Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged FISA Court

Rss Feed Group items tagged

Paul Merrell

How Israel helps eavesdrop on US citizens | The Electronic Intifada - 0 views

  • It is well-known that the two largest American telecom companies AT&T and Verizon collaborated with the US government to allow illegal eavesdropping on their customers. The known uses to which information obtained this way has been put include building the government’s massive secret “watch lists,” and “no-fly lists” and even, Bamford suggests, to deny Small Business Administration loans to citizens or reject their children’s applications to military colleges. What is less well-known is that AT&T and Verizon handed “the bugging of their entire networks — carrying billions of American communications every day” to two companies founded in Israel. Verint and Narus, as they are called, are “superintrusive — conducting mass surveillance on both international and domestic communications 24/7,” and sifting traffic at “key Internet gateways” around the US.
  • Virtually all US voice and data communications and much from the rest of the world can be remotely accessed by these companies in Israel, which Bamford describes as “the eavesdropping capital of the world.” Although there is no way to prove cooperation, Bamford writes that “the greatest potential beneficiaries of this marriage between the Israeli eavesdroppers and America’s increasingly centralized telecom grid are Israel’s intelligence agencies.” Israel’s spy agencies have long had a revolving-door relationship with Verint and Narus and other Israeli military-security firms. The relationship is particularly close between the firms and Israel’s own version of the NSA, called “Unit 8200.”
  • Israeli companies seeking a share of massively expanded US intelligence budgets formed similarly incestuous relationships with some in the American intelligence establishment: Ken Minihan, a former director of the NSA, served on Verint’s “security committee” and the former Federal Bureau of Investigation (FBI) official responsible for liaison with the telecom industry became head of the Verint unit that sold eavesdropping equipment to the FBI and NSA.
  • ...4 more annotations...
  • FISA — the Foreign Intelligence Surveillance Act of 1978 — required the government to seek court warrants for wiretaps where at least one target was in the US. In 2005, it was revealed that the Bush administration had been flagrantly violating this law. Last July, Congress passed a bill legalizing this activity and giving retroactive immunity to the telecom companies that had assisted.
  • Israel has a well-established record of compromising American national security. The most notorious case was that of convicted spy Jonathan Pollard. Although the full details of his crimes are still secret, he is thought to have passed critical information about US intelligence-gathering methods to Israel, which then traded those secrets to US adversaries. In 2005, Larry Franklin, a Defense Department analyst, pleaded guilty to spying for Israel. Most recently, Ben-Ami Kadish, a retired US army engineer, was indicted in April for allegedly passing classified documents about US nuclear weapons to Israel from 1979 to 1985. Two former officials of AIPAC, the pro-Israel lobbying group, are still awaiting trial on charges that they passed classified information between Franklin and the Israeli government.
  • Nor have particular Israeli firms established a record of trustworthiness that would justify such complacency. Jacob “Kobi” Alexander, the former Israeli intelligence officer who founded Verint, fled the US to Israel in 2006 just before he and other top executives of a subsidiary were indicted for fraud that allegedly cost US taxpayers and company shareholders $138 million. Alexander eventually adopted a fake identity and hid in the southern African country of Namibia where he is now fighting extradition
  • Israeli companies do not assist the US only to spy on its own citizens, of course. Another Israeli firm, Natural Speech Communication (NSC), among whose directors is former Mossad chief Shabtai Shavit, makes software that the US uses to electronically analyze and key-word search recorded conversations in “Levantine Arabic,” the dialects “spoken by Israeli Arabs, Jordanians, Lebanese and Palestinians.” Mexico and Australia are among other countries known to use Israeli technologies and firms to eavesdrop on their citizens.
Paul Merrell

How the NSA's Surveillance Procedures Threaten Americans' Privacy | American Civil Libe... - 0 views

  • Newly released documents confirm what critics have long suspected—that the National Security Agency, a component of the Defense Department, is engaged in unconstitutional surveillance of Americans' communications, including their telephone calls and emails. The documents show that the NSA is conducting sweeping surveillance of Americans' international communications, that it is acquiring many purely domestic communications as well, and that the rules that supposedly protect Americans' privacy are weak and riddled with exceptions.
  • 3. The Procedures permit the government to conduct surveillance that has no real connection to the government's foreign intelligence interests. One of the fundamental problems with the Act is that it permits the government to conduct surveillance without probable cause or individualized suspicion. It permits the government to monitor people who aren't even thought to be doing anything wrong, and to do so without particularized warrants or meaningful review by impartial judges. Government officials have placed heavy emphasis on the fact that the Act allows the government to conduct surveillance only if one of its purposes is to gather "foreign intelligence information." That term, though, is defined very broadly to include not only information about terrorism but also information about intelligence activities, the national defense, and even "the foreign affairs of the United States." The Procedures weaken the limitation further. Among the things the NSA examines to determine whether a particular email address or phone number will be used to exchange foreign intelligence information is whether it has been used in the past to communicate with foreigners. Another is whether it is listed in a foreigner's address book. In other words, the NSA seems to equate a propensity to communicate with foreigners with a propensity to communicate foreign intelligence information. The effect is to bring virtually every international communication within the reach of the NSA's surveillance.
  •  
    "Among the things the NSA examines to determine whether a particular email address or phone number will be used to exchange foreign intelligence information is *whether it has been used in the past to communicate with foreigners."* Let that sink into your mind, please. Have you ever communicated with a foreigner? Have any of your communications ever been routed through servers in a foreign country? (The way the Internet works, it is an everyday event for just about anyone.) Does that constitute communication with a foreigner?  One of the many giant loopholes in the NSA's leaked procedures document for "minimizing" the collection of data on U.S. citizens.  
Paul Merrell

Rating Obama's NSA Reform Plan: EFF Scorecard Explained | Electronic Frontier Foundation - 0 views

  • Earlier today, President Obama announced a series of reforms to address abuses by the National Security Agency. We were heartened to see Obama recognized that the NSA has gone too far in trampling the privacy rights of people worldwide. In his speech, the President ensured that National Security Letters would not come with perpetual gag orders, brought new levels of transparency and fairness to the FISA court, and ended bulk collection of telephone records by the NSA. However, there is still much more to be done. We’ve put together a scorecard showing how Obama’s announcements stack up against 12 common sense fixes that should be a minimum for reforming NSA surveillance. Each necessary reform was worth 1 point, and we were willing to award partial credit for steps in the right direction. On that scale, President Obama racked up 3.5 points out of a possible 12.
Paul Merrell

Obama's Lies, NSA Spies, and the Sons of Liberty: Will You Choose Dangerous Freedom or ... - 0 views

  • After such a 1984-esque send-up, it doesn’t even really matter what else Obama had to say in his speech about NSA reforms and the like. Rest assured, it was largely a pack of lies. Mind you, Obama said it eloquently enough and interspersed it with all the appropriately glib patriotic remarks about individual freedom and the need to defend the Constitution and securing the life of our nation while preserving our liberties. After all, Obama has proven to be very good at saying one thing and doing another, whether it’s insisting that “you can keep your health care plan,” that he’ll close Guantanamo, or that his administration’s controversial drone strikes only target terrorists and not civilians. When it comes to the NSA, Obama has been lying to the American people for quite some time now. There was the time he claimed the secret FISA court is “transparent.” Then he insisted that “we don’t have a domestic spying program.” And then, to top it all off, he actually insisted there was no evidence the NSA was “actually abusing” its power. As David Sirota writes for Salon: “it has now become almost silly to insinuate or assume that the president hasn’t also been lying. Why? Because if that’s true — if indeed he hasn’t been deliberately lying — then it means he has been dangerously, irresponsibly and negligently ignorant of not only the government he runs, but also of the news breaking around him.”
  • So in terms of Obama’s latest speech on the NSA, if you read between the lines—or just ignore the president’s words and pay attention to his actions—it’s clear that nothing is going to change. The NSA will continue to abuse its power by spying on Americans’ phone calls and emails. They will continue to collect metadata on our various communications and activities. And they will continue to carry out their surveillance in secret, with no attempts at transparency or accountability. The NSA will do so, no matter what Obama claims to the contrary, because this black ops-funded agency whose very existence is abhorrent to the Constitution has become a power unto itself. They no longer work for us or for the president, for that matter. He works for them. Remember, Obama is the chief executive of a super secretive surveillance state whose overarching purpose is to remain in power by any means available. As such, he and his surveillance state cohorts have far more in common with King George and the British government of his day than with the American colonists who worked hard to foment a rebellion and overthrow a despotic regime.
  • Indeed, Obama and his speechwriters would do well to brush up on their history. In doing so, they will find that the Sons of Liberty, the “small, secret surveillance committee” they conveniently liken to the NSA, was in fact an underground, revolutionary movement that fought the established government of its day, whose members were considered agitators, traitors and terrorists not unlike Edward Snowden.
Paul Merrell

Wyden Statement at Senate Intelligence Committee's Open Hearing | Press Releases | U.S.... - 0 views

  • U.S. Senator Ron Wyden (D-Ore.) delivered the following statement prior to questioning senior Intelligence Community officials during the Senate Intelligence Committee’s open hearing. Wyden is a senior member of the Intelligence committee. “The men and women of America’s intelligence agencies are overwhelmingly dedicated professionals and they deserve to have leadership that is trusted by the American people. Unfortunately, that trust has been seriously undermined by senior officials’ reckless reliance on secret interpretations of the law and battered by years of misleading and deceptive statements that senior officials made to the American people. These statements did not protect sources and methods that were useful in fighting terror. Instead they hid bad policy choices and violations of the liberties of the American people. For example, the director of the NSA said publicly that the NSA doesn’t hold data on U.S. citizens. That was obviously untrue.  Justice Department officials testified that section 215 of the Patriot Act is analogous to grand jury subpoena authority. And that deceptive statement was made on multiple occasions. Officials also suggested that the NSA doesn’t have the authority to read Americans’ emails without a warrant but the FISA court opinions declassified last August showed that wasn’t true either.
  • The statement and subsequent questions may be viewed below or here:
  •  
    Ron Wyden comes out swinging at a Senate hearing, giving 3 examples of lies about digital surveillance told to Congress by intelligence officials and DoJ. Then he presses DNI Clapper, CIA head Brennan, and FBI head Comey to provide by dates certain written public answers to a series of questions that he had previously asked in writing but never received answers on. All three said they would provide the answers, Clapper within 30 days and the other two within 7 days.  The questions themselves are extremely important, about the government's interpretation of legal authorities to conduct warrantless searches and in the case of the CIA, whether it is subject to the Computer Fraud and Abuse Act. That Act provides for criminal penalties and civil damages for accessing a "protected computer" (essentially any computer connected to the internet, whether in the U.S. or abroad) or activating any command or installing any malware on a protected computer. See generally, http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act That question suggests that Wyden and his staff are boring into issues involving the government breaking into computers to access private data. Another question asked whether the government claimed the authority to access private data stored in the cloud without a warrant.  This is a short video well worth the watching time.
Paul Merrell

Has the NSA Wiretapping Violated Attorney-Client Privilege? | The Nation - 0 views

  • The first time Adis Medunjanin tried to call Robert C. Gottlieb in mid-2009, Gottlieb was out of the office. Medunjanin was agitated. He had to speak to an attorney. Gottlieb’s assistant told him Gottlieb would be back soon. When Medunjanin spoke to the lawyer a little later, he was told he might need legal representation. He thought he might be under investigation. Over the next six months and in forty-two phone calls, Medunjanin sought legal advice from Gottlieb. When he was arrested in January 2010 on charges that he tried to bomb the New York subway, it was Gottlieb who defended him, receiving security clearance to review government documents pertinent to the case in the process. Gottlieb was preparing Medunjanin’s defense when a federal officer in charge of information distribution e-mailed him that there was new classified information he needed to review at the US Eastern District Court in Brooklyn. “I went over to the Brooklyn Federal courthouse, went up to the secured room, gained entry with the secret security codes, opened the file cabinet that is also secure and in the second drawer was a CD,” Gottlieb told me. On that CD were recordings of every single one of his forty-two phone calls with Medunjanin before he was taken into custody and indicted on January 7, 2010.
  • Such calls are normally sacrosanct under the principle of attorney-client privilege, the ability to speak confidentially with your lawyer. But a leak to The Guardian last summer of National Security Agency (NSA) procedures that are supposed to protect privileged calls showed that some attorney-client privileged calls are not subject to internal rules that detail the instances when a wiretap should be turned off. A later version of the procedures declassified by the NSA last August contains the same language. These “minimization” procedures, as they are known, are the rules and regulations for wiretaps under the Foreign Intelligence Surveillance Act (FISA). They tell NSA agents when they can listen, and when they have to turn the tap off, when they can record and when they should not be recording. There are rules for which kinds of communications can be monitored—for example, domestic communications are off limits, although communications from agents of foreign powers and suspected terrorists don’t count as domestic—and there is a section that provides for the protection of attorney-client calls.
  • Section four of the declassified 2011 guidelines is the part of that document that governs wiretapping attorney-client calls. At first glance, it seems quite clear: when the agent realizes that he or she is monitoring an attorney-client communication, “monitoring of that communication will cease and the communication will be identified as an attorney-client communication in a log maintained for that purpose.” But given a second reading, section four doesn’t apply to all attorney-client calls. It provides only for the minimization (and protection) of the calls of “a person who is known to be under criminal indictment in the United States”—someone who has already been charged under US law. This is because indicted persons have a Sixth Amendment right to counsel. People who aren’t indicted don’t have this right, and so their calls are not minimized. When I asked an NSA press officer, Vanee’ M. Vines, how attorney-client privilege was protected, she referred me to the Department of Justice. I left several messages, but the DOJ never contacted me back.
Paul Merrell

The NSA is turning the internet into a total surveillance system | Alexander Abdo and P... - 0 views

  • Another burst of sunlight permeated the National Security Agency's black box of domestic surveillance last week.According to the New York Times, the NSA is searching the content of virtually every email that comes into or goes out of the United States without a warrant. To accomplish this astonishing invasion of Americans' privacy, the NSA reportedly is making a copy of nearly every international email. It then searches that cloned data, keeping all of the emails containing certain keywords and deleting the rest – all in a matter of seconds.
  • The NSA appears to believe this general monitoring of our electronic communications is justified because the entire process takes, in one official's words, "a small number of seconds". Translation: the NSA thinks it can intercept and then read Americans' emails so long as the intrusion is swift, efficient and silent.That is not how the fourth amendment works.Whether the NSA inspects and retains these messages for years, or only searches through them once before moving on, the invasion of Americans' privacy is real and immediate. There is no "five-second rule" for fourth amendment violations: the US constitution does not excuse these bulk searches simply because they happen in the blink of an eye.The government claims that this program is authorized by a surveillance statute passed in 2008 that allows the government to target foreigners for surveillance. Although the government has frequently defended that law as a necessary tool in gathering foreign intelligence, the government has repeatedly misled the public about the extent to which the statute implicates Americans' communications.
  • There should no longer be any doubt: the US government has for years relied upon its authority to collect foreigners' communications as a useful cover for its sweeping surveillance of Americans' communications. The surveillance program revealed last week confirms that the interception of American communications under this law is neither "targeted" at foreigners (in any ordinary sense of that word) nor "inadvertent", as officials have repeatedly claimed.Last week's revelations are a disturbing harbinger of future surveillance. Two months ago, this newspaper reported that the US government has been forcing American telecommunications companies to turn over the call records of every one of their customers "on an ongoing daily basis", to allow the NSA to later search those records when it has a reason to do so. The government has since defended the program, in part on the theory that Americans' right to privacy is not implicated by the initial acquisition of their phone records, only by their later searching.That legal theory is extraordinarily dangerous because it would allow the NSA to acquire virtually all digital information today simply because it might possibly become relevant tomorrow. The surveillance program revealed by the New York Times report goes one step further still. No longer is the government simply collecting information now so that the data is available to search, should a reasonable suspicion arise at some point in the future; the NSA is searching everything now – in real time and without suspicion – merely on the chance that it finds something of interest.
  • ...1 more annotation...
  • That principle of pre-emptive surveillance threatens to subvert the most basic protections of the fourth amendment, which generally prohibit the government from conducting suspicion-less fishing expeditions through our private affairs. If the government is correct that it can search our every communication in case we say or type something suspicious, there is little to prevent the NSA from converting the internet into a tool of pervasive surveillance.
  •  
    Obama was apparently technically accurate but materially misleading when he he said that no one is reading your email. But government computers are reading every email. "Although conduct by law enforcement officials prior to trial may ultimately impair that right, a constitutional violation occurs only at trial. Kastigar v. United States, 406 U. S. 441, 453 (1972). The Fourth Amendment functions differently. It prohibits 'unreasonable searches and seizures' whether or not the evidence is sought to be used in a criminal trial, and a violation of the Amendment is 'fully accomplished' at the time of an unreasonable governmental intrusion. United States v. Calandra, 414 U. S. 338, 354 (1974); United States v. Leon, 468 U. S. 897, 906 (1984)." United States v. Verdugo-Urquidez, 494 US 259, 265 (1990), http://scholar.google.com/scholar_case?case=10167007390100843851  
Paul Merrell

​Thought better of it: NSA can get rid of evidence, judge says - RT USA - 0 views

  • A federal judge who ordered the National Security Agency to retain all records of its secret telephone surveillance related to an ongoing case has reversed the order – just a day after it was issued. “In order to protect national security programs, I cannot issue a ruling at this time. The Court rescinds the June 5 order,” US District Judge Jeffrey White said from the bench on Friday. The NSA had been prohibited from destroying any of its records of communications surveillance on Thursday – specifically under the government’s Section 702 program. Section 702 of the Foreign Intelligence Surveillance Act (FISA) has been used by the NSA to justify widespread collection of phone calls and emails.
  •  
    Wow! Thrice ordered to preserve evidence the NSA continued to destroy it. On the 5th, the judge issued yet another order. Today, he reverses himself in an oral order. Look for EFF to quickly file an emergency motion in the Ninth Circuit. 
Paul Merrell

Apple, Facebook and Google call for 'substantial' reform of NSA surveillance | Technolo... - 0 views

  • Tech giants including Apple, Facebook and Google called for substantial reforms to the US government's surveillance programmes Thursday in a letter to the Senate judiciary committee.In the wake of more revelations about the lengths to which the National Security Agency has gone to intercept data, the companies have called for more transparency and "substantial enhancements to privacy protections and appropriate oversight and accountability mechanisms for those programs."The letter, also signed by AOL, Microsoft and Yahoo, follows the release of more documents obtained by former NSA contractor Edward Snowden that reveal the US authorities were secretly tapping in to the tech firm's main communications links.The letter "applauds" the USA Freedom Act, a bill sponsored by Democrat senator Patrick Leahy and Republican congressman James Sensenbrenner that would end the bulk collection of data from millions of Americans and set up a privacy advocate to monitor the Fisa court, which oversees the NSA's US activities.
  • In a recent report the Information Technology and Innovation Foundation (ITIF) said the US tech firms could end up losing out on tens of billions of dollars in the cloud-based computing space in the wake of Snowden's revelations. Cloud computing is a rapidly growing area and revelations that the US authorities have been scooping up the personal data of millions of users, particularly outside the US, could cost them business."On the low end, US cloud computing providers might lose $21.5bn over the next three years," ITIF concluded. On the high end the report put the figure at $35bn.
Paul Merrell

We All Go Down Together: NSA Programs Overseas Violate Americans' Privacy, Yet Escape F... - 0 views

  • Ongoing revelations show that significant NSA surveillance activities take place outside of either Foreign Intelligence Surveillance Court (FISC) or congressional oversight, even though these policies directly impact Americans’ privacy.  These activities should, at the very least, be subject to congressional review, since American interests are being adversely impacted by them.
Paul Merrell

60 Minutes Hearts the NSA -- Daily Intelligencer - 0 views

  • Last night’s episode of 60 Minutes on CBS included what basically amounted to an uncritical commercial for the embattled National Security Agency, led by a journalist who used to be a government colleague. While the show — which has faced recent problems of its own, from the Benghazi debacle to the Amazon drone PR stunt — celebrated its own “unprecedented access to NSA headquarters,” it’s clear the meeting was on the NSA’s terms. In fact, NSA Director General Keith Alexander “made the call to invite us in,” a 60 Minutes producer admitted. They pretty much let him say his piece, nodding along excitedly. “Full disclosure, I once worked in the office of the director of National Intelligence where I saw firsthand how secretly the NSA operates,” said the reporter John Miller at the start of the segment.
  • While no critics of the NSA programs were given a chance to make the case against the potentially extralegal spying, which has resulted in international outrage, CBS did assist in the discrediting of master leaker Edward Snowden. Take, for example, this galling exchange with the head of the Snowden task force within the NSA, following Miller’s dismissive description of Snowden as a “twentysomething-year-old, high-school-dropout contractor”: John Miller: Did you sit in his chair?Rick Ledgett: I did not. I couldn’t bring myself to do that. […] At home, they discovered Snowden had some strange habits. Rick Ledgett: He would work on the computer with a hood that covered the computer screen and covered his head and shoulders, so that he could work and his girlfriend couldn't see what he was doing.John Miller: That's pretty strange, sitting at your computer kind of covered by a sheet over your head and the screen?Rick Ledgett: Agreed.
  • Media observers, some less personally involved in the Snowden leaks than others, could not believe what they were watching: 60 Minutes forgot to ask about how James Clapper & Keith Alexander routinely lied to Congress & FISA courts - just ran out of time.— Glenn Greenwald (@ggreenwald) December 16, 2013 Wow, the 60 Minutes piece about the NSA was just embarrassing. Kudos to the NSA communications staff. You guys should get a raise.— Ryan Lizza (@RyanLizza) December 16, 2013
  • ...3 more annotations...
  • "NSA Doing Great Job, NSA Says" - 60 Minutes— Dave Itzkoff (@ditzkoff) December 16, 2013 This 60 Minutes episode has been a pretty good infomercial for the NSA so far. Did anyone catch that 1-800 number so I can order?— Andy Greenberg (@a_greenberg) December 16, 2013 That time a 60 Minutes correspondent asked an NSA analyst to solve a Rubik's cube. #journalism pic.twitter.com/9fgJkLB1oK— Dave Itzkoff (@ditzkoff) December 16, 2013
  • CBS’s John Miller, though, knew what he was doing. “General Alexander agreed to talk to us because he believes the NSA has not told its story well,” he explained in a behind-the-scenes segment. “I think we asked the hardest questions we could ask,” he said. “We’ve heard plenty from the critics. We’ve heard a lot from Edward Snowden.” Still, “You also don’t want this to be a puff piece,” he added. We got one anyway.
  • The cherry on top is that Miller is currently in the running, reportedly, for a “top counterterrorism or intelligence role” in the NYPD when his old pal Bill Bratton takes over, something that was not disclosed by 60 Minutes.  He's certainly qualified. (Miller held a similar job as chief of counterterrorism under Bratton at the LAPD in addition to his work in national intelligence.) “He wants the badge, the gun and the adrenaline — to be in the center of the action,” a source told the New York Post of Miller, calling it “a 99.44 percent done deal.” And on top of describing Bill Bratton as “one of my best friends,” this was a great audition.  [CBS News] [HuffPost] [Poynter]
  •  
    I'm glad I didn't miss anything important that I haven't heard before too many times. Filmed before a federal judge and Obama's blue ribbon committee report on DoD intelligence community digital spying both in effect branded Alexander as a liar again. 
Paul Merrell

Tech giants oppose NSA reform bill for timid safeguards against spying - RT USA - 0 views

  • Ahead of Thursday’s US House vote on a bill sold as reform of a major US government spying program, top technology firms like Google have joined civil liberties and privacy groups in calling the legislation inadequate in fighting mass surveillance. The Reform Government Surveillance coalition – AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo – offered a statement on Wednesday denouncing the USA Freedom Act as a weak attempt at ending the government’s bulk storage of domestic phone metadata.
  • The USA Freedom Act would take the mass storage of phone records away from the government. Instead, telecommunications companies would be required to store the data. The bill would require the National Security Agency to get approval to search the telecoms’ cache of records from the often-compliant Foreign Intelligence Surveillance Court. Last-minute changes to the bill rankled privacy groups on Tuesday, leading many of them to decry the backdoor dealings as responsible for a “weakened,” “watered down” bill compared to what had previously passed the House Judiciary and Intelligence Committees earlier this month. On Wednesday, the tech coalition echoed these concerns, calling the amended legislation a move “in the wrong direction” of needed reform regarding mass surveillance. "The latest draft opens up an unacceptable loophole that could enable the bulk collection of Internet users' data," the coalition said. "While it makes important progress, we cannot support this bill as currently drafted and urge Congress to close this loophole to ensure meaningful reform." The loophole referred to by the coalition pertains to the USA Freedom Act’s definition for how and when government officials can search collected phone metadata records.
  • The new language – approved by House leaders and the Obama administration in recent days – modifies the prohibitions on bulk collection of domestic data to allow government officials to search for Americans’ phone records using a “a discrete term, such as a term specifically identifying a person, entity, account, address, or device, used by the Government to limit the scope of the information or tangible things sought.” This revised standard for the USA Freedom Act’s reform of surveillance is too broad and leaves privacy protections at risk, civil liberties groups said on Tuesday. In addition, the legislation’s new language also weakens the bill’s transparency provisions which outlined how much technology companies can disclose to customers about the extent of government requests of user data.
  • ...2 more annotations...
  • In addition to the tech coalition’s protest, the Computer & Communications Industry Association – whose members include Pandora, Samsung, Sprint, and others – said Wednesday it would “not support consideration or passage of the USA Freedom Act in its current form." The Obama administration publicly threw its support behind the amended USA Freedom Act, saying the bill would “provide the public greater confidence in our programs and the checks and balances in the system.” “The bill ensures our intelligence and law enforcement professionals have the authorities they need to protect the nation, while further ensuring that individuals’ privacy is appropriately protected when these authorities are employed,” the White House included.
  • Lawmakers opposed to the secretive negotiations attempted on Tuesday to counter the weakened surveillance reform bill by offering an amendment to the National Defense Authorization Act (NDAA) that is “materially identical” to the version of the USA Freedom Act that was advanced by the House Judiciary and Intelligence Committees earlier this month. Yet the amendment was denied by the House Rules Committee late Tuesday. The House is now scheduled to vote on the USA Freedom Act on Thursday under closed rules, which forbids adding amendments before the final vote.
  •  
    The Obama Administration and NSA supporters in the House of Representatives resort to a successful last-minute ambush attack to eviscerate the modest reforms proposed in the USA Freedom Act. 
Paul Merrell

Curbs on Surveillance State Urged | Consortiumnews - 1 views

  • In the post 9/11 era, the U.S. government vastly expanded its surveillance of nearly everyone on earth, even U.S. citizens, brushing aside constitutional protections in the name of security. A group of intelligence veterans urges reform of those practices to protect privacy and to stop the waste of resources. MEMORANDUM FOR: Privacy and Civil Liberties Oversight BoardFROM: Veteran Intelligence Professionals for Sanity (VIPS)Subject: Two Administrations and Congress Dismantled the Constitution – How Can It Be Restored? Drastic Erosion of Citizen Privacy Since 9/11Since the events of September 11, 2001, actions by successive U.S. administrations – backed by legislation such as the Patriot Act and the FISA Amendments Act (FAA) – have eroded privacy provisions guaranteed under the U.S. Constitution. Lawsuits challenging these actions have languished, with the U.S. Supreme Court having declined to hear the one case to reach it for review, Clapper vs. Amnesty International.
Paul Merrell

FBI Can Neither Confirm Nor Deny Trump Tower Wiretap - 0 views

  • In response to a Freedom of Information Act (FOIA) request filed by Shadowproof, the Federal Bureau of Investigation (FBI) said it “can neither confirm nor deny the existence of records” regarding a wiretap of Trump Tower. The FBI sent its response via email earlier this afternoon, hours before news broke that the United States government wiretapped President Trump’s former campaign chairman, Paul Manafort. The Bureau’s response appears to be a reversal from its response to an earlier FOIA request, in which the Department of Justice stated that “Both FBI and NSD confirm that they have no records related to wiretaps as described by the March 4, 2017 tweets [in which Trump alleged President Obama had wiretapped Trump Tower]”. CNN reported today that U.S. investigators employed secret court orders to wiretap Manafort, both prior to and following the election. Though Manafort owns an apartment in Trump Tower, the report by CNN did not make clear whether that was the location or subject of the wiretap.
« First ‹ Previous 101 - 114 of 114
Showing 20 items per page