Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "metadata" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
4More

Clintons Are Under Multiple FBI Investigations as Agents Are Stymied - 0 views

  • Current and former FBI officials have launched a media counter-offensive to engage head to head with the Clinton media machine and to throw off the shackles the Loretta Lynch Justice Department has used to stymie their multiple investigations into the Clinton pay-to-play network. Over the past weekend, former FBI Assistant Director and current CNN Senior Law Enforcement Analyst Tom Fuentes told viewers that “the FBI has an intensive investigation ongoing into the Clinton Foundation.” He said he had received this information from “senior officials” at the FBI, “several of them, in and out of the Bureau.” (See video clip from CNN below.) That information was further supported by an in-depth article last evening in the Wall Street Journal by Devlin Barrett. According to Barrett, the “probe of the foundation began more than a year ago to determine whether financial crimes or influence peddling occurred related to the charity.” Barrett’s article suggests that the Justice Department, which oversees the FBI, has attempted to circumvent the investigation. The new revelations lead to the appearance of wrongdoing on the part of U.S. Attorney General Loretta Lynch for secretly meeting with Bill Clinton on her plane on the tarmac of Phoenix Sky Harbor International Airport on the evening of June 28 of this year. Not only was Bill Clinton’s wife under an FBI investigation at the time over her use of a private email server in the basement of her New York home over which Top Secret material was transmitted while she was Secretary of State but his own charitable foundation was also under investigation, a fact that was unknown at the time to the public and the media.
  • The reports leaking out of the FBI over the weekend came on the heels of FBI Director James Comey sending a letter to members of Congress on Friday acknowledging that the investigation into the Hillary Clinton email server was not closed as he had previously testified to Congress, but had been reopened as a result of “pertinent” emails turning up. According to multiple media sources, those emails were found on the laptop of Anthony Weiner, estranged husband of Hillary Clinton’s longtime aide, Huma Abedin. Weiner was forced to resign from Congress in 2011 over a sexting scandal with more sexting scandals to follow. Early this month, on October 3, the FBI raided Weiner’s apartment in New York with a search warrant in hand and seized multiple electronic devices. At least one of those devices had been used by both Weiner and Abedin to send email messages. The search warrant had been obtained following a detailed report that had appeared in the Daily Mail newspaper in the U.K. in September, showing sordid, sexual emails that Weiner had allegedly sent to a 15-year old girl in North Carolina. According to the content of the published emails, Weiner was aware that the girl was underage. While examining the hard drive of a laptop seized from Weiner, the FBI found metadata showing that thousands of the emails were exchanged between the private server located in Hillary Clinton’s basement in Chappaqua, New York. Since the FBI had only a search warrant to examine emails and documents related to the Weiner matter, it was not able to read the other emails but simply tallied up the metadata linked to the private server in Chappaqua to show how many potentially new emails might be in the trove on the laptop. (It is also possible that the FBI agents could have used a program to compare subject headings against those emails previously turned over by Abedin to make their case that Abedin had perjured herself when she testified to them that she had turned over all of her work-related emails from her time as Deputy Chief of Staff for Operations when Hillary Clinton served as Secretary of State.)
  • The FBI officials briefed FBI Director James Comey last Thursday on the new trove of emails and he went public with his letter to Congress the next day – leading the Clinton camp to immediately launch a media assault on his motives. As if all of this wasn’t enough for the public to digest over the weekend, yesterday morning James Kallstrom, the former Assistant Director in Charge of the FBI’s New York Division and 25-year veteran of the FBI, went on the John Catsimatidis radio program to call the Clintons a “crime family.” (You can hear the full program here.) Kallstrom’s comments were further amplified when the New York Daily News reported on his criticisms that the FBI had been hamstrung from conducting a real investigation. The Daily News quoted Kallstrom from the radio program as follows: “ ‘This investigation was never a real investigation, they never had grand jury empaneled…This investigation was without the ability to serve subpoenas, serve search warrants, and obtain evidence … It was just ludicrous.’ ” On Wednesday of last week, just two days before FBI Director Comey issued his public letter to Congress, WikiLeaks released a devastating memo from Douglas Band, at the time a key figure at the Clinton Foundation and President of his own corporate consulting firm, Teneo. The memo was rife with suggestions of pay-to-play and personal enrichment schemes at the Clinton Foundation. The same day, Washington Post reporters Rosalind Helderman and Tom Hamburger reported the story, including the following details:
  • ...1 more annotation...
  • “The memo, made public Wednesday by the anti-secrecy group WikiLeaks, lays out the aggressive strategy behind lining up the consulting contracts and paid speaking engagements for Bill Clinton that added tens of millions of dollars to the family’s fortune, including during the years that Hillary Clinton led the State Department. It describes how Band helped run what he called ‘Bill Clinton Inc.,’ obtaining ‘in-kind services for the President and his family — for personal travel, hospitality, vacation and the like.’… Band wrote that Teneo partners had raised in excess of $8 million for the foundation and $3 million in paid speaking fees for Bill Clinton. He said he had secured contracts for the former president that would pay out $66 million over the subsequent nine years if the deals remained in place.” The memo was likely the final straw for the FBI agents and officials who had been thwarted by the Justice Department in mounting an aggressive investigation of the Clinton Foundation using the full FBI arsenal typically available like subpoenas, witness interviews and wiretaps. Given the weekend leaks, it now appears that the FBI understands that the only hope for a real investigation is to shine some much needed sunlight on how Loretta Lynch’s Justice Department cowers before politically powerful people.
4More

How Many Americans Does The N.S.A. Spy On? A Lot of Them : The New Yorker - 0 views

  • but reading the new documents, which include a secret FISA court order that amounts to a gift certificate for one year of warrant-free spying, it becomes clear that many more “United States persons” have their communications monitored, and on much vaguer grounds, than the Obama Administration has acknowledged. “What I can say unequivocally is that, if you are a U.S. person, the N.S.A. cannot listen to your telephone calls, and the N.S.A. cannot target your e-mails,” the President said earlier this week. A 2009 memorandum signed by Eric Holder establishes a broader criteria, referring to people “reasonably believed” to be located abroad. That reasonable belief, as it turns out, can be quite shaky. Among the information that the N.S.A. is told to use includes having had a phone or e-mail connection with a person “associated with a foreign power or foreign territory,” or being in the “‘buddy list’ or address book” of such a person. It won’t be lost on anyone that Americans whose families include recent immigrants will be disproportionately vulnerable to such intrusions. (So, incidentally, will journalists.) The defaults in the analysis are telling: a person
  • whose location is unknown, will not be treated as a United States person unless such person can be positively identified as such, or the nature or circumstances of the person’s give rise to a reasonable belief that such person is a United States person. (The extent to which the N.S.A. can spy on a wide range of foreigners is its own, important discussion.) The criteria also show the interaction of various N.S.A. programs: the Administration has defended the collection of telephony metadata by saying that if it ever produces an interesting match, investigators would have to go to court to get a proper warrant to look more closely. But metadata is mentioned in these documents as a basis for picking a target for the surveillance under what appears to be a blanket FISA order—not an individualized one.
  • And what happens when the N.S.A. realizes that it is reading and listening to an American’s communications? It is supposed to stop, at least until it gets a different kind of FISA order—which, based on what it has already heard, may be all the easier. And if it finds something that is interesting in any one of a half-dozen ways, it can analyze the communications further, and hold on to them for five years. Maybe an American’s e-mails contain “significant foreign intelligence information”; or maybe they don’t, but are “reasonably believed” to contain evidence of a crime. There are a lot of crimes on the books, and the N.S.A. is also allowed to count one it thinks might be “about to be committed.” It can also “disseminate” the information to other agencies, and find out more about the American if it seems that the person might have access to secrets, or be a target of foreigners, or just do business with them. This includes communications between someone under indictment and his or her lawyer—the words can’t be used in a prosecution, but can be to gather intelligence. And what the N.S.A. happens to see can also be used in leak investigations. Does this still seem too narrow, not enough to keep us all safe? The documents note that the private data of Americans that the N.S.A. can hold on to “include electronic communications acquired because of limitations on NSA’S ability to filter communications.” In other words, if it fails to fine-tune its targeting, it can keep what it sweeps up anyway. Also, if the N.S.A. decides on its own that there is an “immediate threat,” it can temporarily put all these minimization procedures aside and figure it out later.
  • ...1 more annotation...
  • These documents were classified: they shouldn’t have been. The N.S.A. can look for certain secrets and keep them. But Americans shouldn’t have to listen to the President with an ear for what words like “targeted” really mean. (Even by that standard, the Administration has not been forthright.) We get to know what the rules are—so we, and not just a secret court, can tell when they are being broken.
6More

WA State Bill Proposes Criminalizing Help to NSA, Turning Off Resources to Yakima Facil... - 0 views

  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • Lawmakers in Oklahoma, California and Indiana have already introduced similar legislation, and a senator in Arizona has committed to running it there, but Washington counts as the first state with an actual NSA facility within its borders to consider the Fourth Amendment Protection Act. The NSA operates a listening center on the Army’s Yakima Training Center (YTC). The NSA facility is in Taylor’s district, and he said he cannot sit idly by while a secretive facility in his own backyard violate the rights of people everywhere. “We’re running the bill to provide protection against the ever increasing surveillance into the daily lives of our citizens,” he said. “Our Founding Fathers established a series of checks and balances in the Constitution. Given the federal government’s utter failure to address the people’s concerns, it’s up to the states to stand for our citizens’ constitutional rights.”
  • ...3 more annotations...
  • According to documents made public by the US Military, as of 2008, a company called PacifiCorp serves as the primary supplier of electric power, and Cascade Natural Gas Corporation supplies natural gas to YTC. The Kittitas Public Utility District, a function of the state of Washington, provides electric power for the MPRC and the Doris site, but no documentation has yet proven that it also provides electricity used directly by the NSA facility on site. And while YTC does provide a bulk of its own water, documents also show that some of it gets there by first passing through upstream dams owned and operated by the State. The Army report states, “YTC lies within three WAUs whose boundaries coincide with WRIAs, as defined by the State of Washington natural resource agencies.” WAU’s are Washington State Water Administration Units. WRIAs are Washington State Water Resource Inventory Areas A Washington company also has a strong link to the NSA. Cray Inc. builds supercomputers for the agency.
  • If the bill passes, it would set in motion actions to stop any state support of the Yakima center as long as it remains in the state, and could make Cray ineligible for any contracts with the state or its political subdivisions. Three public universities in Washington join 166 schools nationwide partnering with the NSA. Taylor’s bill would address these schools’ status as NSA “Centers of Academic Excellence,” and would bar any new partnerships with other state colleges or universities. Tenth Amendment Center national communications director Mike Maharrey says the bills prohibition against using unconstitutionally gathered data in state court would probably have the most immediate impact. In fact, lawmakers in Kansas and Missouri will consider bills simply addressing this kind of data sharing.
  • “We know the NSA shares data with state and local law enforcement. We know from a Reuters report that most of this shared data has absolutely nothing to do with national security issues. This bill would make that information inadmissible in state court,” he said. “This data sharing shoves a dagger into the heart of the Fourth Amendment. This bill would stop that from happening. This is a no-brainer. Every state should do it.” Maharrey said he expects at least three more states to introduce the act within the next few weeks. “This idea is catching fire,” he said. “And why wouldn’t it? We have an out of control agency spying on virtually everybody in the world. We have a president and a Congress that appears poised to maybe put a band aid on it. Americans are realizing if we are going to slow down the NSA, we are going to have to take a different approach. This is it.”
3More

Congressmen Call For DNI Clapper's Ouster | Threatpost - English - Global - threatpost.com - 0 views

  • A group of six Congressmen have asked President Barack Obama to remove James Clapper as director of national intelligence as a result of his misstatements to Congress about the NSA’s dragnet data-collection programs. The group, led by Rep. Darrell Issa (R-Calif.), said that Clapper’s role as DNI “is incompatible with the goal of restoring trust in our security programs”.
  • Clapper is the former head of the National Geospatial Intelligence Agency and has been DNI since 2010. In their letter to Obama, the group of Congressmen calling for his ouster said that he lied to Congress and should no longer be in office. “The continued role of James Clapper as Director of National Intelligence is incompatible with the goal of restoring trust in our security programs and ensuring the highest level of transparency. Director Clapper continues to hold his position despite lying to Congress, under oath, about the existence of bulk data collection programs in March 2013. Asking Director Clapper, and other federal intelligence officials who misrepresented programs to Congress and the courts, to report to you on needed reforms and the future role of government surveillance is not a credible solution,” the letter from Issa, Ted Poe, Paul Broun, Doug Collins, Walter Jones and Alan Grayson says. The Congressmen sent the letter to Obama on Monday, 10 days after the president gave a much-anticipated speech on the NSA’s role and some new limits he wants to place on the scope of its data collection. Security experts and privacy advocates were not enthusiastic about the changes Obama announced, which included a recommendation that a third party hold phone metadata records, which are now stored by the NSA.
  • One issue that Obama didn’t address in his speech was the agency’s alleged subversion of cryptographic standards and algorithms. In their letter, Issa and his colleagues urged Obama to address this issue. “While the collection of bulk telephone records (meta-data) under Section 215 of the PATRIOT Act has understandably garnered the most significant public debate over government overreach, considerable concern has been raised about the govemment’s exploitation of the Internet through circumvention of encryption. The Review Group recognized the potential hazard created by exposing vulnerabilities in encryption data and recommended that your Administration support, rather than undermine, efforts to protect the integrity of these systems.3 However, your January 17′th speech failed to address the future of encryption related programs. Internet freedom is indispensible, and reports regarding the govemment’s treatment of encryption protocols underscore the need to provide leadership and clarity beyond the collection of telephone records,” the letter says.
3More

Glassholes: A Mini NSA on Your Face, Recorded by the Spy Agency | Global Research - 0 views

  • eOnline reports: A new app will allow total strangers to ID you and pull up all your information, just by looking at you and scanning your face with their Google Glass. The app is called NameTag and it sounds CREEPY. The “real-time facial recognition” software “can detect a face using the Google Glass camera, send it wirelessly to a server, compare it to millions of records, and in seconds return a match complete with a name, additional photos and social media profiles.” The information listed could include your name, occupation, any social media profiles you have set up and whether or not you have a criminal record (“CRIMINAL HISTORY FOUND” pops up in bright red letters according to the demo).
  • Since the NSA is tapping into all of our digital communications, it is not unreasonable to assume that all of the info from your digital glasses – yup, everything – may be recorded by the spy agency. Are we going to have millions of mini NSAs walking around recording everything … glassholes? It doesn’t help inspire confidence that America’s largest police force and Taser are beta-testing Google Glasses. Postscript: I love gadgets and tech, and previously discussed the exciting possibilities of Google Glasses. But the NSA is ruining the fun, just like it’s harming U.S. Internet business.
  •  
    Thankfully, there's buddying technology to block computer facial-recognition algorithms. http://tinyurl.com/mzfyfra On the other hand, used Hallowe'en masks can usually be purchased inexpensively from some nearby school kids at this time of year. Now if I could just put together a few near-infrared LEDs to fry a license plate-scanner's view ...  
5More

NSA says it considered collecting phone call location data - Los Angeles Times - 0 views

  • The National Security Agency collected samples of records showing where Americans were when they made mobile phone calls in 2010 and 2011 to test how it could obtain and process the data in bulk, but decided not to move forward with the plan, intelligence officials disclosed Wednesday.The admission by NSA chief Keith Alexander to a Senate committee solved part of a mystery about the digital spying agency's involvement with data that could reveal the day-to-day movements of — and deeply personal information about — every cellphone user.
  • Sen. Ron Wyden (D-Ore.), who receives classified briefings as a member of the Senate Intelligence Committee, had been pressing the NSA to acknowledge its flirtation with bulk collection of U.S. location data. He said in a statement there was more to the story, but did not elaborate."After years of stonewalling on whether the government has ever tracked or planned to track the location of law-abiding Americans through their cellphones, once again, the intelligence leadership has decided to leave most of the real story secret — even when the truth would not compromise national security," Wyden said.
  • The NSA already vacuums up as much mobile phone location data on foreign targets outside the U.S. as it can get, former officials say.The news of the NSA's location data test emerged at a Senate Judiciary Committee hearing on agency surveillance as the director of national intelligence, James R. Clapper, offered a new rationale for the agency's controversial collection of U.S. calling records in bulk.
  • ...1 more annotation...
  • "We have heard over and over again the assertion that 54 terrorist plots were thwarted by the use of Section 215 and/or Section 702 authorities," Leahy said, referring to parts of surveillance law. "That's plainly wrong, but we still get it in letters to members of Congress; we get it in statements. These weren't all plots, and they weren't all thwarted. The American people are getting left with an inaccurate impression of the effectiveness of NSA programs."Alexander acknowledged that only in two cases at most could officials say that domestic terrorist activity would not have been detected without the collection of American phone records.But Clapper added that determining "plots foiled" was not the only way to measure the usefulness of the domestic phone database. The records also allow analysts to rule out domestic conspiracies, he said."I would call it the 'peace of mind' metric," he said.
  •  
    Alexander says they don't collect location-data on U.S. citizens, then Wyden all but calls him a liar.  And check Clapper's admission that NSA's call metadata program offers nothing but his own "peace of mind."
4More

The NSA's Secret Role in the U.S. Assassination Program - The Intercept - 0 views

  • The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using. The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere. His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen
  • The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using. The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere. His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.
  • In his speech at the National Defense University last May, President Obama declared that “before any strike is taken, there must be near-certainty that no civilians will be killed or injured – the highest standard we can set.” He added that, “by narrowly targeting our action against those who want to kill us and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.” But the increased reliance on phone tracking and other fallible surveillance tactics suggests that the opposite is true. The Bureau of Investigative Journalism, which uses a conservative methodology to track drone strikes, estimates that at least 273 civilians in Pakistan, Yemen and Somalia have been killed by unmanned aerial assaults under the Obama administration. A recent study conducted by a U.S. military adviser found that, during a single year in Afghanistan – where the majority of drone strikes have taken place – unmanned vehicles were 10 times more likely than conventional aircraft to cause civilian casualties.
  •  
    Glenn Greenwald's initial article in the new online The Intercept. 
7More

Yahoo webcam images from millions of users intercepted by GCHQ | World news | The Guardian - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy".
  • GCHQ does not have the technical means to make sure no images of UK or US citizens are collected and stored by the system, and there are no restrictions under UK law to prevent Americans' images being accessed by British analysts without an individual warrant.The documents also chronicle GCHQ's sustained struggle to keep the large store of sexually explicit imagery collected by Optic Nerve away from the eyes of its staff, though there is little discussion about the privacy implications of storing this material in the first place.
  • "Face detection has the potential to aid selection of useful images for 'mugshots' or even for face recognition by assessing the angle of the face," it reads. "The best images are ones where the person is facing the camera with their face upright."The agency did make efforts to limit analysts' ability to see webcam images, restricting bulk searches to metadata only.However, analysts were shown the faces of people with similar usernames to surveillance targets, potentially dragging in large numbers of innocent people. One document tells agency staff they were allowed to display "webcam images associated with similar Yahoo identifiers to your known target".Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
  • ...3 more annotations...
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs.Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.One document even likened the program's "bulk access to Yahoo webcam images/events" to a massive digital police mugbook of previously arrested individuals.
  • Programs like Optic Nerve, which collect information in bulk from largely anonymous user IDs, are unable to filter out information from UK or US citizens. Unlike the NSA, GCHQ is not required by UK law to "minimize", or remove, domestic citizens' information from its databases. However, additional legal authorisations are required before analysts can search for the data of individuals likely to be in the British Isles at the time of the search.There are no such legal safeguards for searches on people believed to be in the US or the other allied "Five Eyes" nations – Australia, New Zealand and Canada.
  • The documents also show that GCHQ trialled automatic searches based on facial recognition technology, for people resembling existing GCHQ targets: "[I]f you search for similar IDs to your target, you will be able to request automatic comparison of the face in the similar IDs to those in your target's ID".
3More

In rare loss, FISA court rejects Justice Dept request to retain data - RT USA - 0 views

  • The federal surveillance court that has approved all but a fraction of the NSA's intelligence requests nonetheless rejected a petition by the government to retain phone records for longer than five years, as is currently allowed.
  • The US Foreign Intelligence Surveillance Court (also known as the FISA Court) was established in 1978 as a gatekeeper that would approve or deny surveillance warrants against suspect foreign enemies living inside the United States. Since that date, the court has denied 11 of the nearly 34,000 surveillance requests by the government. While judges on the court have said that they force the government to make changes to approximately one-quarter of those requests, the .03 percent decline rate has been startling to civil liberties advocates. Judge Reggie Walton acted as a rare bump in that road this week when he denied the US Department of Justice’s request to keep the telephone metadata collected by the NSA past the five-year deadline. The Obama administration had asked the FISA Court to bend the rules so that the Justice Department could adequately defend itself from a series of lawsuits filed by various groups, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) chief among them. US attorneys argued in a court filing last month that when “preservation of information is required, the duty to preserve supersedes statutory or regulatory requirements or records-management policies that would otherwise result in the destruction of the information.”
  • Authorities proposed that the information be retained, although they sought to make it illegal for any NSA analyst to examine the data as they would information that is not five years old. That is not enough of an excuse, Walton ruled, saying that he found that rationale to be “simply unresponsive” and that the groups that have filed suit are hoping for “the destruction of the [telephone] metadata, not its retention.” The judge concluded that any reason to keep the telephone records is outweighed by the damage that such a decision would do to privacy. Justice Department attorneys may have expected such a decision from Walton who, even as chief judge of the FISA Court, has admitted skepticism with the program since the government’s methods were first revealed. Judge Walton told The Washington Post in August that the court, which is supposed to act as the final barometer, is unable to verify the very information provided by law enforcement. “The FISC is forced to rely upon the accuracy of the information that is provided to the court,” he wrote. “The FISC does not have the capacity to investigate issues of noncompliance, and in that respect the FISC is in the same position as any other court when it comes to enforcing [government] compliance with its orders.”
1More

NSA Whistleblowers: NSA Collects 'Word for Word' Every Domestic Communication | Global ... - 0 views

  •  
    "Anyone Who Says the Government Only Spies On Metadata Is Sadly Mistaken PBS interviewed NSA whistleblowers William Binney and Russell Tice this week. Binney is the NSA's former director of global digital data, and a 32-year NSA veteran widely regarded as a "legend" within the agency.  Tice helped the NSA spy with satellites for 20 years. Binney and Tice confirmed that the NSA is recording every word of every phone call made within the United States:"
1More

You Won't BELIEVE What's Going On with Government Spying on Americans - BlackListedNews... - 1 views

  •  
    "New Revelations Are Breaking Every Day" This web page is very well sourced and filled with links where you will get lost for hours. Excellent reference document ............................ Revelations about the breathtaking scope of government spying are coming so fast that it's time for an updated roundup: - Just weeks after NSA boss Alexander said that a review of NSA spying found not even one violation, the Washington Post published an internal NSA audit showing that the agency has broken its own rules thousands of times each year - 2 Senators on the intelligence committee said the violations revealed in the Post article were just the "tip of the iceberg" - Glenn Greenwald notes:  "One key to the WashPost story: the reports are internal, NSA audits, which means high likelihood of both under-counting & white-washing".(Even so, the White House tried to do damage control by retroactively changing on-the-record quotes) - The government is spying on essentially everything we do. It is not just "metadata" … although that is enough to destroy your privacy - The government has adopted a secret interpretation of the Patriot Act which allows it to pretend that "everything" is relevant … so it spies on everyone - NSA whistleblowers say that the NSA collects all of our conversations word-for-word - It's not just the NSA … Many other agencies, like the FBI and IRS - concerned only with domesticissues - spy on Americans as well - The information gained through spying is shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes.  The agencies are instructed to intentionally "launder" the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges - Top counter-terror experts say that the government's mass spying doesn't keep us
6More

NSA shares raw intelligence including Americans' data with Israel | World news | The Gu... - 0 views

  • The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process "minimization", but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
  • The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content."According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. "NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection", it says.
  • In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy."Any US person information that is acquired as a result of NSA's surveillance activities is handled under procedures that are designed to protect privacy rights," the spokesperson said.The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
  • ...3 more annotations...
  • While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel."Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge," states the report, titled 'History of the US – Israel Sigint Relationship, Post-1992'. "In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA's only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner."
  • In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. "On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems," the official says. "A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US."Later in the document, the official is quoted as saying: "One of NSA's biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended."
  • The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.In its statement, the NSA said: "We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations."NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information."
6More

Private firms selling mass surveillance systems around world, documents show | World ne... - 0 views

  • Private firms are selling spying tools and mass surveillance technologies to developing countries with promises that "off the shelf" equipment will allow them to snoop on millions of emails, text messages and phone calls, according to a cache of documents published on Monday.The papers show how firms, including dozens from Britain, tout the capabilities at private trade fairs aimed at offering nations in Africa, Asia and the Middle East the kind of powerful capabilities that are usually associated with government agencies such as GCHQ and its US counterpart, the National Security Agency.The market has raised concerns among human rights groups and ministers, who are poised to announce new rules about the sale of such equipment from Britain.
  • The documents are included in an online database compiled by the research watchdog Privacy International, which has spent four years gathering 1,203 brochures and sales pitches used at conventions in Dubai, Prague, Brasilia, Washington, Kuala Lumpur, Paris and London. Analysts posed as potential buyers to gain access to the private fairs.The database, called the Surveillance Industry Index, shows how firms from the UK, Israel, Germany, France and the US offer governments a range of systems that allow them to secretly hack into internet cables carrying email and phone traffic.The index has details from 338 companies, including 77 from the UK, offering a total of 97 different technologies.
  • The documents include a brochure from a company called Advanced Middle East Systems (AMES), based in Dubai. It has been offering a device called Cerebro – a DIY system similar to the Tempora programme run by GCHQ – that taps information from fibre-optic cables carrying internet traffic.AMES describes Cerebro as a "core technology designed to monitor and analyse in real time communications … including SMS (texting), GSM (mobile calls), billing data, emails, conversations, webmail, chat sessions and social networks."The company brochure makes clear this is done by attaching probes to internet cables. "No co-operation with the providers is required," it adds."Cerebro is designed to store several billions of records – metadata and/or communication contents. At any time the investigators can follow the live activity of their target with advanced targeting criteria (email addresses, phone numbers, key words)," says the brochure.
  • ...2 more annotations...
  • Another firm selling similar equipment is VASTech, based in South Africa, which has a system called Zebra. Potential buyers are told it has been designed to help "government security agencies face huge challenges in their combat against crime and terrorism".VASTech says Zebra offers "access to high volumes of information generated via telecommunication services for the purposes of analysis and investigation".It has been designed to "intercept all content and metadata of voice, SMS, email and fax communications on the connected network, creating a rich repository of information".
  • It is now possible, from a single laptop computer, to locate where a mobile phone is calling from anywhere in the world, with an accuracy of between 200 metres and a mile. This is not done by attaching probes, and it is not limited to the area where the laptop is working from. The "cross border" system means it is now theoretically possible to locate a mobile phone call from a town abroad from a laptop in London.
4More

White House to release independent report on NSA spying - CNN.com - 0 views

  • An independent assessment of National Security Agency surveillance ordered by President Barack Obama following classified leaks by Edward Snowden will be released Wednesday, White House spokesman Jay Carney said. The review was submitted last week by an outside panel, but Carney said news reports about its recommendations were "inaccurate" so the White House has decided to release the conclusions now rather than in January as previously planned.
  • Release of the findings would come two days after a federal judge in Washington ruled preliminarily that NSA data collection of telephone metadata was probably unconstitutional on privacy grounds.
  • Company executives met with Obama on Tuesday, and sources told CNN's Jake Tapper that those present got the impression from the President that NSA metadata collection would not stop anytime soon but that more efforts at transparency would be made.
  •  
    "Independent assessment." By a group of people hand-picked by Director of Intelligence James Clapper himself. "Independent" would be making everything public and allowing the affected public to weigh in on what they find. But stand by, the report is due out today. 
3More

Edward Snowden: US government spied on human rights workers | World news | The Guardian - 0 views

  • The US has spied on the staff of prominent human rights organisations, Edward Snowden has told the Council of Europe in Strasbourg, Europe's top human rights body.Giving evidence via a videolink from Moscow, Snowden said the National Security Agency – for which he worked as a contractor – had deliberately snooped on bodies like Amnesty International and Human Rights Watch.He told council members: "The NSA has specifically targeted either leaders or staff members in a number of civil and non-governmental organisations … including domestically within the borders of the United States." Snowden did not reveal which groups the NSA had bugged.The assembly asked Snowden if the US spied on the "highly sensitive and confidential communications" of major rights bodies such as Amnesty and Human Rights Watch, as well as on similar smaller regional and national groups. He replied: "The answer is, without question, yes. Absolutely."
  • Snowden, meanwhile, dismissed NSA claims that he had swiped as many as 1.7m documents from the agency's servers in an interview with Vanity Fair. He described the number released by investigators as "simply a scare number based on an intentionally crude metric: everything that I ever digitally interacted with in my career."He added: "Look at the language officials use in sworn testimony about these records: 'could have,' 'may have,' 'potentially.' They're prevaricating. Every single one of those officials knows I don't have 1.7m files, but what are they going to say? What senior official is going to go in front of Congress and say, 'We have no idea what he has, because the NSA's auditing of systems holding hundreds of millions of Americans' data is so negligent that any high-school dropout can walk out the door with it'?"In live testimony to the Council of Europe, Snowden also gave a forensic account of how the NSA's powerful surveillance programs violate the EU's privacy laws. He said programs such as XKeyscore, revealed by the Guardian last July, use sophisticated data mining techniques to screen "trillions" of private communications."This technology represents the most significant new threat to civil liberties in modern times," he declared.
  • XKeyscore allows analysts to search with no prior authorisation through vast databases containing emails, online chats, and the browsing histories of millions of individuals.Snowden said on Tuesday that he and other analysts were able to use the tool to select an individual's metadata and content "without judicial approval or prior review".In practical terms, this meant the agency tracked citizens not involved in any nefarious activities, he stressed. The NSA operated a "de facto policy of guilt by association", he added.Snowden said the agency, for example, monitored the travel patterns of innocent EU and other citizens not involved in terrorism or any wrongdoing.The 30-year-old whistleblower – who began his intelligence career working for the CIA in Geneva – said the NSA also routinely monitored the communications of Swiss nationals "across specific routes".
5More

NSA loophole allows warrantless search for US citizens' emails and phone calls | World ... - 0 views

  • The National Security Agency has a secret backdoor into its vast databases under a legal authority enabling it to search for US citizens' email and phone calls without a warrant, according to a top-secret document passed to the Guardian by Edward Snowden.The previously undisclosed rule change allows NSA operatives to hunt for individual Americans' communications using their name or other identifying information. Senator Ron Wyden told the Guardian that the law provides the NSA with a loophole potentially allowing "warrantless searches for the phone calls or emails of law-abiding Americans".The authority, approved in 2011, appears to contrast with repeated assurances from Barack Obama and senior intelligence officials to both Congress and the American public that the privacy of US citizens is protected from the NSA's dragnet surveillance programs.
  • The intelligence data is being gathered under Section 702 of the of the Fisa Amendments Act (FAA), which gives the NSA authority to target without warrant the communications of foreign targets, who must be non-US citizens and outside the US at the point of collection.The communications of Americans in direct contact with foreign targets can also be collected without a warrant, and the intelligence agencies acknowledge that purely domestic communications can also be inadvertently swept into its databases. That process is known as "incidental collection" in surveillance parlance.But this is the first evidence that the NSA has permission to search those databases for specific US individuals' communications.
  • A secret glossary document provided to operatives in the NSA's Special Source Operations division – which runs the Prism program and large-scale cable intercepts through corporate partnerships with technology companies – details an update to the "minimization" procedures that govern how the agency must handle the communications of US persons. That group is defined as both American citizens and foreigners located in the US."While the FAA 702 minimization procedures approved on 3 October 2011 now allow for use of certain United States person names and identifiers as query terms when reviewing collected FAA 702 data," the glossary states, "analysts may NOT/NOT [not repeat not] implement any USP [US persons] queries until an effective oversight process has been developed by NSA and agreed to by DOJ/ODNI [Office of the Director of National Intelligence]."The term "identifiers" is NSA jargon for information relating to an individual, such as telephone number, email address, IP address and username as well as their name.The document – which is undated, though metadata suggests this version was last updated in June 2012 – does not say whether the oversight process it mentions has been established or whether any searches against US person names have taken place.
  • ...2 more annotations...
  • Wyden, an Oregon Democrat on the Senate intelligence committee, has obliquely warned for months that the NSA's retention of Americans' communications incidentally collected and its ability to search through it has been far more extensive than intelligence officials have stated publicly. Speaking this week, Wyden told the Guardian it amounts to a "backdoor search" through Americans' communications data."Section 702 was intended to give the government new authorities to collect the communications of individuals believed to be foreigners outside the US, but the intelligence community has been unable to tell Congress how many Americans have had their communications swept up in that collection," he said."Once Americans' communications are collected, a gap in the law that I call the 'back-door searches loophole' allows the government to potentially go through these communications and conduct warrantless searches for the phone calls or emails of law-abiding Americans."
  • Exclusive: Spy agency has secret backdoor permission to search databases for individual Americans' communications
3More

Third group wants in on Larry Klayman NSA case - POLITICO.com - 0 views

  • A third civil liberties organization is asking a federal appeals court for time to defend the only federal court ruling challenging the legality of the National Security Agency's bulk collection of information on U.S. telephone calls. The Center for National Security Studies, a D.C.-based group which advocates for individual liberties and government transparency, asked the U.S. Court of Appeals for the D.C. Circuit Friday to allow the group time to argue that U.S. District Court Judge Richard Leon's ruling that the counterterrorism program appeared to be illegal was correct, albeit on different grounds than Leon identified. Leon found the program likely unconstitutional as a violation of Fourth Amendment protections against unreasonable searches and seizures. However, CNSS and other advocates have argued that Leon never should have reached the constitutional issues because the NSA's bulk telephone metadata program was never authorized by Congress.
  • Government lawyers and numerous judges from the Foreign Intelligence Surveillance Court have concluded that the Section 215 of the Patriot Act creates a legal basis for the program, but that depends on the debatable notion that all U.S. telephone data are "relevant" to future terrorism investigations. Critics of that rationale say it would allow the government to collect virtually any type of data because it could become useful in the future. CNSS's motion filed Friday asks for 10 minutes of argument time on Nov. 4, when the D.C. Circuit takes up the government's appeal of Leon's ruling as well as several related appeals. The motion (posted here) says both the Justice Department and the conservative legal activist who brought the underlying lawsuits, Larry Klayman, are opposing the request for extra time. Last week, two other organizations?—the American Civil Liberties Union and the Electronic Frontier Foundation—asked together to join in the arguments on Klayman's case. The government and Klayman did not oppose that motion.
  • Some opponents of the NSA surveillance program are clearly nervous about leaving the arguments against the program solely to Klayman, a longtime conservative activist known as a rhetorical bombthrower.  In an online commentary last week, Klayman called for the U.S. military to use tactical nuclear weapons against the Islamic State militant group. However, he predicted that President Barack Obama will not do so because he "simply has no stomach for killing his creed en masse." The D.C. Circuit has not yet ruled on either of the motions to join in next month's arguments.
6More

USA Freedom Act Passes House, Codifying Bulk Collection For First Time, Critics Say - T... - 0 views

  • After only one hour of floor debate, and no allowed amendments, the House of Representatives today passed legislation that opponents believe may give brand new authorization to the U.S. government to conduct domestic dragnets. The USA Freedom Act was approved in a 338-88 vote, with approximately equal numbers of Democrats and Republicans voting against. The bill’s supporters say it will disallow bulk collection of domestic telephone metadata, in which the Foreign Intelligence Surveillance Court has regularly ordered phone companies to turn over such data. The Obama administration claims such collection is authorized by Section 215 of the USA Patriot Act, which is set to expire June 1. However, the U.S. Court of Appeals for the Second Circuit recently held that Section 215 does not provide such authorization. Today’s legislation would prevent the government from issuing such orders for bulk collection and instead rely on telephone companies to store all their metadata — some of which the government could then demand using a “specific selection term” related to foreign terrorism. Bill supporters maintain this would prevent indiscriminate collection.
  • However, the legislation may not end bulk surveillance and in fact could codify the ability of the government to conduct dragnet data collection. “We’re taking something that was not permitted under regular section 215 … and now we’re creating a whole apparatus to provide for it,” Rep. Justin Amash, R-Mich., said on Tuesday night during a House Rules Committee proceeding. “The language does limit the amount of bulk collection, it doesn’t end bulk collection,” Rep. Amash said, arguing that the problematic “specific selection term” allows for “very large data collection, potentially in the hundreds of thousands of people, maybe even millions.” In a statement posted to Facebook ahead of the vote, Rep. Amash said the legislation “falls woefully short of reining in the mass collection of Americans’ data, and it takes us a step in the wrong direction by specifically authorizing such collection in violation of the Fourth Amendment to the Constitution.”
  • “While I appreciate a number of the reforms in the bill and understand the need for secure counter-espionage and terrorism investigations, I believe our nation is better served by allowing Section 215 to expire completely and replacing it with a measure that finds a better balance between national security interests and protecting the civil liberties of Americans,” Congressman Ted Lieu, D-Calif., said in a statement explaining his vote against the bill.
  • ...2 more annotations...
  • Not addressed in the bill, however, are a slew of other spying authorities in use by the NSA that either directly or inadvertently target the communications of American citizens. Lawmakers offered several amendments in the days leading up to the vote that would have tackled surveillance activities laid out in Section 702 of the Foreign Intelligence Surveillance Act and Executive Order 12333 — two authorities intended for foreign surveillance that have been used to collect Americans’ internet data, including online address books and buddy lists. The House Rules Committee, however, prohibited consideration of any amendment to the USA Freedom Act, claiming that any changes to the legislation would have weakened its chances of passage.
  • The measure now goes to the Senate where its future is uncertain. Majority Leader Mitch McConnell has declined to schedule the bill for consideration, and is instead pushing for a clean reauthorization of expiring Patriot Act provisions that includes no surveillance reforms. Senators Ron Wyden, D-Ore., and Rand Paul, R-Ky., have threated to filibuster any bill that extends the Patriot Act without also reforming the NSA.
  •  
    Surprise, surprise. U.S. "progressive" groups are waging an all-out email lobbying effort to sunset the Patriot Act. https://www.sunsetthepatriotact.com/ Same with civil liberties groups. e.g., https://action.aclu.org/secure/Section215 And a coalition of libertarian organizations. http://docs.techfreedom.org/Coalition_Letter_McConnell_215Reauth_4.27.15.pdf
7More

DEA Global Surveillance Dragnet Exposed; Access to Data Likely Continues - The Intercept - 0 views

  • Secret mass surveillance conducted by the Drug Enforcement Administration is falling under renewed scrutiny after fresh revelations about the broad scope of the agency’s electronic spying. On Tuesday, USA Today reported that for more than two decades, dating back to 1992, the DEA and the Justice Department “amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking.” Citing anonymous current and former officials “involved with the operation,” USA Today reported that Americans’ calls were logged between the United States and targeted countries and regions including Canada, Mexico, and Central and South America.
  • The DEA’s data dragnet was apparently shut down by Attorney General Eric Holder in September 2013. But on Wednesday, following USA Today’s report, Human Rights Watch launched a lawsuit against the DEA over its bulk collection of phone records and is seeking a retrospective declaration that the surveillance was unlawful. The latest revelations shine more light on the broad scope of the DEA’s involvement in mass surveillance programs, which can be traced back to a secret program named “Project Crisscross” in the early 1990s, as The Intercept previously revealed. Documents from National Security Agency whistleblower Edward Snowden, published by The Intercept in August last year, showed that the DEA was involved in collecting and sharing billions of phone records alongside agencies such as the NSA, the CIA and the FBI.
  • The vast program reported on by USA Today shares some of the same hallmarks of Project Crisscross: it began in the early 1990s, was ostensibly aimed at gathering intelligence about drug trafficking, and targeted countries worldwide, with focus on Central and South America. It is also reminiscent of the so-called Hemisphere Project, a DEA operation revealed in September 2013 by The New York Times, which dated as far back as 1987, and used subpoenas to collect vast amounts of international call records every day. There is crossover, too, with a DEA database called DICE, revealed by Reuters in August 2013, which reportedly contains phone and Internet communication records gathered by the DEA through subpoenas and search warrants nationwide. The precise relationship between Crisscross, DICE, Hemisphere and the surveillance program revealed by USA Today is unclear. Whether or not they were part of a single overarching operation, the phone records and other data collected by each were likely accessible to DEA agents through the same computer interfaces and search and analysis tools.
  • ...3 more annotations...
  • A Justice Department spokesman told Reuters Wednesday that “all of the information has been deleted” and that the DEA was “no longer collecting bulk telephony metadata from U.S. service providers.” What the spokesman did not say is that the DEA has access to troves of phone records from multiple sources — and not all of them are obtained from U.S. service providers. As The Intercept’s reporting on Project Crisscross revealed, the DEA has had large-scale access to data covertly collected by the NSA, CIA and other agencies for years. According to NSA documents obtained by Snowden, the DEA can sift through billions of metadata records collected by other agencies about emails, phone calls, faxes, Internet chats and text messages using systems named ICREACH and CRISSCROSS/PROTON.
  • Notably, the DEA spying reported by USA Today encompassed phone records collected by the DEA using administrative subpoenas to obtain data from phone companies without the approval of a judge. The phone records collected by the agency as part of Project Hemisphere and the data stored on the DICE system were also collected through subpoenas and warrants. But ICREACH alone was designed to handle two to five billion new records every day — the majority of them not collected using any conventional search warrant or a subpoena. Instead, most of the data accessible to the DEA through ICREACH is vacuumed up by the NSA using Executive Order 12333, a controversial Reagan-era presidential directive that underpins several NSA bulk surveillance operations that monitor communications overseas. The 12333 surveillance takes place with no court oversight and has received minimal Congressional scrutiny because it is targeted at foreign, not domestic, communication networks.
  • This means that some of the DEA’s access to mass surveillance data — records collected in bulk through subpoenas or warrants — may have been shut down by Holder in 2013. But it is likely that the agency still has the ability to tap into other huge data repositories, and questions remain about how that access is being used.
  •  
    How many ways do I love thee? ... Just a few minutes. I have to consult my haystacks.  'Twas on August 20, 1982 when Ronald Reagan formally declered "War on Drugs," thereby sweeping U.S. Drug Enforcement Administration records under the umbrella of "national security" secrets. Concurrently, a document was produced by the White House that mentioned that the forerunners of today's "fusion centers" would be created to begin trawling government databases for information to wage that war, including medical records held by the then-Veterans Administration. I''ve been keeping an eye on those rascals ever since. Believe me, we have merely scratched the surface of a very few of the Feds' "haystacks." There are very many to go before they're all rooted out into the sunlight.  
« First ‹ Previous 81 - 100 of 180 Next › Last »
Showing 20 items per page