Telecoms and ISPs Feed Secret State's Surveillance Machine

Moderators: Elvis, DrVolin, Jeff

Telecoms and ISPs Feed Secret State's Surveillance Machine

Postby American Dream » Thu Dec 10, 2009 8:59 pm

http://antifascist-calling.blogspot.com ... -isps.html

THURSDAY, DECEMBER 10, 2009

Following the Money Trail: Telecoms and ISPs Feed the Secret State's Surveillance Machine



"Follow the money."

And why not. As the interface between state and private criminality, following the money trail is oxygen and combustible fuel for rooting out corruption in high places: indelible signs left behind like toxic tracks by our sociopathic masters.

After all, there's nothing quite like exposing an exchange of cold, hard cash from one greedy fist to another to focus one's attention on the business at hand.

And when that dirty business is the subversion of the American people's right to privacy, there's also nothing quite like economic self-interest for ensuring that a cone of silence descends over matters best left to the experts; a veritable army of specialists squeezing singular advantage out of any circumstance, regardless of how dire the implications for our democracy.

In light of this recommendation researcher Christopher Soghoian, deploying the tools of statistical analysis and a keen sense of outrage, reaffirmed that "Internet service providers and telecommunications companies play a significant, yet little known role in law enforcement and intelligence gathering."

That the American people have been kept in the dark when it comes to this and other affairs of state, remain among the most closely-guarded open secrets of what has euphemistically been called the "NSA spying scandal."

And when the Electronic Frontier Foundation (EFF) posted thousands of pages of documents "detailing behind-the-scenes negotiations between government agencies and Congress about providing immunity for telecoms involved in illegal government surveillance" last month, they lifted the lid on what should be a major scandal, not that corporate media paid the least attention.

A lid that Obama's "change" regime hopes to slam back down as expeditiously as possible.

Hoping to forestall public suspicions of how things actually work in Washington, the administration has declared that "it will continue to block the release of additional documents, including communications within the Executive Branch and records reflecting the identities of telecoms involved in lobbying for immunity," according to EFF's Senior Staff Attorney Kurt Opsahl.

No small matter, considering that should a court ever find avaricious telecoms and ISPs liable for violating the rights of their customers, fines could mount into the billions. Even in today's climate of corporate bailouts and "too big to fail" cash gifts to executive suite fraudsters, damages, both in monetary terms and adverse publicity, would hardly be chump change.

Hence, last year's mad scramble for the retroactive immunity avidly sought by these grifters and granted by congressional con men on both sides of the aisle when they passed the despicable FISA Amendments Act, hastily signed into law by our former "war president."

Without belaboring the point that corporate media largely failed to expose the extent of the dirty deals struck amongst these scofflaws, Soghoian, a graduate student no less, stepped into the breech and filled some necessary gaps in the surveillance story.

Believing, naïvely perhaps, that numbers don't lie and that laying out the facts might just wake us from our deadly slumber, Soghoian writes: "If you were to believe the public surveillance statistics, you might come away with the idea that government surveillance is exceedingly rare in the United States."

Indeed, "the vast majority of ... [court] intercept orders are for phone wiretaps. Thus, for example, of the 1891 intercept orders granted in 2008, all but 134 of them were issued for phone taps."

Which begs the question: "How often are Internet communications being monitored, and what kind of orders are required in order to do so."

Unsurprisingly, the threshold for obtaining personal records is exceedingly low and "very few of these methods require an intercept order."

All the government need do to obtain a pen register or trap and trace order, which examine to/from/subject lines of email messages, URLs of viewed web pages, search terms, telephone numbers dialed and the like, is to unilaterally declare that information obtained via this backdoor route is "relevant" to an ongoing criminal or counterterrorist investigation.

In other words, give us everything we want and move along!

The nation's telecoms and ISPs have been very accommodating in this regard. And, as with other recent historical examples that come to mind such as the rush by U.S. firms to "rebuild" Iraq, Afghanistan and other benighted nations "liberated" by that "shining city upon a hill" that bombs, maims and generally does what it pleases because it can, servicing the secret state's limitless appetite for "actionable intelligence" has proven to be a very lucrative cash cow indeed.

Open a Can of Worms and Blood-Sucking Night Crawlers Slither Out

Deciding to "follow the money," Soghoian hoped "to determine how often Internet firms were disclosing their customers' private information to the government." As often as possible as it turns out. Describing the nexus between Sprint Nextel and the secret state, Soghoian discloses:

Sprint Nextel provided law enforcement agencies with its customers' (GPS) location information over 8 million times between September 2008 and October 2009. This massive disclosure of sensitive customer information was made possible due to the roll-out by Sprint of a new, special web portal for law enforcement officers.

The evidence documenting this surveillance program comes in the form of an audio recording of Sprint's Manager of Electronic Surveillance, who described it during a panel discussion at a wiretapping and interception industry conference, held in Washington DC in October of 2009.

It is unclear if Federal law enforcement agencies' extensive collection of geolocation data should have been disclosed to Congress pursuant to a 1999 law that requires the publication of certain surveillance statistics--since the Department of Justice simply ignores the law, and has not provided the legally mandated reports to Congress since 2004.
(Christopher Soghoian, "8 Million Reasons for Real Surveillance Oversight," Slight Paranoia, December 1, 2009)

A web portal I might add, equipped with a built-in price list ready-made for charging securocrats who spy on our blog posts, emails, web searches, mobile phone pings; indeed, any data the government might deem worthy of an "investigation." Call it a PayPal for spooks; now how's that for convenience!

How did Soghoian dig up the facts on the firm's lucrative arrangement with the government? In October, he attended the ISS World 2009 conference, Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering (ISS), described by Wired as "a surveillance industry gathering for law enforcement and intelligence agencies and the companies that provide them with the technologies and capabilities to conduct surveillance."

Closed to the media and the public, the enterprising researcher obtained entry as a graduate student and recorded several sessions, since taken down at the insistence of ISS's corporate master TeleStrategies, who hosted the conference.

Describing itself as "the leading producer of telecommunications conference events in the United States," the firm claimed that Soghoian's recordings "violated copyright law." But not having deep pockets to weather a Digital Millennium Copyright Act (DMCA) takedown fight, he removed the files from his blog.

Inquiring minds can't help but wonder what was so threatening to the corporatist apple cart that they threatened to bring their thumb down, on a student no less? Let's take a look!

Among the sponsors of this year's ISS confab, one finds the usual low-key suspects manning the exhibits, hawking their wares and delivering learned presentations to their "partners" in the intelligence and security "community."

Leading the pack is ETI Group, self-described as "a leading management consulting firm specializing in Process Management and Improvement." As a "leading provider" of so-called "lawful interception solutions" for security agencies, telecoms and ISPs, ETI Group provide "future proof and scalable platforms" for the acquisition of information from "multiple sources."

NICE Systems, another "leading provider" of what it calls "Insight from Interactions solutions" derived from the "the convergence of advanced analytics of unstructured multimedia content and transactional data--from telephony, web, email, radio, video and other data sources." Partners in the "Security Sector" include, among others, Raytheon, Honeywell, Siemens, Lockheed Martin, HP, Tyco and Motorola, all of whom are heavy-hitters in the Military-Industrial-Intelligence Complex and niche players in the burgeoning electronic surveillance industry in their own right.

Next up is SAP, a firm whose Government Support & Services division provide "a comprehensive range" of "enterprise software applications" to "help the analysts of the Intelligence Community" obtain "timely, accurate, objective and relevant intelligence." One can only wonder whether Doug Feith's shop over at the Pentagon deployed SAP "solutions" to find Saddam's "weapons of mass destruction" during the run-up to the Iraq invasion!

Taking their turn on the dais is Spectronic Systems, a Danish firm that is "100% privately owned." Little however, could be gleaned from a perusal of their web site since the company kindly informs us that it "is strictly for the benefit of Government Agencies, Law Enforcement Agencies, Intelligence Agencies and Government Approved companies." However, ISS World was good enough to disclose that Spectronic activities include "the development and manufacturing of monitoring systems and monitoring centres" for telephone, internet, fax and modem traffic. Their systems are designed to "handle--i.e. retrieve, collect, decode, store and present--bulk data," that can double as "data retention systems" for "bulk monitoring of SMS, MMS, e-mails or other means of data communication." But how beneficial is it to the bottom line? Alas, a diligent search of the business press by this writer hit a veritable blank wall.

SS8 on the other hand is more forthcoming, claiming that their "products" allow intelligence agencies to "visualize and analyze a target's internet session" and to "recognize, monitor, investigate and prevent criminal activity." Proud that they have a "global reach," SS8 broadcasts that their "electronic surveillance solutions" are "deployed in over 25 countries" and that their data installations "can intercept more than 100 million subscribers." The firm's platform for internet, WiFi, broadband and satellite interception claims to be capable of ferreting out "hidden relationships" while identifying "trends" (code for data mining and social network analysis) that "meet the functional needs" of the secret state.

Telesoft Technologies, produce "monitoring probes" that "allow data extraction" from "cellular and fixed networks." This can be done for "fixed, 2/3G mobile and packet networks." According to the firm, their "universal passive probes extract call content, signalling [sic] and location information for use by monitoring applications," ensuring a seamless connection" of applications to "real world systems."

True Position; this firm's national security brief involves the identification and tracking of any mobile device in "real time" and offer "insightful intelligence" while "delivering powerful solutions" that "enable private enterprises and government agencies" the capability "to protect people, combat crime, and save lives like never before." According to the company's web site, the firm deploys data mining technologies that "monitor activity and behavior over time in order to build detailed profiles and identify others that they associate with."

Last, but certainly not least, is the ultra-spooky Israeli firm, Verint (formerly Comverse Infosys). Billing itself as the world leader in "actionable intelligence," readers are well-advised to peruse the documents on Verint products such as Reliant and Star Gate generously posted by our good friends over at the whistleblowing web site Quintessenz. And while your at it, why not check out AFC's piece, "Thick as Thieves: The Private (and very profitable) World of Corporate Spying," where information on the shady activities of the firm's founder, Kobi Alexander, can be found. Currently holed-up in Windhoek, Namibia after becoming the recipient of a 2006 thirty-two count indictment by the Justice Department that charged the ex-Israeli intelligence officer and entrepreneur with backdating millions of stock options worth $138 million, Alexander is a sterling representative of an industry dedicated to "lawful interception" of our electronic communications to "prevent criminal activity."

Amongst the exhibitors at ISS World, one finds (yet another) spooky Israeli firm Narus, whose hardware was a permanent "guest" in ATT/NSA "secret rooms" scattered around the country for surveillance of the entire Internet. First disclosed by ATT whistleblower Mark Klein in his sworn affidavit on behalf of EFF's lawsuit, Hepting v. ATT, the firm's STA 6400 traffic analyzer can monitor traffic equal to 39,000 DSL lines at 10 Gbit/s, or in practical terms, a single Narus machine can surveil several million broadband users at any given time. In 2004, the former Deputy Director of NSA, William Crowell joined the firm's board of directors. As a result of FAA's retroactive immunity provision, Hepting v. ATT was dismissed in 2009.

Which brings us full-circle to Sprint Nextel's spiffy new web portal that enables the secret state to "ping" their customers' GPS locations eight million times in the space of a year.

Tip of the Proverbial Iceberg

Hoping to learn more, Soghoian filed multiple Freedom of Information Act (FOIA) requests with the Department of Justice, seeking relevant details on just how much these corporate grifters charge our silent guardians for their electronic spying.

It was at that point that Soghoian ran into a brick wall. When he uncovered evidence that the illicit surveillance compact amongst federal security agencies, telecoms and ISPs was a limitless gold mine enriching shareholders at the expense of our constitutional rights, the firms struck back.

"Verizon and Yahoo intervened and filed an objection on grounds that, among other things, they would be ridiculed and publicly shamed were their surveillance price sheets made public," Wired reported December 1.

What do these firms have to hide? Apparently, quite a lot.

Yahoo and Verizon weren't about to release the data and filed a 12-page objection letter with the Justice Department, claiming that if their pricing information were disclosed to Soghoian he would use it for nefarious ends "to 'shame' Yahoo and other companies--and to 'shock' their customers."

Cryptome Delivers the Goods, Again

Despite their whining, the indefatigable John Young, webmaster of the intelligence and security whistleblowing web site Cryptome, has published the Yahoo! Compliance Guide for Law Enforcement.

The 17-page handy guide for spooks and cops provides information on what the firm can and will provide the secret state (everything) and what it will cost.

Cryptome, never a site to run from a fight, has also posted the compliance guides of AT&T, Verizon, Sprint, Voicestream, Cox, Cingular, SBC, and Pacific Telesis.

As Antifascist Calling has averred many times, since the business of America's security is, after all, business, let's just say the "service" Yahoo provides our nation's spooks doesn't come cheap.

For his sterling efforts to inform the public, Young has been threatened by Yahoo attorneys with the tony Washington law firm Steptoe & Johnson.

In a series of communications with Young, Yahoo's lawyers are threatening legal action in the form of a Digital Millennium Copyright Act (DMCA) takedown notice, claiming that "the unauthorized use and distribution of this document ... infringes Yahoo's intellectual property rights and constitutes a violation of U.S. copyright law."

Attorney Michael T. Gershberg's tersely worded missive, alleges that the posted spy guide "also infringes Yahoo's trade secrets and constitutes business interference."

Young fired back December 2: "The Yahoo document hosted on Cryptome was found on the Internet at a publicly accessible site.

"There is no copyright notice on the document. Would you please provide substantiation that the document is copyrighted or otherwise protected by DMCA? Your letter does not provide more than assertion without evidence."

Gershberg countered: "On behalf of our client, Yahoo! Inc., attached please find a notice of copyright infringement pursuant to Section 512 of the Digital Millennium Copyright Act. Thank you for your cooperation in this matter."

Undeterred, Young shot back: "I cannot find at the Copyright Office a grant of copyright for the Yahoo spying document hosted on Cryptome. To assure readers Yahoo's copyright claim is valid and not another hoary bluff without substantiation so common under DMCA bombast please send a copy of the copyright grant for publication on Cryptome."

Continuing, Young wrote: "Until Yahoo provides proof of copyright, the document will remain available to the public for it provides information that is in the public interest about Yahoo's contradictory privacy policy and should remain a topic of public debate on ISP unacknowledged spying complicity with officials for lucrative fees."

According to Cryptome, "The information in the document which counters Yahoo's customer privacy policy suggests a clearing of the air is in order to assure customer reliance on Yahoo's published promises of trust. A rewrite of Yahoo's spying guide to replace the villainous one would be a positive step, advice of an unpaid, non-lawyerly independent panel could be sought to avoid the stigma associated with DMCA coercion.

"Note: Yahoo's exclamation point is surely trademarked so omitted here."

Commenting on the spy guide, Wired reported,

The Compliance Guide reveals, for example, that Yahoo does not retain a copy of e-mails that an account holder sends unless that customer sets up the account to store those e-mails. Yahoo also cannot search for or produce deleted e-mails once they've been removed from a user's trash file.

The guide also reveals that the company retains the IP addresses from which a user logs in for just one year. But the company's logs of IP addresses used to register new accounts for the first time go back to 1999. The contents of accounts on Flickr, which Yahoo also owns, are purged as soon as a user deactivates the account.

Chats conducted through the company's Web Messenger service may be saved on Yahoo's server if one of the parties in the correspondence set up their account to archive chats. This pertains to the web-based version of the chat service, however. Yahoo does not have the content of chats for consumers who use the downloadable Web Messenger client on their computer.

Instant message logs are retained 45 to 60 days and includes an account holder's friends list, and the date and times the user communicated with them.
(Kim Zetter, "Yahoo Issues Takedown Notice for Spying Price List," Wired, December 4, 2009)

Well, just how much does Yahoo charge for their dubious shenanigans with the secret state? Wired reports: "According to this list, Yahoo charges the government about $30 to $40 for the contents, including e-mail, of a subscriber's account. It charges $40 to $80 for the contents of a Yahoo group."

Do the math for millions of customers whose rights have been abused and violated and pretty soon we're talking serious money!

Is this what Yahoo and Verizon mean when they claim that should their surveillance price lists be publicly disclosed to they would be used "to 'shame' Yahoo! and other companies--and to 'shock' their customers."

"Therefore," the company avers, "release of Yahoo's information is reasonably likely to lead to impairment of its reputation for protection of user privacy and security, which is a competitive disadvantage for technology companies."

Well guess what, guilty as charged! Now that the information has been widely posted and mirrored by the global whistleblowers Wikileaks and countless other web sites, we should consider the alarming implications of Christopher Soghoian's essential research to our privacy and democratic rights and act accordingly.

Barring a mechanism that guarantees public accountability from the secret state and their grifting corporate partners, we are left with no alternative but to name and shame. After all, democracy is a spectator sport!
American Dream
 
Posts: 19946
Joined: Sat Sep 15, 2007 4:56 pm
Location: Planet Earth
Blog: View Blog (0)

Re: Telecoms and ISPs Feed Secret State's Surveillance Machine

Postby American Dream » Sun Jan 31, 2010 7:47 pm

http://antifascist-calling.blogspot.com ... -with.html

SUNDAY, JANUARY 31, 2010

Court Tosses NSA Spy Suits, Sides with White House Over Illegal Surveillance



In late January, the Justice Department's Office of the Inspector General released a report that provided startling new details on illegal operations by the FBI's Communications Analysis Unit (CAU) and America's grifting telecoms.

For years, AT&T, Verizon, MCI and others fed the Bureau phone records of journalists and citizens under the guise of America's endless, and highly profitable, "War on Terror."

Between 2002 and 2007, the FBI illegally collected more than 4,000 U.S. telephone records, citing bogus terrorism threats or simply by persuading telephone companies to hand over the records. Why? Because the FBI could and the telecoms were more than willing to help out a "friend"--and reap profits accrued by shredding the Constitution in the process.

So egregious had these practices become that "based on nothing more than e-mail messages or scribbled requests on Post-it notes, the phone employees turned over customer calling records" to the FBI, The New York Times reported.

And when questions about these dodgy practices were raised internally, top FBI managers "up to the assistant director level" approved CAU's blatantly illegal methodology and responded by "crafting a 'blanket' national security letter to authorize all past searches that had not been covered by open cases," The Washington Post disclosed.

"On some occasions" according to the Times, "the phone employees allowed the F.B.I. to upload call records to government databases. On others, they allowed agents to view records on their computer screens, a practice that became known as 'sneak peeks'."

"But in a surprise buried at the end of the 289-page report" Wired disclosed, "the inspector general also reveals that the Obama administration issued a secret rule almost two weeks ago saying it was legal for the FBI to have skirted federal privacy protections."

Investigative journalist Ryan Singel revealed that the "Obama administration retroactively legalized the entire fiasco through a secret ruling from the Office of Legal Counsel nearly two weeks ago."

"That's the same office" Singel writes, "from which John Yoo blessed President George W. Bush's torture techniques and warrantless wiretapping of Americans' communications that crossed the border."

While corporate media frame these stories as if they were practices of the far-distant Bushist past, former telephone technician and AT&T whistleblower Mark Klein, who leaked documents on the existence of secret NSA-controlled spy rooms embedded in AT&T switching offices across the country, believes otherwise.

Klein told Wired journalist David Kravets January 29, that the President's Surveillance Program (PSP) and internal AT&T documents suggest that the program "was just the tip of an eavesdropping iceberg."

According to Klein, these programs are not "targeted" against suspected terrorists but rather "show an untargeted, massive vacuum cleaner sweeping up millions of peoples' communications every second automatically."

Yet despite overwhelming evidence of lawbreaking by the secret state and their corporate partners, on January 21 U.S. District Chief Judge Vaughn Walker tossed out the EFF's lawsuit, Jewell v. NSA, filed on behalf of AT&T customers fighting the National Security Agency's illegal operations that target millions of citizens' phone calls, emails and web searches.

In a cowardly ruling that skirts the issue of Americans' privacy rights, Walker reaffirmed the unlimited power of the so-called "Unitary Executive," Bushist double-speak for a presidential dictatorship; a position embraced by current Oval Office resident, the discredited "change" President, Barack Obama.

In a further sign that the Executive Branch and secret state agencies are above the law, Walker ruled that harm done to U.S. citizens and legal residents under the PSP, was not a "particularized injury" but instead was a "generalized grievance" because almost everyone in the United States has a phone and Internet service.

Chillingly, Walker asserted that "a citizen may not gain standing by claiming a right to have the government follow the law." This pitiful summary judgement merely affirms the obvious: America is a lawless state where neither citizens nor "co-equal" branches of government, Congress and the Courts, can challenge the quintessentially political decisions made in secret by the Executive Branch.

Despite the fact that an audit by the Justice Department's own Office of the Inspector General found that the FBI and telecom grifters colluded together to violate federal wiretapping laws, to wit, the Electronic Communications Protection Act (ECPA) and continue to do so today, Walker's ruling means that Americans are left without an legal mechanism to redress the systematic destruction of their rights.

According to enforcement provisions of ECPA: "A court issuing an order under this section against a telecommunications carrier, a manufacturer of telecommunications transmission or switching equipment, or a provider of telecommunications support services may impose a civil penalty of up to $10,000 per day for each day in violation after the issuance of the order or after such future date as the court may specify."

It is all-too-clear that were these lawsuits to go forward and the telecoms lose, the giant phone companies and internet service providers, which the Justice Department was forced to admit in court papers are an "arm of the government ... when it comes to secret spying," as Wired reported in October, would potentially face astronomical fines.

Strip away Walker's mendacious reasoning and what we're left with is another in an endless series of moves by the capitalist state to defend the interests of their political masters: the corporate oligarchy and financial swindlers who resort to police state methods of rule to shore-up a crumbling empire.

EFF Senior Staff Attorney Kevin Bankston denounced the ruling and said, "The alarming upshot of the court's decision is that so long as the government spies on all Americans, the courts have no power to review or halt such mass surveillance even when it is flatly illegal and unconstitutional."

Last June, Walker dismissed EFF's Hepting v. AT&T lawsuit that targeted illegal collaboration between AT&T and the NSA. In that case, the court ruled that the telecoms enjoyed retroactive immunity from liability when the Democratic-controlled Congress, and then-Senator and corporatist presidential candidate Barack Obama, voted in favor of the despicable FISA Amendments Act (FAA).

Antifascist Calling reported that the Obama administration argued that Jewell too, must be dismissed on similar grounds. Taking a page from the Bush/Cheney playbook, the government claimed that should Jewell go forward, it would require disclosure of "privileged state secrets."

As I wrote at the time, the claim of "sovereign immunity" and a "state secrets" privilege means that the government can never be held accountable for blatant illegalities under any federal statute. In other words, under such conditions the "rule of law" is a fraudulent exercise and gross criminality, when sanctioned at the highest levels of the state, becomes the norm as formerly democratic and republican forms of self-governance slip ineluctably towards the abyss of presidential dictatorship.

Following in the footsteps of his White House predecessor, the cynical nature of Obama's rhetoric is all the more remarkable, considering that the president announced last September amid great fanfare that his administration will "impose new limits on the government assertion of the state secrets privilege used to block lawsuits for national security reasons," according to The New York Times.

Despite administration posturing that it would be the most "open" in history, "more than 300 individuals and groups have sued the government to get records" in the year since Obama assumed office, The Washington Post reported January 27.

"In case after case" the Post disclosed, "plaintiffs say little has changed since the Bush administration years, when most began their quests for records. Agencies still often fight requests for disclosure, contending that national security and internal decision-making need to be protected."

Nowhere is this penchant for secrecy more pronounced then by the Obama administration's steadfast refusal to turn over the names of telecom lobbyists who bought-off their congressional allies in the run-up to the passage of the FISA Amendments Act of 2008.

The Electronic Frontier Foundation has been litigating a Freedom of Information Act request against the government, demanding that the administration turn over the names of corporate lobbyists who had contacted Congress, the Department of Justice and the Office of the Director of National Intelligence on behalf of their telecom clients bid for retroactive immunity under the FAA.

According to EFF, AT&T, Sprint and Verizon lobbyists forked over bundles of cash, as the watchdog group MAPLight revealed in 2008, when they published a list of campaign contributions to congressional Democrats who changed their votes on FAA once the wheels had been sufficiently greased.

Despite claims of "openness" and "transparency," the administration is still fighting hard to conceal the names of these lobbyists from the American people. In December, EFF reported that the Justice Department "argued to the appeals court that 'there is no public interest in the compelled disclosure of the representatives' identities'."

Having pledged to the American people that his would be an administration based on the rule of law and public accountability, the Obama presidency has proven itself to be just as secretive and mendacious as the Bush/Cheney cabal that ruled the roost for eight long and bloody years.

Our "forward looking" president, and the ruling class elites who have presided over the destruction of our democracy demonstrate on a daily basis the accountability-averse culture that has been a staple of American political life for decades.

While the federal courts toss out suits by citizens demanding that their right to privacy not be sacrificed to corporate looters and their police state accomplices, the architects of torture and driftnet surveillance get a free pass.

Newsweek reported January 29, that a long-awaited report from the Justice Department's Office of Professional Responsibility (OPR) "clears the Bush administration lawyers who authored the 'torture' memos of professional-misconduct allegations."

Leaving aside Newsweek's placement of quotation marks around the word "torture," a practice fully in keeping with the corporate media's consensus that such heinous practices have "kept us safe," Michael Isikoff and Daniel Klaidman write that while the probe "is sharply critical" of the "legal reasoning" used to justify CIA and Pentagon crimes however, "a senior Justice official who did the final review of the report softened an earlier OPR finding."

That earlier version had concluded that two of the key authors of Bushist torture and surveillance policies, Federal Appeals Court Judge Jay Bybee and University of California law professor John Yoo, "violated their professional obligations as lawyers when they crafted a crucial 2002 memo approving the use of harsh tactics."

"But the reviewer" Newsweek notes, "career veteran David Margolis, downgraded that assessment to say they showed 'poor judgment'."

By downgrading OPR's original finding, the Justice Department is no longer obligated to send a referral to state bar associations "for potential disciplinary action--which, in Bybee's case, could have led to an impeachment inquiry."

Despite the tortured reasoning of blind Obama loyalists, Dick Cheney's "Unitary Executive" is alive and well.

After all, Plus ça change, plus c'est la même chose!
American Dream
 
Posts: 19946
Joined: Sat Sep 15, 2007 4:56 pm
Location: Planet Earth
Blog: View Blog (0)

Re: Telecoms and ISPs Feed Secret State's Surveillance Machi

Postby elfismiles » Fri Dec 03, 2010 3:17 pm

Haven't found the thread I'm thinking of yet but ... I recall one on ATT-NSA whistleblower Mark Klein's (I think) hinting that there was some kind of surveillance that went WAY beyond what he was blowing the whistle about.


Feds Warrantlessly Tracking Americans’ Credit Cards in Real Time
By Ryan Singel December 2, 2010 | 5:06 pm | Categories: Surveillance


Federal law enforcement agencies have been tracking Americans in real-time using credit cards, loyalty cards and travel reservations without getting a court order, a new document released under a government sunshine request shows.

The document, obtained by security researcher Christopher Soghoian, explains how so-called “Hotwatch” orders allow for real-time tracking of individuals in a criminal investigation via credit card companies, rental car agencies, calling cards, and even grocery store loyalty programs. The revelation sheds a little more light on the Justice Department’s increasing power and willingness to surveil Americans with little to no judicial or Congressional oversight.

For credit cards, agents can get real-time information on a person’s purchases by writing their own subpoena, followed up by a order from a judge that the surveillance not be disclosed. Agents can also go the traditional route — going to a judge, proving probable cause and getting a search warrant — which means the target will eventually be notified they were spied on.

The document suggests that the normal practice is to ask for all historical records on an account or individual from a credit card company, since getting stored records is generally legally easy. Then the agent sends a request for “Any and all records and information relating directly or indirectly to any and all ongoing and future transactions or events relating to any and all of the following person(s), entitities, account numbers, addresses and other matters…” That gets them a live feed of transaction data.

DOJ powerpoint presentation on Hotwatch surveillance orders of credit card transactions
http://www.scribd.com/doc/44542244/DOJ- ... ansactions


It’s not clear what standards an agent would have to follow to get a “Hotwatch” order. The Justice Department told Sogohian the document is the only one it could find relating to “hotwatches” — which means there is either no policy or the department is witholding relevant documents.

The Justice Department did not return a call for comment.

Every year, the Justice Department does have to report to Congress the numbers of criminal and national security wiretaps undertaken, as well as the number of National Security Letters issued. Tens of thousands of NSLs are issued yearly — most with gag orders that forbid ISPs or librarians from ever saying they have ever been served with such a subpoena.

But the Justice Department does not report or make public the number of times it got real time or historic cell phone location information, nor how often it is using these so-called “hotwatch” orders.

Photo courtesy of TheTruthAbout

See Also:

Feds: Privacy Does Not Exist in ‘Public Places’
Caught Spying on Student, FBI Demands GPS Tracker Back
FBI Use of Patriot Act Authority Increased Dramatically in 2008
FBI Spyware: How Does the CIPAV Work? — UPDATE
Court OKs Warrantless Cell-Site Tracking

http://www.wired.com/threatlevel/2010/12/realtime/



NSA Scrapped Tested, Legal Program for Warrantless Spying
viewtopic.php?f=31&t=7490

Try this trick at home, kids.
viewtopic.php?f=31&t=7550

Ex-AT&T employee:NSA snooping Internet traffic too(11/11
viewtopic.php?f=8&t=14575

Government wants to read ANY email
viewtopic.php?f=8&t=15689

Mukasey: revelation or lie re pre-9/11 phone call?
viewtopic.php?f=8&t=17006

FBI's "Quantico Circuit" -- Still Spying, Lying
viewtopic.php?f=8&t=17125

Police State USA: Spying as Law of the Land
viewtopic.php?f=8&t=19209

rigorous apathy
viewtopic.php?f=8&t=19375

Niche Telecom Providers Assisting NSA Spy Operations
viewtopic.php?f=8&t=20226

James Bamford explains how Israeli companies spy on US
viewtopic.php?f=8&t=22396

Obama's Justice Department Moves to Squash NSA Spying Suits
viewtopic.php?f=8&t=23581

Surveillance
viewtopic.php?f=33&t=23799

Spying in the UK: GCHQ Awards Lockheed Martin £200m Contract
viewtopic.php?f=8&t=23802

National Cyber Range Building Attack Tools
viewtopic.php?f=8&t=24016

Spying on Americans: Obama Endorses Warrantless Taps
viewtopic.php?f=8&t=25785

Telecoms and ISPs Feed Secret State's Surveillance Machine
viewtopic.php?f=8&t=26204
User avatar
elfismiles
 
Posts: 8512
Joined: Fri Aug 11, 2006 6:46 pm
Blog: View Blog (4)


Return to General Discussion

Who is online

Users browsing this forum: No registered users and 7 guests