Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Obama-Surveillance" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
6More

NSA shares raw intelligence including Americans' data with Israel | World news | The Gu... - 0 views

  • The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process "minimization", but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
  • The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content."According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. "NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection", it says.
  • In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy."Any US person information that is acquired as a result of NSA's surveillance activities is handled under procedures that are designed to protect privacy rights," the spokesperson said.The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
  • ...3 more annotations...
  • While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel."Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge," states the report, titled 'History of the US – Israel Sigint Relationship, Post-1992'. "In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA's only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner."
  • In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. "On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems," the official says. "A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US."Later in the document, the official is quoted as saying: "One of NSA's biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended."
  • The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.In its statement, the NSA said: "We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations."NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information."
2More

Obama, Merkel agree to talks on U.S. spying - 0 views

  • The United States, Germany and probably other nations will soon hold talks on American surveillance tactics that include alleged spying on European allies.Amid reports that the U.S. has bugged various embassies and missions, President Obama and German Chancellor Angela Merkel had what sounds like an uncomfortable discussion by phone on Wednesday, the White House reported."The President assured the Chancellor that the United States takes seriously the concerns of our European allies and partners," said a White House statement on the call.The White House said Obama and Merkel agreed to "a high-level meeting of U.S. and German security officials in the coming days" to discuss surveillance issues disclosed in news leaks by former government contractor Edward Snowden.The two leaders also support a United States-European Union "dialogue" on the "collection and oversight of intelligence and questions of privacy and data protection," said the White House.
  • EU officials have expressed outrage over news reports on the activities of the National Security Agency.Obama and Merkel "reaffirmed the importance of continued close cooperation between our respective intelligence services in the fight against terrorism and other threats to the security of the United States, Germany, and our allies," the White House said.
6More

Washington Gets Explicit: Its 'War on Terror' is Permanent - 0 views

  • On Thursday, the Senate Armed Services Committee held a hearing on whether the statutory basis for this "war" - the 2001 Authorization to Use Military Force (AUMF) - should be revised (meaning: expanded). This is how Wired's Spencer Ackerman (soon to be the Guardian US's national security editor) described the most significant exchange: "Asked at a Senate hearing today how long the war on terrorism will last, Michael Sheehan, the assistant secretary of defense for special operations and low-intensity conflict, answered, 'At least 10 to 20 years.' . . . A spokeswoman, Army Col. Anne Edgecomb, clarified that Sheehan meant the conflict is likely to last 10 to 20 more years from today - atop the 12 years that the conflict has already lasted. Welcome to America's Thirty Years War." That the Obama administration is now repeatedly declaring that the "war on terror" will last at least another decade (or two) is vastly more significant than all three of this week's big media controversies (Benghazi, IRS, and AP/DOJ) combined. The military historian Andrew Bacevich has spent years warning that US policy planners have adopted an explicit doctrine of "endless war". Obama officials, despite repeatedly boasting that they have delivered permanently crippling blows to al-Qaida, are now, as clearly as the English language permits, openly declaring this to be so.
  • It is hard to resist the conclusion that this war has no purpose other than its own eternal perpetuation. This war is not a means to any end but rather is the end in itself. Not only is it the end itself, but it is also its own fuel: it is precisely this endless war - justified in the name of stopping the threat of terrorism - that is the single greatest cause of that threat.
  • I wrote that the "war on terror" cannot and will not end on its own for two reasons: (1) it is designed by its very terms to be permanent, incapable of ending, since the war itself ironically ensures that there will never come a time when people stop wanting to bring violence back to the US (the operational definition of "terrorism"), and (2) the nation's most powerful political and economic factions reap a bonanza of benefits from its continuation. Whatever else is true, it is now beyond doubt that ending this war is the last thing on the mind of the 2009 Nobel Peace Prize winner and those who work at the highest levels of his administration. Is there any way they can make that clearer beyond declaring that it will continue for "at least" another 10-20 years? The genius of America's endless war machine is that, learning from the unplesantness of the Vietnam war protests, it has rendered the costs of war largely invisible. That is accomplished by heaping all of the fighting burden on a tiny and mostly economically marginalized faction of the population, by using sterile, mechanized instruments to deliver the violence, and by suppressing any real discussion in establishment media circles of America's innocent victims and the worldwide anti-American rage that generates. Though rarely visible, the costs are nonetheless gargantuan. Just in financial terms, as Americans are told they must sacrifice Social Security and Medicare benefits and place their children in a crumbling educational system, the Pentagon remains the world's largest employer and continues to militarily outspend the rest of the world by a significant margin. The mythology of the Reagan presidency is that he induced the collapse of the Soviet Union by luring it into unsustainable military spending and wars: should there come a point when we think about applying that lesson to ourselves?
  • ...3 more annotations...
  • Then there are the threats to Americans' security. Having their government spend decades proudly touting itself as "A Nation at War" and bringing horrific violence to the world is certain to prompt more and more people to want to attack Americans, as the US government itself claims took place just recently in Boston (and as clearly took place multiple other times over the last several years). And then there's the most intangible yet most significant cost: each year of endless war that passes further normalizes the endless rights erosions justified in its name. The second term of the Bush administration and first five years of the Obama presidency have been devoted to codifying and institutionalizing the vast and unchecked powers that are typically vested in leaders in the name of war. Those powers of secrecy, indefinite detention, mass surveillance, and due-process-free assassination are not going anywhere. They are now permanent fixtures not only in the US political system but, worse, in American political culture. Each year that passes, millions of young Americans come of age having spent their entire lives, literally, with these powers and this climate fixed in place: to them, there is nothing radical or aberrational about any of it. The post-9/11 era is all they have been trained to know. That is how a state of permanent war not only devastates its foreign targets but also degrades the population of the nation that prosecutes it.
  • Just to convey a sense for how degraded is this Washington "debate": Obama officials at yesterday's Senate hearing repeatedly insisted that this "war" is already one without geographical limits and without any real conceptual constraints. The AUMF's war power, they said, "stretches from Boston to the [tribal areas of Pakistan]" and can be used "anywhere around the world, including inside Syria, where the rebel Nusra Front recently allied itself with al-Qaida's Iraq affiliate, or even what Sen. Lindsey Graham (R-SC) called 'boots on the ground in Congo'". The acting general counsel of the Pentagon said it even "authorized war against al-Qaida's associated forces in Mali, Libya and Syria". Newly elected independent Sen. Angus King of Maine said after listening to how the Obama administration interprets its war powers under the AUMF: This is the most astounding and most astoundingly disturbing hearing that I've been to since I've been here. You guys have essentially rewritten the Constitution today."
  • In response to that, the only real movement in Congress is to think about how to enact a new law to expand the authorization even further. But it's a worthless and illusory debate, affecting nothing other than the pretexts and symbols used to justify what will, in all cases, be a permanent and limitless war. The Washington AUMF debate is about nothing other than whether more fig leafs are needed to make it all pretty and legal. The Obama administration already claims the power to wage endless and boundless war, in virtually total secrecy, and without a single meaningful check or constraint. No institution with any power disputes this. To the contrary, the only ones which exert real influence - Congress, the courts, the establishment media, the plutocratic class - clearly favor its continuation and only think about how further to enable it. That will continue unless and until Americans begin to realize just what a mammoth price they're paying for this ongoing splurge of war spending and endless aggression.
2More

Obama Refuses to Pardon Edward Snowden. Trump's New CIA Pick Wants Him Dead. - 0 views

  • President Obama indicated on Friday that he won’t pardon NSA whistleblower Edward Snowden, even as President-elect Donald Trump announced his pick to run the CIA: Kansas congressman Mike Pompeo, who has called for “the traitor Edward Snowden” to be executed.
  • In an interview with Obama published on Friday, German newspaper Der Spiegel asked: “Are you going to pardon Edward Snowden?” Obama replied: “I can’t pardon somebody who hasn’t gone before a court and presented themselves, so that’s not something that I would comment on at this point.” But P.S. Ruckman, editor of the Pardon Power blog said Obama is wrong to suggest he couldn’t pardon Snowden if he wanted to. Ruckman noted that Obama has previously only granted pardons and commutations to people who have already been convicted. “I just think what he may have better said is: ‘I prefer that he present himself to a court and then we’ll talk turkey.’ But technically in terms of the Constitution, there are no restrictions at all.” The operative Supreme Court ruling, from 1886, states that “The power of pardon conferred by the Constitution upon the President is unlimited except in cases of impeachment. It extends to every offence known to the law, and may be exercised at any time after its commission, either before legal proceedings are taken or during their pendency, or after conviction and judgment. The power is not subject to legislative control.”
10More

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
3More

How the U.S. Uses Surveillance and Scandal to Advance Its Global Control | Alternet - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.For well over a century, from the pacification of the Philippines in 1898 to trade negotiations with the European Union today, surveillance and its kissing cousins, scandal and scurrilous information, have been key weapons in Washington’s search for global dominion. Not surprisingly, in a post-9/11 bipartisan exercise of executive power, George W. Bush and Barack Obama have presided over building the NSA step by secret step into a digital panopticon designed to monitor the communications of every American and foreign leaders worldwide.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies.Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  •  
    Excellent, detailed, and heavily referenced with hyperlinks. A history of U.S. use of intelligence for blackmail purposes. The author makes the case that with the U.S. empire and economy waning, the U.S. has found an extremely inexpensive method to project power by blackmail.
5More

Tech giants reach White House deal on NSA surveillance of customer data | World news | ... - 0 views

  • The Obama administration has reached a deal with a number of technology giants, allowing the companies to disclose more information on customer data they are compelled to share with the government.Announced on Monday, the transparency arrangement ends months of legal wrangling between the companies and US intelligence agencies before a secret surveillance court, to compel the disclosures.The disclosures are to be nonspecific, listed by the thousand and subject in some cases to a six-month delay – speaking to the large quantities of data that the government still plans on collecting from its technology partners. In order to be more specific about the amount of data turned over, the companies must be less specific about the type of data it is.The deal also explicitly points to a delay of up to two years on revealing information on data collected under surveillance programs the National Security Agency may yet develop.
  • But the deal also purports to shed far more light than ever on a question the intelligence agencies have been extremely reluctant to address – the number of people affected by NSA surveillance.The Justice Department said the transparency deal also applies to phone companies that turn over, on a daily basis, the records of every phone call made in the US. The phone companies have not exhibited the same agitation for transparency in the wake of the Edward Snowden revelations as have tech firms.
  • The new arrangement addresses a major grievance held by Google, Yahoo, Microsoft, Facebook and LinkedIn, which all joined a coalition called Reform Government Surveillance in order to pressure the administration into reassuring their customers about the propriety and legality of giving vast amounts of data to the NSA, FBI and other government agencies. It does not curtail the amount of data demanded, which is another demand of the coalition. 
  • ...2 more annotations...
  • Additionally, once the NSA or other government agency develops a surveillance effort on “a platform, product or service (whether developed or acquired) for which the company has not previously received such an order”, the firms must wait two years before disclosure of its existence. Such “new capability orders” would subsequently be subject to the same biannual reporting requirements after the two-year period expires.
  • The five firms that were party to the Fisa court transparency suit agreed to drop their case, according to a document released by the court on Monday. Civil libertarians were optimistic about the deal. 
3More

Vladimir Putin must be called to account on surveillance just like Obama | Edward Snowd... - 0 views

  • On Thursday, I questioned Russia's involvement in mass surveillance on live television. I asked Russia's president, Vladimir Putin, a question that cannot credibly be answered in the negative by any leader who runs a modern, intrusive surveillance program: "Does [your country] intercept, analyse or store millions of individuals' communications?"I went on to challenge whether, even if such a mass surveillance program were effective and technically legal, it could ever be morally justified.The question was intended to mirror the now infamous exchange in US Senate intelligence committee hearings between senator Ron Wyden and the director of national intelligence, James Clapper, about whether the NSA collected records on millions of Americans, and to invite either an important concession or a clear evasion. (See a side-by-side comparison of Wyden's question and mine here.)
  • Clapper's lie – to the Senate and to the public – was a major motivating force behind my decision to go public, and a historic example of the importance of official accountability. In his response, Putin denied the first part of the question and dodged on the latter. There are serious inconsistencies in his denial – and we'll get to them soon – but it was not the president's suspiciously narrow answer that was criticised by many pundits. It was that I had chosen to ask a question at all.I was surprised that people who witnessed me risk my life to expose the surveillance practices of my own country could not believe that I might also criticise the surveillance policies of Russia, a country to which I have sworn no allegiance, without ulterior motive. I regret that my question could be misinterpreted, and that it enabled many to ignore the substance of the question – and Putin's evasive response – in order to speculate, wildly and incorrectly, about my motives for asking it.
  •  
    Article by Edward Snowden, includes video of the questions by Snowden and answers by Putin. Well worth the read. 
3More

On 6/5, 65 Things We Know About NSA Surveillance That We Didn't Know a Year Ago | Elect... - 0 views

  • It’s been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting dragnet surveillance on millions of innocent people. Since then, the onslaught of disturbing revelations, from disclosures, admissions from government officials, Freedom of Information Act requests, and lawsuits, has been nonstop. On the anniversary of that first leak, here are 65 things we know about NSA spying that we did not know a year ago
  • here’s no question that the international relationships Obama pledged to repair, as well as the confidence of the American people in their privacy and constitutional rights, have been damaged by the NSAs dragnet surveillance. But one year later, both the United States and international governments have not taken the steps necessary to ensure that this surveillance ends. That’s why everyone must take action— contact your elected representative, join Reset the Net, and learn about how international law applies to U.S. surveillance today. 
  •  
    EFF has a great list of the top NSA disclosures in the last year, with each of the 65 bullet points linked to source articles. 
11More

How NSA Can Secretly Aid Criminal Cases | Consortiumnews - 0 views

  • Though the NSA says its mass surveillance of Americans targets only “terrorists,” the spying may turn up evidence of other illegal acts that can get passed on to law enforcement which hides the secret source through a ruse called “parallel construction,” writes ex-CIA analyst Ray McGovern. By Ray McGovern Rarely do you get a chance to ask a just-retired FBI director whether he had “any legal qualms” about what, in football, is called “illegal procedure,” but at the Justice Department is called “parallel construction.” Government wordsmiths have given us this pleasant euphemism to describe the use of the National Security Agency’s illegal eavesdropping on Americans as an investigative tool to pass on tips to law enforcement agencies which then hide the source of the original suspicion and “construct” a case using “parallel” evidence to prosecute the likes of you and me.
  • For those interested in “quaint” things like the protections that used to be afforded us by the Fourth and Fifth Amendments to the Constitution, information about this “parallel construction” has been in the public domain, including the “mainstream media,” for at least a year or so. So, I welcomed the chance to expose this artful practice to still more people with cameras rolling at a large conference on “Ethos & Profession of Intelligence” at Georgetown University on Wednesday, during the Q & A after former FBI Director Robert Mueller spoke. Mueller ducked my question regarding whether he had any “legal qualms” about this “parallel construction” arrangement. He launched into a discursive reply in which he described the various ”authorities” enjoyed by the FBI (and the CIA), which left the clear impression not only that he was without qualms but that he considered the practice of concealing the provenance of illegally acquired tip-off information somehow within those professed “authorities.”
  • Bottom line? Beware, those of you who think you have “nothing to hide” when the NSA scoops up your personal information. You may think that the targets of these searches are just potential “terrorists.” But the FBI, Internal Revenue Service, Drug Enforcement Administration and countless other law enforcement bodies are dipping their cursors into the huge pool of mass surveillance.
  • ...8 more annotations...
  • Former FBI Division Counsel in Minneapolis Coleen Rowley – who, with Jesselyn Radack, Tom Drake and me, visited Snowden in Russia last October – told me of two legal doctrines established many decades ago: the “exclusionary rule” and the rule regarding the “fruit of the poisonous tree.” These were designed to force over-zealous law enforcement officers to adhere to the Constitution by having judges throw out cases derived from improperly obtained evidence. To evade this rule, law enforcement officials who have been on the receiving end of NSA’s wiretap data must conceal what tipped off an investigation.
  • Last week a journalist asked me why I thought Congress’ initial outrage – seemingly genuine in some quarters – over bulk collection of citizens’ metadata had pretty much dissipated in just a few months. What started out as a strong bill upholding Fourth Amendment principles ended up much weakened with only a few significant restraints remaining against NSA’s flaunting of the Constitution? Let me be politically incorrect and mention the possibility of blackmail or at least the fear among some politicians that the NSA has collected information on their personal activities that could be transformed into a devastating scandal if leaked at the right moment. Do not blanch before the likelihood that the NSA has the book on each and every member of Congress, including extramarital affairs and political deal-making. We know that NSA has collected such information on foreign diplomats, including at the United Nations in New York, to influence votes on the Iraq War and other issues important to U.S. “national security.”
  • We also know how the late FBI Director J. Edgar Hoover used much more rudimentary technology a half century ago to develop dossiers on the personal indiscretions of political and ideological opponents. It makes sense that people with access to the NSA’s modern surveillance tools would be sorely tempted to put these new toys to use in support of their own priorities.
  • We cannot escape some pretty dismal conclusions here. Not only have the Executive and Legislative branches been corrupted by establishing, funding, hiding and promoting unconstitutional surveillance programs for over 12 years, but the Judicial branch has been corrupted, too. The discovery process in criminal cases is now stacked in favor of the government through its devious means for hiding unconstitutional surveillance and using it in ways beyond the narrow declared purpose of thwarting terrorism. Moreover, federal courts at the district, appeals and Supreme Court levels have allowed the government to evade legal accountability by insisting that plaintiffs must be able to prove what often is not provable, that they were surveilled through highly secretive NSA means. And, if the plaintiffs make too much progress, the government can always get a lawsuit thrown out by invoking “state secrets.” The Separation of Powers designed by the Constitution’s Framers to prevent excessive accumulation of power by one of the branches has stopped functioning amid the modern concept of “permanent war” and the unwillingness of all but a few hearty souls to challenge the invocation of “national security.” Plus, the corporate-owned U.S. media, with very few exceptions, is fully complicit.
  • The concept of a “United Stasi of America,” coined by Pentagon Papers whistleblower Daniel Ellsberg a year ago, has been given real meaning by the unconstitutional behavior and dereliction of duty on the part of both the George W. Bush and Obama administrations. Just days after the first published disclosure from Snowden, Ellsberg underscored that the NSA, FBI and CIA now have surveillance capabilities that East Germany’s Stasi secret police could scarcely have imagined.
  • Last June, Mathew Schofield of McClatchy conducted an interesting interview of Wolfgang Schmidt, a former lieutenant colonel in the Stasi, in Berlin. With the Snowden revelations beginning to tumble out into the media, Schofield described Schmidt as he pondered the sheer magnitude of domestic spying in the United States.
  • “So much information, on so many people,” says Schmidt who, at that point, volunteers a stern warning for Schofield and the rest of us: “It is the height of naiveté to think that, once collected, this information won’t be used. This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.”
  • Take note, those of you who may still feel fearless, those of you with “nothing to hide.”
7More

The ultimate goal of the NSA is total population control | Antony Loewenstein | Comment... - 0 views

  • William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.
  • “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.Binney, who featured in a 2012 short film by Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government intrusion unlimited.“The ultimate goal of the NSA is total population control”, Binney said, “but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone.”
  • It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”The lack of official oversight is one of Binney’s key concerns, particularly of the secret Foreign Intelligence Surveillance Court (Fisa), which is held out by NSA defenders as a sign of the surveillance scheme's constitutionality.“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally.”
  • ...4 more annotations...
  • He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out but fear retribution and exile, not unlike Snowden himself, who is likely to remain there for some time.
  • Binney recently told the German NSA inquiry committee that his former employer had a “totalitarian mentality” that was the "greatest threat" to US society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over of Iraq.The era of mass surveillance has gone from the fringes of public debate to the mainstream, where it belongs. The Pew Research Centre released a report this month, Digital Life in 2025, that predicted worsening state control and censorship, reduced public trust, and increased commercialisation of every aspect of web culture.It’s not just internet experts warning about the internet’s colonisation by state and corporate power. One of Europe’s leading web creators, Lena Thiele, presented her stunning series Netwars in London on the threat of cyber warfare. She showed how easy it is for governments and corporations to capture our personal information without us even realising.Thiele said that the US budget for cyber security was US$67 billion in 2013 and will double by 2016. Much of this money is wasted and doesn't protect online infrastructure. This fact doesn’t worry the multinationals making a killing from the gross exaggeration of fear that permeates the public domain.
  • Wikileaks understands this reality better than most. Founder Julian Assange and investigative editor Sarah Harrison both remain in legal limbo. I spent time with Assange in his current home at the Ecuadorian embassy in London last week, where he continues to work, release leaks, and fight various legal battles. He hopes to resolve his predicament soon.At the Centre for Investigative Journalism conference, Harrison stressed the importance of journalists who work with technologists to best report the NSA stories. “It’s no accident”, she said, “that some of the best stories on the NSA are in Germany, where there’s technical assistance from people like Jacob Appelbaum.” A core Wikileaks belief, she stressed, is releasing all documents in their entirety, something the group criticised the news site The Intercept for not doing on a recent story. “The full archive should always be published”, Harrison said.
  • With 8m documents on its website after years of leaking, the importance of publishing and maintaining source documents for the media, general public and court cases can’t be under-estimated. “I see Wikileaks as a library”, Assange said. “We’re the librarians who can’t say no.”With evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney said: “I call people who are covering up NSA crimes traitors”.
2More

Great Privacy Essay: Fourth Amendment Doctrine in the Era of Total Surveillance | CIO - 0 views

  •  
    "'Failing Expectations: Fourth Amendment Doctrine in the Era of Total Surveillance' is a thought-provoking essay written by a Fordham University law professor about how the reasonable expectation test for privacy is failing to protect us. Add into our networked world the third-party doctrine and we have little protection against unreasonable searches and seizures."
  •  
    It doesn't detract substantially from the essay's central thesis, but an important part of the learned professor's heartfelt desires were delivered in a Supreme Court decision just decided, after the essay was published, Reilly v. California, http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf The Court held in relevant part: "We also reject the United States' final suggestion that officers should always be able to search a phone's call log, as they did in Wurie's case. The Government relies on Smithv. Maryland, 442 U. S. 735 (1979), which held that no warrant was required to use a pen register at telephone company premises to identify numbers dialed by a particular caller. The Court in that case, however, concluded that the use of a pen register was not a "search" at all under the Fourth Amendment. See id., at 745-746. There is no dispute here that the officers engaged in a search of Wurie's cell phone. Moreover, call logs typically contain more than just phone numbers; they include any identifying information that an individual might add, such as the label "my house" in Wurie's case." The effect there was to confine Smith v. Maryland, the foundation of the third-party doctrine, to its particular facts. In other words, the third-party doctrine is now confined to connected telephone numbers, the connect time, and the duration of the call. If any other metadata is gathered, such as location data, the third-party doctrine no longer applies. When you read the rest of the Reilly decision, you see a unanimous Supreme Court shooting down one government defense after another that have been used in the NSA's defense to mass telecommunications surveillance. But most interestingly, the Court unmistakably has laid the groundwork for a later decision drastically cutting back on digital surveillance without a search warrant based on particularized probable cause to believe that evidence of a specific crime has occurred and that the requested sear
4More

Court asked to kill off NSA's 'zombie dragnet' of Americans' bulk phone data | US news ... - 0 views

  • The leading civil liberties group in the United States has requested a federal court to stop the National Security Agency from collecting Americans’ phone data in bulk through the end of the year.
  • While the surveillance dragnet was phased out by Congress and Barack Obama last month, an American Civil Liberties Union suit seeks to end a twilight, zombie period of the same US phone records collection, slated under the new law to last six months. “Today the government is continuing – after a brief suspension – to collect Americans’ call records in bulk on the purported authority of precisely the same statutory language this court has already concluded does not permit it,” the ACLU writes in a motion filed on Tuesday before the second circuit court of appeals.
  • The venue is significant. On 7 May, as Congress debated ending the domestic phone-records collection, the second circuit ruled the collection was illegal. Yet it did not order Obama’s administration to cease the bulk collection, writing that a preferable option would be to stay out of the unfolding legislative battle over the future scope of US surveillance. That debate ended on 2 June with the passage of the USA Freedom Act, which reinstated expired provisions of the Patriot Act that the government had since 2006 relied upon – erroneously, in the second circuit’s view – for the bulk collection. Yet it ended the NSA’s bulk US phone records collection and created a new mechanism for the NSA to gather “call data records” from telecoms pursuant to a court order.
  • ...1 more annotation...
  • Within hours of signing the bill, Obama requested that the secret surveillance panel known as the Fisa court reinstate the dragnet, relying on a provision permitting a six-month “transition” period. Judge Michael Mosman granted the request on 29 June. The ACLU, which was the plaintiff in the case the second circuit decided, has indicated since the Fisa court began considering resumption of the dragnet that it would seek an injunction. Its major contention in support of the requested injunction is that despite the Freedom Act’s provision for a transition period, the underlying law authorizing the bulk surveillance remains the same Patriot Act provisions that the second circuit held do not justify the NSA phone-records collection. “There is no sound reason to accord this language a different meaning now than the court accorded it in May. [The Patriot Act] did not authorize bulk collection in May, and it does not authorize it now,” reads the ACLU brief.
6More

NSA giving 'a lot of thought' to privacy rights of overseas citizens - top lawyer | Wor... - 0 views

  • The top lawyer for the US intelligence community and the National Security Agency said on Wednesday that the spy agencies are giving new consideration to the privacy rights of non-Americans in the wake of a diplomatic row over the surveillance of foreign leaders. Speaking at a conference on national security law sponsored by the American Bar Association on Thursday, the general counsel for the office of the director of national intelligence, Robert Litt, said intelligence chiefs were giving "a lot of thought" to the issue. His comments came a day after General Keith Alexander, the NSA director, stated that the spy agency is open to scaling back some of its operations on foreign leaders, following an unfolding diplomatic crisis sparked by revelations that the NSA spied on German chancellor Angela Merkel. 
  • US law provides greater legal protection to those defined as "US persons", which includes American citizens and foreigners living in the US. "On the issue of US person versus non-US person, that’s an issue we’re giving a lot of thought to now,” said Litt. “It’s not surprising that the law gives more protections to US citizens or persons who are in this country,” Litt added. “That doesn’t mean that we have no protection for non-US persons, and the principal protection we have is the requirement that the collection, retention and dissemination of information has to be for a valid foreign intelligence purpose.” Litt said the intelligence agencies were “giving some thought to whether there are ways that we can both introduce a little more rigor into that requirement and perhaps a little more transparency into how we enforce that requirement.” Litt and NSA general counsel Rajesh De would not answer a question from the Guardian about the legal basis for a different, unfolding NSA controversy: the new allegation that the NSA intercepts data transiting between the foreign data centers of Google and Yahoo, two longtime NSA partners, published in the Washington Post.
  • But De took issue with a suggestion that the Post story prompted that the NSA interception would at times rely on a seminal executive order that defines basic powers and operations of the intelligence agencies, known as Executive Order 12333, rather than the relatively restrictive Foreign Intelligence Surveillance Act, or Fisa. “The implication, the insinuation, the suggestion or the outright statement that an agency like NSA would use authority under Executive Order 12333 to evade, skirt or go around Fisa is simply inaccurate,” De said. On Tuesday, the director of national intelligence, James Clapper, testified to the House intelligence panel that they considered US corporations to be “US persons,” meaning their communications and associated data enjoyed legal privileges associated with citizenship. But neither Litt nor De would explain whether that category protected communications data transiting between the data centers of US companies.
  • ...2 more annotations...
  • Both Litt and De spoke hours before the Senate intelligence committee was due to begin a second day of considering chairwoman Dianne Feinstein’s proposal to increase transparency around the NSA’s surveillance activities. A Tuesday afternoon markup session of the bill – whose text is not yet public – went uncompleted. Feinstein, previously an unequivocal supporter of the NSA, unexpectedly criticized the agency’s surveillance on foreign leaders, a relatively traditional surveillance function. Feinstein on Monday declared herself “totally opposed” to the collection and suggested her oversight committee was not “fully informed” of the practice. A similar rift has emerged between NSA and the White House over how much President Obama knew about the spying, which US officials have said does not currently take place and will not resume. Litt appeared to concede that Obama himself may not have known about spying on Merkel, but contended that the White House and Senate intelligence committee had all the information necessary to understand it was taking place.
  • “I completely disagree with the proposition that the fact that the president and the chairman of the Senate intelligence committee didn’t know every single one of these selectors the NSA was tasking means there is ineffective oversight,” Litt said. “What the president knew and what the Senate intelligence committee knows: they know what our intelligence priorities are. Those are set annually through the interagency process. That says, here’s the kind of information we need to collect. And that gets sent out to the intelligence community and then the intelligence community, through a process that works down through the ranks, figures out what’s the best way to select that. “It’s very easy in hindsight to say, well, this particular selector was sensitive and so the president should have been told that,” Litt continued. “That’s always true in hindsight. Virtually everything we do, if it comes out, is going to be embarrassing.”
  •  
    So if they're not relying on either FISA or EO 12333, are they simply ignoring any legal restraints on the Agency? It's interesting that the NSA house of cards only crumbled with the announcement of spying on 35 foreign national leaders. Personally, I'd vote for putting the leader of every nation in a glass house, butt naked, and able to communicate with others only through a loudspeaker/broadcast system audible to everyone in the world. Secrecy in government is the problem, not a solution. 
5More

Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack - The I... - 0 views

  • The U.S. government has long lavished overwhelming aid on Israel, providing cash, weapons and surveillance technology that play a crucial role in Israel’s attacks on its neighbors. But top secret documents provided by NSA whistleblower Edward Snowden shed substantial new light on how the U.S. and its partners directly enable Israel’s military assaults – such as the one on Gaza. Over the last decade, the NSA has significantly increased the surveillance assistance it provides to its Israeli counterpart, the Israeli SIGINT National Unit (ISNU; also known as Unit 8200), including data used to monitor and target Palestinians. In many cases, the NSA and ISNU work cooperatively with the British and Canadian spy agencies, the GCHQ and CSEC. The relationship has, on at least one occasion, entailed the covert payment of a large amount of cash to Israeli operatives. Beyond their own surveillance programs, the American and British surveillance agencies rely on U.S.-supported Arab regimes, including the Jordanian monarchy and even the Palestinian Authority Security Forces, to provide vital spying services regarding Palestinian targets.
  • The new documents underscore the indispensable, direct involvement of the U.S. government and its key allies in Israeli aggression against its neighbors. That covert support is squarely at odds with the posture of helpless detachment typically adopted by Obama officials and their supporters.
  • Each time Israel attacks Gaza and massacres its trapped civilian population – at the end of 2008, in the fall of 2012, and now again this past month – the same process repeats itself in both U.S. media and government circles: the U.S. government feeds Israel the weapons it uses and steadfastly defends its aggression both publicly and at the U.N.; the U.S. Congress unanimously enacts one resolution after the next to support and enable Israel; and then American media figures pretend that the Israeli attack has nothing to do with their country, that it’s just some sort of unfortunately intractable, distant conflict between two equally intransigent foreign parties in response to which all decent Americans helplessly throw up their hands as though they bear no responsibility.
  • ...1 more annotation...
  • “The United States has been trying to broker peace in the Middle East for the past 20 years,” wrote the liberal commentator Kevin Drum in Mother Jones, last Tuesday. The following day, CNN reported that the Obama administration ”agreed to Israel’s request to resupply it with several types of ammunition … Among the items being bought are 120mm mortar rounds and 40mm ammunition for grenade launchers.” The new Snowden documents illustrate a crucial fact: Israeli aggression would be impossible without the constant, lavish support and protection of the U.S. government, which is anything but a neutral, peace-brokering party in these attacks. And the relationship between the NSA and its partners on the one hand, and the Israeli spying agency on the other, is at the center of that enabling.
  •  
    Glenn Greenwald uses Edward Snowden documents to lift the blanket of secrecy off the U.S. Dark State's carnal relationship with the Israeli apartheid government's War on Arabs, and no real surprise here, the Palestinian Authority's role as a key provider of intelligence to both Israel and the U.S. 
5More

Edward Snowden: the whistleblower behind the NSA surveillance revelations | World news ... - 0 views

  • Having watched the Obama administration prosecute whistleblowers at a historically unprecedented rate, he fully expects the US government to attempt to use all its weight to punish him. "I am not afraid," he said calmly, "because this is the choice I've made."He predicts the government will launch an investigation and "say I have broken the Espionage Act and helped our enemies, but that can be used against anyone who points out how massive and invasive the system has become".
  • Over the next three years, he learned just how all-consuming the NSA's surveillance activities were, claiming "they are intent on making every conversation and every form of behaviour in the world known to them".
  • he believed that the value of the internet, along with basic privacy, is being rapidly destroyed by ubiquitous surveillance. "I don't see myself as a hero," he said, "because what I'm doing is self-interested: I don't want to live in a world where there's no privacy and therefore no room for intellectual exploration and creativity."
  • ...1 more annotation...
  • I carefully evaluated every single document I disclosed to ensure that each was legitimately in the public interest," he said. "There are all sorts of documents that would have made a big impact that I didn't turn over, because harming people isn't my goal. Transparency is."
  •  
    ""I'm willing to sacrifice all of that because I can't in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building.""
2More

The Surveillance Speech: A Low Point in Barack Obama's Presidency - Conor Friedersdorf ... - 0 views

  • On Friday, President Obama spoke to us about surveillance as though we were precocious children. He proceeded as if widespread objections to his policies can be dispatched like a parent answers an eight-year-old who has formally protested her bedtime. He is so proud that we've matured enough to take an interest in our civil liberties! Why, he used to think just like us when he was younger, and promises to consider our arguments. But some decisions just have to be made by the grownups. Do we know how much he loves us? Can we even imagine how awful he would feel if anything bad ever happened while it was still his job to ensure our safety? * By observing Obama's condescension, I don't mean to suggest tone was the most objectionable part of the speech. The disinformation should bother the American people most. The weasel words. The impossible-to-believe protestations. The factually inaccurate assertions.  They're all there.
  •  
    The Atlantic dissects Obama's recent surveillance speech, line by line, pointing to the lies and misleading statements, pointing to references to more truthful reports.
4More

Encouraging Words of Regret From Dean Baquet and Weasel Words From James Clapper - The ... - 0 views

  • One should not expect any change to come from the U.S. government itself (which includes Congress), whose strategy in such cases is to enact the pretext of “reform” so as to placate public anger, protect the system from any serious weakening, and allow President Obama to go before the country and the world and give a pretty speech about how the U.S. heard their anger and re-calibrated the balance between privacy and security. Any new law that comes from the radically corrupted political class in DC will either be largely empty, or worse. The purpose will be to shield the NSA from real reform. There are, though, numerous other avenues with the real potential to engender serious limits on the NSA’s surveillance powers, including the self-interested though genuine panic of the U.S. tech industry over how surveillance will impede their future business prospects, the efforts of other countries to undermine U.S. hegemony over the internet, the newfound emphasis on privacy protections from internet companies worldwide, and, most of all, the increasing use of encryption technology by users around the world that poses genuine obstacles to state surveillance. Those are all far, far more promising avenues than any bill Barack Obama, Dianne Feinstein and Saxby Chambliss will let Congress cough up.
  • That national security state officials routinely mislead and deceive the public should never have even been in serious doubt in the first place – certainly not for journalists, and especially now after the experience of the Iraq War. That fact — that official pronouncements merit great skepticism rather than reverence — should be (but plainly is not) fundamental to how journalists view the world. More evidence for that is provided by a Washington Post column today by one of the national security state’s favorite outlets, David Ignatius. Ignatius interviewed the chronic deceiver, Director of National Intelligence James Clapper, who now “says it appears the impact [of Snowden's leaking] may be less than once feared because ‘it doesn’t look like he [Snowden] took as much’ as first thought.” Clapper specifically casts serious doubt on the U.S. government’s prior claim that Snowden ”had compromised the communications networks that make up the military’s command and control system”; instead, “officials now think that dire forecast may have been too extreme.” Ignatius — citing an anonymous “senior intelligence official” (who may or may not be Clapper) — also announces that the government has yet again revised its rank speculation about how many documents Snowden took: “This batch of probably downloaded material is about 1.5 million documents, the senior official said. That’s below an earlier estimate of 1.77 million documents.”
  • Most notable is Ignatius’ summary of the government’s attempt to claim Snowden seriously compromised the security of the U.S.: Pressed to explain what damage Snowden’s revelations had done, the official was guarded, saying that there was “damage in foreign relations” and that the leaks had “poisoned [NSA’s] relations with commercial providers.” He also said that terrorist groups had carefully studied the disclosures, turning more to anonymizers, encryption and use of couriers to shield communications. The senior official wouldn’t respond to repeated questions about whether the intelligence community has noted any changes in behavior by either the Russian or Chinese governments, in possible response to information they may have gleaned from Snowden’s revelations. In other words, the only specific damage they can point to is from the anger that other people around the world have about what the U.S. government has done and the fact that people will not want to buy U.S. tech products if they fear (for good reason) that those companies collaborate with the NSA. But, as usual, there is zero evidence provided (as opposed to bald, self-serving assertions) of any harm to genuine national security concerns (i.e., the ability to monitor anyone planning actual violent attacks).
  • ...1 more annotation...
  • As is always the case, the stream of fear-mongering and alarmist warnings issued by the government to demonize a whistleblower proves to be false and without any basis, and the same is true for accusations made about the revelations themselves (“In January, [Mike] Rogers said that the report concluded that most of the documents Snowden had access to concerned ‘vital operations of the U.S. Army, Navy, Marine Corps and Air Force’” – AP: Lawmakers: Snowden’s Leaks May Endanger US Troops“). But none of that has stopped countless U.S. journalists from mindlessly citing each one of the latest evidence-free official claims as sacred fact.
3More

Obama's NSA 'reforms' are little more than a PR attempt to mollify the public | Glenn G... - 0 views

  • In response to political scandal and public outrage, official Washington repeatedly uses the same well-worn tactic. It is the one that has been hauled out over decades in response to many of America's most significant political scandals. Predictably, it is the same one that shaped President Obama's much-heralded Friday speech to announce his proposals for "reforming" the National Security Agency in the wake of seven months of intense worldwide controversy.The crux of this tactic is that US political leaders pretend to validate and even channel public anger by acknowledging that there are "serious questions that have been raised". They vow changes to fix the system and ensure these problems never happen again. And they then set out, with their actions, to do exactly the opposite: to make the system prettier and more politically palatable with empty, cosmetic "reforms" so as to placate public anger while leaving the system fundamentally unchanged, even more immune than before to serious challenge.
  • In response to political scandal and public outrage, official Washington repeatedly uses the same well-worn tactic. It is the one that has been hauled out over decades in response to many of America's most significant political scandals. Predictably, it is the same one that shaped President Obama's much-heralded Friday speech to announce his proposals for "reforming" the National Security Agency in the wake of seven months of intense worldwide controversy.The crux of this tactic is that US political leaders pretend to validate and even channel public anger by acknowledging that there are "serious questions that have been raised". They vow changes to fix the system and ensure these problems never happen again. And they then set out, with their actions, to do exactly the opposite: to make the system prettier and more politically palatable with empty, cosmetic "reforms" so as to placate public anger while leaving the system fundamentally unchanged, even more immune than before to serious challenge.This scam has been so frequently used that it is now easily recognizable.
  •  
    Glenn Greenwald offers his take on Obama's NSA "reform" speech.
3More

Why AT&T's Surveillance Report Omits 80 Million NSA Targets | Threat Level | Wired.com - 0 views

  • AT&T this week released for the first time in the phone company’s 140-year history a rough accounting of how often the U.S. government secretly demands records on telephone customers. But to those who’ve been following the National Security Agency leaks, Ma Bell’s numbers come up short by more than 80 million spied-upon Americans. AT&T’s transparency report counts 301,816 total requests for information — spread between subpoenas, court orders and search warrants — in 2013. That includes between 2,000 and 4,000 under the category “national security demands,” which collectively gathered information on about 39,000 to 42,000 different accounts. There was a time when that number would have seemed high. Today, it’s suspiciously low, given the disclosures by whistleblower Edward Snowden about the NSA’s bulk metadata program. We now know that the secretive Foreign Intelligence Surveillance Court is ordering the major telecoms to provide the NSA a firehose of metadata covering every phone call that crosses their networks. An accurate transparency report should include a line indicating that AT&T has turned over information on each and every one of its more than 80 million-plus customers. It doesn’t.
  • That’s particularly ironic, given that it was Snowden’s revelations about this so-called “Section 215″ metadata spying that paved the way for the transparency report. In Snowden’s wake, technology companies pushed President Barack Obama to craft new rules allowing them to be more transparent about how much customer data they’re forced to provide the NSA and other agencies. In a Jan. 17 globally televised speech, Obama finally agreed. We will also enable communications providers to make public more information than ever before about the orders they have received to provide data to the government. But when the new transparency guidelines came out on Jan. 27, the language left it unclear whether discussing bulk collection was allowed, says Alex Abdo, an American Civil Liberties Union staff attorney. AT&T on Monday became the first phone company to release a transparency report under the new rules, and the results seem to confirm that the metadata collection is still meant to stay secret. “This transparency report confirmed our fear that the DOJ’s apparent concession was carefully crafted to prevent real transparency,” Abdo says. “If they want real transparency, they would allow the disclosure of the bulk telephone metadata program.”
  • The guidelines allow for the disclosure, in chunks of 1,000, of “the number of customer selectors [phone numbers] targeted under FISA non-content orders.” Since the bulk metadata collection doesn’t “target” any “selectors” it is, by definition, not subject to disclosure. This loophole is no accident of phrasing. In other sections of the guidelines covering National Security Letters — a type of subpoena that doesn’t require a judge’s signature — Obama allows disclosure of the “number of customer accounts affected.” If the guidelines used that same language for the FISA disclosures, AT&T’s transparency report would presumably disclose that more than 80 million customers — that would be all of AT&T’s customers — had been spied upon. The end result, observes Kevin Bankston, the policy director of the New America Foundation’s Open Technology Institute, is that Obama’s so-called reform has spawned a misleading report that provides false comfort to AT&T customers — and all Americans.
« First ‹ Previous 81 - 100 of 367 Next › Last »
Showing 20 items per page