Edward Snowden, American Hero

Moderators: Elvis, DrVolin, Jeff

Re: Edward Snowden, American Hero

Postby seemslikeadream » Tue Jun 18, 2013 8:30 pm

"The NSA doesn't listen to Americans' phone calls or read their emails w/out first getting a warrant": totally false


Fisa court oversight: a look inside a secret and empty process
Obama and other NSA defenders insist there are robust limitations on surveillance but the documents show otherwise


Glenn Greenwald
guardian.co.uk, Tuesday 18 June 2013 19.36 EDT

Barack Obama discusses the NSA surveillance controversy at a press conference in California this month. Photograph: Evan Vucci/AP
Since we began began publishing stories about the NSA's massive domestic spying apparatus, various NSA defenders – beginning with President Obama - have sought to assure the public that this is all done under robust judicial oversight. "When it comes to telephone calls, nobody is listening to your telephone calls," he proclaimed on June 7 when responding to our story about the bulk collection of telephone records, adding that the program is "fully overseen" by "the Fisa court, a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them". Obama told Charlie Rose last night:

"What I can say unequivocally is that if you are a US person, the NSA cannot listen to your telephone calls … by law and by rule, and unless they … go to a court, and obtain a warrant, and seek probable cause, the same way it's always been, the same way when we were growing up and we were watching movies, you want to go set up a wiretap, you got to go to a judge, show probable cause."

The GOP chairman of the House Intelligence Committee, Mike Rogers, told CNN that the NSA "is not listening to Americans' phone calls. If it did, it is illegal. It is breaking the law." Talking points issued by the House GOP in defense of the NSA claimed that surveillance law only "allows the Government to acquire foreign intelligence information concerning non-U.S.-persons (foreign, non-Americans) located outside the United States."

The NSA's media defenders have similarly stressed that the NSA's eavesdropping and internet snooping requires warrants when it involves Americans. The Washington Post's Charles Lane told his readers: "the government needs a court-issued warrant, based on probable cause, to listen in on phone calls." The Post's David Ignatius told Post readers that NSA internet surveillance "is overseen by judges who sit on the Foreign Intelligence Surveillance Court" and is "lawful and controlled". Tom Friedman told New York Times readers that before NSA analysts can invade the content of calls and emails, they "have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress."

This has become the most common theme for those defending NSA surveillance. But these claim are highly misleading, and in some cases outright false.

Top secret documents obtained by the Guardian illustrate what the Fisa court actually does – and does not do – when purporting to engage in "oversight" over the NSA's domestic spying. That process lacks many of the safeguards that Obama, the House GOP, and various media defenders of the NSA are trying to lead the public to believe exist.

No individualized warrants required under 2008 Fisa law

Many of the reasons these claims are so misleading is demonstrated by the law itself. When the original Fisa law was enacted in 1978, its primary purpose was to ensure that the US government would be barred from ever monitoring the electronic communications of Americans without first obtaining an individualized warrant from the Fisa court, which required evidence showing "probable cause" that the person to be surveilled was an agent of a foreign power or terrorist organization.

That was the law which George Bush, in late 2001, violated, when he secretly authorized eavesdropping on the international calls of Americans without any warrants from that court. Rather than act to punish Bush for those actions, the Congress, on a bipartisan basis in 2008, enacted a new, highly diluted Fisa law – the Fisa Amendments Act of 2008 (FAA) – that legalized much of the Bush warrantless NSA program.

Under the FAA, which was just renewed last December for another five years, no warrants are needed for the NSA to eavesdrop on a wide array of calls, emails and online chats involving US citizens. Individualized warrants are required only when the target of the surveillance is a US person or the call is entirely domestic. But even under the law, no individualized warrant is needed to listen in on the calls or read the emails of Americans when they communicate with a foreign national whom the NSA has targeted for surveillance.

As a result, under the FAA, the NSA frequently eavesdrops on Americans' calls and reads their emails without any individualized warrants – exactly that which NSA defenders, including Obama, are trying to make Americans believe does not take place. As Yale Law professor Jack Balkin explained back in 2009:


"The Fisa Amendments Act of 2008, effectively gives the President - now President Obama - the authority to run surveillance programs similar in effect to the warrantless surveillance program [secretly implemented by George Bush in late 2001]. That is because New Fisa no longer requires individualized targets in all surveillance programs. Some programs may be 'vacuum cleaner' programs that listen to a great many different calls (and read a great many e-mails) with any requirement of a warrant directed at a particular person as long as no US person is directly targeted as the object of the program. . . .

"New Fisa authorizes the creation of surveillance programs directed against foreign persons (or rather, against persons believed to be outside the United States) – which require no individualized suspicion of anyone being a terrorist, or engaging in any criminal activity. These programs may inevitably include many phone calls involving Americans, who may have absolutely no connection to terrorism or to Al Qaeda."

As the FAA was being enacted in mid-2008, Professor Balkin explained that "Congress is now giving the President the authority to do much of what he was probably doing (illegally) before".

The ACLU's Deputy Legal Director, Jameel Jaffer, told me this week by email:

"On its face, the 2008 law gives the government authority to engage in surveillance directed at people outside the United States. In the course of conducting that surveillance, though, the government inevitably sweeps up the communications of many Americans. The government often says that this surveillance of Americans' communications is 'incidental', which makes it sound like the NSA's surveillance of Americans' phone calls and emails is inadvertent and, even from the government's perspective, regrettable.

"But when Bush administration officials asked Congress for this new surveillance power, they said quite explicitly that Americans' communications were the communications of most interest to them. See, for example, Fisa for the 21st Century, Hearing Before the S. Comm. on the Judiciary, 109th Cong. (2006) (statement of Michael Hayden) (stating, in debate preceding passage of FAA's predecessor statute, that certain communications 'with one end in the United States" are the ones "that are most important to us').

The principal purpose of the 2008 law was to make it possible for the government to collect Americans' international communications - and to collect those communications without reference to whether any party to those communications was doing anything illegal. And a lot of the government's advocacy is meant to obscure this fact, but it's a crucial one: The government doesn't need to 'target' Americans in order to collect huge volumes of their communications."

That's why Democratic senators such as Ron Wyden and Mark Udall spent years asking the NSA: how many Americans are having their telephone calls listened to and emails read by you without individualized warrants? Unlike the current attempts to convince Americans that the answer is "none", the NSA repeatedly refused to provide any answers, claiming that providing an accurate number was beyond their current technological capabilities. Obviously, the answer is far from "none".

Contrary to the claims by NSA defenders that the surveillance being conducted is legal, the Obama DOJ has repeatedly thwarted any efforts to obtain judicial rulings on whether this law is consistent with the Fourth Amendment or otherwise legal. Every time a lawsuit is brought contesting the legality of intercepting Americans' communications without warrants, the Obama DOJ raises claims of secrecy, standing and immunity to prevent any such determination from being made.

The emptiness of 'oversight' from the secret Fisa court

The supposed safeguard under the FAA is that the NSA annually submits a document setting forth its general procedures for how it decides on whom it can eavesdrop without a warrant. The Fisa court then approves those general procedures. And then the NSA is empowered to issue "directives" to telephone and internet companies to obtain the communications for whomever the NSA decides – with no external (i.e. outside the executive branch) oversight – complies with the guidelines it submitted to the court.

In his interview with the president last night, Charlie Rose asked Obama about the oversight he claims exists: "Should this be transparent in some way?" Obama's answer: "It is transparent. That's why we set up the Fisa Court." But as Politico's Josh Gerstein noted about that exchange: Obama was "referring to the Foreign Intelligence Surveillance Court – which carries out its work almost entirely in secret." Indeed, that court's orders are among the most closely held secrets in the US government. That Obama, when asked about transparency, has to cite a court that operates in complete secrecy demonstrates how little actual transparency there is to any this.

The way to bring actual transparency to this process it to examine the relevant Top Secret Fisa court documents. Those documents demonstrate that this entire process is a fig leaf, "oversight" in name only. It offers no real safeguards. That's because no court monitors what the NSA is actually doing when it claims to comply with the court-approved procedures. Once the Fisa court puts its approval stamp on the NSA's procedures, there is no external judicial check on which targets end up being selected by the NSA analysts for eavesdropping. The only time individualized warrants are required is when the NSA is specifically targeting a US citizen or the communications are purely domestic.

When it is time for the NSA to obtain Fisa court approval, the agency does not tell the court whose calls and emails it intends to intercept. It instead merely provides the general guidelines which it claims are used by its analysts to determine which individuals they can target, and the Fisa court judge then issues a simple order approving those guidelines. The court endorses a one-paragraph form order stating that the NSA's process "'contains all the required elements' and that the revised NSA, FBI and CIA minimization procedures submitted with the amendment 'are consistent with the requirements of [50 U.S.C. §1881a(e)] and with the fourth amendment to the Constitution of the United States'". As but one typical example, the Guardian has obtained an August 19, 2010, Fisa court approval from Judge John Bates which does nothing more than recite the statutory language in approving the NSA's guidelines.

Once the NSA has this court approval, it can then target anyone chosen by their analysts, and can even order telecoms and internet companies to turn over to them the emails, chats and calls of those they target. The Fisa court plays no role whatsoever in reviewing whether the procedures it approved are actually complied with when the NSA starts eavesdropping on calls and reading people's emails.

The guidelines submitted by the NSA to the Fisa court demonstrate how much discretion the agency has in choosing who will be targeted. Those guidelines also make clear that, contrary to the repeated assurances from government officials and media figures, the communications of American citizens are – without any individualized warrant – included in what is surveilled.

The specific guidelines submitted by the NSA to the Fisa court in July 2009 – marked Top Secret and signed by Attorney General Eric Holder – state that "NSA determines whether a person is a non-United States person reasonably believed to be outside the United States in light of the totality of the circumstances based on the information available with respect to that person, including information concerning the communications facility or facilities used by that person." It includes information that the NSA analyst uses to make this determination – including IP addresses, statements made by the potential target, and other information in the NSA databases.

The decision to begin listening to someone's phone calls or read their emails is made exclusively by NSA analysts and their "line supervisors". There is no outside scrutiny, and certainly no Fisa court involvement. As the NSA itself explained in its guidelines submitted to the Fisa court:

"Analysts who request tasking will document in the tasking database a citation or citations to the information that led them to reasonably believe that a targeted person is located outside the United States. Before tasking is approved, the database entry for that tasking will be reviewed in order to verify that the database entry contains the necessary citations."

The only oversight for monitoring whether there is abuse comes from the executive branch itself: from the DOJ and Director of National Intelligence, which conduct "periodic reviews … to evaluate the implementation of the procedure." At a hearing before the House Intelligence Committee Tuesday afternoon, deputy attorney general James Cole testified that every 30 days, the Fisa court is merely given an "aggregate number" of database searches on US domestic phone records.

Warrantless interception of Americans' communications

Obama and other NSA defenders have repeatedly claimed that "nobody" is listening to Americans' telephone calls without first obtaining warrants. This is simply false. There is no doubt that some of the communications intercepted by the NSA under this warrantless scheme set forth in FAA's section 702 include those of US citizens. Indeed, as part of the Fisa court approval process, the NSA submits a separate document, also signed by Holder, which describes how communications of US persons are collected and what is done with them.

One typical example is a document submitted by the NSA in July 2009. In its first paragraph, it purports to set forth "minimization procedures" that "apply to the acquisition, retention, use, and dissemination of non-publicly available information concerning unconsenting United States persons that is acquired by targeting non-United States persons reasonably believed to be located outside the United States in accordance with section 702 of the Foreign Intelligence Surveillance Act of 1978, as amended."

That document provides that "communications of or concerning United States persons that may be related to the authorized purpose of the acquisition may be forwarded to analytic personnel responsible for producing intelligence information from the collected data." It also states that "such communications or information" - those from US citizens - "may be retained and disseminated" if it meets the guidelines set forth in the NSA's procedures.

Those guidelines specifically address what the NSA does with what it calls "domestic communications", defined as "communications in which the sender and all intended recipients are reasonably believed to be located in the United States at the time of acquisition". The NSA expressly claims the right to store and even disseminate such domestic communication if: (1) "it is reasonably believed to contain significant foreign intelligence information"; (2) "the communication does not contain foreign intelligence information but is reasonably believed to contain evidence of a crime that has been, is being, or is about to be committed"; or (3) "the communication is reasonably believed to contain technical data base information, as defined in Section 2(i), or information necessary to understand or assess a communications security vulnerability."

Although it refuses to say how many Americans have their communications intercepted without warrants, there can be no question that the NSA does this. That's precisely why they have created elaborate procedures for what they do when they end up collecting Americans' communications without warrants.

Vast discretion vested in NSA analysts

The vast amount of discretion vested in NSA analysts is also demonstrated by the training and briefings given to them by the agency. In one such briefing from an official with the NSA's general counsel's office - a top secret transcript of which was obtained by the Guardian, dated 2008 and then updated for 2013 - NSA analysts are told how much the new Fisa law diluted the prior standards and how much discretion they now have in deciding whose communications to intercept:


"The court gets to look at procedures for saying that there is a reasonable belief for saying that a target is outside of the United States. Once again - a major change from the targeting under Fisa. Under Fisa you had to have probable cause to believe that the target was a foreign power or agent of a foreign power. Here all you need is a reasonable belief that the target is outside of the United States ...

"Now, all kinds of information can be used to this end. There's a list in the targeting procedures: phone directories, finished foreign intelligence, NSA technical analysis of selectors, lead information. Now, you don't have to check a box in every one of those categories. But you have to look at everything you've got and make a judgment. Looking at everything, do you have a reasonable belief that your target is outside the United States? So, cast your search wide. But don't feel as though you have to have something in every category. In the end, what matters is, 'Does all that add up to a reasonable belief that your target is outside the United States?'"

So vast is this discretion that NSA analysts even have the authority to surveil communications between their targets and their lawyers, and that information can be not just stored but also disseminated. NSA procedures do not ban such interception, but rather set forth procedures to be followed in the event that the NSA analyst believes they should be "disseminated".

The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.

Legal constraints v technical capabilities

What is vital to recognize is that the NSA is collecting and storing staggering sums of communications every day. Back in 2010, the Washington Post reported that "every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." Documents published by the Guardian last week detail that, in March 2013, the NSA collected three billions of pieces of intelligence just from US communications networks alone.

In sum, the NSA is vacuuming up enormous amounts of communications involving ordinary Americans and people around the world who are guilty of nothing. There are some legal constraints governing their power to examine the content of those communications, but there are no technical limits on the ability either of the agency or its analysts to do so. The fact that there is so little external oversight is what makes this sweeping, suspicion-less surveillance system so dangerous. It's also what makes the assurances from government officials and their media allies so dubious.

A senior US intelligence official told the Guardian: "Under section 702, the Fisa court has to approve targeting and minimization procedures adopted by the Attorney General, in consultation with the Director of National Intelligence."

"The targeting procedures ensure that the targets of surveillance are reasonably believed to be non-US persons outside of the US", the official added.

"Moreover, decisions about targeting are memorialized, reviewed on a regular basis and audited. Moreover, Congress clearly understood that even when the government is targeting foreign persons for collection, communications of US persons may be acquired if those persons are in communication with the foreign targets, for example as was testified to in today's hearing when Najibullah Zazi communicated with a foreign terrorist whose communications were being targeted under Section 702.

"That," the official continued, "is why the statute requires that there be minimization procedures to ensure that when communications of, or concerning, US persons are acquired in the course of lawful collection under Section 702, that information is minimized and is retained and disseminated only when appropriate. These procedures are approved on an annual basis by the Fisa court.

"Compliance with them is extensively overseen by the intelligence community, the DOJ, the ODNI and Inspectors General," the official said. "Both the Fisa court and Congress receive regular reports on compliance."
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Edward Snowden, American Hero

Postby seemslikeadream » Wed Jun 19, 2013 9:13 am

Fisa court oversight: a look inside a secret and empty process
Obama and other NSA defenders insist there are robust limitations on surveillance but the documents show otherwise

Glenn Greenwald
guardian.co.uk, Tuesday 18 June 2013 19.36 EDT

Since we began began publishing stories about the NSA's massive domestic spying apparatus, various NSA defenders – beginning with President Obama - have sought to assure the public that this is all done under robust judicial oversight. "When it comes to telephone calls, nobody is listening to your telephone calls," he proclaimed on June 7 when responding to our story about the bulk collection of telephone records, adding that the program is "fully overseen" by "the Fisa court, a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them". Obama told Charlie Rose last night:

"What I can say unequivocally is that if you are a US person, the NSA cannot listen to your telephone calls … by law and by rule, and unless they … go to a court, and obtain a warrant, and seek probable cause, the same way it's always been, the same way when we were growing up and we were watching movies, you want to go set up a wiretap, you got to go to a judge, show probable cause."

The GOP chairman of the House Intelligence Committee, Mike Rogers, told CNN that the NSA "is not listening to Americans' phone calls. If it did, it is illegal. It is breaking the law." Talking points issued by the House GOP in defense of the NSA claimed that surveillance law only "allows the Government to acquire foreign intelligence information concerning non-U.S.-persons (foreign, non-Americans) located outside the United States."

The NSA's media defenders have similarly stressed that the NSA's eavesdropping and internet snooping requires warrants when it involves Americans. The Washington Post's Charles Lane told his readers: "the government needs a court-issued warrant, based on probable cause, to listen in on phone calls." The Post's David Ignatius told Post readers that NSA internet surveillance "is overseen by judges who sit on the Foreign Intelligence Surveillance Court" and is "lawful and controlled". Tom Friedman told New York Times readers that before NSA analysts can invade the content of calls and emails, they "have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress."

This has become the most common theme for those defending NSA surveillance. But these claim are highly misleading, and in some cases outright false.

Top secret documents obtained by the Guardian illustrate what the Fisa court actually does – and does not do – when purporting to engage in "oversight" over the NSA's domestic spying. That process lacks many of the safeguards that Obama, the House GOP, and various media defenders of the NSA are trying to lead the public to believe exist.

No individualized warrants required under 2008 Fisa law

Many of the reasons these claims are so misleading is demonstrated by the law itself. When the original Fisa law was enacted in 1978, its primary purpose was to ensure that the US government would be barred from ever monitoring the electronic communications of Americans without first obtaining an individualized warrant from the Fisa court, which required evidence showing "probable cause" that the person to be surveilled was an agent of a foreign power or terrorist organization.

That was the law which George Bush, in late 2001, violated, when he secretly authorized eavesdropping on the international calls of Americans without any warrants from that court. Rather than act to punish Bush for those actions, the Congress, on a bipartisan basis in 2008, enacted a new, highly diluted Fisa law – the Fisa Amendments Act of 2008 (FAA) – that legalized much of the Bush warrantless NSA program.

Under the FAA, which was just renewed last December for another five years, no warrants are needed for the NSA to eavesdrop on a wide array of calls, emails and online chats involving US citizens. Individualized warrants are required only when the target of the surveillance is a US person or the call is entirely domestic. But even under the law, no individualized warrant is needed to listen in on the calls or read the emails of Americans when they communicate with a foreign national whom the NSA has targeted for surveillance.

As a result, under the FAA, the NSA frequently eavesdrops on Americans' calls and reads their emails without any individualized warrants – exactly that which NSA defenders, including Obama, are trying to make Americans believe does not take place. As Yale Law professor Jack Balkin explained back in 2009:


"The Fisa Amendments Act of 2008, effectively gives the President - now President Obama - the authority to run surveillance programs similar in effect to the warrantless surveillance program [secretly implemented by George Bush in late 2001]. That is because New Fisa no longer requires individualized targets in all surveillance programs. Some programs may be 'vacuum cleaner' programs that listen to a great many different calls (and read a great many e-mails) with any requirement of a warrant directed at a particular person as long as no US person is directly targeted as the object of the program. . . .

"New Fisa authorizes the creation of surveillance programs directed against foreign persons (or rather, against persons believed to be outside the United States) – which require no individualized suspicion of anyone being a terrorist, or engaging in any criminal activity. These programs may inevitably include many phone calls involving Americans, who may have absolutely no connection to terrorism or to Al Qaeda."

As the FAA was being enacted in mid-2008, Professor Balkin explained that "Congress is now giving the President the authority to do much of what he was probably doing (illegally) before".

The ACLU's Deputy Legal Director, Jameel Jaffer, told me this week by email:

"On its face, the 2008 law gives the government authority to engage in surveillance directed at people outside the United States. In the course of conducting that surveillance, though, the government inevitably sweeps up the communications of many Americans. The government often says that this surveillance of Americans' communications is 'incidental', which makes it sound like the NSA's surveillance of Americans' phone calls and emails is inadvertent and, even from the government's perspective, regrettable.

"But when Bush administration officials asked Congress for this new surveillance power, they said quite explicitly that Americans' communications were the communications of most interest to them. See, for example, Fisa for the 21st Century, Hearing Before the S. Comm. on the Judiciary, 109th Cong. (2006) (statement of Michael Hayden) (stating, in debate preceding passage of FAA's predecessor statute, that certain communications 'with one end in the United States" are the ones "that are most important to us').

The principal purpose of the 2008 law was to make it possible for the government to collect Americans' international communications - and to collect those communications without reference to whether any party to those communications was doing anything illegal. And a lot of the government's advocacy is meant to obscure this fact, but it's a crucial one: The government doesn't need to 'target' Americans in order to collect huge volumes of their communications."

That's why Democratic senators such as Ron Wyden and Mark Udall spent years asking the NSA: how many Americans are having their telephone calls listened to and emails read by you without individualized warrants? Unlike the current attempts to convince Americans that the answer is "none", the NSA repeatedly refused to provide any answers, claiming that providing an accurate number was beyond their current technological capabilities. Obviously, the answer is far from "none".

Contrary to the claims by NSA defenders that the surveillance being conducted is legal, the Obama DOJ has repeatedly thwarted any efforts to obtain judicial rulings on whether this law is consistent with the Fourth Amendment or otherwise legal. Every time a lawsuit is brought contesting the legality of intercepting Americans' communications without warrants, the Obama DOJ raises claims of secrecy, standing and immunity to prevent any such determination from being made.

The emptiness of 'oversight' from the secret Fisa court

The supposed safeguard under the FAA is that the NSA annually submits a document setting forth its general procedures for how it decides on whom it can eavesdrop without a warrant. The Fisa court then approves those general procedures. And then the NSA is empowered to issue "directives" to telephone and internet companies to obtain the communications for whomever the NSA decides – with no external (i.e. outside the executive branch) oversight – complies with the guidelines it submitted to the court.

In his interview with the president last night, Charlie Rose asked Obama about the oversight he claims exists: "Should this be transparent in some way?" Obama's answer: "It is transparent. That's why we set up the Fisa Court." But as Politico's Josh Gerstein noted about that exchange: Obama was "referring to the Foreign Intelligence Surveillance Court – which carries out its work almost entirely in secret." Indeed, that court's orders are among the most closely held secrets in the US government. That Obama, when asked about transparency, has to cite a court that operates in complete secrecy demonstrates how little actual transparency there is to any this.

The way to bring actual transparency to this process it to examine the relevant Top Secret Fisa court documents. Those documents demonstrate that this entire process is a fig leaf, "oversight" in name only. It offers no real safeguards. That's because no court monitors what the NSA is actually doing when it claims to comply with the court-approved procedures. Once the Fisa court puts its approval stamp on the NSA's procedures, there is no external judicial check on which targets end up being selected by the NSA analysts for eavesdropping. The only time individualized warrants are required is when the NSA is specifically targeting a US citizen or the communications are purely domestic.

When it is time for the NSA to obtain Fisa court approval, the agency does not tell the court whose calls and emails it intends to intercept. It instead merely provides the general guidelines which it claims are used by its analysts to determine which individuals they can target, and the Fisa court judge then issues a simple order approving those guidelines. The court endorses a one-paragraph form order stating that the NSA's process "'contains all the required elements' and that the revised NSA, FBI and CIA minimization procedures submitted with the amendment 'are consistent with the requirements of [50 U.S.C. §1881a(e)] and with the fourth amendment to the Constitution of the United States'". As but one typical example, the Guardian has obtained an August 19, 2010, Fisa court approval from Judge John Bates which does nothing more than recite the statutory language in approving the NSA's guidelines.

Once the NSA has this court approval, it can then target anyone chosen by their analysts, and can even order telecoms and internet companies to turn over to them the emails, chats and calls of those they target. The Fisa court plays no role whatsoever in reviewing whether the procedures it approved are actually complied with when the NSA starts eavesdropping on calls and reading people's emails.

The guidelines submitted by the NSA to the Fisa court demonstrate how much discretion the agency has in choosing who will be targeted. Those guidelines also make clear that, contrary to the repeated assurances from government officials and media figures, the communications of American citizens are – without any individualized warrant – included in what is surveilled.

The specific guidelines submitted by the NSA to the Fisa court in July 2009 – marked Top Secret and signed by Attorney General Eric Holder – state that "NSA determines whether a person is a non-United States person reasonably believed to be outside the United States in light of the totality of the circumstances based on the information available with respect to that person, including information concerning the communications facility or facilities used by that person." It includes information that the NSA analyst uses to make this determination – including IP addresses, statements made by the potential target, and other information in the NSA databases.

The decision to begin listening to someone's phone calls or read their emails is made exclusively by NSA analysts and their "line supervisors". There is no outside scrutiny, and certainly no Fisa court involvement. As the NSA itself explained in its guidelines submitted to the Fisa court:

"Analysts who request tasking will document in the tasking database a citation or citations to the information that led them to reasonably believe that a targeted person is located outside the United States. Before tasking is approved, the database entry for that tasking will be reviewed in order to verify that the database entry contains the necessary citations."

The only oversight for monitoring whether there is abuse comes from the executive branch itself: from the DOJ and Director of National Intelligence, which conduct "periodic reviews … to evaluate the implementation of the procedure." At a hearing before the House Intelligence Committee Tuesday afternoon, deputy attorney general James Cole testified that every 30 days, the Fisa court is merely given an "aggregate number" of database searches on US domestic phone records.

Warrantless interception of Americans' communications

Obama and other NSA defenders have repeatedly claimed that "nobody" is listening to Americans' telephone calls without first obtaining warrants. This is simply false. There is no doubt that some of the communications intercepted by the NSA under this warrantless scheme set forth in FAA's section 702 include those of US citizens. Indeed, as part of the Fisa court approval process, the NSA submits a separate document, also signed by Holder, which describes how communications of US persons are collected and what is done with them.

One typical example is a document submitted by the NSA in July 2009. In its first paragraph, it purports to set forth "minimization procedures" that "apply to the acquisition, retention, use, and dissemination of non-publicly available information concerning unconsenting United States persons that is acquired by targeting non-United States persons reasonably believed to be located outside the United States in accordance with section 702 of the Foreign Intelligence Surveillance Act of 1978, as amended."

That document provides that "communications of or concerning United States persons that may be related to the authorized purpose of the acquisition may be forwarded to analytic personnel responsible for producing intelligence information from the collected data." It also states that "such communications or information" - those from US citizens - "may be retained and disseminated" if it meets the guidelines set forth in the NSA's procedures.

Those guidelines specifically address what the NSA does with what it calls "domestic communications", defined as "communications in which the sender and all intended recipients are reasonably believed to be located in the United States at the time of acquisition". The NSA expressly claims the right to store and even disseminate such domestic communication if: (1) "it is reasonably believed to contain significant foreign intelligence information"; (2) "the communication does not contain foreign intelligence information but is reasonably believed to contain evidence of a crime that has been, is being, or is about to be committed"; or (3) "the communication is reasonably believed to contain technical data base information, as defined in Section 2(i), or information necessary to understand or assess a communications security vulnerability."

Although it refuses to say how many Americans have their communications intercepted without warrants, there can be no question that the NSA does this. That's precisely why they have created elaborate procedures for what they do when they end up collecting Americans' communications without warrants.

Vast discretion vested in NSA analysts

The vast amount of discretion vested in NSA analysts is also demonstrated by the training and briefings given to them by the agency. In one such briefing from an official with the NSA's general counsel's office - a top secret transcript of which was obtained by the Guardian, dated 2008 and then updated for 2013 - NSA analysts are told how much the new Fisa law diluted the prior standards and how much discretion they now have in deciding whose communications to intercept:


"The court gets to look at procedures for saying that there is a reasonable belief for saying that a target is outside of the United States. Once again - a major change from the targeting under Fisa. Under Fisa you had to have probable cause to believe that the target was a foreign power or agent of a foreign power. Here all you need is a reasonable belief that the target is outside of the United States ...

"Now, all kinds of information can be used to this end. There's a list in the targeting procedures: phone directories, finished foreign intelligence, NSA technical analysis of selectors, lead information. Now, you don't have to check a box in every one of those categories. But you have to look at everything you've got and make a judgment. Looking at everything, do you have a reasonable belief that your target is outside the United States? So, cast your search wide. But don't feel as though you have to have something in every category. In the end, what matters is, 'Does all that add up to a reasonable belief that your target is outside the United States?'"

So vast is this discretion that NSA analysts even have the authority to surveil communications between their targets and their lawyers, and that information can be not just stored but also disseminated. NSA procedures do not ban such interception, but rather set forth procedures to be followed in the event that the NSA analyst believes they should be "disseminated".

The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.

Legal constraints v technical capabilities

What is vital to recognize is that the NSA is collecting and storing staggering sums of communications every day. Back in 2010, the Washington Post reported that "every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." Documents published by the Guardian last week detail that, in March 2013, the NSA collected three billions of pieces of intelligence just from US communications networks alone.

In sum, the NSA is vacuuming up enormous amounts of communications involving ordinary Americans and people around the world who are guilty of nothing. There are some legal constraints governing their power to examine the content of those communications, but there are no technical limits on the ability either of the agency or its analysts to do so. The fact that there is so little external oversight is what makes this sweeping, suspicion-less surveillance system so dangerous. It's also what makes the assurances from government officials and their media allies so dubious.

A senior US intelligence official told the Guardian: "Under section 702, the Fisa court has to approve targeting and minimization procedures adopted by the Attorney General, in consultation with the Director of National Intelligence."

"The targeting procedures ensure that the targets of surveillance are reasonably believed to be non-US persons outside of the US", the official added.

"Moreover, decisions about targeting are memorialized, reviewed on a regular basis and audited. Moreover, Congress clearly understood that even when the government is targeting foreign persons for collection, communications of US persons may be acquired if those persons are in communication with the foreign targets, for example as was testified to in today's hearing when Najibullah Zazi communicated with a foreign terrorist whose communications were being targeted under Section 702.

"That," the official continued, "is why the statute requires that there be minimization procedures to ensure that when communications of, or concerning, US persons are acquired in the course of lawful collection under Section 702, that information is minimized and is retained and disseminated only when appropriate. These procedures are approved on an annual basis by the Fisa court.

"Compliance with them is extensively overseen by the intelligence community, the DOJ, the ODNI and Inspectors General," the official said. "Both the Fisa court and Congress receive regular reports on compliance."


Edward Snowden vs. the Sovietization of America
What do you have to hide, comrade?

by Justin Raimondo, June 19, 2013

What could be more fun? An articulate and very smart young man our Washington mandarins deride as a "twenty-something high school dropout" has the US national security establishment, the Washington punditocracy, and the President himself in a panicky lather. Government officials are howling with outrage, and calling for Edward Snowden’s head. The pundits are livid: how dare this "narcissist" who didn’t go to an Ivy League college presume to sit in judgment of his betters! Whatever their disagreements, politicians and talking heads of the left and the right agree: Snowden is a "traitor"!

Their big problem, however, is that the American people think he did the right thing: a Time poll says 54 percent approve. Snowden may be the most hated man in Washington, but out here in the cornfields he’s a hero. You can manipulate polls by injecting subtle bias into the way the question is worded – this explains, I think, why other polls say the majority are in favor of his prosecution – but the unmistakable reality is that Americans are not yet so corrupted that they will sit still for wearing shackles. After more than a decade of constant fear-mongering propaganda, their attachment to the Constitution has not been broken – although perhaps it is more accurate to say their basic distrust of anything coming out of Washington, D.C., is unabated. The White House petition to pardon Snowden garnered 80,000 signatures in less than a week: as I write, it is fast approaching 85,000.

But the Washington know-it-alls have a solution to this dilemma –and, for them, it is indeed a dilemma: keep everything secret. So that even the law is itself a secret – or, at least, the government’s interpretation of it is kept under lock and key. Everything else about the mechanics of our emerging police state is also a secret: the internet companies forced to turn over their customers’ private accounts to government snoops are forbidden by law from saying anything about their interactions with Washington. They cannot tell a customer "The government forced us to turn over your records." If they choose to fight in court, they cannot publicize their fight. It is a mugging that happens in the dark – the familiar modus operandi of all criminals.

The very court order giving the government carte blanche to monitor all the communications of Verizon – and, now we learn, of all major internet and phone service providers – was top secret classified information. Indeed, this is among the gravest of Snowden’s alleged "crimes" – leaking this Top Secret document, which is nothing more than a perfunctory court order, of the sort that are routinely public in any free society. This document was deemed so sensitive that only a very few High Muckamucks were given access to it – which has fueled speculation Snowden may have had help from someone higher up on the Soviet totem pole, perhaps some Lieutenant Commissar somewhere in the bowels of the NSA who had a pang of conscience….

We are told that the reason for all this secrecy is that we don’t want to let the "terrorists" in on how we’re tracking and fighting them. But the reality is that Al Qaeda and likeminded groups are already aware we’re tracking them – though, on 9/11, it appeared they were tracking us, as Bill Safire pointed out in one of his last columns for the New York Times:

"A threatening message received by the Secret Service was relayed to the agents with the president that ‘Air Force One is next.’ According to the high official, American code words were used showing a knowledge of procedures that made the threat credible.”

Safire swore this was told to him by Karl Rove, who said the President was going back to Washington until the Secret Service “informed him that the threat contained language that was evidence that the terrorists had knowledge of his procedures and whereabouts." As Safire put it:

“That knowledge of code words and presidential whereabouts and possession of secret procedures indicates that the terrorists may have a mole in the White House – that, or informants in the Secret Service, FBI, FAA, or CIA.”

Safire later disavowed this story, but I believed him the first time, and still do. Yet this knowledge went down the Memory Hole, along with Safire himself, and no one talks about it anymore – and the NSA sure isn’t talking. We still don’t know all the important facts about the catalyst for the all-pervasive surveillance our "war on terror" has conjured into being, let alone the invasions we’ve launched in its name. The Panopticon uncovered by Snowden is not some recent invention: it was born before the Bush administration – remember "Echelon"? – and has metastasized ever since.

It started under Bill Clinton, but in the post-9/11 atmosphere the tentacles of the Surveillance State grew like kudzu. For twelve years, the US government has been fighting a nameless enemy – it’s gone far beyond just Al Qaeda – using methods it refuses to reveal, but the events of the past few weeks have thrown back the curtain on the true nature of that struggle. Washington is waging war on those they consider the real enemy – the American people.

Why else would they vacuum up all the phone calls made in this country, and store them away for future reference? Why would they create a huge surveillance apparatus that employs tens of thousands of people and deploys sophisticated technologies on solving the "problem" of how to keep track of the movements, thoughts, and opinions of millions of Americans? And why would they keep the law itself – or, at least, their twisted "interpretation" of it – a state secret? This is the ultimate in authoritarianism – a secret law that you don’t even know you’re breaking (how can you know when it’s a secret?).

The Soviet empire is dead: only the ruins persist. Yet the system Lenin and his successors created lives on right here in America. "If you see something," says Big Sis, "say something." The KGB would’ve agreed wholeheartedly. So, you object to the government scooping up your phone calls and emails – what do you have to hide, comrade? Left-wing commentators, from Mother Jones to Talking Points Memo, are sliming Snowden like Pravda once slimed dissidents. Pro-government media are playing down the Snowden revelations – poor Rachel Maddow has to get really really creative in order to think up other stuff to cover – and Washington is just as united against Snowden as Moscow, circa 1930, was against "Trotskyite wreckers." And then there’s this – the nagging suspicion that the former "community organizer" who sounds so reasonable, so intelligent, so positively Stevie Wonder-ish, is really an aspiring tyrant in the guise of an American President.

Such suspicions have previously been confined to the outer reaches of the political spectrum, where the Obama-is-a-secret-Muslim crowd hangs out. And, yes, we’ve already heard all about the Bill Ayers-wrote-his-books theory, and the other crap the neocons have been handing out to their easily indoctrinated followers in the official "conservative" movement. With the Snowden revelations, however, which show how the President – who campaigned in 2008 as a civil libertarian crusader – ratcheted up the Surveillance State into a smoothly humming Panopticon, the real face of Barack Hussein (yes, Hussein) Obama is revealed to the world.

And it isn’t pretty.

President Obama nationalized the auto and healthcare industries in his first term, to the applause of our pro-government "progressives": now we learn he secretly nationalized the nation’s biggest internet service providers right under our noses, forcing them into the role of snoops – and the cheers from his progressive amen corner are deafening. Like Winston Smith at the end of George Orwell’s classic novel Nineteen Eighty-Four, they have suddenly discovered that they love Big Brother.

There are notable exceptions, which only prove the rule: Glenn Greenwald, the reporter and columnist who broke this story, and who exemplifies the old-fashioned liberal in the tradition of Randolph Bourne and Oswald Garrison Villard, has come under relentless attack from the all-too-familiar left-wing defenders of the Regime. And speaking of regime defenders: Chris Hayes has expressed some reservations, but lately taken to simply avoiding the topic of Snowden. Maddow has dropped all mention of it from her show (and these people wonder why their ratings are tanking). Good old Nat Hentoff is horrified, but since he came out, so to speak, as pro-life, liberals have given themselves a good reason not to listen to him anymore. Over at Fox, there is outright editorial dissonance, with commentators visibly torn between their kneejerk inclination to bash the President and their reflexively authoritarian-neoconservative instincts whenever "national security" is supposedly involved.

Is it, though? Some high mucka-muck recently testified before Congress that no less than fifty terrorist attacks worldwide were prevented due to the all-seeing Eye of Sauron the NSA, and yet every time they get specific it turns out the case they point to could have been broken without this supposedly invaluable aid.

Think of it this way: our government has set up a system whereby an "analyst" can key in the right code and call up all your emails, all your phone calls, all the locations you’ve visited – and with whom – as far back as you care you imagine. Are we really supposed to believe they have done this in order to fight scattered bands of "terrorists" hiding out in caves somewhere in the mountains of Shitholistan?

If you believe that, you deserve to live in a Soviet America, comrade. Because that’s just where you’re headed.


The Morning Plum: Time to declassify those FISA court opinions, Mr. President
By Greg Sargent, Published: June 19, 2013 at 9:20 amE-mail the writer

President Obama, still facing widespread criticism over revelations about NSA phone gathering and internet mining, again defended the NSA programs yesterday. “I came into office committed to protecting the American people but also committed to our values and our ideals and one of our highest ideals is civil liberties and privacy,” Obama said. “I am confident that at this point we have struck the appropriate balance.”
If that is so, then surely Obama would have no reason to support the status quo, in which Foreign Intelligence Surveillance Court opinions authorizing these programs continue to remain secret — leaving the public and the press with no meaningful way of evaluating whether the legal rationale underlying that “balance” is indeed “appropriate.”
As best as anyone can determine, Obama could push for the declassification of key FISA court opinions if he wanted to. And in a letter to be sent to the President today, Senator Jeff Merkley calls on him to do just that.
Merkley notes that the NSA programs are made possible by the legal interpretation of key sections of the Patriot Act and FISA Amendments Act offered by both the administration and the FISA court — but that these interpretations remain secret, making meaningful public debate about the programs impossible. Merkley continues:
Because of the highly classified nature of opinions issued by the Foreign Intelligence Surveillance Court (FISC), Members of Congress cannot publicly discuss, let alone debate, the way that the executive and judicial branches are interpreting the law. And without disclosing and debating the interpretation of the law, it is a fruitless exercise to debate whether and how to change laws which we are periodically asked to reauthorize.
In order to support a public discussion about these issues, I ask that you declassify opinions issued by the FISC and the Foreign Intelligence Surveillance Court of Review that contain significant construction or interpretation of law. If declassifying the full opinions would compromise sensitive sources and methods used by our intelligence community, then I urge you to release public summaries of legal interpretations contained in these opinions. While debating the laws that govern our intelligence gathering programs has never been easy, we must be able to publicly discuss what the law means in order to protect and promote our most cherished values.
Calling for these opinions, or summaries of them, to be released doesn’t even constitute calling for a change or end to the NSA programs themselves. The request is simply for more transparency around the legal rationale for them.
The public apparently supports such transparency. A new Post poll finds that 65 percent of Americans want Congress to hold public hearings on the NSA programs. This is supported by large majorities of Democrats, Republicans and independents, and large majorities of liberals, moderates and conservatives. This, even though the poll also finds that a solid majority supports the programs themselves. These things are not mutually exclusive. Indeed, one could argue that support for more public disclosure, at a minimum, is the truly “balanced” view here.
Now, perhaps there are procedural or process reasons that explain why declassification is not as easy for the President himself to pursue as civil libertarians think it is. But as the New York Times editorial board notes this morning, even if this is true, there is no reason why Obama can’t voice support for the bill being pushed by a number of Senators that would compel the declassification of these opinions, or summaries of them.
To his credit, Obama has said that concerns about the secrecy shrouding these programs are “legitimate,” and has promised to push for more public disclosure. Voicing support for the declassification and release of key FISA opinions would be a good place to start, and would help bring about the “debate” Obama says he wants. Alternatively, if there is some reason why this is not a good idea, the President should tell us what it is.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Edward Snowden, American Hero

Postby elfismiles » Wed Jun 19, 2013 4:00 pm

WHISTLEBLOWER - feat. Edward Snowden [RAP NEWS 19]
http://www.youtube.com/watch?v=hnMPQmIPibE
User avatar
elfismiles
 
Posts: 8512
Joined: Fri Aug 11, 2006 6:46 pm
Blog: View Blog (4)

Re: Edward Snowden, American Hero

Postby Elvis » Wed Jun 19, 2013 4:35 pm

HuffPost is so ugly, my apologies, but they're the source of the interview. Plame appears in a video at the link.


Valerie Plame: Edward Snowden Deserves Thanks, 'Will Be Abused,' Clapper Should Resign (VIDEO)

The Huffington Post | By Danny Shea
Posted: 06/19/2013 12:44 pm EDT | Updated: 06/19/2013 4:13 pm EDT


Former CIA agent Valerie Plame said Wednesday that she views NSA leaker Edward Snowden as neither a hero nor a traitor, but that Americans should be grateful that he brought the conversation about liberty and security to the national forefront.

"I don't think [Snowden's] a hero, I don't condone what he did. At the same time he's certainly not a traitor as he was called by Dick Cheney," Plame told HuffPost Live host Mike Sacks. "In a way, we as U.S. citizens owe Edward Snowden a thank you for having brought this issue to the forefront and so that we can begin to have a serious and genuine conversation about these issues."

Plame also rolled her eyes at Cheney labeling Snowden a traitor, given the Bush administration's involvement in leaking her identity to columnist Robert Novak.

"The irony of people like Dick Cheney or Karl Rove whining and bemoaning the fact of the leak of intelligence -- given my history and certainly Dick Cheney's intimate involvement with the betrayal of my CIA identity -- is really something," she said.

Plame called for the resignation of Director of National Intelligence James Clapper, saying that "as a former intelligence officer" she finds it "astounding" that upwards of 60 to 70 percent of the United States' intelligence budget is spent on private contractors.

"One question might be, 'Why hasn't the Director of National Intelligence Clapper resigned?' He is ultimately responsible for the safeguarding of these secrets," she said. "How do you propose to keep secrets if you have that high a contracting force? Where is their loyalty? It's not necessarily going to be to their country, to the United States, it's going to be to the person writing their paycheck."

Plame said she has "great respect" for journalist Glenn Greenwald, who broke the Snowden story, saying "he has written eloquently for years on these issues in a very serious, sustained manner."

She added that she believes the conversation should focus less on Snowden and more on the questions he raised, since "his fate is already foregone."

"He will be abused, he will be punished," Plame said of Snowden. "Perhaps he could have done it in a different way, but that's not the conversation we should be having."
http://www.huffingtonpost.com/2013/06/1 ... f=politics
“The purpose of studying economics is not to acquire a set of ready-made answers to economic questions, but to learn how to avoid being deceived by economists.” ― Joan Robinson
User avatar
Elvis
 
Posts: 7573
Joined: Fri Apr 11, 2008 7:24 pm
Blog: View Blog (0)

Re: Edward Snowden, American Hero

Postby seemslikeadream » Wed Jun 19, 2013 7:36 pm

Valerie Plame: Edward Snowden Deserves Thanks, 'Will Be Abused,' Clapper Should Resign (VIDEO)
The Huffington Post | By Danny Shea
Posted: 06/19/2013 12:44 pm EDT | Updated: 06/19/2013 4:13 pm EDT

Former CIA agent Valerie Plame said Wednesday that she views NSA leaker Edward Snowden as neither a hero nor a traitor, but that Americans should be grateful that he brought the conversation about liberty and security to the national forefront.

"I don't think [Snowden's] a hero, I don't condone what he did. At the same time he's certainly not a traitor as he was called by Dick Cheney," Plame told HuffPost Live host Mike Sacks. "In a way, we as U.S. citizens owe Edward Snowden a thank you for having brought this issue to the forefront and so that we can begin to have a serious and genuine conversation about these issues."

Plame also rolled her eyes at Cheney labeling Snowden a traitor, given the Bush administration's involvement in leaking her identity to columnist Robert Novak.

"The irony of people like Dick Cheney or Karl Rove whining and bemoaning the fact of the leak of intelligence -- given my history and certainly Dick Cheney's intimate involvement with the betrayal of my CIA identity -- is really something," she said.

Plame called for the resignation of Director of National Intelligence James Clapper, saying that "as a former intelligence officer" she finds it "astounding" that upwards of 60 to 70 percent of the United States' intelligence budget is spent on private contractors.

"One question might be, 'Why hasn't the Director of National Intelligence Clapper resigned?' He is ultimately responsible for the safeguarding of these secrets," she said. "How do you propose to keep secrets if you have that high a contracting force? Where is their loyalty? It's not necessarily going to be to their country, to the United States, it's going to be to the person writing their paycheck."

Plame said she has "great respect" for journalist Glenn Greenwald, who broke the Snowden story, saying "he has written eloquently for years on these issues in a very serious, sustained manner."


She added that she believes the conversation should focus less on Snowden and more on the questions he raised, since "his fate is already foregone."

"He will be abused, he will be punished," Plame said of Snowden. "Perhaps he could have done it in a different way, but that's not the conversation we should be having."
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Edward Snowden, American Hero

Postby seemslikeadream » Thu Jun 20, 2013 7:50 pm

Snowden extradition may be complicated process if criminal charges are filed

Kin Cheung/AP - A banner supporting Edward Snowden, a former CIA employee who leaked top-secret documents about sweeping U.S. surveillance programs, is displayed at Central, Hong Kong's business district on Wednesday.

By Sari Horwitz and Jia Lynn Yang, Published: June 19 E-mail the writers
If U.S. officials criminally charge Edward Snowden, they are likely to confront a complicated and lengthy process to bring the admitted leaker of top-secret documents back home to stand trial, according to extradition experts and law enforcement officials.

Although the United States has an extradition treaty with Hong Kong, where Snowden was last seen, the treaty offers an exception for political offenses. It also has a rare exception that would allow Snowden to stay in Hong Kong if the government there determines it to be in its best interest. He also could apply for asylum in Hong Kong, Iceland or another country. On Wednesday, the founder of WikiLeaks told reporters that his legal advisers had been in touch with Icelandic officials on Snowden’s behalf.

Hundreds of people marched to the U.S. consulate in Hong Kong on Saturday in support of Edward Snowden, an American citizen who leaked top-secret information about U.S. surveillance programs.
Snowden extradition may be a very complicated process

Sari Horwitz and Jia Lynn Yang JUN 19
If criminal charges are filed, the U.S. is likely to face many hurdles to bring the admitted leaker home for trial.

“There are a number of hurdles that the government will have to jump through before Snowden will ever end up in a U.S. courtroom,” said Stephen I. Vladeck, an associate dean at American University’s Washington College of Law who studies national security law.

In the end, the ability to bring the former National Security Agency contractor back to the United States will come down to legal maneuvering and creative diplomacy, Vladeck said.

“The dirty little secret about extradition law,” he said, “is it’s really about 90 percent politics and only 10 percent law.”

Snowden, 29, revealed himself June 9 as the anonymous source for articles in the British newspaper the Guardian and The Washington Post about the NSA surveillance of telephone calls and Internet communications. He was staying in an upscale hotel in Hong Kong, a city that he said he had chosen because he felt he might win asylum there.

But Snowden subsequently left the hotel, and it is unclear where he is. In an unusual live Web chat Monday, he said he sees no possibility of a fair trial in the United States and suggested that he would try to elude authorities as long as possible.

Justice Department officials have said that a criminal investigation is underway, led by agents from the FBI’s Washington field office and lawyers from the department’s national security division. Investigators are gathering forensic material to back up possible criminal charges, most likely under the Espionage Act, according to former Justice Department officials.

Snowden also could be charged with theft and the conversion of property belonging to the U.S. government, experts say. A thorny issue for U.S. authorities trying to build their case against Snowden involves how much to reveal about the highly classified material that he allegedly acquired, according to former Justice Department officials.

U.S. officials could file a criminal complaint and try to have Snowden detained in Hong Kong on a provisional arrest, extradition lawyers said. They would then have 60 days to file an indictment, possibly under seal, setting out probable cause. U.S. authorities could then formally move to extradite Snowden for trial in the United States — a move he could fight in the courts.

The United States has extradition treaties with about 120 countries, but that doesn’t necessarily make it easier to extract people accused of a crime from those countries. For example, of 130 extradition requests to Britain since 2004, only 77 people were extradited to the United States.

To fight extradition, Snowden could invoke Article 6 of the 1997 pact between the United States and Hong Kong, which states that a suspect will not be surrendered to face criminal prosecution for an offense of a “political character.”

That’s a standard and historic exception in treaties between governments but one that lacks a standard definition or clear legal interpretation. In the United States, as well as in other states, what constitutes a political act has narrowed. How the Hong Kong courts would view such an assertion is unclear. If Snowden argues that he is an activist, said Simon N.M. Young, director for the Center of Comparative and Public Law at the University of Hong Kong, “this will be one of our first cases.”

Hong Kong also has an additional and unusual exception in its treaty that could provide a defense for Snowden, according to Douglas McNabb, a lawyer who specializes in international extradition cases. Hong Kong authorities can refuse the extradition of a suspect “if they believe it should be denied from a defense or foreign policy perspective,” McNabb said. “I have not seen that in any other treaty.” Public sentiment in support of Snowden has built in Hong Kong, and hundreds rallied in the streets Saturday.

Should a Hong Kong judge rule against Snowden, he could continue to appeal, all the way up to Hong Kong’s highest court, dragging the process out over many months. Bail is unlikely to be offered, so Snowden could be in jail at that point, possibly at the Lai Chi Kok maximum-
security facility in Kowloon, where conditions are harsh. “That will be added pressure on him for how long he wants to fight it out here,” Young said.

Aside from the courts, Snowden could plead for asylum, the route taken by WikiLeaks founder Julian Assange, who has been holed up for a year in the Ecuadoran Embassy in London.

Snowden, in an interview with the Guardian, floated the idea of asylum in Iceland, which has historically provided a haven for whistleblowers and never granted a U.S. extradition request.

Johannes Skulason, an Icelandic government official, told the Associated Press on Wednesday that WikiLeaks spokesman Kristinn Hrafnsson had held informal talks with assistants at the Interior Ministry and the prime minister’s office.

Skulason said Hrafnsson “presented his case that he was in contact with Snowden and wanted to see what the legal framework was like.”

But the United States could try to prevent Snowden from traveling by asking the International Criminal Police Organization, or Interpol, to put out a “red notice,” which is a bulletin for international fugitives and which alerts about 190 countries that there is an outstanding warrant for Snowden’s arrest.

Snowden could also apply for asylum in another country’s embassy in Hong Kong, as Assange did in London. Or he could make an asylum claim in Hong Kong after his travel visa expires in mid-August or if the U.S. government requests his surrender.

If he does apply for asylum, Snowden will be stumbling into a labyrinthine system criticized by human rights lawyers as dysfunctional and inefficient.

Hong Kong did not sign the United Nations’ 1951 Refugee Convention, and so the government has no obligation to process refu­gee claims. Instead, it relies mostly on the U.N. High Commissioner for Refugees’ office in Hong Kong, which is underderstaffed and has a backlog of asylum requests. In cases in which the applicants claim that they may be tortured if sent home, the Hong Kong government reviews the case. An estimated 5,000 claims are being processed by both the UNHCR and the Hong Kong government.

“We have asylum seekers who have been in Hong Kong for years,” Young said.

Because the UNHCR and the Hong Kong government evaluate claims, Snowden could seek to have his asylum case reviewed by both. Complicating the picture are two recent court cases mandating that Hong Kong consolidate its refu­gee system and establish a new process.

“I think Mr. Snowden is much wiser from a legal perspective than many people initially gave him credit for,” McNabb said. “I think he’s thought about this for a long time.”
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Edward Snowden, American Hero

Postby seemslikeadream » Thu Jun 20, 2013 8:21 pm

U.S. contractor that vetted Snowden is probed by watchdog

WASHINGTON | Thu Jun 20, 2013 4:55pm EDT
(Reuters) - A company that conducted a 2011 background investigation into Edward Snowden, the source of recent leaks about U.S. secret surveillance programs, is itself under investigation, it was revealed at a congressional hearing on Thursday.

Patrick McFarland, the inspector general for the U.S. Office of Personnel Management, said his office is probing USIS, a Falls Church, Virginia-based company that specializes in providing information and security services to government agencies.

McFarland told the homeland security subcommittee hearing that there are concerns that USIS may not have carried out its background check into Snowden in an appropriate or thorough matter. "Yes, we do believe that there - there may be some problems," McFarland told the hearing.

Senator Claire McCaskill described the probe as a criminal investigation into allegations that USIS systemically failed to adequately conduct investigations under its contract.

A USIS spokesman did not immediately respond to a request for comment.

Snowden, who is believed to be hiding in Hong Kong, has been under intense scrutiny since he went public in a video released by Britain's Guardian newspaper on June 9 as the source of documents revealing the U.S. government's vast surveillance of phone and Internet activity.

Snowden, a contractor formerly employed by Booz Allen Hamilton, worked at a National Security Agency facility in Hawaii. He had a Top Secret/Sensitive Compartmented Information level clearance.

Senators at the hearing on Thursday said they were concerned about whether people receiving Top Secret level clearances are being properly vetted, and said there does not appear to be sufficient oversight of the work, which is largely outsourced.

"It is a reminder that background investigations can have real consequences for our national security," McCaskill said of Snowden's leaks. McCaskill chairs the contracting oversight subcommittee of the Senate's Homeland Security Committee.

USIS supports the Office of Personnel Management (OPM) by managing and overseeing background investigations, an arrangement that McCaskill said appears to put USIS in a position of oversight for its own work. She added that the company received $200 million last year from OPM.

Merton Miller, an official in OPM's Federal Investigative Services unit, said USIS conducts 45 percent of the overall contract workload for government background investigations.

Security investigations for federal employees used to be conducted mainly by a large staff of full-time investigators who were civil servants at the OPM.

In 1996, the investigative functions of OPM were privatized and the resulting company, USIS, was awarded a contract with OPM to conduct background investigations for security clearances on employees of more than 95 federal agencies.

On its website, USIS says it presently has 100 federal contracts.

USIS is owned by a larger investigative company called Altegrity, which in turn is principally owned by private equity firm Providence Equity Partners.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Edward Snowden, American Hero

Postby Nordic » Thu Jun 20, 2013 11:38 pm

Oh good lord, it's not background tests they're really talking about, it's psychological profiling.

Too much of this shit going on right now, I'm starting to get profoundly pissed iff again.

Fucking liars lying about every fucking little thing. Goddamn evil fucks.
"He who wounds the ecosphere literally wounds God" -- Philip K. Dick
Nordic
 
Posts: 14230
Joined: Fri Nov 10, 2006 3:36 am
Location: California USA
Blog: View Blog (6)

Re: Edward Snowden, American Hero

Postby divideandconquer » Thu Jun 20, 2013 11:51 pm

I'm not sold on ES being the real deal. I can't believe that the NSA, and the DIA (Defense Intelligence Agency)-- with a budget ten times the size of the budgets of the CIA and FBI combined as well as 100 times the employees of the CIA and FBI combined--with all of their interconnected supercomputers with the ability to cryptanalyze, or break, unfathomably complex encryption systems, can't snag Snowden. American Everyman http://willyloman.wordpress.com/ has raised a lot of good questions and I found one of the comments particularly interesting in relation to evading national security.

I mean, how are they securely communicating? Greenwald says he sends Snowden his digital footprint and that’s how Snowden knows it is him. Wtf? If Greenwald is sending some kind of pass-phrase, it isn’t gonna matter if the email is not encrypted. And, Snowden hints their using encryption.

Some researchers have said that the NSA is partnered with the certificate authorities that provide the encryption keys. Snowden and Greenwald would each have to have a public key to encrypt the message and a corresponding private key to decrypt it. This would allow for bidirectional communication. If this is the case, then how did Snowden get Greenwald the custom keys (not issued by an authority)? Certificate keys are files containing the ciphers. According to Greenwald, Snowden first contacted him months ago. You know Greenwald’s email has to likely be monitored, even at the Telegraph (an admin there could certainly pull all his messages). I guess they would have to be using secret emails not on the radar, but that is taking a chance.

And, it has been reported that Snowden left with 4 laptops? Wtf, so the NSA doesn’t track them, or if they are, anyone can remove whatever is used to track them? Surely, they watch the analysts, it would be dumb not to.

Then you have the matter of Snowden posting his answers to an unencrypted link (no SSL) in a real-time chat session. I don’t recall the chat link being encrypted, and it isn’t now either. When posting to the server, with no encryption for information in transit, it comes across as clear text. All the NSA would have to do is trace the packets back to a proxy server that doesn’t likely change it’s headers (only masks the IP). Using that unencrypted packet header information, his location would be given away.
'I see clearly that man in this world deceives himself by admiring and esteeming things which are not, and neither sees nor esteems the things which are.' — St. Catherine of Genoa
User avatar
divideandconquer
 
Posts: 1021
Joined: Mon Dec 24, 2012 3:23 pm
Blog: View Blog (0)

Re: Edward Snowden, American Hero

Postby justdrew » Fri Jun 21, 2013 12:36 am

divideandconquer » 20 Jun 2013 20:51 wrote:I'm not sold on ES being the real deal. I can't believe that the NSA, and the DIA (Defense Intelligence Agency)-- with a budget ten times the size of the budgets of the CIA and FBI combined as well as 100 times the employees of the CIA and FBI combined--with all of their interconnected supercomputers with the ability to cryptanalyze, or break, unfathomably complex encryption systems, can't snag Snowden. American Everyman http://willyloman.wordpress.com/ has raised a lot of good questions and I found one of the comments particularly interesting in relation to evading national security.

I mean, how are they securely communicating? Greenwald says he sends Snowden his digital footprint and that’s how Snowden knows it is him. Wtf? If Greenwald is sending some kind of pass-phrase, it isn’t gonna matter if the email is not encrypted. And, Snowden hints their using encryption.

Some researchers have said that the NSA is partnered with the certificate authorities that provide the encryption keys. Snowden and Greenwald would each have to have a public key to encrypt the message and a corresponding private key to decrypt it. This would allow for bidirectional communication. If this is the case, then how did Snowden get Greenwald the custom keys (not issued by an authority)? Certificate keys are files containing the ciphers. According to Greenwald, Snowden first contacted him months ago. You know Greenwald’s email has to likely be monitored, even at the Telegraph (an admin there could certainly pull all his messages). I guess they would have to be using secret emails not on the radar, but that is taking a chance.

And, it has been reported that Snowden left with 4 laptops? Wtf, so the NSA doesn’t track them, or if they are, anyone can remove whatever is used to track them? Surely, they watch the analysts, it would be dumb not to.

Then you have the matter of Snowden posting his answers to an unencrypted link (no SSL) in a real-time chat session. I don’t recall the chat link being encrypted, and it isn’t now either. When posting to the server, with no encryption for information in transit, it comes across as clear text. All the NSA would have to do is trace the packets back to a proxy server that doesn’t likely change it’s headers (only masks the IP). Using that unencrypted packet header information, his location would be given away.



http://en.wikipedia.org/wiki/Public-key_cryptography

http://www.gnupg.org/
By 1964 there were 1.5 million mobile phone users in the US
User avatar
justdrew
 
Posts: 11966
Joined: Tue May 24, 2005 7:57 pm
Location: unknown
Blog: View Blog (11)

Re: Edward Snowden, American Hero

Postby seemslikeadream » Fri Jun 21, 2013 12:44 am

Image

Web’s Reach Binds N.S.A. and Silicon Valley Leaders
By JAMES RISEN and NICK WINGFIELD
Published: June 19, 2013

WASHINGTON — When Max Kelly, the chief security officer for Facebook, left the social media company in 2010, he did not go to Google, Twitter or a similar Silicon Valley concern. Instead the man who was responsible for protecting the personal information of Facebook’s more than one billion users from outside attacks went to work for another giant institution that manages and analyzes large pools of data: the National Security Agency.

Mr. Kelly’s move to the spy agency, which has not previously been reported, underscores the increasingly deep connections between Silicon Valley and the agency and the degree to which they are now in the same business. Both hunt for ways to collect, analyze and exploit large pools of data about millions of Americans.

The only difference is that the N.S.A. does it for intelligence, and Silicon Valley does it to make money.

The disclosure of the spy agency’s program called Prism, which is said to collect the e-mails and other Web activity of foreigners using major Internet companies like Google, Yahoo and Facebook, has prompted the companies to deny that the agency has direct access to their computers, even as they acknowledge complying with secret N.S.A. court orders for specific data.

Yet technology experts and former intelligence officials say the convergence between Silicon Valley and the N.S.A. and the rise of data mining — both as an industry and as a crucial intelligence tool — have created a more complex reality.

Silicon Valley has what the spy agency wants: vast amounts of private data and the most sophisticated software available to analyze it. The agency in turn is one of Silicon Valley’s largest customers for what is known as data analytics, one of the valley’s fastest-growing markets. To get their hands on the latest software technology to manipulate and take advantage of large volumes of data, United States intelligence agencies invest in Silicon Valley start-ups, award classified contracts and recruit technology experts like Mr. Kelly.

“We are all in these Big Data business models,” said Ray Wang, a technology analyst and chief executive of Constellation Research, based in San Francisco. “There are a lot of connections now because the data scientists and the folks who are building these systems have a lot of common interests.”

Although Silicon Valley has sold equipment to the N.S.A. and other intelligence agencies for a generation, the interests of the two began to converge in new ways in the last few years as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data — at the same time that the value of the data for use in consumer marketing began to rise. “These worlds overlap,” said Philipp S. Krüger, chief executive of Explorist, an Internet start-up in New York.

The sums the N.S.A. spends in Silicon Valley are classified, as is the agency’s total budget, which independent analysts say is $8 billion to $10 billion a year.

Despite the companies’ assertions that they cooperate with the agency only when legally compelled, current and former industry officials say the companies sometimes secretly put together teams of in-house experts to find ways to cooperate more completely with the N.S.A. and to make their customers’ information more accessible to the agency. The companies do so, the officials say, because they want to control the process themselves. They are also under subtle but powerful pressure from the N.S.A. to make access easier.

Skype, the Internet-based calling service, began its own secret program, Project Chess, to explore the legal and technical issues in making Skype calls readily available to intelligence agencies and law enforcement officials, according to people briefed on the program who asked not to be named to avoid trouble with the intelligence agencies.

Project Chess, which has never been previously disclosed, was small, limited to fewer than a dozen people inside Skype, and was developed as the company had sometimes contentious talks with the government over legal issues, said one of the people briefed on the project. The project began about five years ago, before most of the company was sold by its parent, eBay, to outside investors in 2009. Microsoft acquired Skype in an $8.5 billion deal that was completed in October 2011.

A Skype executive denied last year in a blog post that recent changes in the way Skype operated were made at the behest of Microsoft to make snooping easier for law enforcement. It appears, however, that Skype figured out how to cooperate with the intelligence community before Microsoft took over the company, according to documents leaked by Edward J. Snowden, a former contractor for the N.S.A. One of the documents about the Prism program made public by Mr. Snowden says Skype joined Prism on Feb. 6, 2011.

Microsoft executives are no longer willing to affirm statements, made by Skype several years ago, that Skype calls could not be wiretapped. Frank X. Shaw, a Microsoft spokesman, declined to comment.

In its recruiting in Silicon Valley, the N.S.A. sends some of its most senior officials to lure the best of the best. No less than Gen. Keith B. Alexander, the agency’s director and the chief of the Pentagon’s Cyber Command, showed up at one of the world’s largest hacker conferences in Las Vegas last summer, looking stiff in an uncharacteristic T-shirt and jeans, to give the keynote speech. His main purpose at Defcon, the conference, was to recruit hackers for his spy agency.

N.S.A. badges are often seen on the lapels of officials at other technology and information security conferences. “They’re very open about their interest in recruiting from the hacker community,” said Jennifer Granick, the director of civil liberties at Stanford Law School’s Center for Internet and Society.

But perhaps no one embodies the tightening relationship between the N.S.A. and the valley more than Kenneth A. Minihan.

A career Air Force intelligence officer, Mr. Minihan was the director of the N.S.A. during the Clinton administration until his retirement in the late 1990s, and then he ran the agency’s outside professional networking organization. Today he is managing director of Paladin Capital Group, a venture capital firm based in Washington that in part specializes in financing start-ups that offer high-tech solutions for the N.S.A. and other intelligence agencies. In effect, Mr. Minihan is an advanced scout for the N.S.A. as it tries to capitalize on the latest technology to analyze and exploit the vast amounts of data flowing around the world and inside the United States.

The members of Paladin’s strategic advisory board include Richard C. Schaeffer Jr., a former N.S.A. executive. While Paladin is a private firm, the American intelligence community has its own in-house venture capital company, In-Q-Tel, financed by the Central Intelligence Agency to invest in high-tech start-ups.

Many software technology firms involved in data analytics are open about their connections to intelligence agencies. Gary King, a co-founder and chief scientist at Crimson Hexagon, a start-up in Boston, said in an interview that he had given talks at C.I.A. headquarters in Langley, Va., about his company’s social media analytics tools.

The future holds the prospect of ever greater cooperation between Silicon Valley and the N.S.A. because data storage is expected to increase at an annual compound rate of 53 percent through 2016, according to the International Data Corporation.

“We reached a tipping point, where the value of having user data rose beyond the cost of storing it,” said Dan Auerbach, a technology analyst with the Electronic Frontier Foundation, an electronic privacy group in San Francisco. “Now we have an incentive to keep it forever.”

Social media sites in the meantime are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own. “You willingly hand over data to Facebook that you would never give voluntarily to the government,” said Bruce Schneier, a technologist and an author.


Image
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Edward Snowden, American Hero

Postby conniption » Fri Jun 21, 2013 12:59 am

conniption
 
Posts: 2480
Joined: Sun Nov 11, 2012 10:01 pm
Blog: View Blog (0)

Re: Edward Snowden, American Hero

Postby Nordic » Fri Jun 21, 2013 4:04 am

divideandconquer » Thu Jun 20, 2013 10:51 pm wrote:I'm not sold on ES being the real deal. I can't believe that the NSA, and the DIA (Defense Intelligence Agency)-- with a budget ten times the size of the budgets of the CIA and FBI combined as well as 100 times the employees of the CIA and FBI combined--with all of their interconnected supercomputers with the ability to cryptanalyze, or break, unfathomably complex encryption systems, can't snag Snowden. American Everyman http://willyloman.wordpress.com/ has raised a lot of good questions and I found one of the comments particularly interesting in relation to evading national security.

I mean, how are they securely communicating? Greenwald says he sends Snowden his digital footprint and that’s how Snowden knows it is him. Wtf? If Greenwald is sending some kind of pass-phrase, it isn’t gonna matter if the email is not encrypted. And, Snowden hints their using encryption.

Some researchers have said that the NSA is partnered with the certificate authorities that provide the encryption keys. Snowden and Greenwald would each have to have a public key to encrypt the message and a corresponding private key to decrypt it. This would allow for bidirectional communication. If this is the case, then how did Snowden get Greenwald the custom keys (not issued by an authority)? Certificate keys are files containing the ciphers. According to Greenwald, Snowden first contacted him months ago. You know Greenwald’s email has to likely be monitored, even at the Telegraph (an admin there could certainly pull all his messages). I guess they would have to be using secret emails not on the radar, but that is taking a chance.

And, it has been reported that Snowden left with 4 laptops? Wtf, so the NSA doesn’t track them, or if they are, anyone can remove whatever is used to track them? Surely, they watch the analysts, it would be dumb not to.

Then you have the matter of Snowden posting his answers to an unencrypted link (no SSL) in a real-time chat session. I don’t recall the chat link being encrypted, and it isn’t now either. When posting to the server, with no encryption for information in transit, it comes across as clear text. All the NSA would have to do is trace the packets back to a proxy server that doesn’t likely change it’s headers (only masks the IP). Using that unencrypted packet header information, his location would be given away.



Maybe they're actually fed-exing hand-written letters back and forth.

You don't HAVE to use email.
"He who wounds the ecosphere literally wounds God" -- Philip K. Dick
Nordic
 
Posts: 14230
Joined: Fri Nov 10, 2006 3:36 am
Location: California USA
Blog: View Blog (6)

Re: Edward Snowden, American Hero

Postby Hunter » Fri Jun 21, 2013 4:34 am

Edited out, wrong thread.
Last edited by Hunter on Fri Jun 21, 2013 9:55 am, edited 2 times in total.
Hunter
 
Posts: 1455
Joined: Wed Apr 11, 2012 2:10 pm
Blog: View Blog (0)

Re: Edward Snowden, American Hero

Postby Hunter » Fri Jun 21, 2013 4:43 am

MOVED TO PROPER HASTINGS THREAD, MODS PLEASE CLEAN UP AND DELETE THANKS


Here is another good article by Hastings that he recently wrote, this is the CIA probe article that is mentioned in my post above, looks REALLY INTERESTING and eerie:

The Spy Who Cracked Up In The Cold:

http://www.rollingstoneme.com/index.php ... le&id=2762



The above is only an excerpt, here is the link to the long version:

http://www.rollingstone.com/politics/ne ... d-20130328




This story obviously tells us how deep Hastings was in, he was a fearless journalist to tell this story, its a literal textbook of the life of a post 9-11 deep cover cia black ops torture guy who was basically driven over the edge. This might be the story that really started to put Hastings on their radar.
Last edited by Hunter on Fri Jun 21, 2013 10:05 am, edited 2 times in total.
Hunter
 
Posts: 1455
Joined: Wed Apr 11, 2012 2:10 pm
Blog: View Blog (0)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 9 guests