Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged audit

Rss Feed Group items tagged

Paul Merrell

Report: Post 9/11 Wars Have Cost Taxpayers Nearly $5 Trillion And Counting - 0 views

  • The U.S. military interventions in Iraq and Afghanistan have cost taxpayers nearly $5 trillion and counting, according to a new report released to coincide with the 15th anniversary of the attacks. Dr. Neta Crawford, professor of political science at Brown University, released the figures in an independent analysis (pdf) of U.S. Departments of Defense, State, Homeland Security, and Veteran Affairs spending, as well as their base and projected future spending. Crawford is also a director at Brown’s Costs of War Project, which works to draw attention to the human, economic, and political toll of the military response to 9/11. In total, the wars already boast a price tag of $4.79 trillion, she found. And the cost is still climbing. Crawford’s estimate includes budget requests for the 2017 operations in Afghanistan—which are poised to continue despite President Barack Obama’s vow to withdraw troops from the country by then—as well as in Iraq and Syria. The Pentagon requested $66 billion for those fights just for that year. However, even if the U.S. stopped spending on war at the end of this fiscal year, the interest costs, such as debt for borrowed funds, would continue to rise. Post-9/11 military spending was financed almost entirely by borrowing, which in turn has driven debt and interest rates, the project has previously noted.
  • Separate reporting late last month by the U.K.-based watchdog Action on Armed Violence (AOAV) found that the Pentagon could only account for 48 percent of small arms shipped to Iraq and Afghanistan since 9/11—meaning more than half of the approximately 700,000 guns it sent overseas in the past 15 years are missing. What’s more, a recent Inspector General audit report found a “jaw-dropping” $6.5 trillion could not be accounted for in Defense spending. The results of Crawford’s report, released last week, follow previous estimates by prominent economists like Nobel Prize-winning Joseph Stiglitz and Harvard professor Linda Bilmes, whose 2008 book The Three Trillion Dollar War made similar claims. Crawford’s report continues: “Interest costs for overseas contingency operations spending alone are projected to add more than $1 trillion dollars to the national debt by 2023. By 2053, interest costs will be at least $7.9 trillion unless the U.S. changes the way it pays for the war.” And, Crawford notes, that’s a conservative estimate. “No set of numbers can convey the human toll of the wars in Iraq and Afghanistan, or how they have spilled into the neighboring states of Syria and Pakistan, and come home to the U.S. and its allies in the form of wounded veterans and contractors,” the report states. “Yet, the expenditures noted on government ledgers are necessary to apprehend, even as they are so large as to be almost incomprehensible.”
Paul Merrell

President Obama Signs Freedom of Information Act Improvements - 0 views

  • At 4:00 PM today President Barack Obama signed the FOIA Improvement Act of 2016 (S. 337) into law. The bipartisan, bicameral bill – introduced by Senators John Cornyn, Chuck Grassley, and Patrick Leahy, and supported by Representatives Jason Chaffetz and Elijah Cummings in the House – will improve FOIA in several meaningful ways and reflects many of the findings of the National Security Archive’s FOIA audits and litigation. The legislation mandates a 25-year sunset for the “wildly misused” FOIA exemption (b)(5), an exemption that currently has no time limit and is often called the “withhold it because you want to” exemption. The CIA recently successfully hid a draft history of its 53-year-old Bay of Pigs invasion by invoking an overly-broad interpretation of the exemption. Thanks to President Obama and FOIA lions in the Senate and the House, the new FOIA bill will curtail such senseless secrecy. Agencies are now required to update their FOIA regulations within 180 days after the passage of the bill. A National Security Archive audit shows that too many federal agencies have not updated their regulations to comply with the 2007 Open Government FOIA improvements. By neglecting to update their “FOIA handbooks,” agencies are essentially ignoring Congress’s FOIA reforms.
  • Today’s signing also codifies the presumption of openness. Archive audits going back to 2009 show that most federal agencies have continued to ignore President Obama’s “presumption of disclosure” guidance that he issued on his first day in office. The new bill codifies this presumption, mirrors the Obama administration’s and the Department of Justice’s (non binding) instructions on FOIA, thereby requiring that records be released unless there is a foreseeable harm or legal requirement to withhold them. The law will also improve public digital access to released records, and strengthen and increase the independence of the FOIA Ombuds Office – the Office of Government Information Services (OGIS). But the bill did not fulfill all of the public's openness asks. It does not include a public interest balancing test to force the release of information which can technically be withheld under the law; it also does not establish a government commission or mechanism which can overturn bad agency FOIA decisions. "This is an important improvement to the US Freedom of Information Act," said Archive director Tom Blanton, "but there are several large leaps the US law still needs to make to catch up with international Freedom of Information norms and standards." The signing of today’s legislation comes just before the law – signed begrudgingly by LBJ on July 4, 1966 – turns 50.
Paul Merrell

Lack of Due Diligence: The NSA's "the Analyst Didn't Give a Fuck" Violation | emptywheel - 0 views

  • The NSA claims there have been no willful violations the law relating to the NSA databases. For example, NSA’s Director of Compliance John DeLong just said ”NSA has a zero tolerance policy for willful misconduct. None of the incidents were willful.” House Intelligence Chair Mike Rogers just said the documents show “no intentional or willful violations.” Which is why I want to look more closely at the user error categories included in the May 3, 2012 audit. The report doesn’t actually break down the root cause of errors across all violations. But it does for 3 different types of overlapping incident types (the 195 FISA authority incidents, the 115 database query ones, and the 772 S2 Directorate violations).
  • What I’m interested in are the three main types of operator error: human error, resources, and lack of due diligence.
  • But then there’s a third category: lack of due diligence. The report defines lack of due diligence as “a failure to follow standard operating procedures.” But some failure to follow standard operating procedure is accounted for in other categories, like training, the misapplied query techniques, and the apparent inadequate research violations. This category appears to be something different than the “honest mistake” errors categorized under human error. In fact, by the very exclusion of these violations from the “human error” category, NSA seems to be admitting these violations aren’t errors. These violations of standard operating procedures, it seems, are intentional. Not errors. Willful violations. At the very least, this category seems to count the violations on behalf of analysts who just don’t give a fuck what he rules are, they’re going to ignore the rules. This category, what consider the “Analyst didn’t give a fuck” category, accounts for 9% to 20% of all the violations broken out by root cause.
  • ...1 more annotation...
  • In aggregate, these violations may not amount to all that many given the thousands of queries run every year — they make up just 68 of the violations in S2, for example. Those 68 due diligence violations make up almost 8% of the violations in the quarter, not counting due diligence violations that may have happened in other Directorates. John DeLong, who is in charge of compliance at NSA, says the Agency has zero tolerance for willful misconduct. But the NSA appears to have a good deal more tolerance for a lack of due diligence.
  •  
    Marcy at EmptyWheel digs into the leaked NSA audit reports and exposes what appears to be another Obama Administration lie: that none of the violations of surveillance law by NSA staff were willful. NSA appears to be hiding the willful violations under the misleadingly titled "lack of due diligence" category. Who says numbers can't lie, if they're miscategorized?   
Paul Merrell

Solution to the "Shutdown": The Fed Could Simply Cancel $2 Trillion of Government Debt ... - 0 views

  • Bipartisan Proposal Would Take Pressure Off the Budget Crisis Congressman Alan Grayson and former congressman Ron Paul are two of the fiercest warriors against an out-of-control Federal Reserve. Paul has campaigned to dissolve the Fed for 35 years, and wrote an entire book called “End the Fed“. Grayson has  repeatedly slammed the Fed, and absolutely demolished it … to its face.    Paul and Grayson also co-sponsored a bill to audit the Federal Reserve. (Their desire to rein in the Fed is supported by numerous top economists.) So when the two of them support a Fed-related solution to the “government shutdown” crisis,  I listen.
Paul Merrell

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth - 0 views

  • Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".
  • Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.
  • This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):
  • ...4 more annotations...
  • 1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.
  • If you think this is an excusable and responsible statement, raise your hand now.Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.
  • Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.
  • Privacy remains your own responsibility.
  •  
    And of course, Google would never succumb to a subpoena requiring it to turn over the audio stream to the NSA. The Tor Browser just keeps looking better and better. https://www.torproject.org/projects/torbrowser.html.en
Paul Merrell

Report Reveals Wider Tracking of Mail in U.S. - NYTimes.com - 0 views

  • In a rare public accounting of its mass surveillance program, the United States Postal Service reported that it approved nearly 50,000 requests last year from law enforcement agencies and its own internal inspection unit to secretly monitor the mail of Americans for use in criminal and national security investigations.The number of requests, contained in a 2014 audit of the surveillance program by the Postal Service’s inspector general, shows that the surveillance program is more extensive than previously disclosed and that oversight protecting Americans from potential abuses is lax.The audit, along with interviews and documents obtained by The New York Times under the Freedom of Information Act, offers one of the first detailed looks at the scope of the program, which has played an important role in the nation’s vast surveillance effort since the terrorist attacks of Sept. 11, 2001.
  • The Postal Service also uses a program called Mail Imaging, in which its computers photograph the exterior of every piece of paper mail sent in the United States. The program’s primary purpose is to process the mail, but in some cases it is also used as a surveillance system that allows law enforcement agencies to request stored images of mail sent to and received by people they are investigating.
  • The mail cover surveillance requests cut across all levels of government — from global intelligence investigations by the United States Army Criminal Investigations Command, which requested 500 mail covers from 2001 through 2012, to state-level criminal inquiries by the Georgia Bureau of Investigation, which requested 69 mail covers in the same period. The Department of Veterans Affairs requested 305, and the State Department’s Bureau of Diplomatic Security asked for 256. The information was provided to The Times under the Freedom of Information request.Continue reading the main story Continue reading the main story Postal officials did not say how many requests came from agencies in charge of national security — including the F.B.I., the Department of Homeland Security and Customs and Border Protection — because release of the information, wrote Kimberly Williams, a public records analyst for the Postal Inspection Service, “would reveal techniques and procedures for law enforcement or prosecutions.”
  •  
    The full article is well worth the read.
Paul Merrell

DOD, HUD Defrauded Taxpayers Of $21 Trillion From 1998 To 2015 - 0 views

  • Last year, a Reuters article brought renewed scrutiny to the budgeting practices of the U.S. Department of Defense (DOD), specifically the U.S. Army, after it was revealed that the department  had “lost” $6.5 trillion in 2015 due to “wrongful budget adjustments.” Nearly half of that massive sum, $2.8 trillion, was lost in just one quarter. Reuters noted that the Army “lacked the receipts and invoices to support those numbers [the adjustments] or simply made them up” in order to “create an illusion that its books are balanced.” Officially, the DOD has acknowledged that its financial statements for 2015 were “materially misstated.” However, this was hardly the first time the department had been caught falsifying its accounting or the first time the department had mishandled massive sums of taxpayer money.
  • The report, which examined in great detail the budgets of both the DOD and the Department of Housing and Urban Development (HUD), found that between 1998 and 2015 these two departments alone lost over $21 trillion in taxpayer funds. The funds lost were a direct result of “unsupported journal voucher adjustments” made to the departments’ budgets. According to the Office of the Comptroller, “unsupported journal voucher adjustments” are defined as “summary-level accounting adjustments made when balances between systems cannot be reconciled. Often these journal vouchers are unsupported, meaning they lack supporting documentation to justify the adjustment [receipts, etc.] or are not tied to specific accounting transactions.” The report notes that, in both the private and public sectors, the presence of such adjustments is considered “a red flag” for potential fraud. The amount of money lost is truly staggering. As co-author Fitts noted in an interview with USA Watchdog, the amount unaccounted for over this 17 year period amounts to “$65,000 for every man, woman and child resident in America.” By comparison, the cost per taxpayer of all U.S. wars waged since 9/11 has been $7,500 per taxpayer. The sum is also enough to cover the entire U.S. national debt, which broke $20 trillion less than a month ago, and still have funds left over. What’s more, the actual amount of funds lost — measured at $21 trillion – is likely to be much higher, as the researchers were unable to recover data for every year over the period, meaning the assessment is incomplete.
Gary Edwards

Senate Democrats Pushed for IRS Tea Party Snooping Before Criticizing It - Brian Walsh ... - 0 views

  •  
    Democrats caught red handed pushing the IRS to audit, harass and delay efforts to establish Constitutional Patriot and Jewish Homeland non profit groups.   The Democrats political efforts behind the IRS's blatant violation of these American citizens 4th Amendment Right to organize and assemble dates back to the 2009 Supreme Court decision known as "Citizens United". In "Citizens Untied", the court ruled that corporations are people, and thus are entitled to 1st Amendment Rights.  Including full participation and monetary contributions in political campaigns. this ruling was further confirmed when the Supreme Court overturned a century old Montana Law prohibiting corporate spending in that State's elections.   The "Citizens United" ruling so upset Obama and the Socialist Party that he publicly scolded the Supreme Court justices during a State of the Union address.  The Progressives rightfully feared that corporations would ppour "unregulated independent expenditures" into newly formed Tea Party Patriot based non profits.  Unable to overturn Citizens United, the Dems called on the IRS and a host of other government bureaucracies to block, harass and slow down the funding of their political opposition. this article exposes the same Dem clowns who are now crying foul as the same tyrants who kicked off the IRS led effort to slow down the Tea Party Patriot opposition movement.   How the Jewish Homeland groups got into the IRS gun sights is still a mystery, but one thing is known:  With the election of Obama in 2008, the IRS moved from targeting non profit Muslim Groups as possible terrorist funding organizations, to targeting Tea Party Patriot movements.  Maybe that's also when they took on Jewish Homeland groups?  excerpt: "With Washington gripped by a trio of exploding scandals this week - from Benghazi to government spying on news outlets to thug tactics by the Internal Revenue Service - Senate Democrats seem to be hoping that if they just yell lou
Paul Merrell

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
Paul Merrell

MI5 feared GCHQ went 'too far' over phone and internet monitoring | UK news | The Observer - 0 views

  • Senior figures inside British intelligence have been alarmed by GCHQ's secret decision to tap into transatlantic cables in order to engage in the bulk interception of phone calls and internet traffic.According to one source who has been directly involved in GCHQ operations, concerns were expressed when the project was being discussed internally in 2008: "We felt we were starting to overstep the mark with some of it. People from MI5 were complaining that they were going too far from a civil liberties perspective … We all had reservations about it, because we all thought: 'If this was used against us, we wouldn't stand a chance'."The Guardian revealed on Friday that GCHQ has placed more than 200 probes on transatlantic cables and is processing 600m "telephone events" a day as well as up to 39m gigabytes of internet traffic. Using a programme codenamed Tempora, it can store and analyse voice recordings, the content of emails, entries on Facebook, the use of websites as well as the "metadata" which records who has contacted who. The programme is shared with GCHQ's American partner, the National Security Agency.
  • Interviews with the UK source and the NSA whistleblower Edward Snowden raise questions about whether the programme:■ Exploits existing law which was passed by parliament without any anticipation that it would be used for this purpose.■ For the first time allows GCHQ to process bulk internal UK traffic which is routed overseas via these cables.■ Allows the NSA to engage in bulk intercepts of internal US traffic which would be forbidden in its own territory.■ Functions with no effective oversight.
  • The source claimed that even the conventional warrant system has been distorted – whereas police used to ask for a warrant before intercepting a target's communications, they will now ask GCHQ to intercept the target's communications and then use that information to seek a warrant.There is a particular concern that the programme allows GCHQ to break the boundary which stopped it engaging in the bulk interception of internal UK communications. The Ripa requirement that one end of a communication must be outside the UK was a significant restriction when it was applied to phone calls using satellites, but it is no longer effective in the world of fibre-optic cables. "The point is that this is an island," the source said. "Everything comes and goes – nearly everything – down fibre-optic cables. You make a mobile phone call, it goes to a mast and then down into a fibre-optic cable, under the ground and away. And even if the call is UK to UK, it's very likely – because of the way the system is structured – to go out of the UK and come back in through these fibre-optic channels."
  • ...4 more annotations...
  • Internet traffic is also liable to be routed internationally even if the message is exchanged between two people within the UK. "At one point, I was told that we were getting 85% of all UK domestic traffic – voice, internet, all of it – via these international cables."
  • There are similar concerns about the role of the NSA. It could have chosen to attach probes to the North American end of the cables and documents shown to the Guardian by Edward Snowden suggest that key elements of the Tempora filtering process were designed by the NSA. Instead, the NSA agency has exported its computer programs and 250 of its analysts to operate the system from the UK.Initial inquiries by the Guardian have failed to explain why this has happened, but US legislators are likely to want to check whether the NSA has sought to bypass legal or policy requirements which restrict its activity in the US. This will be particularly sensitive if it is confirmed that Tempora is also analysing internal US traffic.The UK source challenges the official justification for the programme; that it is necessary for the fight against terrorism and serious crime: "This is not scoring very high against those targets, because they are wise to the monitoring of their communications. If the terrorists are wise to it, why are we increasing the capability?
  • Defenders insist that the mass of data is heavily filtered by the programme so that only that relating to legitimate targets is analysed.However, there are doubts about the effectiveness of this. First, according to the UK source, "written definitions for targeting and filtering are very elastic. They are wide open to interpretation." The target areas defined by the Ripa certificates are secret.Second, there is further room for interpretation when human analysts become involved in using the filtered intelligence to produce what are known as "contact chains". "Here is target A. But who is A talking to? Now we're into B and C and D." If analysts believe it is proportional, they can look at all the traffic – content and metadata – relating to all of the target's contact." GCHQ audits a sample of its analysts' work – believed to be 5% every six months – but even the statistical results of these audits are also secret.
  • Beyond the detail of the operation of the programme, there is a larger, long-term anxiety, clearly expressed by the UK source: "If there was the wrong political change, it could be very dangerous. All you need is to have the wrong government in place. It is capable of abuse because there is no independent scrutiny."
Paul Merrell

Watchdog Report: FBI Facial Recognition Programs Are Quasi-Illegal - nsnbc internationa... - 0 views

  • According to a Government Accountability Office (GOA) report from May of this year, the Federal Bureau of Investigations (FBI) facial recognition programs are violating public privacy and raises civil liberties concerns.
  • Despite many studies showing that facial recognition software is incorrect more often than not when identifying minorities, women and under 20-somethings, The sixty-eight page report details how the FBI could not confirm the accuracy of the program which gives law enforcement the ability to search databases of photographs from passports, driver’s licenses, and mugshots taken by various governmental agencies. Using the brought online the Next Generation Identification System (NGIS), the FBI has access to a gigantic biometric database that uses images and facial recognition software (FRS) to identify criminals. The GAO report revealed that the Facial Analysis, Comparison and Evaluation (FACE) Services has allowed certain FBI agents to access the State Department and the Pentagon and check on individuals who have never been suspected of any criminal or terroristic activities. So far an estimated 411 million facial images have been compromised by the FBI; and yet nearly a half-billion in total could have been violated.
  • Bedoya continued: “We found out that [the FBI] have no idea if they’re misusing it or not. They’ve literally never done an audit.” Concerning privacy expectations, Bedoya said: “When you turn 16 or 17, you don’t go down to the police station and give them your fingerprints; you go get your driver’s license. Turns out, it’s the same thing as far as the FBI is concerned. They might not be storing these photos at Quantico but it has built, in effect, a nationwide biometric database using driver’s license photos. It’s breathtaking.” The FBI has been using the faulty facial recognition software and databases much more “than had previously been understood” which is worrisome because “the FBI hasn’t done enough to audit its own use of facial recognition technology or that of other law enforcement agencies that partner with the FBI, nor has it taken adequate steps to ensure the technology’s accuracy.”
Gary Edwards

End the Fed! Congress Debates the Federal Reserve: Reform or Abolish? - 0 views

  •  
    synopsis: Tuesday May 8th, 2012 - Dr. Ron Paul Chaired the Congressional subcommittee holding the first hearings on the Federal Reserve Bankster Cartel.  Dr. Paul has become famous around the world for his tireless efforts to audit, expose, and abolish the central bank. Even making that effort the centerpiece of his "Restore the Constitution - Take Back America" run for the presidency.  He published a best-selling book in 2009 entitled "End the Fed", a title that has become a rallying cry for millions of Americans angry about the institution's multi-trillion-dollar bailouts, market manipulations, corruption, and debasement of the currency. The subcommittee hearing, entitled "The Federal Reserve System: Mend It or End It?", examined a range of different proposals to reform the nation's monetary system - it was supposed to look at six different options emanating from both parties. One of the measures on the agenda was Congressman Paul's own "Federal Reserve Board Abolition Act," legislation to dismantle the central bank and restore sound money based on market principles. "More and more people are beginning to understand just how destructive the Federal Reserve's monetary policy has been. I hope that this hearing will kick start a serious discussion on the need to rein in the Fed," Chairman Paul said in a statement about the event. "A hundred years is far too long for Congress to have taken a hands-off approach. The Fed continues to reward Wall Street banks while destroying the dollar's purchasing power and driving up the cost of living for average Americans. This reckless behavior must come to an end."
Gary Edwards

Peter Beinart: How Ron Paul Will Change the GOP in 2012 - The Daily Beast - 2 views

  •  
    Not a big Peter Beinhart fan, but this article explains a large part of the Ron Paul phenom. After a life time as a big C Goldwater-Reagan Constitutional Conservative, this summer i made a full transition to big C Constitutional Libertarian. The tipping point for me was the GAO audit of the Federal Reserve, where they discovered $16.1 Trillion of taxpayer dollars missing from the Federal Reserve Bankster Cartel management books. It went to a who's who of international Bankster Cartel members. None of the taxpayer funded "financial collapse of 2008" bailout dollars went to the purposes chartered by their legislation. That includees the TARP $850 Billion, the Obama Stimulous $1 Trillion, and the mega FRBC $16.1 Trillion. No bad debts were purchased and retired. No rotting mortgage securities were swept up and restructured. No shovel ready jobs either. And no one in government or banksterism having caused the financial collapse went to jail. Instead, the perps feasted on the bailout dollars. The debt remains on the books of international Banksters, collecting interest, thirsting for foreclosure. The Bankster Cartel members are flush with cash, but not lending. By law (The Federal Reserve Act of December 23rd, 1913), FRBC members must keep a significant amount of their assets on "reserve" at the Federal Reserve, at 6% interest. In exchange for managing this process and the exploding money supply, the taxpayers of the USA are obligated by law to pay the FRBC 1% per year of (assets under management" (the money supply). Take note: the FRBC takes the 1% per year payment for their services in the form of GOLD!! They will not take payment in the form of paper notes labeled legal tender "Federal Reserve Notes". They only take GOLD. My transition to Constitutional Libertarian begins with a strct reading of the Constitution (the How), the Declaration of Independence, (the Why), and belief in the Rule of Law, not man. The concept of achievi
Gary Edwards

$29,000,000,000,000: A Detailed Look at the Fed's Bailout by Funding Facility and Recip... - 0 views

  •  
    Stunning stuff.  No need to bailout the European Banks because the Federal Reserve has already done that!!! The Levi Institute of Economics has published the details of the Federal Reserve's International Bankster bailout from late 2007 to 2009.  It's far more than the $16.2 Trillion the GAO audit uncovered in July of 2010.  It's far more than the $7.77 Trillion Bloomberg discovered in their Freedom of Information action against the Federal Reserve.  Researching the "recipients" of the USA Federal reserve Bankster largess, the Levi Institute documents a whopping $29 Trillion has been distributed to Bankster coffers at near zero percent interest.   Note that no debt, and no loans of any kind has been purchased, retired, restructured or otherwise dealt with.  The bad loans remain on the books, including crushing interest payments that continue to escalate and accrue.  Debtors continue to fall deeper into debt.  Foreclosure and default loom over public, private and sovereign debtors.  So where did the money go?  $29 Trill is more than enough to retire the entire USA national debt, with interest, and, every mortgage both public and private in the USA. abstract: There have been a number of estimates of the total amount of funding provided by the Federal Reserve to bail out the financial system. For example, Bloomberg recently claimed that the cumulative commitment by the Fed (this includes asset purchases plus lending) was $7.77 trillion. As part of the Ford Foundation project "A Research and Policy Dialogue Project on Improving Governance of the Government Safety Net in Financial Crisis," Nicola Matthews and James Felkerson have undertaken an examination of the data on the Fed's bailout of the financial system-the most comprehensive investigation of the raw data to date. This working paper is the first in a series that will report the results of this investigation. The extraordinary scope and magnitude of the recent financial crisis of 2007-09 required an
Gary Edwards

Next Leg Of The Ponzi Revealed - Foreign Central Banks To Begin Buying US Stocks Outrig... - 0 views

  •  
    Another great chart detailing the Feds destruction of our currency.  Is this money laundering or a giant ponzi scheme? The good news is that the stock market is on a tear.  The bad news?  International banksters are gobbling up US corporate stocks with the Trillions of freshly printed dollars our Federal Reserve Cartel was kind enough to provide.   Recall that the July 2010 GAO audit of the Federal Reserve Banksters revealed an eye-popping $16.1 Trillion dollars had been distributed to domestic and international banksters between December 2007 and January 2010.   Where did the money go?  How do those dollars make their way back into the world economy?  And what will happen to the value of the dollar when these vast sums do show up in world financial markets? The banksters are not lending.  And companies are not borrowing.  The Trillions flooding the worlds banksters was originally thought to provide liquidity and keep the economy churning.  While there are many competing answers to the question of why this massive bailout and reboot didn't work, were now witnessing the wholesale purchase of corporate ownership with those dollars.   "Don't want to borrow those Trillions?  Good.  We'll buy you then." Sorry, but this looks like a gigantic money laundering scheme where hot dollars are dumped off in exchange for real assets. excerpt:  In other words, while the Fed's charter forbids it from buying US equities outright, it certainly can promise that it will bail out such bosom friends as the Bank of Israel, the Swiss National Bank, and soon everyone else, if and when their investment in Apple should sour. Luckily, this means that the exponential phase in risk is approaching as everyone will now scramble to frontrun central bank purchases no longer in bonds, but in stocks outright, leading to epic surges in everything risk related, then collapse and force the Fed to print tens of trillions to bail everyone out all over again, rinse repea
Paul Merrell

Black Budget: US govt clueless about missing Pentagon $trillions - YouTube - 0 views

  • The Pentagon has secured a 630 billion dollar budget for next year, even though it's failed to even account for the money it's received since 1996. A whopping 8.5 trillion dollars of taxpayer cash have gone to defence programmes - none of which has been audited. This black budget has sparked concerns over potential fraud, as Gayane Chichakyan reports.
Paul Merrell

NSA Director Alexander Defends Surveillance at Black Hat | Threatpost - 0 views

  •  
    "There are allegations [the NSA] listen to all our emails; that's wrong. We don't," Alexander said, adding that of 54 different terrorist-related activities identified through PRISM, 42 of which were disrupted, including 13 in the U.S., and 25 in Europe. "And if we did, we would be held accountable. There is 100 percent auditability on what we do." Technically accurate but materially misleading (only those with text-to-voice capabilities "listen" to emails). Meanwhile, assuming that Alexandeer meant to say "reading" instead of "listening to," the linked Guardian UK reporting on the NSA XScore program brands Gen. Alexander as a liar. 
Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
‹ Previous 21 - 40 of 90 Next › Last »
Showing 20 items per page