Results 1 to 4 of 4

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

  1. #1
    Guest
    Join Date
    Aug 2009
    Posts
    9,266

    The Rest Of The World Is Absolutely Disgusted With Our Big Brother Spying Methods

    The Rest Of The World Is Absolutely Disgusted With Our Big Brother Spying Methods

    Posted: 11 Jun 2013 07:02 PM PDT
    The rest of the world has found out that the U.S. government has been listening to their phone calls and watching what they do on the Internet and they do not like it one bit. Outrage has been pouring in from all over the planet, and one member of the European Parliament is even comparing the NSA to the Stasi. But instead of stepping back and reevaluating our Big Brother spying methods now that they have been revealed, Barack Obama and other leading members of Congress are defiantly declaring that there is nothing wrong with these methods and that no changes will be made. The U.S. government is going to continue to invade the privacy of the citizens of the rest of the world as much as it possibly can, and our leaders don't seem to really care what the international response is. And make no mistake - the goal of the U.S. intelligence community is to literally know everything about everyone. The chief technology officer of the CIA, Gus Hunt, made the following shocking admission back in March: "We fundamentally try to collect everything and hang onto it forever." He followed that statement up with this gem: "It is really very nearly within our grasp to be able to compute on all human-generated information." In other words, they want it all, and they nearly have the capacity to gather it all already. So where does this end? Will the U.S. intelligence community ever be happy until they have every piece of data on every single person on the entire planet? Do we really want a government that collects "everything" and hangs on to it "forever"?

    Thanks to Edward Snowden, the rest of the globe is starting to understand the extent to which the U.S. government has been spying on them. Needless to say, a lot of people are extremely upset about this.
    In Germany (a country that knows a thing or two about Big Brother tactics), some prominent politicians are publicly denouncing the surveillance that the U.S. government has been doing on their citizens. In fact, one German politician has accused the U.S. of employing "American-style Stasi methods"...
    In a guest editorial for Spiegel Online on Tuesday, Justice Minister Sabine Leutheusser-Schnarrenberger said reports that the United States could access and track virtually all forms of Internet communication were "deeply disconcerting" and potentially dangerous.
    "The more a society monitors, controls and observes its citizens, the less free it is," she said.
    "The suspicion of excessive surveillance of communication is so alarming that it cannot be ignored. For that reason, openness and clarification by the U.S. administration itself is paramount at this point. All facts must be put on the table."
    Markus Ferber, a member of Merkel's Bavarian sister party who sits in the European Parliament, went further, accusing Washington of using "American-style Stasi methods".
    In Italy, the government official in charge of data protection, Antonello Soro, said that the surveillance that the NSA is doing "would not be legal in Italy" and would be "contrary to the principles of our legislation and would represent a very serious violation".
    In Russia (another country with a long history of using Big Brother tactics), President Vladimir Putin has expressed significant concern about the NSA spying program and there are even rumors that Russia will be offering asylum to Edward Snowden...
    Alexey Pushkov, head of the Duma's international affairs committee and a vocal US critic, said on Twitter: "By promising asylum to Snowden, Moscow has taken upon itself the protection of those persecuted for political reasons. There will be hysterics in the US. They only recognise this right for themselves."
    He continued: "Listening to telephones and tracking the internet, the US special services broke the laws of their country. In this case, Snowden, like Assange, is a human rights activist."
    But even more important than what foreign politicians think about the NSA spying scandal is what average people all over the globe think. This scandal is causing millions of average people all over the planet to look at the United States with disgust and disdain. How can we hold ourselves out as the "defenders of freedom" to the rest of the globe when we are openly telling them that we are going to spy on them as much as we possibly can? How do we expect the rest of the world to look at us as "the good guys" when we are selfishly grabbing and recording all of their emails, phone calls and Internet searches without any concern for their privacy whatsoever?
    What makes all of this even worse is that our top intelligence officials are making jokes about this scandal. For example, just check out the wisecracks that the Director of National Intelligence, James Clapper, was making at an awards ceremony on Friday...
    With the current and past directors of national intelligence at the Omni Shoreham to honor former CIA and National Security Agency chief Michael Hayden, the result in speeches and interviews with intel professionals was a gumbo of outrage, worry and humor.
    Director of National Intelligence James Clapper told the black-tie crowd of more than 700 he would “address the elephant in the room” and proceeded, to applause, to denounce “the unauthorized leaks as reprehensible and egregious.” Clapper characterized the program as completely legal, debated and reauthorized by Congress under strict oversight and by court order “to make our nation safe and secure.”
    He then cracked a few jokes. “Some of you expressed surprise that I showed up—so many emails to read!” Clapper said. Greeting fellow banqueter John Pistole, the administrator of the Transportation Security Administration who recently reversed a planned policy to permit air travelers to carry certain knives on planes, Clapper said, “John, can I borrow your pocket knife?”
    How in the world can he make a joke about reading our emails at a time like this?
    This is how arrogant the U.S. intelligence community has become. They feel like they can do whatever they want and get away with it.
    For example, back in March Clapper flat out lied to the U.S. Congress about the surveillance that the NSA is doing. When he was asked by Senator Ron Wyden if the NSA was collecting any information on the American people, Clapper completely denied it.
    The following is from a transcript of that exchange...
    "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Oregon Republican Sen. Ron Wyden asked Clapper at the March 12 hearing.
    "No, sir," Clapper responded.
    "It does not?" Wyden pressed.
    Clapper recanted and said: "Not wittingly. There are cases where they could, inadvertently perhaps, collect -- but not wittingly."
    Apparently Clapper must have "forgotten" that the government is forcing all of the big telephone companies to turn over all of their call records to the NSA every single month.
    And you know what? The truth is that the government is not just collecting "metadata" about our phone calls. The content of our calls is being recorded and stored as well. Just check out this story from the Blaze...
    Hollywood actor Shia LaBeouf in 2008 during an appearance on the Tonight Show with Jay Leno detailed how he learned phone calls were allegedly being recorded.
    Promoting the film “Eagle Eye,” which according to IMDb shows how “technology of everyday life [is used] to track and control,” LaBeouf told Leno that an FBI consultant for the movie said one in five phone calls made are recorded and logged.
    “And I laughed at him,” LaBeouf said.
    “And then he played back a phone conversation I’d had two years prior to joining the picture,” LaBouf continued.
    Both Leno and LaBeouf concluded it was “extremely creepy.”
    The American people, along with the people of the entire planet, deserve the truth about this.
    Unfortunately, Barack Obama is certainly not going to tell us the truth, and there will probably only be a half-hearted effort by some members of Congress to get to the bottom of things.
    That is why it is going to be important to take this to court, and thankfully a couple of lawsuits are already in the works.
    According to U.S. News & World Report, one of these lawsuits is being filed by a former Justice Department prosecutor...
    Former Justice Department prosecutor Larry Klayman amended an existing lawsuit against Verizon and a slew of Obama administration officials Monday to make it the first class-action lawsuit in response to the publication of a secret court order instructing Verizon to hand over all phone records of millions of American customers on an "ongoing, daily basis."
    Klayman told U.S. News he will file a second class-action lawsuit Wednesday in the U.S. District Court for the District of Columbia targeting government officials and each of the nine companies listed in a leaked National Security Agency slideshow as participants in the government's PRISM program.
    And according to USA Today, the ACLU has also filed a lawsuit...
    National Security Agency surveillance programs came under more scrutiny Tuesday as the American Civil Liberties Union filed a lawsuit and a prominent senator and Internet giant Google called on the Obama administration to disclose more information.
    In its lawsuit, the ACLU said an NSA program that harvests phone calls violates the rights of all Americans.
    "The program goes far beyond even the permissive limits set by the Patriot Act and represents a gross infringement of the freedom of association and the right to privacy," said Jameel Jaffer, the ACLU's deputy legal director.
    Hopefully these lawsuits will reveal more details about the spying that has been taking place.
    There is also a "bipartisan coalition" of 86 Internet companies and civil liberties organizations that have sent a letter to Congress demanding action on these issues. You can read the full letter right here. Some of the organizations involved include the Electronic Frontier Foundation, Reddit, Mozilla, FreedomWorks, and the Center for Digital Democracy.
    Will Congress listen to them?
    Probably not.
    But at least they are trying to do something about this.
    The key will be to get the American people outraged enough about all of this that they won't forget about it in a week or two. And that is not an easy thing to do.
    There have been a couple of public opinion polls taken over the past few days that show some very curious results. A Rasmussen survey found that 59 percent of Americans are against the government secretly collecting our phone records and only 26 percent are in favor. But a Washington Post survey found that 56 percent of Americans consider the collecting of our phone records to be "acceptable" and only 41 percent consider the practice to be "unacceptable".
    How could those two surveys get such wildly different results?
    A lot of it is in the way that they ask the questions.
    In the end, our politicians don't really care too much about what the general public thinks anyway. They are just going to continue to do what they have been doing and the rest of the world will continue to become even more disgusted with us.
    We are recklessly destroying our global reputation and our leaders do not even seem to care. But someday America will need some friends, and when that day arrives we may find that we don't have too many left.


    http://theeconomiccollapseblog.com/a...spying-methods

  2. #2
    Guest
    Join Date
    Aug 2009
    Posts
    9,266
    The top secret rules that allow NSA to use US data without a warrant

    Fisa court submissions show broad scope of procedures governing NSA's surveillance of Americans' communication

    Document one: procedures used by NSA to target non-US persons
    Document two: procedures used by NSA to minimise data collected from US persons






    The documents show that discretion as to who is actually targeted lies directly with the NSA's analysts. Photograph: Martin Rogers/Workbook Stock/Getty

    Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders which allow the NSA to make use of information "inadvertently" collected from domestic US communications without a warrant.
    The Guardian is publishing in full two documents submitted to the secret Foreign Intelligence Surveillance Court (known as the Fisa court), signed by Attorney General Eric Holder and stamped 29 July 2009. They detail the procedures the NSA is required to follow to target "non-US persons" under its foreign intelligence powers and what the agency does to minimize data collected on US citizens and residents in the course of that surveillance.
    The documents show that even under authorities governing the collection of foreign intelligence from foreign targets, US communications can still be collected, retained and used.
    The procedures cover only part of the NSA's surveillance of domestic US communications. The bulk collection of domestic call records, as first revealed by the Guardian earlier this month, takes place under rolling court orders issued on the basis of a legal interpretation of a different authority, section 215 of the Patriot Act.
    The Fisa court's oversight role has been referenced many times by Barack Obama and senior intelligence officials as they have sought to reassure the public about surveillance, but the procedures approved by the court have never before been publicly disclosed.
    The top secret documents published today detail the circumstances in which data collected on US persons under the foreign intelligence authority must be destroyed, extensive steps analysts must take to try to check targets are outside the US, and reveals how US call records are used to help remove US citizens and residents from data collection.
    However, alongside those provisions, the Fisa court-approved policies allow the NSA to:
    • Keep data that could potentially contain details of US persons for up to five years;
    • Retain and make use of "inadvertently acquired" domestic communications if they contain usable intelligence, information on criminal activity, threat of harm to people or property, are encrypted, or are believed to contain any information relevant to cybersecurity;
    • Preserve "foreign intelligence information" contained within attorney-client communications;
    • Access the content of communications gathered from "U.S. based machine[s]" or phone numbers in order to establish if targets are located in the US, for the purposes of ceasing further surveillance.
    The broad scope of the court orders, and the nature of the procedures set out in the documents, appear to clash with assurances from President Obama and senior intelligence officials that the NSA could not access Americans' call or email information without warrants.
    The documents also show that discretion as to who is actually targeted under the NSA's foreign surveillance powers lies directly with its own analysts, without recourse to courts or superiors – though a percentage of targeting decisions are reviewed by internal audit teams on a regular basis.
    Since the Guardian first revealed the extent of the NSA's collection of US communications, there have been repeated calls for the legal basis of the programs to be released. On Thursday, two US congressmen introduced a bill compelling the Obama administration to declassify the secret legal justifications for NSA surveillance.
    The disclosure bill, sponsored by Adam Schiff, a California Democrat, and Todd Rokita, an Indiana Republican, is a complement to one proposed in the Senate last week. It would "increase the transparency of the Fisa Court and the state of the law in this area," Schiff told the Guardian. "It would give the public a better understanding of the safeguards, as well as the scope of these programs."
    Section 702 of the Fisa Amendments Act (FAA), which was renewed for five years last December, is the authority under which the NSA is allowed to collect large-scale data, including foreign communications and also communications between the US and other countries, provided the target is overseas.
    FAA warrants are issued by the Fisa court for up to 12 months at a time, and authorise the collection of bulk information – some of which can include communications of US citizens, or people inside the US. To intentionally target either of those groups requires an individual warrant.
    One-paragraph order

    One such warrant seen by the Guardian shows that they do not contain detailed legal rulings or explanation. Instead, the one-paragraph order, signed by a Fisa court judge in 2010, declares that the procedures submitted by the attorney general on behalf of the NSA are consistent with US law and the fourth amendment.
    Those procedures state that the "NSA determines whether a person is a non-United States person reasonably believed to be outside the United States in light of the totality of the circumstances based on the information available with respect to that person, including information concerning the communications facility or facilities used by that person".
    It includes information that the NSA analyst uses to make this determination – including IP addresses, statements made by the potential target, and other information in the NSA databases, which can include public information and data collected by other agencies.
    Where the NSA has no specific information on a person's location, analysts are free to presume they are overseas, the document continues.
    "In the absence of specific information regarding whether a target is a United States person," it states "a person reasonably believed to be located outside the United States or whose location is not known will be presumed to be a non-United States person unless such person can be positively identified as a United States person."
    If it later appears that a target is in fact located in the US, analysts are permitted to look at the content of messages, or listen to phone calls, to establish if this is indeed the case.
    Referring to steps taken to prevent intentional collection of telephone content of those inside the US, the document states: "NSA analysts may analyze content for indications that a foreign target has entered or intends to enter the United States. Such content analysis will be conducted according to analytic and intelligence requirements and priorities."
    Details set out in the "minimization procedures", regularly referred to in House and Senate hearings, as well as public statements in recent weeks, also raise questions as to the extent of monitoring of US citizens and residents.
    NSA minimization procedures signed by Holder in 2009 set out that once a target is confirmed to be within the US, interception must stop immediately. However, these circumstances do not apply to large-scale data where the NSA claims it is unable to filter US communications from non-US ones.
    The NSA is empowered to retain data for up to five years and the policy states "communications which may be retained include electronic communications acquired because of limitations on the NSA's ability to filter communications".
    Even if upon examination a communication is found to be domestic – entirely within the US – the NSA can appeal to its director to keep what it has found if it contains "significant foreign intelligence information", "evidence of a crime", "technical data base information" (such as encrypted communications), or "information pertaining to a threat of serious harm to life or property".
    Domestic communications containing none of the above must be destroyed. Communications in which one party was outside the US, but the other is a US-person, are permitted for retention under FAA rules.
    The minimization procedure adds that these can be disseminated to other agencies or friendly governments if the US person is anonymised, or including the US person's identity under certain criteria.
    Holder's 'minimization procedure' says once a target is confirmed to be in the US, interception of communication must stop. Photo: Nicholas Kamm/AFP/Getty Images A separate section of the same document notes that as soon as any intercepted communications are determined to have been between someone under US criminal indictment and their attorney, surveillance must stop. However, the material collected can be retained, if it is useful, though in a segregated database:
    "The relevant portion of the communication containing that conversation will be segregated and the National Security Division of the Department of Justice will be notified so that appropriate procedures may be established to protect such communications from review or use in any criminal prosecution, while preserving foreign intelligence information contained therein," the document states.
    In practice, much of the decision-making appears to lie with NSA analysts, rather than the Fisa court or senior officials.
    A transcript of a 2008 briefing on FAA from the NSA's general counsel sets out how much discretion NSA analysts possess when it comes to the specifics of targeting, and making decisions on who they believe is a non-US person. Referring to a situation where there has been a suggestion a target is within the US.
    "Once again, the standard here is a reasonable belief that your target is outside the United States. What does that mean when you get information that might lead you to believe the contrary? It means you can't ignore it. You can't turn a blind eye to somebody saying: 'Hey, I think so and so is in the United States.' You can't ignore that. Does it mean you have to completely turn off collection the minute you hear that? No, it means you have to do some sort of investigation: 'Is that guy right? Is my target here?" he says.
    "But, if everything else you have says 'no' (he talked yesterday, I saw him on TV yesterday, even, depending on the target, he was in Baghdad) you can still continue targeting but you have to keep that in mind. You can't put it aside. You have to investigate it and, once again, with that new information in mind, what is your reasonable belief about your target's location?"
    The broad nature of the court's oversight role, and the discretion given to NSA analysts, sheds light on responses from the administration and internet companies to the Guardian's disclosure of the PRISM program. They have stated that the content of online communications is turned over to the NSA only pursuant to a court order. But except when a US citizen is specifically targeted, the court orders used by the NSA to obtain that information as part of Prism are these general FAA orders, not individualized warrants specific to any individual.
    Once armed with these general orders, the NSA is empowered to compel telephone and internet companies to turn over to it the communications of any individual identified by the NSA. The Fisa court plays no role in the selection of those individuals, nor does it monitor who is selected by the NSA.
    The NSA's ability to collect and retain the communications of people in the US, even without a warrant, has fuelled congressional demands for an estimate of how many Americans have been caught up in surveillance.
    Two US senators, Ron Wyden and Mark Udall – both members of the Senate intelligence committee – have been seeking this information since 2011, but senior White House and intelligence officials have repeatedly insisted that the agency is unable to gather such statistics.



    http://www.guardian.co.uk/world/2013...ithout-warrant
    Last edited by kathyet; 06-21-2013 at 12:30 PM.

  3. #3
    Guest
    Join Date
    Aug 2009
    Posts
    9,266
    SHOCKING DISCOVERY: Obama Unleashes ‘Insider Threat Program’

    Posted on June 21, 2013


    Obama is quickly tightening his reign of power in. We need to be watchful on how he’ll try and keep power here in the next few years.
    Check it out:

    Even before a former U.S. intelligence contractor exposed the secret collection of Americans’ phone records, the Obama administration was pressing a government-wide crackdown on security threats that requires federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions.
    President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.
    Government documents reviewed by McClatchy illustrate how some agencies are using that latitude to pursue unauthorized disclosures of any information, not just classified material. They also show how millions of federal employees and contractors must watch for “high-risk persons or behaviors” among co-workers and could face penalties, including criminal charges, for failing to report them. Leaks to the media are equated with espionage.
    Continue Reading on www.mcclatchydc.com ...


    Read more: http://conservativebyte.com/2013/06/...#ixzz2Ws4YX1GM


    Read more below





    Obama’s crackdown views leaks as aiding enemies of U.S.


    Danny Dougherty/McClatchy Washington Bureau



    More on this Story




    View larger image


    By Marisa Taylor and Jonathan S. Landay | McClatchy Washington Bureau

    WASHINGTON — Even before a former U.S. intelligence contractor exposed the secret collection of Americans’ phone records, the Obama administration was pressing a government-wide crackdown on security threats that requires federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions.
    President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.
    Government documents reviewed by McClatchy illustrate how some agencies are using that latitude to pursue unauthorized disclosures of any information, not just classified material. They also show how millions of federal employees and contractors must watch for “high-risk persons or behaviors” among co-workers and could face penalties, including criminal charges, for failing to report them. Leaks to the media are equated with espionage.
    “Hammer this fact home . . . leaking is tantamount to aiding the enemies of the United States,” says a June 1, 2012, Defense Department strategy for the program that was obtained by McClatchy.
    The Obama administration is expected to hasten the program’s implementation as the government grapples with the fallout from the leaks of top secret documents by Edward Snowden, the former National Security Agency contractor who revealed the agency’s secret telephone data collection program. The case is only the latest in a series of what the government condemns as betrayals by “trusted insiders” who have harmed national security.
    “Leaks related to national security can put people at risk,” Obama said on May 16 in defending criminal investigations into leaks. “They can put men and women in uniform that I’ve sent into the battlefield at risk. They can put some of our intelligence officers, who are in various, dangerous situations that are easily compromised, at risk. . . . So I make no apologies, and I don’t think the American people would expect me as commander in chief not to be concerned about information that might compromise their missions or might get them killed.”
    As part of the initiative, Obama ordered greater protection for whistleblowers who use the proper internal channels to report official waste, fraud and abuse, but that’s hardly comforting to some national security experts and current and former U.S. officials. They worry that the Insider Threat Program won’t just discourage whistleblowing but will have other grave consequences for the public’s right to know and national security.
    The program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations of loyal Americans, according to these current and former officials and experts. Some non-intelligence agencies already are urging employees to watch their co-workers for “indicators” that include stress, divorce and financial problems.
    “It was just a matter of time before the Department of Agriculture or the FDA (Food and Drug Administration) started implementing, ‘Hey, let’s get people to snitch on their friends.’ The only thing they haven’t done here is reward it,” said Kel McClanahan, a Washington lawyer who specializes in national security law. “I’m waiting for the time when you turn in a friend and you get a $50 reward.”
    The Defense Department anti-leak strategy obtained by McClatchy spells out a zero-tolerance policy. Security managers, it says, “must” reprimand or revoke the security clearances – a career-killing penalty – of workers who commit a single severe infraction or multiple lesser breaches “as an unavoidable negative personnel action.”
    Employees must turn themselves and others in for failing to report breaches. “Penalize clearly identifiable failures to report security infractions and violations, including any lack of self-reporting,” the strategic plan says.
    The Obama administration already was pursuing an unprecedented number of leak prosecutions, and some in Congress – long one of the most prolific spillers of secrets – favor tightening restrictions on reporters’ access to federal agencies, making many U.S. officials reluctant to even disclose unclassified matters to the public.
    The policy, which partly relies on behavior profiles, also could discourage creative thinking and fuel conformist “group think” of the kind that was blamed for the CIA’s erroneous assessment that Iraq was hiding weapons of mass destruction, a judgment that underpinned the 2003 U.S. invasion.
    “The real danger is that you get a bland common denominator working in the government,” warned Ilana Greenstein, a former CIA case officer who says she quit the agency after being falsely accused of being a security risk. “You don’t get people speaking up when there’s wrongdoing. You don’t get people who look at things in a different way and who are willing to stand up for things. What you get are people who toe the party line, and that’s really dangerous for national security.”
    Obama launched the Insider Threat Program in October 2011 after Army Pfc. Bradley Manning downloaded hundreds of thousands of documents from a classified computer network and sent them to WikiLeaks, the anti-government secrecy group. It also followed the 2009 killing of 13 people at Fort Hood, Texas, by Army Maj. Nidal Hasan, an attack that federal authorities failed to prevent even though they were monitoring his emails to an al Qaida-linked Islamic cleric.
    An internal review launched after Manning’s leaks found “wide disparities” in the abilities of U.S. intelligence agencies to detect security risks and determined that all needed improved defenses.
    Obama’s executive order formalizes broad practices that the intelligence agencies have followed for years to detect security threats and extends them to agencies that aren’t involved in national security policy but can access classified networks. Across the government, new policies are being developed.
    There are, however, signs of problems with the program. Even though it severely restricts the use of removable storage devices on classified networks, Snowden, the former NSA contractor who revealed the agency’s telephone data collection operations, used a thumb drive to acquire the documents he leaked to two newspapers.
    “Nothing that’s been done in the past two years stopped Snowden, and so that fact alone casts a shadow over this whole endeavor,” said Steven Aftergood, director of the non-profit Federation of American Scientists’ Project on Government Secrecy. “Whatever they’ve done is apparently inadequate.”
    U.S. history is replete with cases in which federal agencies missed signs that trusted officials and military officers were stealing secrets. The CIA, for example, failed for some time to uncover Aldrich Ames, a senior officer who was one of the most prolific Soviet spies in U.S. history, despite polygraphs, drunkenness, and sudden and unexplained wealth.
    Stopping a spy or a leaker has become even more difficult as the government continues to accumulate information in vast computer databases and has increased the number of people granted access to classified material to nearly 5 million.
    Administration officials say the program could help ensure that agencies catch a wide array of threats, especially if employees are properly trained in recognizing behavior that identifies potential security risks.
    “If this is done correctly, an organization can get to a person who is having personal issues or problems that if not addressed by a variety of social means may lead that individual to violence, theft or espionage before it even gets to that point,” said a senior Pentagon official, who requested anonymity because he wasn’t authorized to discuss the issue publicly.
    Manning, for instance, reportedly was reprimanded for posting YouTube messages describing the interior of a classified intelligence facility where he worked. He also exhibited behavior that could have forewarned his superiors that he posed a security risk, officials said.
    Jonathan Pollard, a former U.S. Navy intelligence analyst sentenced in 1987 to life in prison for spying for Israel, wasn’t investigated even though he’d failed polygraph tests and lied to his supervisors. He was caught only after a co-worker saw him leave a top-secret facility with classified documents.
    “If the folks who are watching within an organization for that insider threat – the lawyers, security officials and psychologists – can figure out that an individual is having money problems or decreased work performance and that person may be starting to come into the window of being an insider threat, superiors can then approach them and try to remove that stress before they become a threat to the organization,” the Pentagon official said.
    The program, however, gives agencies such wide latitude in crafting their responses to insider threats that someone deemed a risk in one agency could be characterized as harmless in another. Even inside an agency, one manager’s disgruntled employee might become another’s threat to national security.
    Obama in November approved “minimum standards” giving departments and agencies considerable leeway in developing their insider threat programs, leading to a potential hodgepodge of interpretations. He instructed them to not only root out leakers but people who might be prone to “violent acts against the government or the nation” and “potential espionage.”
    The Pentagon established its own sweeping definition of an insider threat as an employee with a clearance who “wittingly or unwittingly” harms “national security interests” through “unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions resulting in loss or degradation of resources or capabilities.”
    “An argument can be made that the rape of military personnel represents an insider threat. Nobody has a model of what this insider threat stuff is supposed to look like,” said the senior Pentagon official, explaining that inside the Defense Department “there are a lot of chiefs with their own agendas but no leadership.”
    The Department of Education, meanwhile, informs employees that co-workers going through “certain life experiences . . . might turn a trusted user into an insider threat.” Those experiences, the department says in a computer training manual, include “stress, divorce, financial problems” or “frustrations with co-workers or the organization.”
    An online tutorial titled “Treason 101” teaches Department of Agriculture and National Oceanic and Atmospheric Administration employees to recognize the psychological profile of spies.
    A Defense Security Service online pamphlet lists a wide range of “reportable” suspicious behaviors, including working outside of normal duty hours. While conceding that not every behavior “represents a spy in our midst,” the pamphlet adds that “every situation needs to be examined to determine whether our nation’s secrets are at risk.”
    The Defense Department, traditionally a leading source of media leaks, is still setting up its program, but it has taken numerous steps. They include creating a unit that reviews news reports every day for leaks of classified defense information and implementing new training courses to teach employees how to recognize security risks, including “high-risk” and “disruptive” behaviors among co-workers, according to Defense Department documents reviewed by McClatchy.
    “It’s about people’s profiles, their approach to work, how they interact with management. Are they cheery? Are they looking at Salon.com or The Onion during their lunch break? This is about ‘The Stepford Wives,’” said a second senior Pentagon official, referring to online publications and a 1975 movie about robotically docile housewives. The official said he wanted to remain anonymous to avoid being punished for criticizing the program.
    The emphasis on certain behaviors reminded Greenstein of her employee orientation with the CIA, when she was told to be suspicious of unhappy co-workers.
    “If someone was having a bad day, the message was watch out for them,” she said.
    Some federal agencies also are using the effort to protect a broader range of information. The Army orders its personnel to report unauthorized disclosures of unclassified information, including details concerning military facilities, activities and personnel.
    The Peace Corps, which is in the midst of implementing its program, “takes very seriously the obligation to protect sensitive information,” said an email from a Peace Corps official who insisted on anonymity but gave no reason for doing so.
    Granting wide discretion is dangerous, some experts and officials warned, when federal agencies are already prone to overreach in their efforts to control information flow.
    The Bush administration allegedly tried to silence two former government climate change experts from speaking publicly on the dangers of global warming. More recently, the FDA justified the monitoring of the personal email of its scientists and doctors as a way to detect leaks of unclassified information.
    But R. Scott Oswald, a Washington attorney of the Employment Law Group, called the Obama administration “a friend to whistleblowers,” saying it draws a distinction between legitimate whistleblowers who use internal systems to complain of wrongdoing vs. leakers, who illegally make classified information public.
    There are numerous cases, however, of government workers who say they’ve been forced to go public because they’ve suffered retaliation after trying to complain about waste, fraud and abuse through internal channels or to Congress. Thomas Drake, a former senior NSA official, was indicted in 2010 under the Espionage Act after he disclosed millions of dollars in waste to a journalist. He’d tried for years to alert his superiors and Congress. The administration eventually dropped the charges against him.
    The Pentagon, meanwhile, declined to answer how its insider threat program would accommodate a leak to the news media like the Pentagon Papers, a top-secret history of U.S. involvement in Vietnam that showed how successive administrations had misled the public and Congress on the war.
    “The danger is that supervisors and managers will use the profiles for ‘Disgruntled Employees’ and ‘Insider Threats’ to go after legitimate whistleblowers,” said the second Pentagon official. “The executive order says you can’t offend the whistleblower laws. But all of the whistleblower laws are about retaliation. That doesn’t mean you can’t profile them before they’re retaliated against.”
    Greenstein said she become the target of scrutiny from security officials after she began raising allegations of mismanagement in the CIA’s operations in Baghdad. But she never leaked her complaints, which included an allegation that her security chief deleted details about safety risks from cables. Instead, she relied on the agency’s internal process to make the allegations.
    The CIA, however, tried to get the Justice Department to open a criminal case after Greenstein mentioned during a polygraph test that she was writing a book, which is permitted inside the agency as long as it goes through pre-publication review. The CIA then demanded to see her personal computers. When she got them back months later, all that she’d written had been deleted, Greenstein said.
    “They clearly perceived me as an insider threat,” said Greenstein, who has since rewritten the book and has received CIA permission to publish portions of it. “By saying ‘I have a problem with this place and I want to make it better,’ I was instantly turned into a security threat,” she said. The CIA declined to comment.


    Email: mtaylor@mcclatchydc.com, jlanday@mcclatchydc.com
    Last edited by kathyet; 06-21-2013 at 01:10 PM.

  4. #4
    Banned
    Join Date
    Jun 2013
    Posts
    8,546

    NSA Spies On Americans For Israel

    NSA Spies On Americans For Israel


    RT Guest Column–NSA Spies On Americans For Israel

    September 11, 2013

    This report indicates that NSA is guilty of treason.

    NSA Spies On Americans For Israel
    http://rt.com/news/nsa-shares-data-israel-723/

    NSA 'routinely' shares Americans' data with Israel - Snowden leak

    Published time: September 11, 2013 15:13
    Edited time: September 13, 2013 12:41 Get short URL

    Reuters/Kevin Lamarque

    http://rt.com/news/nsa-shares-data-israel-723/

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •