Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged DNI

Rss Feed Group items tagged

Paul Merrell

DNI Clapper: Transparency is the Way Forward - Secrecy News - 0 views

  • The primary lesson that emerges from the unauthorized disclosures of classified intelligence information by Edward Snowden is that U.S. intelligence agencies must be more transparent in their operations, said Director of National Intelligence James R. Clapper yesterday. “The major takeaway for us, certainly for me, from the past several months is that we must lean in the direction of transparency, wherever and whenever we can,” DNI Clapper told the Senate Intelligence Committee. “With greater transparency about these intelligence programs the American people may be more likely to accept them,” he said, promising “further declassification.” Another possibility, he acknowledged, is that even with greater transparency the American people will choose not to accept certain kinds of intelligence programs. “If dealing with reduced capacities is what we need to ensure the faith and confidence of the American people and their elected representatives, then we in the intelligence community will work as hard as we can to meet the expectations before us,” DNI Clapper said.
  • The primary lesson that emerges from the unauthorized disclosures of classified intelligence information by Edward Snowden is that U.S. intelligence agencies must be more transparent in their operations, said Director of National Intelligence James R. Clapper yesterday. “The major takeaway for us, certainly for me, from the past several months is that we must lean in the direction of transparency, wherever and whenever we can,” DNI Clapper told the Senate Intelligence Committee. “With greater transparency about these intelligence programs the American people may be more likely to accept them,” he said, promising “further declassification.” Another possibility, he acknowledged, is that even with greater transparency the American people will choose not to accept certain kinds of intelligence programs.
  • Already, the Snowden disclosures have caused “profound damage” to U.S. intelligence, the DNI said. “What Snowden has stolen and exposed has gone way, way beyond his professed concerns with so-called domestic surveillance programs. As a result, we’ve lost critical foreign intelligence collection sources, including some shared with us by valued partners.” “Snowden claims that he’s won and that his mission is accomplished. If that is so, I call on him and his accomplices to facilitate the return of the remaining stolen documents that have not yet been exposed to prevent even more damage to U.S. security,” the DNI said. The use of the word “accomplices” appeared to suggest that the DNI views the journalists who possess and report on the Snowden documents as Snowden’s partners in crime, and even as criminals themselves. “Is it now the official view of the Obama administration that these journalists and media outlets are ‘accomplices’ in what they regard as Snowden’s crimes? If so, that is a rather stunning and extremist statement,” wrote Glenn Greenwald, who first reported on the Snowden releases last June.
Paul Merrell

First Unitarian Church of Los Angeles v. NSA | Electronic Frontier Foundation - 0 views

  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • ...5 more annotations...
  • Our goal is to highlight one of the most important ways that the government collection of telephone records is unconstitutional: it violates the First Amendment right of association. When the government gets access to the phone records of political and activist organizations and their members, it knows who is talking to whom, when, and for how long. This so-called “metadata,” especially when collected in bulk and aggregated, tracks the associations of these organizations. After all, if the government knows that you call the Unitarian Church or Calguns or People for the American Way or Students for Sensible Drug Policy regularly, it has a very good indication that you are a member and it certainly knows that you associate regularly. The law has long recognized that government access to associations can create a chilling effect—people are less likely to associate with organizations when they know the government is watching and when the government can track their associations. 
  • The case challenges the mass telephone records collection that was confirmed by the FISA Order that was published on June 5, 2013 and confirmed by the Director of National Intelligence (DNI) on June 6, 2013. The DNI confirmed that the collection was “broad in scope” and conducted under the “business records” provision of the Foreign Intelligence Surveillance Act, also known as section 215 of the Patriot Act and 50 U.S.C. section 1861. The facts have long been part of EFF’s Jewel v. NSA case. The case does not include section 702 programs, which includes the recently made public and called the PRISM program or the fiber optic splitter program that is included (along with the telephone records program) in the Jewel v. NSA case. 
  • The First Amendment right of association is a well established doctrine that prevents the government “interfering with the right to peaceably assemble or prohibit the petition for a governmental redress of grievances.” The most famous case embracing it is a 1958 Supreme Court Case from the Civil Rights era called  NAACP v. Alabama. In that case the Supreme Court held that it would violate the First Amendment for the NAACP to have to turn over its membership lists in litigation. The right stems from the simple fact that the First Amendment protects the freedom to associate and express political views as a group. This constitutional protection is critical because, as the court noted “[e]ffective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association[.]” NAACP v. Alabama, 357 U.S. at 460. As another court noted: the Constitution protects freedom of association to encourage the “advancing ideas and airing grievances” Bates v. City of Little Rock, 361 U.S. 516, 522-23 (1960).
  • The collection and analysis of telephone records give the government a broad window into our associations. The First Amendment protects against this because, as the Supreme Court has recognized, “it may induce members to withdraw from the association and dissuade others from joining it because of fear of exposure of their beliefs shown through their associations and of the consequences of their exposure.” NAACP v. Alabama, 357 U.S. at 462-63. See also Bates, 361 U.S. at 523; Gibson v. Florida Legislative Investigation Comm., 372 U.S. 539 (1963).  Privacy in one’s associational ties is also closely linked to freedom of association: “Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs.” NAACP v. Alabama, 357 U.S. at 462. 
  • The Supreme Court has made clear that infringements on freedom of association may survive constitutional scrutiny only when they “serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.” Roberts v. United States Jaycees, 468 U.S. 609, 623 (1984); see also NAACP v. Button, 371 U.S. at 341; Knox v. SEIU, Local 1000, 132 S. Ct. 2277, 2291 (2012)  Here, the wholesale collection of telephone records of millions of innocent Americans’ communications records, and thereby collection of their associations, is massively overbroad, regardless of the government’s interest. Thus, the NSA spying program fails under the basic First Amendment tests that have been in place for over fifty years.
  •  
    This case is related to EFF's earlier pending case, Jewel v. NSA and has been assigned to Judge Whyte, the same judge who ruled earlier in Jewel that the State Secrets Privilege does not apply to NSA's call metadata "haystack." The plaintiffs are 22 different groups who would make strange bedfellows indeed, except in opposition to government surveillance and repression. 
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
Paul Merrell

Congressmen Call For DNI Clapper's Ouster | Threatpost - English - Global - threatpost.com - 0 views

  • A group of six Congressmen have asked President Barack Obama to remove James Clapper as director of national intelligence as a result of his misstatements to Congress about the NSA’s dragnet data-collection programs. The group, led by Rep. Darrell Issa (R-Calif.), said that Clapper’s role as DNI “is incompatible with the goal of restoring trust in our security programs”.
  • Clapper is the former head of the National Geospatial Intelligence Agency and has been DNI since 2010. In their letter to Obama, the group of Congressmen calling for his ouster said that he lied to Congress and should no longer be in office. “The continued role of James Clapper as Director of National Intelligence is incompatible with the goal of restoring trust in our security programs and ensuring the highest level of transparency. Director Clapper continues to hold his position despite lying to Congress, under oath, about the existence of bulk data collection programs in March 2013. Asking Director Clapper, and other federal intelligence officials who misrepresented programs to Congress and the courts, to report to you on needed reforms and the future role of government surveillance is not a credible solution,” the letter from Issa, Ted Poe, Paul Broun, Doug Collins, Walter Jones and Alan Grayson says. The Congressmen sent the letter to Obama on Monday, 10 days after the president gave a much-anticipated speech on the NSA’s role and some new limits he wants to place on the scope of its data collection. Security experts and privacy advocates were not enthusiastic about the changes Obama announced, which included a recommendation that a third party hold phone metadata records, which are now stored by the NSA.
  • One issue that Obama didn’t address in his speech was the agency’s alleged subversion of cryptographic standards and algorithms. In their letter, Issa and his colleagues urged Obama to address this issue. “While the collection of bulk telephone records (meta-data) under Section 215 of the PATRIOT Act has understandably garnered the most significant public debate over government overreach, considerable concern has been raised about the govemment’s exploitation of the Internet through circumvention of encryption. The Review Group recognized the potential hazard created by exposing vulnerabilities in encryption data and recommended that your Administration support, rather than undermine, efforts to protect the integrity of these systems.3 However, your January 17′th speech failed to address the future of encryption related programs. Internet freedom is indispensible, and reports regarding the govemment’s treatment of encryption protocols underscore the need to provide leadership and clarity beyond the collection of telephone records,” the letter says.
Paul Merrell

DNI Issues New Policy on Leak Damage Assessments | Federation Of American Scientists - 0 views

  • The Director of National Intelligence has issued new guidance on assessing damage resulting from the unauthorized disclosure of classified intelligence information to ensure that the damage assessments “are produced in an efficient, timely, consistent and collaborative manner.” Leak damage assessments should be used iteratively and the lessons learned from them should be applied “to strengthen the protection of classified national intelligence and prevent future unauthorized disclosures or compromises.” In addition to the facts and circumstances of the unauthorized disclosure, damage assessments should identify “any foreign involvement” in the case and “actionable recommendations to prevent future occurrences.” Where foreign partners are affected by the leak, agency heads shall coordinate with DNI “prior to notifying a foreign government.” Also, “foreign governments normally will not be advised of any security system vulnerabilities that contributed to the compromise.” See “Damage Assessments,” Intelligence Community Directive 732, June 27, 2014.
Paul Merrell

The Stop Arming Terrorists Act     : Information Clearing House - ICH - 0 views

  • Rep. Tulsi Gabbard (HI-02) introduced the Stop Arming Terrorists Act today. The legislation would prohibit the U.S. government from using American taxpayer dollars to provide funding, weapons, training, and intelligence support to groups like the Levant Front, Fursan al Ha and other allies of Jabhat Fateh al-Sham, al-Qaeda and ISIS, or to countries who are providing direct or indirect support to those same groups.
  • Rep. Tulsi Gabbard said, “Under U.S. law it is illegal for any American to provide money or assistance to al-Qaeda, ISIS or other terrorist groups. If you or I gave money, weapons or support to al-Qaeda or ISIS, we would be thrown in jail. Yet the U.S. government has been violating this law for years, quietly supporting allies and partners of al-Qaeda, ISIL, Jabhat Fateh al Sham and other terrorist groups with money, weapons, and intelligence support, in their fight to overthrow the Syrian government.[i] “The CIA has also been funneling weapons and money through Saudi Arabia, Turkey, Qatar and others who provide direct and indirect support to groups like ISIS and al-Qaeda. This support has allowed al-Qaeda and their fellow terrorist organizations to establish strongholds throughout Syria, including in Aleppo.   “A recent New York Times article confirmed that ‘rebel groups’ supported by the U.S. ‘have entered into battlefield alliances with the affiliate of al-Qaeda in Syria, formerly known as al Nusra.’ This alliance has rendered the phrase ‘moderate rebels’ meaningless. Reports confirm that ‘every armed anti-Assad organization unit in those provinces [of Idlib and Aleppo] is engaged in a military structure controlled by [al-Qaeda’s] Nusra militants.’
  • “A recent Wall Street Journal article reported that many rebel groups are ‘doubling down on their alliance’ with al Nusra. Some rebel groups are renewing their alliance, while others, like Nour al-Din al-Zinki, a former CIA-backed group and one of the largest factions in Aleppo are joining for the first time. “The Syria Conquest Front—formerly known as the al-Qaeda-linked Nusra Front—is deeply intermingled with armed opposition groups of all stripes across Syria’s battlefields.”  “The CIA has long been supporting a group called Fursan al Haqq, providing them with salaries, weapons and support, including surface to air missiles.  This group is cooperating with and fighting alongside an al-Qaeda affiliated group trying to overthrow the Syrian government. The Levant Front is another so-called moderate umbrella group of Syrian opposition fighters. Over the past year, the United States has been working with Turkey to give this group intelligence support and other forms of military assistance. This group has joined forces with al-Qaeda’s offshoot group in Syria.  “This madness must end. We must stop arming terrorists. The Government must end this hypocrisy and abide by the same laws that apply to its’ citizens.  “That is why I’ve introduced the Stop Arming Terrorists bill—legislation based on congressional action during the Iran-Contra affair to stop the CIA’s illegal arming of rebels in Nicaragua. It will prohibit any Federal agency from using taxpayer dollars to provide weapons, cash, intelligence, or any support to al-Qaeda, ISIS and other terrorist groups, and it will prohibit the government from funneling money and weapons through other countries who are directly or indirectly supporting terrorists,” concluded Rep. Tulsi Gabbard.
  • ...1 more annotation...
  • Background: The Stop Arming Terrorists bill prohibits U.S. government funds from being used to support al-Qaeda, ISIS or other terrorist groups. In the same way that Congress passed the Boland Amendment to prohibit the funding and support to CIA backed-Nicaraguan Contras during the 1980’s, this bill would stop CIA or other Federal government activities in places like Syria by ensuring U.S. funds are not used to support al-Qaeda, Jabhat Fateh al-Sham, ISIS, or other terrorist groups working with them. It would also prohibit the Federal government from funding assistance to countries that are directly or indirectly supporting those terrorist groups. The bill achieves this by: Making it illegal for any U.S. Federal government funds to be used to provide assistance covered in this bill to terrorists. The assistance covered includes weapons, munitions, weapons platforms, intelligence, logistics, training, and cash. Making it illegal for the U.S. government to provide assistance covered in the bill to any nation that has given or continues to give such assistance to terrorists. Requiring the Director of National Intelligence (DNI) to determine the individual and groups that should be considered terrorists, for the purposes of this bill, by determining: (a) the individuals and groups that are associated with, affiliated with, adherents to or cooperating with al-Qaeda, Jabhat Fateh al-Sham, or ISIS; (b) the countries that are providing assistance covered in this bill to those individuals or groups. Requiring the DNI to review and update the list of countries and groups to which assistance is prohibited every six months, in consultation with the House Foreign Affairs and Armed Services Committees, as well as the House Permanent Select Committee on Intelligence. Requiring the DNI to brief Congress on the determinations.
Paul Merrell

VIDEO: Rep. Tulsi Gabbard Introduces Legislation to Stop Arming Terrorists | Congresswo... - 0 views

  • Rep. Tulsi Gabbard (HI-02) introduced the Stop Arming Terrorists Act today. The legislation would prohibit the U.S. government from using American taxpayer dollars to provide funding, weapons, training, and intelligence support to groups like the Levant Front, Fursan al Ha and other allies of Jabhat Fateh al-Sham, al-Qaeda and ISIS, or to countries who are providing direct or indirect support to those same groups. The legislation is cosponsored by Reps. Peter Welch (D-VT-AL), Barbara Lee (D-CA-13), Dana Rohrabacher (R-CA-48), and Thomas Massie (R-KT-04), and supported by the Progressive Democrats of America (PDA) and the U.S. Peace Council. Video of Rep. Tulsi Gabbard’s speech on the House floor is available here Rep. Tulsi Gabbard said, “Under U.S. law it is illegal for any American to provide money or assistance to al-Qaeda, ISIS or other terrorist groups. If you or I gave money, weapons or support to al-Qaeda or ISIS, we would be thrown in jail. Yet the U.S. government has been violating this law for years, quietly supporting allies and partners of al-Qaeda, ISIL, Jabhat Fateh al Sham and other terrorist groups with money, weapons, and intelligence support, in their fight to overthrow the Syrian government.[i] “The CIA has also been funneling weapons and money through Saudi Arabia, Turkey, Qatar and others who provide direct and indirect support to groups like ISIS and al-Qaeda. This support has allowed al-Qaeda and their fellow terrorist organizations to establish strongholds throughout Syria, including in Aleppo.
  • “A recent New York Times article confirmed that ‘rebel groups’ supported by the U.S. ‘have entered into battlefield alliances with the affiliate of al-Qaeda in Syria, formerly known as al Nusra.’ This alliance has rendered the phrase ‘moderate rebels’ meaningless. Reports confirm that ‘every armed anti-Assad organization unit in those provinces [of Idlib and Aleppo] is engaged in a military structure controlled by [al-Qaeda’s] Nusra militants.’ “A recent Wall Street Journal article reported that many rebel groups are ‘doubling down on their alliance’ with al Nusra. Some rebel groups are renewing their alliance, while others, like Nour al-Din al-Zinki, a former CIA-backed group and one of the largest factions in Aleppo are joining for the first time. “The Syria Conquest Front—formerly known as the al-Qaeda-linked Nusra Front—is deeply intermingled with armed opposition groups of all stripes across Syria’s battlefields.”  “The CIA has long been supporting a group called Fursan al Haqq, providing them with salaries, weapons and support, including surface to air missiles.  This group is cooperating with and fighting alongside an al-Qaeda affiliated group trying to overthrow the Syrian government. The Levant Front is another so-called moderate umbrella group of Syrian opposition fighters. Over the past year, the United States has been working with Turkey to give this group intelligence support and other forms of military assistance. This group has joined forces with al-Qaeda’s offshoot group in Syria.  “This madness must end. We must stop arming terrorists. The Government must end this hypocrisy and abide by the same laws that apply to its’ citizens. 
  • “That is why I’ve introduced the Stop Arming Terrorists bill—legislation based on congressional action during the Iran-Contra affair to stop the CIA’s illegal arming of rebels in Nicaragua. It will prohibit any Federal agency from using taxpayer dollars to provide weapons, cash, intelligence, or any support to al-Qaeda, ISIS and other terrorist groups, and it will prohibit the government from funneling money and weapons through other countries who are directly or indirectly supporting terrorists,” concluded Rep. Tulsi Gabbard.
  • ...2 more annotations...
  • Background: The Stop Arming Terrorists bill prohibits U.S. government funds from being used to support al-Qaeda, ISIS or other terrorist groups. In the same way that Congress passed the Boland Amendment to prohibit the funding and support to CIA backed-Nicaraguan Contras during the 1980’s, this bill would stop CIA or other Federal government activities in places like Syria by ensuring U.S. funds are not used to support al-Qaeda, Jabhat Fateh al-Sham, ISIS, or other terrorist groups working with them. It would also prohibit the Federal government from funding assistance to countries that are directly or indirectly supporting those terrorist groups. The bill achieves this by: Making it illegal for any U.S. Federal government funds to be used to provide assistance covered in this bill to terrorists. The assistance covered includes weapons, munitions, weapons platforms, intelligence, logistics, training, and cash. Making it illegal for the U.S. government to provide assistance covered in the bill to any nation that has given or continues to give such assistance to terrorists. Requiring the Director of National Intelligence (DNI) to determine the individual and groups that should be considered terrorists, for the purposes of this bill, by determining: (a) the individuals and groups that are associated with, affiliated with, adherents to or cooperating with al-Qaeda, Jabhat Fateh al-Sham, or ISIS; (b) the countries that are providing assistance covered in this bill to those individuals or groups. Requiring the DNI to review and update the list of countries and groups to which assistance is prohibited every six months, in consultation with the House Foreign Affairs and Armed Services Committees, as well as the House Permanent Select Committee on Intelligence. Requiring the DNI to brief Congress on the determinations.
  • [i] Levant Front (U.S. backed, via the MOC in Turkey) is working under an Ahrar al Sham led umbrella group: http://www.understandingwar.org/sites/default/files/December%202%20EDITS%20COT_2.pdf ; U.S. support for Levant Front: http://carnegie-mec.org/diwan/57605?lang=en ; CIA groups cooperated with Jayesh al-Fateh http://www.thedailybeast.com/articles/2016/01/19/the-cia-s-syria-program-and-the-perils-of-proxies.html; U.S. weapons arriving in Syria through covert, CIA-led program, via Saudi Arabia and Turkey; CIA can provide support http://www.reuters.com/article/us-usa-syria-obama-order-idUSBRE8701OK20120802
  •  
    A member of Congress who has actually discovered hyperlinks? Amazing.
Paul Merrell

IC ON THE RECORD * ODNI STATEMENT on the Unauthorized Disclosure of... - 1 views

  • September 6, 2013 It should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries’ use of encryption.  Throughout history, nations have used encryption to protect their secrets, and today, terrorists, cybercriminals, human traffickers and others also use code to hide their activities.  Our intelligence community would not be doing its job if we did not try to counter that.  While the specifics of how our intelligence agencies carry out this cryptanalytic mission have been kept secret, the fact that NSA’s mission includes deciphering enciphered communications is not a secret, and is not news. Indeed, NSA’s public website states that its mission includes leading “the U.S. Government in cryptology … in order to gain a decision advantage for the Nation and our allies.” The stories published yesterday, however, reveal specific and classified details about how we conduct this critical intelligence activity. Anything that yesterday’s disclosures add to the ongoing public debate is outweighed by the road map they give to our adversaries about the specific techniques we are using to try to intercept their communications in our attempts to keep America and our allies safe and to provide our leaders with the information they need to make difficult and critical national security decisions.
  •  
    Director of National Intelligence James Clapper is displeased by the disclosures of its decryption capabilities revealed by the New York Times, based on Edward Snowden-leaked documents.  http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?pagewanted=all&_r=0 Noticeably absent from DNI Clapper's reaction is the slightest hint of respect for privacy rights of American citizens. Isn't it past time that this gentleman lose his job, to be replaced by a strong civil libertarian? 
Paul Merrell

UT Documents: Does Obama administration view journalists as Snowden's "accomplices"? It... - 0 views

  • James Clapper, the Director of National Intelligence, appeared today before the Senate Intelligence Committee, his first appearance since outright lying to that Committee last March about NSA bulk collection. In his prepared opening remarks, Clapper said this: Who, in the view of the Obama administration, are Snowden's "accomplices"? The FBI and other official investigators have been very clear with the media that there is no evidence whatsoever that Snowden had any help in copying and removing documents from the NSA. Here, Clapper is referring to "accomplices" as those who can "facilitate the return of the remaining" documents. As Snowden has said, the only ones to whom he has given those documents are the journalists with whom he has worked. As has been publicly reported, the journalists who are in possession of thousands of Snowden documents include myself, Laura Poitras, Barton Gellman/The Washington Post, The New York Times, the Guardian, and ProPublica.
  • Is it now the official view of the Obama administration that these journalists and media outlets are "accomplices" in what they regard as Snowden's crimes? If so, that is a rather stunning and extremist statement. Is there any other possible interpretation of Clapper's remarks? UPDATE: In response to media inquiries about what Clapper meant when he referred to "accomplices", a spokesman for the DNI's office, Shawn Turner, is saying this: "anyone who is assisting Edward Snowden [to] further harm our nation through the unauthorized disclosure of stolen documents." (Turner declined to be more specific when asked if that included journalists.) Turner may be reluctant to admit it, but that essentially dispels all doubt - if there was any - that Clapper was publicly accusing journalists who publish Snowden documents of being "accomplices" in his "crimes". That a top-level Obama official is publicly accusing journalists of criminality for their journalism seems like fairly big (though unsurprising) news. posted by Glenn Greenwald
  •  
    For an analysis of which statutes might be used to criminally prosecute journalists publishing the Snowden materials, see http://blogs.fas.org/secrecy/2014/01/dni-transparency/
Paul Merrell

Heck no, Clapper won't go: DNI refuses to quit over misleading Congress on NSA spying -... - 0 views

  • Director of National IntelligenceJames Clapper has no plans to resign following disclosures to the Senate Intelligence Committee that he misled Congress on widespread National Security Agency electronic surveillance of Americans.
Paul Merrell

The U.S. Government's Secret Plans to Spy for American Corporations - The Intercept - 0 views

  • Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. So critical is this denial to the U.S. government that last August, an NSA spokesperson emailed The Washington Post to say (emphasis in original): “The department does ***not*** engage in economic espionage in any domain, including cyber.” After that categorical statement to the Post, the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations.
  • In a graphic describing an “illustrative example,” the report heralds “technology acquisition by all means.” Some of the planning relates to foreign superiority in surveillance technology, but other parts are explicitly concerned with using cyber-espionage to bolster the competitive advantage of U.S. corporations. The report thus envisions a scenario in which companies from India and Russia work together to develop technological innovation, and the U.S. intelligence community then “conducts cyber operations” against “research facilities” in those countries, acquires their proprietary data, and then “assesses whether and how its findings would be useful to U.S. industry” (click on image to enlarge):
  • One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” Such a development, the report says “could put the United States at a growing—and potentially permanent—disadvantage in crucial areas such as energy, nanotechnology, medicine, and information technology.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence” (emphasis added). In particular, the DNI’s report envisions “cyber operations” to penetrate “covert centers of innovation” such as R&D facilities.
  • ...3 more annotations...
  • Director of National Intelligence James Clapper, for instance, responded to the Petrobras revelations by claiming: “It is not a secret that the Intelligence Community collects information about economic and financial matters…. What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of—or give intelligence we collect to—U.S. companies to enhance their international competitiveness or increase their bottom line.” But a secret 2009 report issued by Clapper’s own office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies as they identify future threats to the U.S. and lay out the actions the U.S. intelligence community should take in response. It anticipates a series of potential scenarios the U.S. may face in 2025, from a “China/Russia/India/Iran centered bloc [that] challenges U.S. supremacy” to a world in which “identity-based groups supplant nation-states,” and games out how the U.S. intelligence community should operate in those alternative futures—the idea being to assess “the most challenging issues [the U.S.] could face beyond the standard planning cycle.”
  • he report describes itself as “an essential long-term piece, looking out between 10 and 20 years” designed to enable ”the IC [to] best posture itself to meet the range of challenges it may face.” Whatever else is true, one thing is unmistakable: the report blithely acknowledges that stealing secrets to help American corporations secure competitive advantage is an acceptable future role for U.S. intelligence agencies. In May, the U.S. Justice Department indicted five Chinese government employees on charges that they spied on U.S. companies. At the time, Attorney General Eric Holder said the spying took place “for no reason other than to advantage state-owned companies and other interests in China,” and “this is a tactic that the U.S. government categorically denounces.” But the following day, The New York Times detailed numerous episodes of American economic spying that seemed quite similar. Harvard Law School professor and former Bush Justice Department official Jack Goldsmith wrote that the accusations in the indictment sound “a lot like the kind of cyber-snooping on firms that the United States does.” But U.S. officials continued to insist that using surveillance capabilities to bestow economic advantage for the benefit of a country’s corporations is wrong, immoral, and illegal.
  • Yet this 2009 report advocates doing exactly that in the event that ”that the technological capacity of foreign multinational corporations outstrip[s] that of U.S. corporations.” Using covert cyber operations to pilfer “proprietary information” and then determining how it ”would be useful to U.S. industry” is precisely what the U.S. government has been vehemently insisting it does not do, even though for years it has officially prepared to do precisely that.
  •  
    DNI James Clapper caught telling another whopper. 
Paul Merrell

US Spy Chief Presents Third-Party Debates as Proof RT Is Anti-US - Antiwar.com Blog - 0 views

  • The Office of the Director of National Intelligence’s latest report on the alleged “election hacking” by Russia includes a substantial section focused around the idea that Russian government-funded channel RT is overtly anti-American. This is a common enough accusation, but when set out in a multi-page report format, a lot of the charges fall remarkable short. Nowhere was this more apparent, however, than on the first page of the Annex on RT, which presented the fact that RT America hosted US presidential debates which included third-party candidates. There has of course been long-standing annoyance among many in the US that the “mainstream” US media’s debates consistently exclude all but the Democratic and Republican candidates. US spy agencies, however, see this exclusion as such a core aspect of US democracy that they are presenting more inclusive debates as inherently anti-American. In 2012 RT hosted a third-party candidates debate which included Libertarian Party candidate Gary Johnson and Green Party candidate Jill Stein. In 2016 RT ran a pair of primary debates for the same two parties focusing on foreign policy as well as electoral reform. Beyond giving third parties an avenue of debate, the Annex also accuses RT of myriad other “misdeeds” of a similarly dubious nature, complaining RT introduced the show “Breaking the Set” in 2012 with an eye toward “the promotion of radical discontent,” and ran stories critical of the environmental fallout of fracking.
  • While anti-fracking news is common across a lot of media outlets, the report concluded that the only reason RT could possibly be concerned with the practice was that they were trying to protect the profits of major Russian natural gas giant OAO Gazprom. The report also notes RT coverage of police brutality in the US, its sympathy for the Occupy Wall Street movement, and criticism of mass surveillance as signs they were trying to “undermine viewers’ trust in US democratic procedures.”
  •  
    Note to DNI James Clapper: You've mistakenly conflated the message and the messenger. Millions of Americans were upset by those issues long before RT piled on; have you granted them all Russian citizenship?
Paul Merrell

Report: Trump plans to shrink top intelligence agencies, including CIA - Business Insider - 0 views

  • President-elect Donald Trump is planning to restructure two of the nation's top intelligence agencies, according to a Wall Street Journal report published Wednesday. The newspaper writes that Trump plans to reduce the size of the office of the Director of National Intelligence and the CIA, fearing the agencies have become too large and politicized. "The view from the Trump team is the intelligence world has become completely politicized," The Journal quoted someone close to Trump's transition team as saying. "They all need to be slimmed down. The focus will be on restructuring the agencies and how they interact."
Paul Merrell

Wyden Statement at Senate Intelligence Committee's Open Hearing | Press Releases | U.S.... - 0 views

  • U.S. Senator Ron Wyden (D-Ore.) delivered the following statement prior to questioning senior Intelligence Community officials during the Senate Intelligence Committee’s open hearing. Wyden is a senior member of the Intelligence committee. “The men and women of America’s intelligence agencies are overwhelmingly dedicated professionals and they deserve to have leadership that is trusted by the American people. Unfortunately, that trust has been seriously undermined by senior officials’ reckless reliance on secret interpretations of the law and battered by years of misleading and deceptive statements that senior officials made to the American people. These statements did not protect sources and methods that were useful in fighting terror. Instead they hid bad policy choices and violations of the liberties of the American people. For example, the director of the NSA said publicly that the NSA doesn’t hold data on U.S. citizens. That was obviously untrue.  Justice Department officials testified that section 215 of the Patriot Act is analogous to grand jury subpoena authority. And that deceptive statement was made on multiple occasions. Officials also suggested that the NSA doesn’t have the authority to read Americans’ emails without a warrant but the FISA court opinions declassified last August showed that wasn’t true either.
  • The statement and subsequent questions may be viewed below or here:
  •  
    Ron Wyden comes out swinging at a Senate hearing, giving 3 examples of lies about digital surveillance told to Congress by intelligence officials and DoJ. Then he presses DNI Clapper, CIA head Brennan, and FBI head Comey to provide by dates certain written public answers to a series of questions that he had previously asked in writing but never received answers on. All three said they would provide the answers, Clapper within 30 days and the other two within 7 days.  The questions themselves are extremely important, about the government's interpretation of legal authorities to conduct warrantless searches and in the case of the CIA, whether it is subject to the Computer Fraud and Abuse Act. That Act provides for criminal penalties and civil damages for accessing a "protected computer" (essentially any computer connected to the internet, whether in the U.S. or abroad) or activating any command or installing any malware on a protected computer. See generally, http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act That question suggests that Wyden and his staff are boring into issues involving the government breaking into computers to access private data. Another question asked whether the government claimed the authority to access private data stored in the cloud without a warrant.  This is a short video well worth the watching time.
Paul Merrell

US looks at ways to prevent spying on its spying - 0 views

  • (AP) — The U.S. government is looking at ways to prevent anyone from spying on its own surveillance of Americans' phone records. As the Obama administration considers shifting the collection of those records from the National Security Agency to requiring that they be stored at phone companies or elsewhere, it's quietly funding research to prevent phone company employees or eavesdroppers from seeing whom the U.S. is spying on, The Associated Press has learned. The Office of the Director of National Intelligence has paid at least five research teams across the country to develop a system for high-volume, encrypted searches of electronic records kept outside the government's possession. The project is among several ideas that would allow the government to discontinue storing Americans' phone records, but still search them as needed.
  • Under the research, U.S. data mining would be shielded by secret coding that could conceal identifying details from outsiders and even the owners of the targeted databases, according to public documents obtained by The Associated Press and AP interviews with researchers, corporate executives and government officials.
  • Internal documents describing the Security and Privacy Assurance Research project do not cite the NSA or its phone surveillance program. But if the project were to prove successful, its encrypted search technology could pave the way for the government to shift storage of the records from NSA computers to either phone companies or a third-party organization. A DNI spokesman, Michael Birmingham, confirmed that the research was relevant to the NSA's phone records program. He cited "interest throughout the intelligence community" but cautioned that it may be some time before the technology is used. The intelligence director's office is by law exempt from disclosing detailed budget figures, so it's unclear how much money the government has spent on the SPAR project, which is overseen by the DNI's Intelligence Advanced Research Projects Activity office. Birmingham said the research is aimed for use in a "situation where a large sensitive data set is held by one party which another seeks to query, preserving privacy and enforcing access policies."
  • ...3 more annotations...
  • A Columbia University computer sciences expert who heads one of the DNI-funded teams, Steven M. Bellovin, estimates the government could start conducting encrypted searches within the next year or two. "If the NSA wanted to deploy something like this it would take one to two years to get the hardware and software in place to start collecting data this way either from phone companies or whatever other entity they decide on," said Bellovin, who is also a former chief technologist for the Federal Trade Commission.
  • An encrypted search system would permit the NSA to shift storage of phone records to either phone providers or a third party, and conduct secure searches remotely through their databases. The coding could shield both the extracted metadata and identities of those conducting the searches, Bellovin said. The government could use encrypted searches to ensure its analysts were not leaking information or abusing anyone's privacy during their data searches. And the technique could also be used by the NSA to securely search out and retrieve Internet metadata, such as emails and other electronic records. Some computer science experts are less sanguine about the prospects for encrypted search techniques. Searches could bog down because of the encryption computations needed, said Daniel Weitzner, principal research scientist at MIT's Computer Science and Artificial Intelligence Laboratory and former deputy U.S. chief technology officer for the Obama administration. "There's no silver bullet that guarantees the intelligence community will only have access to the records they're supposed to have access to," Weitzner said. "We also need oversight of the actual use of the data."
  • The encrypted search techniques could make it more difficult for hackers to access the phone records and could prevent phone companies from knowing which records the government was searching. "It would remove one of the big objections to having the phone companies hold the data," Bellovin said. Similar research is underway by researchers at University of California at Irvine; a group from the University of Wisconsin-Madison and the University of Texas at Austin; another group from MIT, Yale and Rensselaer Polytechnic Institute; and a fourth from Stealth Software Technologies, a Los Angeles-based technology company.
Paul Merrell

NSA can eavesdrop on Americans' phone calls, documents show | Politics and Law - CNET News - 0 views

  • The National Security Agency has been secretly granted legal authority to operate a massive domestic eavesdropping system that vacuums up Americans' phone calls and Internet communications, newly leaked documents show. A pair of classified government documents (No. 1 and No. 2) signed by Attorney General Eric Holder and posted by the Guardian on Thursday show that NSA analysts are able to listen to Americans' intercepted phone calls without asking a judge for a warrant first. That appears to be at odds with what President Obama said earlier this week in defense of the NSA's surveillance efforts. "I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your e-mails," Obama said. The new documents indicate, however, that NSA, CIA, and FBI analysts are granted broad access to data vacuumed up by the world's most powerful intelligence agency -- but are supposed to follow certain "targeting" and "minimization" procedures to limit the number of Americans who become individual targets of warrantless surveillance.
  • Analysts are expected to exercise "reasonable judgment" in determining which data to use, according to the documents, and "inadvertently acquired communications of or concerning a United States person may be retained no longer than five years." The documents also refer to "content repositories" that contain records of devices' "previous Internet activity," and say the NSA keeps records of Americans' "electronic communications accounts/addresses/identifiers" in an apparent effort to avoid targeting them in future eavesdropping efforts. The Holder procedures were blessed in advance by the secret Foreign Intelligence Surveillance Court, the Guardian reported, meaning that the judges would have issued a general order that authorizes the NSA to engage in warrantless surveillance as long as it's primarily aimed at foreign targets, subject to some limited judicial oversight. Today's disclosure jibes with what Edward Snowden, the former NSA contractor who leaked top-secret documents, alleged in an online chat earlier this week. Snowden said, referring to the contents of e-mail and phone calls, that "Americans' communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant."
  • On Sunday, Director of National Intelligence James Clapper released a carefully-worded statement in response to a CNET article and other reports questioning when intelligence analysts can listen to domestic phone calls. Clapper said: "The statement that a single analyst can eavesdrop on domestic communications without proper legal authorization is incorrect and was not briefed to Congress." Clapper's statement was viewed as a denial, but it wasn't. Today's disclosures reveal why: Because the Justice Department granted intelligence analysts "proper legal authorization" in advance through the Holder regulations. "The DNI has a history of playing games with wording, using terms with carefully obscured meanings to leave an impression different from the truth," Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation who has litigated domestic surveillance cases, told CNET earlier this week.
  • ...3 more annotations...
  • Jameel Jaffer, the American Civil Liberties Union's deputy legal director, said in a statement today that: After Congress enacted the FISA Amendments Act in 2008, we worried that the NSA would use the new authority to conduct warrantless surveillance of Americans' telephone calls and emails. These documents confirm many of our worst fears. The "targeting" procedures indicate that the NSA is engaged in broad surveillance of Americans' international communications. The "minimization" procedures that supposedly protect Americans' constitutional rights turn out to be far weaker than we imagined they could be. For example, the NSA claims the authority to collect and disseminate attorney-client communications -- and even, in some circumstances, to turn them over to Justice Department prosecutors. The government also claims the authority to retain Americans' purely domestic communications in certain situations.
  • The documents suggest there are some significant loopholes in domestic surveillance: if an NSA analyst reviews an intercepted communication and finds "evidence of a crime that has been, is being, or is about to be committed," it can be forwarded to the FBI or other federal law enforcement agencies. Another loophole is "a serious harm to life or property" -- which could sweep in intellectual property -- and "enciphered" data. Communications that contain "enciphered" data, which would likely include PGP but also could mean encrypted Web connections using SSL, may be kept indefinitely. Earlier reports have indicated that the NSA has the ability to record nearly all domestic and international phone calls -- in case an analyst needed to access the recordings in the future. A Wired magazine article last year disclosed that the NSA has established "listening posts" that allow the agency to collect and sift through billions of phone calls through a massive new data center in Utah, "whether they originate within the country or overseas." That includes not just metadata, but also the contents of the communications.
  • Section 702 of the FAA says surveillance may be authorized by the attorney general and director of national intelligence without prior approval by the secret Foreign Intelligence Surveillance Court, as long as minimization requirements and general procedures blessed by the court are followed.
Paul Merrell

Secrecy News From All Over - Secrecy News - 0 views

  • The Director of National Intelligence yesterday declassified and released hundreds of pages of records concerning collection under the Foreign Intelligence Surveillance Act, illuminating the origins of bulk collection of email metadata, as well as interactions with the FISA Court and Congress.
  • By themselves, the latest disclosures (provided in response to FOIA litigation brought by ACLU and EFF) are unlikely to resolve ongoing disputes about NSA intelligence gathering. The legitimacy of bulk collection of email and telephone metadata may ultimately be more of a value judgment rather than a factual or legal one. At a minimum, perhaps the new documents will provide a more substantial basis for informed debate. But there is disagreement even about that. “Some would like to believe these disclosures have started a debate about the propriety and efficacy of NSA surveillance programs but, in fact, to a substantial degree, recent unauthorized disclosures have ended the debate because, once disclosed, the programs at issue become substantially less effective,” according to a November 12 report from the Senate Intelligence Committee. “The nation will suffer as a result.”
  • The Public Interest Declassification Board will hold an open meeting at the National Archives on Thursday, November 21. The Board proposes to focus on prioritizing topics and events for declassification. The intended emphasis is on declassification of historical records, but it need not be limited to that. Although willful abuse of classification authority is not unheard of, there seems to be no case in which it has ever been penalized. “I am extremely concerned that the integrity of the classification system continues to be severely undermined by the complete absence of accountability in instances such as this clear abuse of classification authority,” wrote J. William Leonard, the former director of the Information Security Oversight Office, in an October 18 letter. He was responding to the controversial classification of evidence concerning the defilement of human remains in Afghanistan.  See Marine Corps fight escalates over handling of case involving troops urinating on corpses, Washington Post, November 15;  and Marine Corps Commandant Accused of Improper Classification, Secrecy News, July 30.
Paul Merrell

Obama administration had restrictions on NSA reversed in 2011 - The Washington Post - 0 views

  • The Obama administration secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agency’s use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases, according to interviews with government officials and recently declassified material. In addition, the court extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years — and more under special circumstances, according to the documents, which include a recently released 2011 opinion by U.S. District Judge John D. Bates, then chief judge of the Foreign Intelligence Surveillance Court.
  • What had not been previously acknowledged is that the court in 2008 imposed an explicit ban — at the government’s request — on those kinds of searches, that officials in 2011 got the court to lift the bar and that the search authority has been used. Together the permission to search and to keep data longer expanded the NSA’s authority in significant ways without public debate or any specific authority from Congress. The administration’s assurances rely on legalistic definitions of the term “target” that can be at odds with ordinary English usage. The enlarged authority is part of a fundamental shift in the government’s approach to surveillance: collecting first, and protecting Americans’ privacy later.
  • “The government says, ‘We’re not targeting U.S. persons,’ ” said Gregory T. Nojeim, senior counsel at the Center for Democracy and Technology. “But then they never say, ‘We turn around and deliberately search for Americans’ records in what we took from the wire.’ That, to me, is not so different from targeting Americans at the outset.”
  • ...7 more annotations...
  • The court decision allowed the NSA “to query the vast majority” of its e-mail and phone call databases using the e-mail addresses and phone numbers of Americans and legal residents without a warrant, according to Bates’s opinion. The queries must be “reasonably likely to yield foreign intelligence information.” And the results are subject to the NSA’s privacy rules.
  • But in 2011, to more rapidly and effectively identify relevant foreign intelligence communications, “we did ask the court” to lift the ban, ODNI general counsel Robert S. Litt said in an interview. “We wanted to be able to do it,” he said, referring to the searching of Americans’ communications without a warrant.
  • The court’s expansion of authority went largely unnoticed when the opinion was released, but it formed the basis for cryptic warnings last year by a pair of Democratic senators, Ron Wyden (Ore.) and Mark Udall (Colo.), that the administration had a “back-door search loophole” that enabled the NSA to scour intercepted communications for those of Americans. They introduced legislation to require a warrant, but they were barred by classification rules from disclosing the court’s authorization or whether the NSA was already conducting such searches.
  • The [surveillance] Court documents declassified recently show that in late 2011 the court authorized the NSA to conduct warrantless searches of individual Americans’ communications using an authority intended to target only foreigners,” Wyden said in a statement to The Washington Post. “Our intelligence agencies need the authority to target the communications of foreigners, but for government agencies to deliberately read the e-mails or listen to the phone calls of individual Americans, the Constitution requires a warrant.”
  • Senior administration officials disagree. “If we’re validly targeting foreigners and we happen to collect communications of Americans, we don’t have to close our eyes to that,” Litt said. “I’m not aware of other situations where once we have lawfully collected information, we have to go back and get a warrant to look at the information we’ve already collected.” The searches take place under a surveillance program Congress authorized in 2008 under Section 702 of the Foreign Intelligence Surveillance Act. Under that law, the target must be a foreigner “reasonably believed” to be outside the United States, and the court must approve the targeting procedures in an order good for one year.
  • But — and this was the nub of the criticism — a warrant for each target would no longer be required. That means that communications with Americans could be picked up without a court first determining that there is probable cause that the people they were talking to were terrorists, spies or “foreign powers.”That is why it is important to require a warrant before searching for Americans’ data, Udall said. “Our founders laid out a roadmap where Americans’ privacy rights are protected before their communications are seized or searched — not after the fact,” he said in a statement to The Post.
  • The NSA intercepts more than 250 million Internet communications each year under Section 702. Ninety-one percent are from U.S. Internet companies such as Google and Yahoo. The rest come from “upstream” companies that route Internet traffic to, from and within the United States. The expanded search authority applies only to the downstream collection.
  •  
    An important article I missed, from last September. Searching the content of American citizens' calls and emails without a search warrant. Straight-up violation of the Fourth and Fifth amendments (warrantless search and deprivation of due process).  And directly contrary to what Obama, Clapper, and Alexander told the public over and over again.
Paul Merrell

Fire the Liar | War Is A Crime .org - 0 views

  • Obama Urged to Fire DNI Clapper December 11, 2013 (Editor Note)  Last March – before Edward Snowden revealed the NSA’s sweeping collection of phone and other data – Director of National Intelligence James Clapper said no such operation existed. Now, a group of ex-national security officials urge President Obama to fire Clapper. MEMORANDUM FOR: The President FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Fire James Clapper
  • We wish to endorse the call by Rep. James Sensenbrenner Jr., Chair of the Subcommittee on Crime, Terrorism, and Homeland Security, Committee on the Judiciary, that Director of National Intelligence James Clapper should be removed and prosecuted for lying to Congress. “Lying to Congress is a federal offense, and Clapper ought to be fired and prosecuted for it,” the Wisconsin Republican said in an interview with The Hill. “The only way laws are effective is if they’re enforced.” Sensenbrenner added, “If it’s a criminal offense — and I believe Mr. Clapper has committed a criminal offense — then the Justice Department ought to do its job.”
  • This brief Memorandum is to inform you that we agree that no intelligence director should be able to deceive Congress and suffer no consequences. No democracy that condones such deceit at the hands of powerful, secretive intelligence directors can long endure. It seems clear that you can expect no help from Sen. Dianne Feinstein, chair of the Senate Intelligence Committee, to which Clapper has apologized for giving “clearly erroneous” testimony, and who, at the height of the controversy over his credibility, defended him as a “direct and honest” person. You must be well aware that few amendments to the U.S. Constitution are as clear as the fourth:
  • ...2 more annotations...
  • “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” Even the cleverest lawyers cannot square with the Fourth Amendment many of the NSA activities that Clapper and Feinstein have defended, winked at, or lied about. Only you can get rid of James Clapper. We suspect that a certain awkwardness — and perhaps also a misguided sense of loyalty to a colleague — militate against your senior staff giving you an unvarnished critique of how badly you have been served by Clapper. And so we decided to give you a candid reminder from us former intelligence and national security officials with a total of hundreds of years of experience, much of it at senior levels, in the hope you will find it helpful. Statements by DNI Clapper re Eavesdropping on Americans
  • Mr. President, are you not also troubled by those misleading statements? We strongly believe you must fire Jim Clapper for his lies to the Congress and the American people and that you must appoint someone who will tell the truth. * * * For the Steering Group, Veteran Intelligence Professionals for Sanity
  •  
    Veteran Intelligence Professionals for Sanity call on Obama to sack Director of National Intelligence James Clapper for perjured testimony to Congress and lying to the public, with a nice collection of Clapper's lies. And Sen. Diane Feinstein gets a share of their wrath.  In my book both Clapper and Gen. Keith Alexander must be fired in disgrace else the message to the intelligence community is that there is no penalty for lying to Congress and the People, which can only encourage further lies.  Moreover, it send a message to the People that the President is more loyal to his henchmen than he is to the public's interest.
1 - 20 of 46 Next › Last »
Showing 20 items per page