Page 25 of 59 FirstFirst ... 1521222324252627282935 ... LastLast
Results 241 to 250 of 582
Like Tree27Likes

Thread: Privacy Alert! Big Brother is watching and listening, UPDATED

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

  1. #241
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    Newly-Leaked NSA Slide Shows that NSA Is Tapping All Data from Main Undersea Phone and Internet Cables

    Posted on July 11, 2013 by WashingtonsBlog

    The Government Has Been Tapping Undersea Cables … And Started Before 9/11

    The Washington Post published a new slide leaked by Edward Snowden showing that the NSA taps into the main undersea data cables along which telephone and internet communications pass through the U.S.

    This confirms what high-level NSA whistleblowers William Binney, Russell Tice and others have said for years: The government is spying on all of our digital communications.

    Remember that massive surveillance of the American people started before 9/11 .

    For example – as regards undersea cables – Zdnet reported 3 months before 9/11:

    Much of the information the agency once gleaned from the airwaves now travels in the form of light beams through fiber-optic cables crisscrossing continents and ocean floors. That shift has forced the NSA to seek new ways to gather intelligence–includingtapping undersea cables, a technologically daunting, physically dangerous and potentially illegal task.
    In the mid-1990s, the NSA installed one such tap, say former intelligence officials familiar with the covert project. Using a special spy submarine, they say, agency personnel descended hundreds of feet into one of the oceans and sliced into a fiber-optic cable.

    ***
    Undersea taps would pose tricky legal issues for the agency, too. For example, U.S. law forbids the NSA to intentionally intercept and process the phone calls and e-mails of U.S. citizens without court approval. Such communications make up a sizable slice of undersea cable traffic.

    Some outside analysts and U.S. intelligence officials think the NSA should abandon such efforts in favor of more narrowly targeted intelligence-gathering efforts. One intelligence official estimates that tapping all the world’s undersea cables, assuming it could be done, would cost more than $2 billion a year. And no one knows whether the NSA will ever have enough computing power to analyze the resulting gusher of digital data.

    Even so, the agency has been pushing ahead. At General Dynamics’ Electric Boat shipyard in Groton, Conn., the Navy is deep into a five-year, $1 billion retrofit of the USS Jimmy Carter, a nuclear-powered vessel that intelligence experts say will be the premier U.S. spy sub when it hits the seas in 2004. Among its many planned features, says one former official familiar with the project: state-of-the-art technology for undersea fiber-optic taps.

    ***
    The NSA recognized from the start that fiber optics could be a problem. In early 1989, the agency assembled a team of researchers in a small warren of labs at its headquarters in Fort Meade, Md. Other researchers fanned out to corporate research centers to bone up on the new technology. Their mission, according to one former NSA researcher who worked on it, was to find a way to get inside fiber-optic cables and secretly siphon off the data moving through them.

    ***
    One retired NSA optical specialist insists that the NSA devised a way to splice a fiber without being detected. “Getting into fiber is delicate work, but by no means impossible,” the former specialist says. Neither he nor the NSA will discuss the matter further.

    ***
    Yet the NSA’s [chief] Lt. Gen. Hayden says … computing power will allow it to process greater masses of data, which he says he hopes will eventually “allow a single analyst to extract wisdom from vast volumes of raw information.”

    How could this massive spying program possibly have started before 9/11 ushered in the “war on terror”? Because mass surveillance of the American people isn’t really aimed so much at preventing terrorism … but rather increasing power and control.

    http://www.washingtonsblog.com/2013/...et-cables.html

    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  2. #242
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    Government’s “Secret Interpretation” of Patriot Act: “EVERYTHING” Is Relevant … So Spy on EVERYONE

    Posted on July 11, 2013 by WashingtonsBlog

    Government’s Interpretation of Spying Turns 200 Years of American Law On Its Head

    Senators Wyden and Udall – both on the Senate Intelligence Committee, with full access to information on the spying program – have said that for at least 2 years that the government was using a “secret interpretation” of the Patriot Act which would shock Americans, because it provides a breathtakingly wide program of spying. And see this.

    Wyden and Udall said that they couldn’t reveal to the public – or even other members of Congress who lack top security clearance – what the secret interpretation is … and that most Congress members weretotally ignorant about it.

    The author of the Patriot Act and chairman on the House Judiciary Subcommittee on Crime, Terrorism, Homeland Security, and Investigations – Congressman Jim Sensenbrenner – says that the government has gone far beyond what the Patriot Act intended, and that the Act “was originally drafted to preventdata mining” on the scale that’s occurred.

    A top NSA whistleblower told us that the secret interpretation is that the government spies on everyone.
    The Wall Street Journal has just disclosed the specifics of the “secret interpretation”:

    In classified orders starting in the mid-2000s, the court accepted that “relevant” could be broadened to permit an entire database of records on millions of people, in contrast to a more conservative interpretation widely applied in criminal cases, in which only some of those records would likely be allowed, according to people familiar with the ruling.

    “Relevant” has long been a broad standard, but the way the court is interpreting it, to mean, in effect, “everything,” is new, says Mark Eckenwiler, a senior counsel at Perkins Coie LLP who, until December, was the Justice Department’s primary authority on federal criminal surveillance law.
    ***
    Two senators on the Intelligence Committee, Ron Wyden (D., Ore.) and Mark Udall (D., Colo.), have argued repeatedly that there was a “secret interpretation” of the Patriot Act.The senators’ offices tell the Journal that this new interpretation of the word “relevant” is what they meant.


    Interpreting “relevant” as meaning “everything” throws more than 200 years of American law on its head … plus a couple hundred additional years of British common law on which early American law was based. The most basic principle of evidence law is that only information actually relevant to the case can be admitted.

    Moreover, top national security experts say that pretending that “everything” is “relevant” means that intelligence agencies will be swamped with useless information … which will make them less able to prevent terrorist attacks.

    And the courts are providing no checks and balances on the spying program.

    Update: The Washington Post has a good write-up on this issue.

    http://www.washingtonsblog.com/2013/...-everyone.html

    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  3. #243
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    Snowden Is a Traitor to the Political Elite … But a Hero to the American People

    Posted on July 10, 2013 by WashingtonsBlog

    The People Want Wrongdoing Exposed

    Bloomberg reports:

    A majority of U.S. registered voters consider Edward Snowden a whistle-blower, not a traitor
    , and a plurality says government anti-terrorism efforts have gone too far in restricting civil liberties, a poll released today shows.
    ***
    The view of Snowden as a whistle-blower rather than traitor predominated among almost every group of respondents broken down by party, gender, income, education and age.
    ***
    The verdict that Snowden is not a traitor goes against almost the unified view of the nation’s political establishment,” Brown said.
    ***
    “The fact that there is little difference now along party lines about the overall anti-terrorism effort and civil liberties and about Snowden is in itself unusual in a country sharply divided along political lines about almost everything,” Brown said.

    Indeed, Snowden has a higher approval rating than Congress.

    That sounds impressive … until you remember that Congress is less popular than cockroaches, lice, root canals, colonoscopies, traffic jams, used car salesmen, Genghis Khan, Communism, BP during the Gulf oil spill, Nixon during Watergate or King George during the American Revolution.

    Postscript: People are sick and tired of corruption. And most understand that mass surveillance on innocent people is for political purposes … not to keep us safe.

    http://www.washingtonsblog.com/2013/...an-people.html

    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  4. #244
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    Even FISA Court Judge Says It’s a Kangaroo Court

    Posted on July 9, 2013 by WashingtonsBlog

    A Real Court Needs to Hear Both Sides

    We’ve noted that there is no real oversight by the courts or Congress on the NSA’s spying programs.
    The New York Times reports that the court overseeing the government’s spying programs only hearsone side of the case:
    Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public. A Court of Review is empaneled to hear appeals, but that is known to have happened only a handful of times in the court’s history, and no case has ever been taken to the Supreme Court. In fact, it is not clear in all circumstances whether Internet and phone companies that are turning over the reams of data even have the right to appear before the FISA court.
    This is not what real courts do.
    As the Times reports:
    Geoffrey R. Stone, a professor of constitutional law at the University of Chicago, said he was troubled by the idea that the court is creating a significant body of law without hearing from anyone outside the government, forgoing the adversarial system that is a staple of the American justice system. “That whole notion is missing in this process,” he said.
    A retired Federal judge – now a professor at Harvard Law School – has slammed the FISA court:
    As a former [federal] judge, I can tell you that your faith in the FISA Court is dramatically misplaced.
    Two reasons: One … The Fourth Amendment frameworks have been substantially diluted in the ordinary police case. One can only imagine what the dilution is in a national security setting. Two, the people who make it on the FISA court, who are appointed to the FISA court, are not judges like me. Enough said.
    ***
    It’s an anointment process. It’s not a selection process. But you know, it’s not boat rockers. So you have a [federal] bench which is way more conservative than before. This is a subset of that. And it’s a subset of that who are operating under privacy, confidentiality, and national security. To suggest that there is meaningful review it seems to me is an illusion.
    ***
    I’m very troubled by that [secret court, especially given that national security protections exist within the civilian court system]. When you get cases in court, in regular civilian court that have national security issues that have classified information, we developed a process whereby the parties would develop security clearances and it could be presented to the court without it being disclosed to anyone else. It is not entirely clear to me why a civilian court with those protections that is otherwise transparent couldn’t do the job. That’s the way we did it before. Then we moved to this national security court. The notion that we have to have a conversation about major incursions on civil liberties and that we have step back and say we don’t really know, we haven’t seen the standards, we haven’t seen the opinions is extraordinary troubling in a democracy.
    [Indeed, it is well-documented that our traditional federal courts can meet the challenges posed by highly-sensitive and classified national security issues.]
    TechNewsWorld reports:
    “I would not go so far as to say that the FISA court is acting unconstitutionally, but the absence of any review by the Supreme Court, combined with the secrecy and non-adversary process, pushes it into a constitutional gray area,” Evan Lee, a professor at UC Hastings College of the Law [an expert on federal courts], told TechNewsWorld.
    ***
    The court’s issuing of rulings in secret “does not in and of itself violate the Constitution,” remarked Sharon Bradford Franklin, senior counsel for The Constitution Project. “However, the practice of having secret interpretations of the law — especially if these interpretations are as extensive as reported — undermines the principles of checks and balances upon which our constitutional government is founded.”
    Although the court’s opinions can be appealed to the Foreign Intelligence Surveillance Court of Review — and technically, to the Supreme Court — “in general, it is unclear who would ever have the knowledge of the opinions and the legal standing to appeal,” Franklin said. “Thus, there are not adequate checks and balances.”
    And a 3-year FISA judge himself said today that the court doesn’t work:
    A former federal judge who served on a secret court overseeing the National Security Agency’s secret surveillance programs said Tuesday that the panel is independent but its oversight is flawed because of the lack of legal adversaries inside the system able to confront the government’s actions.
    “Anyone who has been a judge will tell you a judge needs to hear both sides of a case,” said James Robertson, a former federal district judge based in Washington who served on the secret Foreign Intelligence Surveillance Court for 3 years between 2002 and 2005.
    ***
    Robertson questioned whether the secret FISA court should provide legal approval for the surveillance programs, saying the court “has turned into something like an administrative agency.”
    ***
    Robertson … warned that Congress’ 2008 reform of the FISA system expanded the government’s authority by forcing the court to approve entire surveillance systems, not just surveillance warrants, as it previously handled. Robertson said the system needed the presence of a legal adversary to act as a check on the government’s programs.
    “This process needs an adversary,” Robertson said…
    We asked Hofstra constitutional law professor Eric Freedman for his opinion on the FISA court, and he told us:
    The only news here is that this monstrosity is finally getting the public attention it deserves.

    http://www.washingtonsblog.com/2013/...roo-court.html
    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  5. #245
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    Even FISA Court Judge Says It’s a Kangaroo Court

    Posted on July 9, 2013 by WashingtonsBlog

    A Real Court Needs to Hear Both Sides

    We’ve noted that there is no real oversight by the courts or Congress on the NSA’s spying programs.
    The New York Times reports that the court overseeing the government’s spying programs only hearsone side of the case:
    Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public. A Court of Review is empaneled to hear appeals, but that is known to have happened only a handful of times in the court’s history, and no case has ever been taken to the Supreme Court. In fact, it is not clear in all circumstances whether Internet and phone companies that are turning over the reams of data even have the right to appear before the FISA court.
    This is not what real courts do.
    As the Times reports:
    Geoffrey R. Stone, a professor of constitutional law at the University of Chicago, said he was troubled by the idea that the court is creating a significant body of law without hearing from anyone outside the government, forgoing the adversarial system that is a staple of the American justice system. “That whole notion is missing in this process,” he said.
    A retired Federal judge – now a professor at Harvard Law School – has slammed the FISA court:
    As a former [federal] judge, I can tell you that your faith in the FISA Court is dramatically misplaced.
    Two reasons: One … The Fourth Amendment frameworks have been substantially diluted in the ordinary police case. One can only imagine what the dilution is in a national security setting. Two, the people who make it on the FISA court, who are appointed to the FISA court, are not judges like me. Enough said.
    ***
    It’s an anointment process. It’s not a selection process. But you know, it’s not boat rockers. So you have a [federal] bench which is way more conservative than before. This is a subset of that. And it’s a subset of that who are operating under privacy, confidentiality, and national security. To suggest that there is meaningful review it seems to me is an illusion.
    ***
    I’m very troubled by that [secret court, especially given that national security protections exist within the civilian court system]. When you get cases in court, in regular civilian court that have national security issues that have classified information, we developed a process whereby the parties would develop security clearances and it could be presented to the court without it being disclosed to anyone else. It is not entirely clear to me why a civilian court with those protections that is otherwise transparent couldn’t do the job. That’s the way we did it before. Then we moved to this national security court. The notion that we have to have a conversation about major incursions on civil liberties and that we have step back and say we don’t really know, we haven’t seen the standards, we haven’t seen the opinions is extraordinary troubling in a democracy.
    [Indeed, it is well-documented that our traditional federal courts can meet the challenges posed by highly-sensitive and classified national security issues.]
    TechNewsWorld reports:
    “I would not go so far as to say that the FISA court is acting unconstitutionally, but the absence of any review by the Supreme Court, combined with the secrecy and non-adversary process, pushes it into a constitutional gray area,” Evan Lee, a professor at UC Hastings College of the Law [an expert on federal courts], told TechNewsWorld.
    ***
    The court’s issuing of rulings in secret “does not in and of itself violate the Constitution,” remarked Sharon Bradford Franklin, senior counsel for The Constitution Project. “However, the practice of having secret interpretations of the law — especially if these interpretations are as extensive as reported — undermines the principles of checks and balances upon which our constitutional government is founded.”
    Although the court’s opinions can be appealed to the Foreign Intelligence Surveillance Court of Review — and technically, to the Supreme Court — “in general, it is unclear who would ever have the knowledge of the opinions and the legal standing to appeal,” Franklin said. “Thus, there are not adequate checks and balances.”
    And a 3-year FISA judge himself said today that the court doesn’t work:
    A former federal judge who served on a secret court overseeing the National Security Agency’s secret surveillance programs said Tuesday that the panel is independent but its oversight is flawed because of the lack of legal adversaries inside the system able to confront the government’s actions.
    “Anyone who has been a judge will tell you a judge needs to hear both sides of a case,” said James Robertson, a former federal district judge based in Washington who served on the secret Foreign Intelligence Surveillance Court for 3 years between 2002 and 2005.
    ***
    Robertson questioned whether the secret FISA court should provide legal approval for the surveillance programs, saying the court “has turned into something like an administrative agency.”
    ***
    Robertson … warned that Congress’ 2008 reform of the FISA system expanded the government’s authority by forcing the court to approve entire surveillance systems, not just surveillance warrants, as it previously handled. Robertson said the system needed the presence of a legal adversary to act as a check on the government’s programs.
    “This process needs an adversary,” Robertson said…
    We asked Hofstra constitutional law professor Eric Freedman for his opinion on the FISA court, and he told us:
    The only news here is that this monstrosity is finally getting the public attention it deserves.

    http://www.washingtonsblog.com/2013/...roo-court.html
    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  6. #246
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    The Fact that Mass Surveillance Doesn’t Keep Us Safe Goes Mainstream

    Posted on July 9, 2013 by WashingtonsBlog

    Top Terrorism Experts Say that Mass Spying Doesn’t Work to Prevent Terrorism

    The fact that mass spying on Americans isn’t necessary to keep us safe is finally going mainstream.
    The top counter-terrorism czar under Presidents Clinton and Bush – Richard Clarke – says:
    The argument that this sweeping search must be kept secret from the terrorists is laughable. Terrorists already assume this sort of thing is being done. Only law-abiding American citizens were blissfully ignorant of what their government was doing.
    ***
    If the government wanted a particular set of records, it could tell the Foreign Intelligence Surveillance Court why — and then be granted permission to access those records directly from specially maintained company servers. The telephone companies would not have to know what data were being accessed. There are no technical disadvantages to doing it that way, although it might be more expensive.
    Would we, as a nation, be willing to pay a little more for a program designed this way, to avoid a situation in which the government keeps on its own computers a record of every time anyone picks up a telephone? That is a question that should have been openly asked and answered in Congress.
    William Binney – the head of NSA’s digital communications program – says that he set up the NSA’s system so that all of the information would automatically be encrypted, so that the government had to obtain a search warrant based upon probably cause before a particular suspect’s communications could be decrypted. But the NSA now collects all data in an unencrypted form, so that no probable cause is needed to view any citizen’s information. He says that it is actually cheaper and easier to store the data in an encrypted format: so the government’s current system is being done for political – not practical – purposes.
    Binney’s statements have been confirmed by other high-level NSA whistleblowers, including Thomas Drake.
    They’ve also been confirmed by Congressman Holt, the former Chairman of the House Select Intelligence Oversight Panel:
    Former NSA executive Thomas Drake … and a team of NSA colleagues [Binney led Drake's team] had actually developed a relatively cheap, very effective and privacy-compliant way of getting the kind of terrorism-related data our government needed to fight groups like al-Qaida.
    Unfortunately, his discovery angered NSA’s senior management….
    Binney also says:




    NSA whistleblower J. Kirk Wiebe has long said that such intrusions on Americans’ privacy were never necessary to protect national security. NSA whistleblower Thomas Drake agrees. So does NSA whistleblower Russell Tice.
    Israeli-American terrorism expert Barry Rubins points out:
    What is most important to understand about the revelations of massive message interception by the U.S. government is this:
    In counterterrorist terms, it is a farce. Basically the NSA, as one of my readers suggested, is the digital equivalent of the TSA strip-searching an 80 year-old Minnesota grandmothers rather than profiling and focusing on the likely terrorists.
    ***
    And isn’t it absurd that the United States can’t … stop a would-be terrorist in the U.S. army who gives a power point presentation on why he is about to shoot people (Major Nadal Hassan), can’t follow up on Russian intelligence warnings about Chechen terrorist contacts (the Boston bombing), or a dozen similar incidents must now collect every telephone call in the country? A system in which a photo shop clerk has to stop an attack on Fort Dix by overcoming his fear of appearing “racist” to report a cell of terrorists or brave passengers must jump a would-be “underpants bomber” from Nigeria because his own father’s warning that he was a terrorist was insufficient?
    And how about a country where terrorists and terrorist supporters visit the White House, hang out with the FBI, advise the U.S. government on counter-terrorist policy (even while, like CAIR) advising Muslims not to cooperate with law enforcement….
    ***
    Or how about the time when the U.S. Consulate in Jerusalem had a (previously jailed) Hamas agent working in their motor pool with direct access to the vehicles and itineraries of all visiting US dignitaries and senior officials.
    ***
    Suppose the U.S. ambassador to Libya warns that the American compound there may be attacked. No response. Then he tells the deputy chief of mission that he is under attack. No response. Then the U.S. military is not allowed to respond. Then the president goes to sleep without making a decision about doing anything because communications break down between the secretaries of defense and state and the president, who goes to sleep because he has a very important fund-raiser the next day. But don’t worry because three billion telephone calls by Americans are daily being intercepted and supposedly analyzed.
    In other words, you have a massive counterterrorist project costing $1 trillion but when it comes down to it the thing repeatedly fails. In that case, to quote the former secretary of state, “”What difference does it make?”
    If one looks at the great intelligence failures of the past, these two points quickly become obvious. Take for example the Japanese surprise attack on Pearl Harbor on December 7, 1941. U.S. naval intelligence had broken Japanese codes. They had the information needed to conclude the attack would take place. [Background.] Yet a focus on the key to the problem was not achieved. The important messages were not read and interpreted; the strategic mindset of the leadership was not in place.
    ***
    And remember that the number of terrorists caught by the TSA hovers around the zero level. The shoe, underpants, and Times Square bombers weren’t even caught by security at all and many other such cases can be listed. In addition to this, the U.S.-Mexico border is practically open.
    **
    The war on al-Qaida has not really been won, since its continued campaigning is undeniable and it has even grown in Syria, partly thanks to U.S. policy.
    ***
    So the problem of growing government spying is three-fold.
    –First, it is against the American system and reduces liberty.
    –Second, it is a misapplication of resources, in other words money is being spent and liberty sacrificed for no real gain.
    –Third, since government decisionmaking and policy about international terrorism is very bad the threat is increasing.
    Senators Wyden and Udall – both on the Senate Intelligence Committee, with access to all of the top-secret information about the government’s spying programs – write:
    “We are quite familiar with the bulk email records collection program that operated under the USA Patriot Act and has now been confirmed by senior intelligence officials. We were very concerned about this program’s impact on Americans’ civil liberties and privacy rights, and we spent a significant portion of 2011 pressing intelligence officials to provide evidence of its effectiveness. They were unable to do so ….
    ***
    In our judgment it is also important to note that intelligence agencies made statements to both Congress and the Court that significantly exaggerated this program’s effectiveness. This experience demonstrates to us that intelligence agencies’ assessments of the usefulness of particular collection programs – even significant ones – are not always accurate. This experience has also led us to be skeptical of claims about the value of the bulk phone records collection program in particular.
    ***
    Assertions from intelligence agencies about the value and effectiveness of particular programs should not simply be accepted at face value by policymakers or oversight bodies any more than statements about the usefulness of other government programs should be taken at face value when they are made by other government officials. It is up to Congress, the courts and the public to ask the tough questions and press even experienced intelligence officials to back their assertions up with actual evidence, rather than simply deferring to these officials’ conclusions without challenging them.
    NBC News reported 2 days ago:
    “I’ve never liked the idea of security vs. privacy, because no one feels more secure in a surveillance state,” said Bruce Schneier, security expert and author of Beyond Fear: Thinking Sensibly About Security in an Insecure World. “There’s plenty of examples of security that doesn’t infringe on privacy. They are all around. Door locks. Fences … Firewalls. People are forgetting that quite a lot of security doesn’t affect privacy. The real dichotomy is liberty vs. control.”
    Dan Solove, a privacy law expert at George Washington University Law School, said the privacy vs. security framing has interfered with what could be a healthy national debate about using high-tech tools to fight terror.
    “You have pollsters and pundits and (National Intelligence Director James) Clapper saying, ‘Do you want us to catch the terrorists or do you want privacy?’ But that’s a false choice. It’s like asking, ‘Do you want the police to exist or not?’” he said. “We already have the most invasive investigative techniques permissible with the right oversight. With probable cause you can search my home. … People want limitations and transparency, so they can make a choice about how much surveillance (they) are willing to tolerate.”
    By creating an either/or tension between privacy and security, government officials have invented a heavy weapon to wield against those who raise civil liberties concerns, he said. It’s easy to cast the choice in stark terms: Who wouldn’t trade a little personal data to save even one American life?
    An honest, open examination of surveillance programs might show the choice is not so simple, says Ashkan Soltani, an independent security researcher.
    “The government feels like they need all this information in order to do its job, that there can’t be security without them having access to everything. Well, that’s a lazy or shortsighted way of seeing things,” he says. “The idea I reject is that you need to violate everyone’s privacy rather than be better at your job of identifying specific (targets).’”
    An article on Bloomberg notes that real terrorists don’t even use the normal phone service or publicly-visible portions of the web that we innocent Americans use:
    The debate over the U.S. government’s monitoring of digital communications suggests that Americans are willing to allow it as long as it is genuinely targeted at terrorists. What they fail to realize is that the surveillance systems are best suited for gathering information on law-abiding citizens.
    ***
    The infrastructure set up by the National Security Agency, however, may only be good for gathering information on the stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on access to the servers of America’s largest Internet companies, which support such popular services as Skype, Gmail and iCloud. These are not the services that truly dangerous elements typically use.
    In a January 2012 report titled “Jihadism on the Web: A Breeding Ground for Jihad in the Modern Age,” the Dutch General Intelligence and Security Service drew a convincing picture of an Islamist Web underground centered around “core forums.” These websites are part of the Deep Web, or Undernet, the multitude of online resources not indexed by commonly used search engines.
    The Netherlands’ security service, which couldn’t find recent data on the size of the Undernet, cited a 2003 study from the University of California at Berkeley as the “latest available scientific assessment.” The study found that just 0.2 percent of the Internet could be searched. The rest remained inscrutable and has probably grown since. In 2010, Google Inc. said it had indexed just 0.004 percent of the information on the Internet.
    Websites aimed at attracting traffic do their best to get noticed, paying to tailor their content to the real or perceived requirements of search engines such as Google. Terrorists have no such ambitions. They prefer to lurk in the dark recesses of the Undernet.
    “People who radicalise under the influence of jihadist websites often go through a number of stages,” the Dutch report said. “Their virtual activities increasingly shift to the invisible Web, their security awareness increases and their activities become more conspiratorial.”
    ***
    Communication on the core forums is often encrypted. In 2012, a French court found nuclear physicist Adlene Hicheur guilty of, among other things, conspiring to commit an act of terror for distributing and using software called Asrar al-Mujahideen, or Mujahideen Secrets. The program employed various cutting-edge encryption methods, including variable stealth ciphers and RSA 2,048-bit keys.
    ***
    Even complete access to these servers brings U.S. authorities no closer to the core forums. These must be infiltrated by more traditional intelligence means, such as using agents posing as jihadists or by informants within terrorist organizations.
    Similarly, monitoring phone calls is hardly the way to catch terrorists. They’re generally not dumb enough to use Verizon.
    ***
    At best, the recent revelations concerning Prism and telephone surveillance might deter potential recruits to terrorist causes from using the most visible parts of the Internet. Beyond that, the government’s efforts are much more dangerous to civil liberties than they are to al-Qaeda and other organizations like it.
    (And see this.)
    Mass Spying Actually HURTS – Rather than Helps – Anti-Terror Efforts

    Not yet convinced?
    Former NSA executive William Binney – who was the head of the NSA’s entire digital spying program –told Daily Caller that the spying dragnet being carried out by the government is less than useless:
    Daily Caller: So it seems logical to ask: Why do we need all of this new data collection when they’re not following up obvious leads, such as an intelligence agency calling and saying you need to be aware of this particular terrorist?
    Binney: It’s sensible to ask, but that’s exactly what they’re doing. They’re making themselves dysfunctional by collecting all of this data. They’ve got so much collection capability but they can’t do everything.
    ***
    [All this data gathered is] putting an extra burden on all of their analysts. It’s not something that’s going to help them; it’s something that’s burdensome. There are ways to do the analysis properly, but they don’t really want the solution because if they got it, they wouldn’t be able to keep demanding the money to solve it. I call it their business statement, “Keep the problems going so the money keeps flowing.” It’s all about contracts and money.
    ***
    The issue is, can you figure out what’s important in it? And figure out the intentions and capabilities of the people you’re monitoring? And they are in no way prepared to do that, because that takes analysis. That’s what the big data initiative was all about out of the White House last year. It was to try to get algorithms and figure out what’s important and tell the people what’s important so that they can find things. The probability of them finding what’s really there is low.
    Indeed, even before 9/11 – when Binney was building the precursor to the NSA’s current digital collection system – there weren’t enough analysts to look through the more modest amount of data being collected at the time:
    The danger of the mass collection of data by the NSA is that it “buries” analysts in data, said Binney, who developed a surveillance program called ThinThread intended to allow the NSA to look at data but not collect it. The NSA dumped that program in favor of more extensive data collection.
    “The biggest problem was getting data to a manageable level,” he said. “We didn’t have enough people, we couldn’t hire enough people east of the Mississippi to manage all the data we were getting.”
    The NSA chief and NSA technicians confirmed Binney’s statement 3 months before 9/11:
    In an interview, Air Force Lt. Gen. Michael Hayden, the NSA’s director … suggested that access isn’t the problem. Rather, he said, the sheer volume and variety of today’s communications means “there’s simply too much out there, and it’s too hard to understand.”
    ***
    “What we got was a blast of digital bits, like a fire hydrant spraying you in the face,” says one former NSA technician with knowledge of the project. “It was the classic needle-in-the-haystack pursuit, except here the haystack starts out huge and grows by the second,” the former technician says. NSA’s computers simply weren’t equipped to sort through so much data flying at them so fast.
    Terrorism expert Barry Rubins writes:
    There is a fallacy behind the current intelligence strategy of the United States, the collection of massive amounts of phone calls, emails, and even credit card expenditures, up to 3 billion phone calls a day alone, not to mention the government spying on the mass media. It is this:
    The more quantity of intelligence, the better it is for preventing terrorism.
    In the real, practical world this is—though it might seem counterintuitive—untrue. You don’t need–to put it in an exaggerated way–an atomic bomb against a flea. The intelligence budget is not unlimited, is it? Where should hiring priorities be put?
    ***
    It is not the quantity of material that counts but the need to locate and correctly understand the most vital material. This requires your security forces to understand the ideological, psychological, and organizational nature of the threat.
    ***
    If the U.S. government can’t even figure out what the Muslim Brotherhood is like or the dangers of supporting Islamists to take over Syria, or the fact that the Turkish regime is an American enemy, or can’t even teach military officers who the enemy is, what’s it going to do with scores of billions of telephone call traffic to overcome terrorism? It isn’t even using the intelligence material it already has!
    If, however, the material is almost limitless, that actually weakens a focus on the most needed intelligence regarding the most likely terrorist threats. Imagine, for example, going through billions of telephone calls even with high-speed computers rather than, say, following up a tip from Russian intelligence on a young Chechen man in Boston who is in contact with terrorists or, for instance, the communications between a Yemeni al-Qaida leader and a U.S. army major who is assigned as a psychiatrist to Fort Hood.
    That is why the old system of getting warrants, focusing on individual email addresses, or sites, or telephones makes sense, at least if it is only used properly. Then those people who are communicating with known terrorists can be traced further. There are no technological magic spells. If analysts are incompetent … and leaders unwilling to take proper action, who cares how much data was collected?
    ***
    Decision-makers and intelligence analysts only have so many hours in the day. There can only be so many meetings; only so many priorities. And the policymaking pyramid narrows rapidly toward the top. There is a point of diminishing returns for the size of an intelligence bureaucracy. Lower-priority tasks proliferate; too much paper is generated and meetings are held; the system clogs when it has too much data.
    PC World reports:
    “In knowing a lot about a lot of different people [the data collection] is great for that,” said Mike German, a former Federal Bureau of Investigation special agent whose policy counsel for national security at the American Civil Liberties Union. “In actually finding the very few bad actors that are out there, not so good.”
    The mass collection of data from innocent people “won’t tell you how guilty people act,” German added. The problem with catching terrorism suspects has never been the inability to collect information, but to analyze the “oceans” of information collected, he said.
    Mass data collection is “like trying to look for needles by building bigger haystacks,” added Wendy Grossman, a freelance technology writer who helped organize the conference.
    New Republic notes:
    This kind of dragnet-style data capture simply doesn’t keep us safe.
    First, intelligence and law enforcement agencies are increasingly drowning in data; the more that comes in, the harder it is to stay afloat. Most recently, the failure of the intelligence community to intercept the 2009 “underwear bomber” was blamed in large part on a surfeit of information: according to an official White House review, a significant amount of critical information was “embedded in a large volume of other data.” Similarly, the independent investigation of the alleged shootings by U.S. Army Major Nidal Hasan at Fort Hood concluded that the “crushing volume” of information was one of the factors that hampered the FBI’s analysis before the attack.
    Multiple security officials have echoed this assessment. As one veteran CIA agenttold The Washington Post in 2010, “The problem is that the system is clogged with information. Most of it isn’t of interest, but people are afraid not to put it in.” A former Department of Homeland Security official told a Senate subcommittee that there was “a lot of data clogging the system with no value.” Even former Defense Secretary Robert Gates acknowledged that “we’ve built tremendous capability, but do we have more than we need?” And the NSA itself was brought to a grinding halt before 9/11 by the “torrent of data” pouring into the system, leaving the agency “brain-dead” for half a week and “[unable] to process information,” as its then-director Gen. Michael Hayden publiclyacknowledged.
    National security hawks say there’s a simple answer to this glut: data mining. The NSA has apparently described its computer systems as having the ability to “manipulate and analyze huge volumes of data at mind-boggling speeds.” Could those systems pore through this information trove to come up with unassailable patterns of terrorist activity? The Department of Defense and security experts have concluded that the answer is no: There is simply no known way to effectively anticipate terrorist threats.
    ***
    The FBI’s and NSA’s scheme is an affront to democratic values. Let’s also not pretend it’s an effective and efficient way of keeping us safe.
    Fortune writes that the NSA’s “big data” strategy is ineffective:
    The evidence for big data is scant at best. To date, large fields of data have generated meaningful insights at times, but not on the scale many have promised. This disappointment has been documented in the Wall Street Journal, Information Week, andSmartData Collective.
    ***
    According to my firm’s research, local farmers in India with tiny fields frequently outperform — in productivity and sustainability — a predictive global model developed by one of the world’s leading agrochemical companies. Why? Because they develop unique planting, fertilizing, or harvesting practices linked to the uniqueness of their soil, their weather pattern, or the rare utilization of some compost. There is more to learn from a local Indian outlier than from building a giant multivariate yield prediction model of all farms in the world. The same is true for terrorism. Don’t look for a needle in a giant haystack. Find one needle in a small clump of hay and see whether similar clumps of hay also contain needles.
    You need local knowledge to glean insights from any data. I once ran a data-mining project with Wal-Mart (WMT) where we tried to figure out sales patterns in New England. One of the questions was, “Why are our gun sales lower in Massachusetts than in other states, even accounting for the liberal bias of the state?” The answer: There were city ordinances prohibiting the sale of guns in many towns. I still remember the disappointed look of my client when he realized the answer had come from a few phone calls to store managers rather than from a multivariate regression model.
    So, please, Mr. President, stop building your giant database in the sky and quit hoping that algorithm experts will generate a terrorist prevention strategy from that data. Instead, rely on your people in the field to detect suspicious local patterns of behavior, communication, or spending, then aggregate data for the folks involved and let your data hounds loose on these focused samples. You and I will both sleep better. And I won’t have to worry about who is lurking in the shadows of my business or bedroom.
    Security expert Bruce Schneier explained in 2005:
    Many believe data mining is the crystal ball that will enable us to uncover future terrorist plots. But even in the most wildly optimistic projections, data mining isn’t tenable for that purpose. We’re not trading privacy for security; we’re giving up privacy and getting no security in return.
    ***
    The promise of data mining is compelling, and convinces many. But it’s wrong. We’re not going to find terrorist plots through systems like this, and we’re going to waste valuable resources chasing down false alarms.
    ***
    Data-mining systems won’t uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless.
    All data-mining systems fail in two different ways: false positives and false negatives.
    ***
    Data mining for terrorist plots will be sloppy, and it’ll be hard to find anything useful.
    ***
    When it comes to terrorism, however, trillions of connections exist between people and events — things that the data-mining system will have to “look at” — and very few plots. This rarity makes even accurate identification systems useless.
    Let’s look at some numbers. We’ll be optimistic — we’ll assume the system has a one in 100 false-positive rate (99 percent accurate), and a one in 1,000 false-negative rate (99.9 percent accurate). Assume 1 trillion possible indicators to sift through: that’s about 10 events — e-mails, phone calls, purchases, web destinations, whatever — per person in the United States per day. Also assume that 10 of them are actually terrorists plotting.
    This unrealistically accurate system will generate 1 billion false alarms for every real terrorist plot it uncovers. Every day of every year, the police will have to investigate 27 million potential plots in order to find the one real terrorist plot per month. Raise that false-positive accuracy to an absurd 99.9999 percent and you’re still chasing 2,750 false alarms per day — but that will inevitably raise your false negatives, and you’re going to miss some of those 10 real plots.
    This isn’t anything new. In statistics, it’s called the “base rate fallacy,” and it applies in other domains as well. For example, even highly accurate medical tests are useless as diagnostic tools if the incidence of the disease is rare in the general population. Terrorist attacks are also rare, any “test” is going to result in an endless stream of false alarms.
    This is exactly the sort of thing we saw with the NSA’s eavesdropping program: the New York Times reported that the computers spat out thousands of tips per month. Every one of them turned out to be a false alarm.
    And the cost was enormous — not just for the FBI agents running around chasing dead-end leads instead of doing things that might actually make us safer, but also the cost in civil liberties.
    ***
    Finding terrorism plots is not a problem that lends itself to data mining. It’s a needle-in-a-haystack problem, and throwing more hay on the pile doesn’t make that problem any easier. We’d be far better off putting people in charge of investigating potential plots and letting them direct the computers, instead of putting the computers in charge and letting them decide who should be investigated.
    Schneier noted in 2008:
    According to a massive report from the National Research Council, data mining for terrorists doesn’t work.
    The former Chairman of the House Select Intelligence Oversight Panel, Rush Holt, says:
    Over the last decade, multiple individuals in the executive branch — and a few in Congress, including me — have warned repeatedly about how the radical over-reach of these programs was undermining the very foundations of our republic, even as the mass collection activities were not making us any safer. And that is the most important point:If investigators are following the Fourth Amendment probable cause guidelines, they will do a better job. Undisciplined fishing expeditions have not made us safer.
    NBC News reports:
    Casting such wide nets is also ineffective, [security researcher Ashkan Soltani] argues. Collecting mountains and mountains of data simply means that when the time comes to find that proverbial needle in a haystack, you’ve simply created a bigger haystack.”Law enforcement is being sold bill of goods that the more data you get, the better your security is. We find that is not true,” Soltani said.
    Collecting data is a hard habit to break, as many U.S. corporations have discovered after years of expensive data breaches. The NSA’s data hoard may be useful in future investigations, helping agents in the future in unpredictable ways, some argue. Schneier doesn’t buy it.
    “The NSA has this fetish for data, and will get it any way they can, and get as much as they can,” he said. “But old ladies who hoard newspapers say the same thing, that someday, this might be useful.”
    Even worse, an overreliance on Big Data surveillance will shift focus from other security techniques that are both less invasive and potentially more effective, like old-fashioned “spycraft,” Soltani says.
    Nassim Taleb writes:
    Big data may mean more information, but it also means more false information.
    ***
    Because of excess data as compared to real signals, someone looking at history from the vantage point of a library will necessarily find many more spurious relationships than one who sees matters in the making; he will be duped by more epiphenomena. Even experiments can be marred with bias, especially when researchers hide failed attempts or formulate a hypothesis after the results — thus fitting the hypothesis to the experiment (though the bias is smaller there).
    This is the tragedy of big data: The more variables, the more correlations that can show significance. Falsity also grows faster than information; it is nonlinear (convex) with respect to data (this convexity in fact resembles that of a financial option payoff). Noise is antifragile. Source: N.N. Taleb
    If big data leads to more false correlations, then mass surveillance may lead to more false accusations of terrorism.
    (Just what we need …)


    http://www.washingtonsblog.com/2013/...ainstream.html

    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  7. #247
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    Everything You Wanted to Know about Spying … But Were Afraid to Ask

    Posted on July 8, 2013 by WashingtonsBlog

    Spying: The Big Picture

    If you’ve been too busy to keep up with the spying scandal, here’s an overview:







































    http://www.washingtonsblog.com/2013/...id-to-ask.html

    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  8. #248
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    Government Spying Has Always Focused On Crushing Dissent … Not On Keeping Us Safe

    Posted on July 7, 2013 by WashingtonsBlog

    Governments Spy On Their Citizens for Control and Power

    Top terrorism experts say that mass spying on Americans doesn’t keep us safe.
    High-level American government officials have warned for 40 years that mass surveillance would lead to tyranny. They’ve warned that the government is using information gained through mass surveillance in order to go after anyone they take a dislike to. And a lieutenant colonel for the Stasi East German’s –based upon his experience – agrees.
    You don’t have to obsess on the NSA’s high-tech spying to figure out what the government is doing. Just look at old-fashioned, low-tech government spying to see what’s s really going on.
    Instead of focusing on catching actual terrorists, police spy on Americans who criticize the government, or the big banks or the other power players.
    Todd Gitlin – chair of the PhD program in communications at Columbia University, and a professor of journalism and sociology - notes:
    Under the Freedom of Information Act, the Partnership for Civil Justice Fund (PCJF) has unearthed documents showing that, in 2011 and 2012, the Department of Homeland Security (DHS) and other federal agencies were busy surveilling and worrying about a good number of Occupy groups — during the very time that they were missing actual warnings about actual terrorist actions.
    From its beginnings, the Occupy movement was of considerable interest to the DHS, the FBI, and other law enforcement and intelligence agencies, while true terrorists were slipping past the nets they cast in the wrong places. In the fall of 2011, the DHS specifically asked its regional affiliates to report on “Peaceful Activist Demonstrations, in addition to reporting on domestic terrorist acts and ‘significant criminal activity.’”
    Aware that Occupy was overwhelmingly peaceful, the federally funded Boston Regional Intelligence Center (BRIC), one of 77 coordination centers known generically as “fusion centers,” was busy monitoring Occupy Boston daily. As the investigative journalist Michael Isikoff recently reported, they were not only tracking Occupy-related Facebook pages and websites but “writing reports on the movement’s potential impact on ‘commercial and financial sector assets.’”
    It was in this period that the FBI received the second of two Russian police warnings about the extremist Islamist activities of Tamerlan Tsarnaev, the future Boston Marathon bomber. That city’s police commissioner later testified that the federal authorities did not pass any information at all about the Tsarnaev brothers on to him, though there’s no point in letting the Boston police off the hook either. The ACLU has uncovered documents showing that, during the same period, they were paying close attention to the internal workings of…Code Pink and Veterans for Peace.
    ***
    In Alaska, Alabama, Florida, Mississippi, Tennessee, and Wisconsin, intelligence was not only pooled among public law enforcement agencies, but shared with private corporations — and vice versa.
    Nationally, in 2011, the FBI and DHS were, in the words of Mara Verheyden-Hilliard, executive director of the Partnership for Civil Justice Fund, “treating protests against the corporate and banking structure of America as potential criminal and terrorist activity.” Last December using FOIA, PCJF obtained 112 pages of documents (heavily redacted) revealing a good deal of evidence for what might otherwise seem like an outlandish charge: that federal authorities were, in Verheyden-Hilliard’s words, “functioning as a de facto intelligence arm of Wall Street and Corporate America.” Consider these examples from PCJF’s summary of federal agencies working directly not only with local authorities but on behalf of the private sector:
    • “As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.”
    • “The FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to… [22] campus police officials… A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.”
    • An entity called the Domestic Security Alliance Council (DSAC), “a strategic partnership between the FBI, the Department of Homeland Security, and the private sector,” sent around information regarding Occupy protests at West Coast ports [on Nov. 2, 2011] to “raise awareness concerning this type of criminal activity.” The DSAC report contained “a ‘handling notice’ that the information is ‘meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel…’ Naval Criminal Investigative Services (NCIS) reported to DSAC on the relationship between OWS and organized labor.”
    • DSAC gave tips to its corporate clients on “civil unrest,” which it defined as running the gamut from “small, organized rallies to large-scale demonstrations and rioting.” ***
    • The FBI in Anchorage, Jacksonville, Tampa, Richmond, Memphis, Milwaukee, and Birmingham also gathered information and briefed local officials on wholly peaceful Occupy activities.
    • In Jackson, Mississippi, FBI agents “attended a meeting with the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for ‘National Bad Bank Sit-In-Day’ on December 7, 2011.” Also in Jackson, “the Joint Terrorism Task Force issued a ‘Counterterrorism Preparedness’ alert” that, despite heavy redactions, notes the need to ‘document…the Occupy Wall Street Movement.’”
    ***
    In 2010, the American Civil Liberties Union of Tennessee learned … that the Tennessee Fusion Center was “highlighting on its website map of ‘Terrorism Events and Other Suspicious Activity’ a recent ACLU-TN letter to school superintendents. The letter encourages schools to be supportive of all religious beliefs during the holiday season.”
    ***
    Consider an “intelligence report” from the North Central Texas fusion center, which in a 2009 “Prevention Awareness Bulletin” described, in the ACLU’s words, “a purportedconspiracy between Muslim civil rights organizations, lobbying groups, the anti-war movement, a former U.S. Congresswoman, the U.S. Treasury Department, and hip hop bands to spread tolerance in the United States, which would ‘provide an environment for terrorist organizations to flourish.’”
    ***
    And those Virginia and Texas fusion centers were hardly alone in expanding the definition of “terrorist” to fit just about anyone who might oppose government policies. According to a 2010 report in the Los Angeles Times, the Justice Department Inspector General found that “FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups after the Sept. 11 terrorist attacks in 2001, and put the names of some of their members on terrorist watch lists based on evidence that turned out to be ‘factually weak.’” The Inspector General called “troubling” what the Los Angeles Times described as “singling out some of the domestic groups for investigations that lasted up to five years, and were extended ‘without adequate basis.’
    Subsequently, the FBI continued to maintain investigative files on groups like Greenpeace, the Catholic Worker, and the Thomas Merton Center in Pittsburgh, cases where (in the politely put words of the Inspector General’s report) “there was little indication of any possible federal crimes… In some cases, the FBI classified some investigations relating to nonviolent civil disobedience under its ‘acts of terrorism’ classification.”
    ***
    In Pittsburgh, on the day after Thanksgiving 2002 (“a slow work day” in the Justice Department Inspector General’s estimation), a rookie FBI agent was outfitted with a camera, sent to an antiwar rally, and told to look for terrorism suspects. The “possibility that any useful information would result from this make-work assignment was remote,” the report added drily.
    “The agent was unable to identify any terrorism subjects at the event, but he photographed a woman in order to have something to show his supervisor. He told us he had spoken to a woman leafletter at the rally who appeared to be of Middle Eastern descent, and that she was probably the person he photographed.”
    The sequel was not quite so droll. The Inspector General found that FBI officials, including their chief lawyer in Pittsburgh, manufactured postdated “routing slips” and the rest of a phony paper trail to justify this surveillance retroactively.
    Moreover, at least one fusion center has involved military intelligence in civilian law enforcement. In 2009, a military operative from Fort Lewis, Washington, worked undercover collecting information on peace groups in the Northwest. In fact, he helped run the Port Militarization Resistance group’s Listserv. Once uncovered, he told activists there were others doing similar work in the Army. How much the military spies on American citizens is unknown and, at the moment at least, unknowable.
    Do we hear an echo from the abyss of the counterintelligence programs of the 1960s and 1970s, when FBI memos — I have some in my own heavily redacted files obtained through an FOIA request — were routinely copied to military intelligence units? Then, too, military intelligence operatives spied on activists who violated no laws, were not suspected of violating laws, and had they violated laws, would not have been under military jurisdiction in any case. During those years, more than 1,500 Army intelligence agents in plain clothes were spying, undercover, on domestic political groups (according to Military Surveillance of Civilian Politics, 1967-70, an unpublished dissertation by former Army intelligence captain Christopher H. Pyle). They posed as students, sometimes growing long hair and beards for the purpose, or as reporters and camera crews. They recorded speeches and conversations on concealed tape recorders. The Army lied about their purposes, claiming they were interested solely in “civil disturbance planning.”
    Indeed, the New York Review of Books notes that spying in America has always been focused on crushing dissent:
    In the United States, political spying by the federal government began in the early part of the twentieth century, with the creation of the Bureau of Investigation in the Department of Justice on July 1, 1908. In more than one sense, the new agency was a descendant of the surveillance practices developed in France a century earlier, since it was initiated by US Attorney General Charles Joseph Bonaparte, a great nephew of Napoleon Bonaparte, who created it during a Congressional recess. Its establishment was denounced by Congressman Walter Smith of Iowa, who argued that “No general system of spying upon and espionage of the people, such as has prevailed in Russia, in France under the Empire, and at one time in Ireland, should be allowed to grow up.”
    Nonetheless, the new Bureau became deeply engaged in political surveillance during World War I when federal authorities sought to gather information on those opposing American entry into the war and those opposing the draft. As a result of this surveillance, many hundreds of people were prosecuted under the 1917 Espionage Act and the 1918 Sedition Act for the peaceful expression of opinion about the war and the draft.
    But it was during the Vietnam War that political surveillance in the United States reached its peak. Under Presidents Lyndon Johnson and, to an even greater extent, Richard Nixon, there was a systematic effort by various agencies, including the United States Army, to gather information on those involved in anti-war protests. Millions of Americans took part in such protests and the federal government—as well as many state and local agencies—gathered enormous amounts of information on them. Here are just three of the numerous examples of political surveillance in that era:

    • In the 1960s in Rochester, New York, the local police department launched Operation SAFE (Scout Awareness for Emergency). It involved twenty thousand boy scouts living in the vicinity of Rochester. They got identification cards marked with their thumb prints. On the cards were the telephone numbers of the local police and the FBI. The scouts participating in the program were given a list of suspicious activities that they were to report.


    • In 1969, the FBI learned that one of the sponsors of an anti-war demonstration in Washington, DC, was a New York City-based organization, the Fifth Avenue Peace Parade Committee, that chartered buses to take protesters to the event. The FBI visited the bank where the organization maintained its account to get photocopies of the checks written to reserve places on the buses and, thereby, to identify participants in the demonstration. One of the other federal agencies given the information by the FBI was the Internal Revenue Service.

    ***
    The National Security Agency was involved in the domestic political surveillance of that era as well. Decades before the Internet, under the direction of President Nixon, the NSA made arrangements with the major communications firms of the time such as RCA Global and Western Union to obtain copies of telegrams. When the matter came before the courts, the Nixon Administration argued that the president had inherent authority to protect the country against subversion. In a unanimous decision in 1972, however, the US Supreme Court rejected the claim that the president had the authority to disregard the requirement of the Fourth Amendment for a judicial warrant.
    ***
    Much of the political surveillance of the 1960s and the 1970s and of the period going back to World War I consisted in efforts to identify organizations that were critical of government policies, or that were proponents of various causes the government didn’t like, and to gather information on their adherents. It was not always clear how this information was used. As best it is possible to establish, the main use was to block some of those who were identified with certain causes from obtaining public employment or some kinds of private employment. Those who were victimized in this way rarely discovered the reason they had been excluded.
    Efforts to protect civil liberties during that era eventually led to the destruction of many of these records, sometimes after those whose activities were monitored were given an opportunity to examine them. In many cases, this prevented surveillance records from being used to harm those who were spied on. Yet great vigilance by organizations such as the ACLU and the Center for Constitutional Rights, which brought a large number of court cases challenging political surveillance, was required to safeguard rights. The collection of data concerning the activities of US citizens did not take place for benign purposes.
    ***Between 1956 and 1971, the FBI operated a program known as COINTELPRO, for Counter Intelligence Program. Its purpose was to interfere with the activities of the organizations and individuals who were its targets or, in the words of long-time FBI Director J. Edgar Hoover, to “expose, disrupt, misdirect, discredit or otherwise neutralize” them. The first target was the Communist Party of the United States, but subsequent targets ranged from the Reverend Martin Luther King, Jr. and his Southern Christian Leadership Conference to organizations espousing women’s rights to right wing organizations such as the National States Rights Party.
    A well-known example of COINTELPRO was the FBI’s planting in 1964 of false documents about William Albertson, a long-time Communist Party official, that persuaded the Communist Party that Albertson was an FBI informant. Amid major publicity, Albertson was expelled from the party, lost all his friends, and was fired from his job. Until his death in an automobile accident in 1972, he tried to prove that he was not a snitch, but the case was not resolved until 1989, when the FBI agreed to payAlbertson’s widow $170,000 to settle her lawsuit against the government.
    COINTELPRO was eventually halted by J. Edgar Hoover after activists broke into a small FBI office in Media, Pennsylvania, in 1971, and released stolen documents about the program to the press. The lesson of COINTELPRO is that any government agency that is able to gather information through political surveillance will be tempted to use that information. After a time, the passive accumulation of data may seem insufficient and it may be used aggressively. This may take place long after the information is initially collected and may involve officials who had nothing to do with the original decision to engage in surveillance.
    ***
    Since President Obama is asking us to trade some of our privacy with respect to our phone calls and our use of the Internet for greater protection against terrorism, at the very least we need to know exactly how our privacy is being violated. We also need to debate fully whether such measures uphold our Constitutional rights, such as the First Amendment’s guarantees of freedom of expression and the Fourth Amendment’s prohibition of unreasonable searches and seizures. Yet if the program is kept secret, and if even the court opinions stating the rationale for authorizing surveillance are kept secret, we cannot decide whether a trade-off is warranted; if it is warranted, exactly what should be traded; if constitutional rights are implicated, whether these are appropriate matters for a trade; or how we can impose limits on any trade so as to minimize the violation of our rights. A trade made in ignorance is not much of a trade.
    Postscript: This is not some “post-9/11 reality”. Spying on Americans started before 9/11.

    http://www.washingtonsblog.com/2013/...g-us-safe.html
    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  9. #249
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    Since President Obama Is Asking Us To Trade Some Of Our Privacy With Respect To Our Phone Calls And Our Use Of The Internet For Greater Protection Against Terrorism, At The Very Least We Need To Know Exactly How Our Privacy Is Being Violated

    Posted on July 7, 2013 by WashingtonsBlog

    How Much Is Government Spying On Americans?

    The New York Review of Books notes:
    Since President Obama is asking us to trade some of our privacy with respect to our phone calls and our use of the Internet for greater protection against terrorism, at the very least we need to know exactly how our privacy is being violated.
    ***
    A trade made in ignorance is not much of a trade.
    Below, we will explain “exactly how our privacy is being violated”.
    The government is spying on both our digital and old-fashioned communications.
    For example, the government is photographing the outside information on every piece of snail mail.
    The government is spying on you through your phone … and may even remotely turn on your camera and microphone when your phone is off. The government might be spying on you through your computer’s webcam or microphone. The government might also be spying on you through your “smart meter”.
    License plate readers mounted on police cars allow police to gather millions of records on drivers … including photos of them in their cars.
    A security expert and former NSA software developer says that hackers can access private surveillance cameras. Given that the NSA apparently already monitors public cameras using facial recognition software, and that the FBI is building a system which will track “public and private surveillance cameras around the country”, we can assume that government agencies might already be hacking into private surveillance cameras.
    The FBI wants a backdoor to all software. Leading European computer publication Heise said in 1999 that the NSA had already built a backdoor into all Windows software. Microsoft has long been working with the NSA so that encryption doesn’t block the government’s ability to spy on Skype, Outlook, Hotmail and other Micrsoft users. And leading security experts say that the NSA might have put a backdoor in all encryption standards years ago.
    The CIA wants to spy on you through your dishwasher and other “smart” appliances. As Slate notes:
    Watch out: the CIA may soon be spying on you—through your beloved, intelligent household appliances, according to Wired.

    In early March, at a meeting for the CIA’s venture capital firm In-Q-Tel, CIA Director David Petraeus reportedly noted that “smart appliances” connected to the Internet could someday be used by the CIA to track individuals. If your grocery-list-generating refrigerator knows when you’re home, the CIA could, too, by using geo-location data from your wired appliances, according to SmartPlanet.

    “The current ‘Internet of PCs’ will move, of course, toward an ‘Internet of Things’—of devices of all types—50 to 100 billion of which will be connected to the Internet by 2020,” Petraeus said in his speech. He continued:
    Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters—all connected to the next-generation Internet using abundant, low cost, and high-power computing—the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.
    ***
    ITworld’s Kevin Fogarty thinks that J. Edgar Hoover, were he still with us, would “die of jealousy” upon hearing about the tools soon to be at Petraeus’ disposal.

    And they’re probably bluffing and exaggerating, but the Department of Homeland Security claims they will soon be able to know your adrenaline level, what you ate for breakfast and what you’re thinking …from 164 feet away. (In addition, people will probably soon be swallowing tracking devices for medical purposes)
    The government is allegedly scanning prisoners’ brains without their consent at Guantanamo. In the near future, brain scanners may be able to literally read our thoughts (and see this).
    The government is currently testing systems for use in public spaces which can screen for “pre-crime”. As Nature reports:
    Like a lie detector, FAST measures a variety of physiological indicators, ranging from heart rate to the steadiness of a person’s gaze, to judge a subject’s state of mind. But there are major differences from the polygraph. FAST relies on non-contact sensors, so it can measure indicators as someone walks through a corridor at an airport, and it does not depend on active questioning of the subject.
    CBS News points out:
    FAST is designed to track and monitor, among other inputs, body movements, voice pitch changes, prosody changes (alterations in the rhythm and intonation of speech), eye movements, body heat changes, and breathing patterns. Occupation and age are also considered. A government source told CNET that blink rate and pupil variation are measured too.
    A field test of FAST has been conducted in at least one undisclosed location in the northeast. “It is not an airport, but it is a large venue that is a suitable substitute for an operational setting,” DHS spokesman John Verrico told Nature.com in May.
    Although DHS has publicly suggested that FAST could be used at airport checkpoints–the Transportation Security Administration is part of the department, after all–the government appears to have grander ambitions. One internal DHS document (PDF) also obtained by EPIC through the Freedom of Information Act says a mobile version of FAST “could be used at security checkpoints such as border crossings or at large public events such as sporting events or conventions.”
    The risk of false positives is very real. As Computer World notes:
    Tom Ormerod, a psychologist in the Investigative Expertise Unit at Lancaster University, UK, told Nature, “Even having an iris scan or fingerprint read at immigration is enough to raise the heart rate of most legitimate travelers.” Other critics have been concerned about “false positives.” For example, some travelers might have some of the physical responses that are supposedly signs of mal-intent if they were about to be groped by TSA agents in airport security.
    Various “pre-crime” sensing devices have already been deployed in public spaces in the U.S.
    The government has also worked on artificial intelligence for “pre-crime” detection on the Web. And given that programs which can figure out your emotions are being developed using your webcam, every change in facial expression could be tracked.
    According to the NSA’s former director of global digital data – William Binney – the NSA’s new data storage center in Utah will have so much storage capacity that:
    “They would have plenty of space … to store at least something on the order of 100 years worth of the worldwide communications, phones and emails and stuff like that,” Binney asserts, “and then have plenty of space left over to do any kind of parallel processing to try to break codes.”
    ***
    [But the NSA isn't stopping there.] Despite its capacity, the Utah center does not satisfy NSA’s data demands. Last month, the agency broke ground on its next data farm at its headquarters at Ft. Meade, Md. But that facility will be only two-thirds the size of the mega-complex in Utah.
    The NSA is building next-generation quantum computers to process all of the data.
    NBC News reports:
    NBC News has learned that under the post-9/11 Patriot Act, the government has been collecting records on every phone call made in the U.S.
    This includes metadata … which can tell the government a lot about you. And it also includes content.
    The documents leaked by Edward Snowden to Glenn Greenwald show:
    But what we’re really talking about here is a localized system that prevents any form of electronic communication from taking place without its being stored and monitored by the National Security Agency.
    It doesn’t mean that they’re listening to every call, it means they’re storing every call and have the capability to listen to them at any time, and it does mean that they’re collecting millions upon millions upon millions of our phone and email records.
    In addition, a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type.” A top NSA executive confirmed to Washington’s Blog that the NSA is intercepting and storing virtually all digital communications on the Internet.
    McClatchy notes:
    FBI Director Robert Mueller told a Senate committee on March 30, 2011, that “technological improvements” now enable the bureau “to pull together past emails and future ones as they come in so that it does not require an individualized search.”
    The administration is building a facility in a valley south of Salt Lake City that will have the capacity to store massive amounts of records – a facility that former agency whistleblowers say has no logical purpose if it’s not going to be a vault holding years of phone and Internet data.
    ***
    Thomas Drake, a former NSA senior executive who challenged the data collection for several years, said the agency’s intent seems obvious.
    “One hundred million phone records?” he asked in an interview. “Why would they want that each and every day? Of course they’re storing it.”
    ***
    Lending credence to his worries, The Guardian’s latest report quoted a document in which Alexander purportedly remarked during a 2008 visit to an NSA intercept station in Britain: “Why can’t we collect all the signals all the time?”
    ***
    One former U.S. security consultant, who spoke on condition of anonymity to protect his connections to government agencies, told McClatchy he has seen agency-installed switches across the country that draw data from the cables.
    “Do I know they copied it? Yes,” said the consultant. “Do I know if they kept it? No.”
    NSA whistleblower Russel Tice – a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping – says that the content and metadata of alldigital communications are being tapped by the NSA.
    After all, the NSA not only accesses data directly from the largest internet companies, it also sucks up huge amounts of data straight from undersea cables providing telephone and Internet service to the United States.
    The Wall Street Journal notes:
    The rules now allow the little-known National Counterterrorism Center to … copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans “reasonably believed to constitute terrorism information” may be permanently retained.
    The changes also allow databases of U.S. civilian information to be given to foreign governments for analysis of their own. In effect, U.S. and foreign governments would be using the information to look for clues that people might commit future crimes.
    “It’s breathtaking” in its scope, said a former senior administration official familiar with the White House debate.
    Reason notes:
    Gazillions. That’s the number of times the federal government has spied on Americans since 9/11 through the use of drones, legal search warrants, illegal search warrants, federal agent-written search warrants and just plain government spying. This is according to Sen. Rand Paul, R-Ky., who, when he asked the government to tell him what it was doing to violate our privacy, was given a classified briefing. The senator — one of just a few in the U.S. Senate who believes that the Constitution means what it says — was required by federal law to agree not to reveal what spies and bureaucrats told him during the briefing.
    Even if the US government weren’t recording all of that data, England’s GCHQ spy agency is … and issharing it with the NSA.
    Private contractors can also view all of your data … and the government isn’t keeping track of which contractors see your data and which don’t. And because background checks regarding some contractors are falsified, it is hard to know the types of people that might have your information.
    And top NSA and FBI experts say that the government can retroactively search all of the collected information on someone since 9/11 if they suspect someone of wrongdoing … or want to frame him.
    The American government is in fact collecting and storing virtually every phone call, purchases, email, text message, internet searches, social media communications, health information, employment history, travel and student records, and virtually all other information of every American.
    The Wall Street Journal reported that the NSA spies on Americans’ credit card transactions. Many other government agencies track your credit card purchases as well.
    As Washington Monthly noted in 2004, Congress chopped off the head of the Total Information Awareness program … but the program returned as a many-headed hydra:
    A program can survive even when the media, the public, and most of Congress wants it killed. It turns out that, while the language in the bill shutting down TIA was clear, a new line had been inserted during conference—no one knew by whom—allowing “certain processing, analysis, and collaboration tools” to continue.
    ….Thanks to the Central Intelligence Agency and the National Security Agency, which had lobbied for the provision, TIA didn’t die—it metastasized. As the AP reported in February [of 2004], the new language simply outsourced many TIA programs to other intelligence offices and buried them in the so-called “black budget.” What’s more, today, several agencies are pursuing data mining projects independent of TIA, including the Department of Homeland Security, the Justice Department, the CIA, the Transportation Security Administration, and NASA….Even with TIA ostensibly shut down, many of the private contractors who worked on the program can continue their research with few controls.
    Senators Wyden and Udall – both on the Senate Intelligence Committee, with access to all of the top-secret information about the government’s spying programs – write:
    Section 215 of the Patriot Act can be used to collect any type of records whatsoever … including information on credit card purchases, medical records, library records, firearm sales records, financial information and a range of other sensitive subjects.
    In fact, all U.S. intelligence agencies – including the CIA and NSA – are going to spy on Americans’ finances. The IRS will be spying on Americans’ shopping records, travel, social interactions, health records and files from other government investigators.
    The government is flying drones over the American homeland to spy on us. Indeed, the head of the FBI told Congress that drones are used for domestic surveillance … and that there are no rules in placegoverning spying on Americans with drones.
    Senator Rand Paul correctly notes:
    The domestic use of drones to spy on Americans clearly violates the Fourth Amendment and limits our rights to personal privacy.
    Emptywheel notes in a post entitled “The OTHER Assault on the Fourth Amendment in the NDAA? Drones at Your Airport?”:
    ***
    As the map above makes clear–taken from this 2010 report–DOD [the Department of Defense] plans to have drones all over the country by 2015.
    Many police departments are also using drones to spy on us. As the Hill reported:
    At least 13 state and local police agencies around the country have used drones in the field or in training, according to the Association for Unmanned Vehicle Systems International, an industry trade group. The Federal Aviation Administration has predicted that by the end of the decade, 30,000 commercial and government drones could be flying over U.S. skies.
    ***
    “Drones should only be used if subject to a powerful framework that regulates their use in order to avoid abuse and invasions of privacy,” Chris Calabrese, a legislative counsel for the American Civil Liberties Union, said during a congressional forum in Texas last month.
    He argued police should only fly drones over private property if they have a warrant, information collected with drones should be promptly destroyed when it’s no longer needed and domestic drones should not carry any weapons.
    He argued that drones pose a more serious threat to privacy than helicopters because they are cheaper to use and can hover in the sky for longer periods of time.
    A congressional report earlier this year predicted that drones could soon be equipped with technologies to identify faces or track people based on their height, age, gender and skin color.
    The military is paying for the development of drones with facial recognition software which “remember” people’s faces … and read “malintent”.
    Moreover, Wired reports:
    Transit authorities in cities across the country are quietly installing microphone-enabled surveillance systems on public buses that would give them the ability to record and store private conversations….
    The systems are being installed in San Francisco, Baltimore, and other cities with funding from the Department of Homeland Security in some cases ….
    The IP audio-video systems can be accessed remotely via a built-in web server (.pdf), and can be combined with GPS data to track the movement of buses and passengers throughout the city.
    ***
    The systems use cables or WiFi to pair audio conversations with camera images in order to produce synchronous recordings. Audio and video can be monitored in real-time, but are also stored onboard in blackbox-like devices, generally for 30 days, for later retrieval. Four to six cameras with mics are generally installed throughout a bus, including one near the driver and one on the exterior of the bus.
    ***
    Privacy and security expert Ashkan Soltani told the Daily that the audio could easily be coupled with facial recognition systems or audio recognition technology to identify passengers caught on the recordings.
    RT notes:
    Street lights that can spy installed in some American cities
    America welcomes a new brand of smart street lightning systems: energy-efficient, long-lasting, complete with LED screens to show ads. They can also spy on citizens in a way George Orwell would not have imagined in his worst nightmare.
    With a price tag of $3,000+ apiece, according to an ABC report, the street lights are now being rolled out in Detroit, Chicago and Pittsburgh, and may soon mushroom all across the country.
    Part of the Intellistreets systems made by the company Illuminating Concepts, they havea number of “homeland security applications” attached.
    Each has a microprocessor “essentially similar to an iPhone,” capable ofwireless communication. Each can capture images and count people for the police through a digital camera, record conversations of passers-by and even give voice commands thanks to a built-in speaker.
    Ron Harwood, president and founder of Illuminating Concepts, says he eyed the creation of such a system after the 9/11 terrorist attacks and the Hurricane Katrina disaster. He is“working with Homeland Security” to deliver his dream of making people “more informed and safer.”
    Cell towers track where your phone is at any moment, and the major cell carriers, including Verizon and AT&T, responded to at least 1.3 million law enforcement requests for cell phone locations and other data in 2011. (And – given that your smartphone routinely sends your location information back to Apple or Google – it would be child’s play for the government to track your location that way.) Your iPhone, orother brand of smartphone is spying on virtually everything you do (ProPublica notes: “That’s No Phone. That’s My Tracker“).
    The NSA has also inserted its code into Android’s operating system … bugging three-quarters of the world’s smartphones.
    “Black boxes” are currently installed in between 90% and 96% of all new cars. And starting in 2014, all new cars will include black boxes that can track your location.
    The TSA has moved way past airports, trains and sports stadiums, and is deploying mobile scanners to spy on people all over the place. This means that traveling within the United States is no longer a private affair.
    You might also have seen the news this week that the Department of Homeland Security is going tocontinue to allow searches of laptops and phones based upon “hunches”.
    What’s that about?
    The ACLU published a map in 2006 showing that nearly two-thirds of the American public – 197.4 million people – live within a “constitution-free zone” within 100 miles of land and coastal borders:

    The ACLU explained:

    • Normally under the Fourth Amendment of the U.S. Constitution, the American people are not generally subject to random and arbitrary stops and searches.


    • The border, however, has always been an exception. There, the longstanding view is that the normal rules do not apply. For example the authorities do not need a warrant or probable cause to conduct a “routine search.”


    • But what is “the border”? According to the government, it is a 100-mile wide strip that wraps around the “external boundary” of the United States.


    • As a result of this claimed authority, individuals who are far away from the border, American citizens traveling from one place in America to another, are being stopped and harassed in ways that our Constitution does not permit.


    • Border Patrol has been setting up checkpoints inland — on highways in states such as California, Texas and Arizona, and at ferry terminals in Washington State. Typically, the agents ask drivers and passengers about their citizenship. Unfortunately, our courts so far have permitted these kinds of checkpoints – legally speaking, they are “administrative” stops that are permitted only for the specific purpose of protecting the nation’s borders. They cannot become general drug-search or other law enforcement efforts.


    • However, these stops by Border Patrol agents are not remaining confined to that border security purpose. On the roads of California and elsewhere in the nation – places far removed from the actual border – agents are stopping, interrogating, and searching Americans on an everyday basis with absolutely no suspicion of wrongdoing.


    • The bottom line is that the extraordinary authorities that the government possesses at the border are spilling into regular American streets.

    Computer World reports:
    Border agents don’t need probable cause and they don’t need a stinking warrant since they don’t need to prove any reasonable suspicion first. Nor, sadly, do two out of three people have First Amendment protection; it is as if DHS has voided those Constitutional amendments and protections they provide to nearly 200 million Americans.
    ***
    Don’t be silly by thinking this means only if you are physically trying to cross the international border. As we saw when discussing the DEA using license plate readers and data-mining to track Americans movements, the U.S. “border” stretches out 100 miles beyond the true border. Godfather Politics added:
    But wait, it gets even better! If you live anywhere in Connecticut, Delaware, Florida, Hawaii, Maine, Massachusetts, Michigan, New Hampshire, New Jersey or Rhode Island, DHS says the search zones encompass the entire state.
    Immigrations and Customs Enforcement (ICE) and Customs and Border Protection (CBP) have a “longstanding constitutional and statutory authority permitting suspicionless and warrantless searches of merchandise at the border and its functional equivalent.” This applies to electronic devices, according to the recent CLCR “Border Searches of Electronic Devices” executive summary [PDF]:
    Fourth Amendment
    The overall authority to conduct border searches without suspicion or warrant is clear and longstanding, and courts have not treated searches of electronic devices any differently than searches of other objects. We conclude that CBP’s and ICE’s current border search policies comply with the Fourth Amendment. We also conclude that imposing a requirement that officers have reasonable suspicion in order to conduct a border search of an electronic device would be operationally harmful without concomitant civil rights/civil liberties benefits. However, we do think that recording more information about why searches are performed would help managers and leadership supervise the use of border search authority, and this is what we recommended; CBP has agreed and has implemented this change beginning in FY2012.***
    The ACLU said, Wait one darn minute! Hello, what happened to the Constitution? Where is the rest of CLCR report on the “policy of combing through and sometimes confiscating travelers’ laptops, cell phones, and other electronic devices—even when there is no suspicion of wrongdoing?” DHS maintains it is not violating our constitutional rights, so the ACLU said:
    If it’s true that our rights are safe and that DHS is doing all the things it needs to do to safeguard them, then why won’t it show us the results of its assessment? And why would it be legitimate to keep a report about the impact of a policy on the public’s rights hidden from the very public being affected?
    ***
    As Christian Post wrote, “Your constitutional rights have been repealed in ten states. No, this isn’t a joke. It is not exaggeration or hyperbole. If you are in ten states in the United States, your some of your rights guaranteed by the Bill of Rights have been made null and void.”
    The ACLU filed a Freedom of Information Act request for the entire DHS report about suspicionless and warrantless “border” searches of electronic devices. ACLU attorney Catherine Crump said “We hope to establish that the Department of Homeland Security can’t simply assert that its practices are legitimate without showing us the evidence, and to make it clear that the government’s own analyses of how our fundamental rights apply to new technologies should be openly accessible to the public for review and debate.”
    Meanwhile, the EFF has tips to protect yourself and your devices against border searches. If you think you know all about it, then you might try testing your knowledge with a defending privacy at the U.S. border quiz.
    Wired pointed out in 2008 that the courts have routinely upheld such constitution-free zones:
    Federal agents at the border do not need any reason to search through travelers’ laptops, cell phones or digital cameras for evidence of crimes, a federal appeals court ruled Monday, extending the government’s power to look through belongings like suitcases at the border to electronics.
    ***
    The 9th U.S. Circuit Court of Appeals sided with the government, finding that the so-called border exception to the Fourth Amendment’s prohibition on unreasonable searches applied not just to suitcases and papers, but also to electronics.
    ***
    Travelers should be aware that anything on their mobile devices can be searched by government agents, who may also seize the devices and keep them for weeks or months. When in doubt, think about whether online storage or encryption might be tools you should use to prevent the feds from rummaging through your journal, your company’s confidential business plans or naked pictures of you and your-of-age partner in adult fun.
    It has gotten so bad that even the mainstream media is sounding the alarm.


    http://www.washingtonsblog.com/2013/...d-to-know.html

    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  10. #250
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    Another Problem with Mass Spying: Centralized Data Creates An Easy Mark for Hackers

    Posted on July 7, 2013 by WashingtonsBlog

    By Gathering Data On Americans In One Place, The Government Is Creating An Attractive Target For Hackers

    As if we needed another reason to oppose mass spying on the American public, Zdnet reports that the NSA database could be hacked by Chinese or -other lurkers:

    What’s missing in this discussion [of NSA spying] is this: how secure is the NSA’s spying system?If a foreign entity wanted to spy on US companies or individuals, would it try to tackle the problem directly by targeting the specific company or individual in its electronic spying attempts? It might, but that’s a lot of work for an uncertain payoff.

    A much more efficient approach would be to hack into a surveillance system that already has access to the information. Far better to hack into the NSA spying system at Google, or at Facebook, or at Microsoft (if such an NSA system exists, of course).

    ***
    Everyone knows that there’s no such thing as a completely secure system. The greater danger in the NSA’s spying activities is not from the NSA itself, but from the many nefarious foreign national, and international criminal enterprises, that find a way to exploit the existing spy systems so thoroughly crafted, and so thoroughly extensive, that have been built by the NSA.

    The danger from allowing the NSA to have deep access into the data systems of US companies is that that very system creates an enormous vulnerability that would not have existed. Hack into part of the NSA spy network and you have access to a mass of private data that would be near impossible to collect in any other way.

    It’s ironic that the NSA’s activities to improve the security of the US have created the nation’s largest security risk of them all.

    Remember, the Chinese have already hacked the most advanced American weapon systems, Congress, America’s largest banks, and other sensitive targets.

    And the more centralized any system is, the more vulnerable it is.

    Information is safest when it is diversified in many different places. By gathering data on Americans in one place, the government is creating an easy mark for hackers.

    http://www.washingtonsblog.com/2013/...ized-data.html

    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •