Page 49 of 59 FirstFirst ... 39454647484950515253 ... LastLast
Results 481 to 490 of 582
Like Tree27Likes

Thread: Privacy Alert! Big Brother is watching and listening, UPDATED

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

  1. #481
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696


    Keiser Report: NSA manipulates bank accounts? (E541)

    http://www.youtube.com/watch?v=v7ukocsQo7Q

    Published on Dec 26, 2013

    In this episode of the Keiser Report, Max Keiser and Stacy Herbert discuss the suggestion that the NSA may be manipulating bank account balances and financial markets. They also discuss 'accidental' tax breaks for billionaires in America; while, in the UK, the tax office 'loses nerve' about pursuing multinationals and instead targets small and medium sized enterprises. In the second half, Max interviews precious metals analyst and presenter, Jan Skoyles, about silver, gold, handbags, crowdfuncing and Chateau du Pepe.
    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  2. #482
    Senior Member MinutemanCDC_SC's Avatar
    Join Date
    Jan 2006
    Location
    tracking the usurper-in-chief and on his trail
    Posts
    3,207
    Quote Originally Posted by the Guardian
    NSA: Tailored Access Operations a 'unique national asset'
    Not so unique, really... an activity that NSA has in common with P.R.China, N. Korea, Cuba, Iran, and other totalitarian states.
    One man's terrorist is another man's undocumented worker.

    Unless we enforce laws against illegal aliens today,
    tomorrow WE may wake up as illegals.

    The last word: illegal aliens are ILLEGAL!

  3. #483
    Senior Member MinutemanCDC_SC's Avatar
    Join Date
    Jan 2006
    Location
    tracking the usurper-in-chief and on his trail
    Posts
    3,207
    Our right to privacy, liberty
    and personal security -
    no longer honored?



    flickr.com



    Mary JewellDallas Etiquette Examiner

    January 6, 2014

    A citizen's right to privacy, liberty and personal security?
    We used to think so.

    Now, while sitting comfortably in our homes, our personal phone conversations and personal e-mails are being 'recorded' and 'filed' indefinitely by our own government.

    Senator Rand Paul recently announced that he is planning to file a class action lawsuit which questions the right of the government to collect personal telephone calls and e-mails of citizens.

    While acknowledging that Americans want personal security, Senator Paul states, "we are not willing to trade our liberty for security." Describing his recent work, he states, "we already have hundred of thousands of signatures from citizens." He emphasizes that "any citizen who owns a cell phone is eligible to join the lawsuit's list of names on his Facebook page." The Senator explains his recent action, http://video.foxnews.com/v/300782732...d=940325739001.

    According to CNN writer, Evan Perez, Top-secret court renews NSA snooping at critical point, "The top-secret federal court that oversees government surveillance on Friday reauthorized the National Security Agency's program that collects data on nearly every phone call in the United States."

    In his January 3, 2014, announcement, Senator Rand Paul questioned the "secretive court" in which Attorney General Eric Holder argued the decision regarding the NSA collection of personal data of citizens.

    In another security-related matter of importance to citizens, referencing President Obama's recent attempt to sign up for Obamacare, Attorney Orly Taitz submitted an FOIA request to the Office of Insurance Regulation in Florida to verify security procedures in effect during enrollment in the Affordable Care Act.

    In December, 2013, White House correspondence officers stated to reporters, among them Foxnews correspondent Ed Henry, that Obama could not sign on the web site as his information "was scrubbed from the data bases."

    A newly received response from FOIA Officer Mary-Beth Senkewitcz, Deputy Commissioner, Office of Insurance Regulation in Florida, sent to Taitz stated that "Washington, DC Healthcare Exchange does not have any order by any judge directing them to remove Obama's identification information from their database." Further, Ms. Senkewitcz stated that "there is no mechanism to protect US tax payers from fraud and use of ACA (Obamacare) by illegal aliens or people using stolen Social Security numbers."

    Most importantly, the response from FOIA Officer Mary-Beth Senkewitcs indicates, "there is no reporting requirement for employees of the Exchange to report identity fraud, identity theft and use of stolen IDs by individuals signing up for ACA."

    How safe and secure can we feel knowing that our 'private' phone calls and e-mails are collected daily by our government?

    We have now been informed by a government official that there is no reporting requirement for employees of the Exchange (Obamacare) to report identity fraud or identity theft.

    While many of us are required to input our own personal data into the Affordable Care Act web site in order to purchase health insurance, we are apparently advised that no safeguard against fraud and identity theft is available.

    www.examiner.com/article/our-right-to-privacy-liberty-and-personal-security-no-longer-honored
    One man's terrorist is another man's undocumented worker.

    Unless we enforce laws against illegal aliens today,
    tomorrow WE may wake up as illegals.

    The last word: illegal aliens are ILLEGAL!

  4. #484
    April
    Guest
    Sadly we are no longer land of the free....and the oppression grows daily IMO. Even thought Snowden enlightened all of us to what was going on .....it is still continuing....and they are adding on news ways to spy on us.

  5. #485
    April
    Guest
    NSA reportedly intercepting laptops purchased online to install spy malware

    By T.C. Sottek




    According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access.
    While the report does not indicate the scope of the program, or who the NSA is targeting with such wiretaps, it's a unique look at the agency's collaborative efforts with the broader intelligence community to gain hard access to communications equipment. One of the products the NSA appears to use to compromise target electronics is codenamed COTTONMOUTH, and has been available since 2009; it's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine.
    This tool, among others, is available to NSA agents through what Der Spiegel describes as a mail-order spy catalog. The report indicates that the catalog offers backdoors into the hardware and software of the most prominent technology makers, including Cisco, Juniper Networks, Dell, Seagate, Western Digital, Maxtor, Samsung, and Huawei. Many of the targets are American companies. The report indicates that the NSA can even exploit error reports from Microsoft's Windows operating system; by intercepting the error reports and determining what's wrong with a target's computer, the NSA can then attack it with Trojans or other malware.
    In response to Der Spiegel's report, Cisco senior vice president John Stewart wrote that "we are deeply concerned with anything that may impact the integrity of our products or our customers' networks," and that the company does "not work with any government to weaken our products for exploitation." Other US companies have fired back against reports of NSA tampering in recent months, including Microsoft, which labeled the agency an "advanced persistent threat" over its efforts to secretly collect private user data within the internal networks of Google and Yahoo.
    Sometimes the NSA hops on an FBI jet for high-tech raids
    The Der Spiegel report, which gives a broad look at TAO operations, also highlights the NSA's cooperation with other intelligence agencies to conduct Hollywood-style raids. Unlike most of the NSA's operations which allow for remote access to targets, Der Spiegel notes that the TAO's programs often require physical access to targets. To gain physical access, the NSA reportedly works with the CIA and FBI on sensitive missions that sometimes include flying NSA agents on FBI jets to plant wiretaps. "This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work," the report notes.
    The NSA currently faces pressure from the public, Congress, federal courts, and privacy advocates over its expansive spying programs. Those programs, which include bulk telephone surveillance of American citizens, are said by critics to violate constitutional protections against unreasonable searches, and were uncovered earlier this year by whistleblower Edward Snowden. Beyond the programs that scoop up data on American citizens, Snowden's documents have also given a much closer look at how the spy agency conducts other surveillance operations, including tapping the phones of high-level foreign leaders.

    http://www.theverge.com/2013/12/29/5...-usb-plant-spy

  6. #486
    Senior Member MinutemanCDC_SC's Avatar
    Join Date
    Jan 2006
    Location
    tracking the usurper-in-chief and on his trail
    Posts
    3,207
    Spiegel.de - Shopping for Spy Gear:
    Catalog Advertises NSA Toolbox


    By Jacob Appelbaum, Judith Horchert and Christian Stöcker

    Entering through the back door: A State Trooper truck is seen in front of the Fort Meade, Maryland headquarters of the National Security Agency.

    After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices.

    Editor's note: This article accompanies our main feature story on the NSA's Tailored Access Operations unit. You can read it here.

    When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online "Google Page Ranking" copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.

    Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.

    A 50-Page Catalog


    These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them.

    This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.

    SPIEGEL ONLINE
    Interactive Graphic: The NSA's Spy Catalog

    In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."

    Master Carpenters


    The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet.

    Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.

    'Persistence'

    The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on.

    This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access.

    Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.

    Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates."

    Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."

    www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
    One man's terrorist is another man's undocumented worker.

    Unless we enforce laws against illegal aliens today,
    tomorrow WE may wake up as illegals.

    The last word: illegal aliens are ILLEGAL!

  7. #487
    April
    Guest
    These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them.
    There is NO PRIVACY anymore....sickening but true....

  8. #488
    April
    Guest
    Quote Originally Posted by MinutemanCDC_SC View Post
    Not so unique, really... an activity that NSA has in common with P.R.China, N. Korea, Cuba, Iran, and other totalitarian states.
    I agree.....pretty disgusting IMO

  9. #489
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    WND EXCLUSIVE

    Klayman welcomes Obama challenge to NSA lawsuit

    Government is asking judge to halt any further proceedings


    Published: 5 days ago
    Bob Unruh



    Headquarters of the National Security Agency

    The Department of Justice regards American citizens as “nothing more than rabble,” charges the attorney who won a legal challenge to the National Security Agency’s spy-on-Americans program called PRISM.
    The DOJ moved Wednesday to block the plaintiffs in the case brought by attorney Larry Klayman, founder of FreedomWatch, against the NSA’s telephone call-tracking program.
    In its motion filed with U.S. District Judge Richard Leon, who earlier issued an injunction against the spy program and called it “Orwellian,” the government is asking that the judge halt any further proceedings while an appeals court examines the ruling that said the government was violating the Constitution.
    Klayman said the move wasn’t exactly a surprise in light of the government’s spying on Americans and its reluctance to provide information about the programs.
    “This is a further attempt to keep information about the biggest violation of the Constitution in American history from the American people. It’s an outrage,” he said.
    He said the Obama administration has the perspective of “heads I win, tails you lose,” and its attitude is: “We control all the information and the American people be damned. They don’t have rights.”

    Help Larry Klayman with his class-action suit against Obama’s use of the NSA to violate Americans’ rights

    Klayman said he already had requested a status conference on the case, asking the court how to proceed with discovery in preparation for trial.
    The government move reveals its true attitude, he said.
    “It’s important for the American people to see how the government treats them and views them. We’re nothing more than rabble,” he said.
    Politico reported on the government’s motion, which argued: “Further litigation of plaintiffs’ challenges to the conduct of these programs could well risk or require disclosure of highly sensitive information about the intelligence sources and methods involved – information that the government determined was not appropriate for declassification when it publicly disclosed certain facts about these programs.”
    The information actually was disclosed when former NSA contractor Edward Snowden leaked details of the program.
    The DOJ argued that if the litigation proceeds, “it will ultimately become necessary to conclusively determine, as a factual matter, whether plaintiffs have established their standing to challenge NSA’s alleged interception of the content of their communications, and collection of metadata about those communications.”
    “Further litigation of this issue could risk or require disclosure of classified national security information, such as whether plaintiffs were the targets of or subject to NSA intelligence-gathering activities, confirmation or denial of the identities of the telecommunications service providers from which NSA has obtained information about individuals’ communications, and other classified information.”
    But that’s exactly the point of his lawsuits, Klayman says: to find out the details of the programs and whether the government, in its alleged pursuit of information about terror activities, has been violating the constitutional assurances of Americans’ privacy.
    The government is alarmed at that aim.
    “Plaintiffs have indicated in their pleadings (and during argument on their motions for preliminary injunctions) that they intend to pursue discovery to obtain ‘full disclosure and a complete accounting’ of what the government defendants (and other defendants in these cases ‘have done [or been] allowed to do’ in connection with the challenged NSA intelligence programs; ‘identification of any and all ‘targets’ subject to defendants’ surveillance’ and production of ‘all other relevant reports, risk assessments, memoranda, and other documents,’” the government said.
    But the Obama administration said it had to keep all that information secret or risk “exceptionally grave damage to national security.”
    DOJ lawyers said they would oppose allowing Klayman or anyone else “access to classified information.”
    The DOJ is asking Leon to halt proceeding while there are appeals of his ruling that the government likely is violating Fourth Amendment.
    The government apparently doesn’t want to release any information, even if that’s the case.
    “Even if the mere collection of information about plaintiffs’ communications constitutes a Fourth Amendment search … conclusively resolving the reasonableness of that search ultimately could risk or require disclosure of exceptionally sensitive and classified intelligence information regarding the nature and scope of the international terrorist threat to the United States, and the role that the NSA’s intelligence-gathering activities have played in meeting that threat,” government attorneys warn.
    Josh Gerstein at Politico noted: “Klayman’s past litigation has been known for being as impactful and sometimes more impactful in the discovery phase, where lawyers demand documents and conduct depositions, as in its ultimate outcome. So, the government’s desire to head that process off for now, and perhaps entirely, is understandable.”
    WND reported just days ago that several states are working on plans to resist the NSA operations, strategizing on ways to make the information unusable even if the NSA collects it.
    According to the Tenth Amendment Center, lawmakers in Missouri are proposing to amend their state constitution. Their plan would add “and electronic communications and data” to the provision that provides privacy and security for residents.
    If changed by voters, it would read: “That the people shall be secure in their persons, papers, homes [and], effects, and electronic communications and data, from unreasonable searches and seizures; and no warrant to search any place, or seize any person or thing, or access electronic data or communication, shall issue without describing the place to be searched, or the person or thing to be seized, or the data or communication to be accessed, as nearly as may be; nor without probable cause, supported by written oath or affirmation.”
    The Joint Resolution, pending before the state Senate, proposes allowing Missouri voters to decide next November whether or not to amend their constitution.

    Help Larry Klayman with his class-action suit against Obama’s use of the NSA to violate Americans’ rights

    According to the Tenth Amendment Center, federal judges and lawyers may squabble over the constitutionality of the NSA data-gathering, but lawmakers could make it impossible for any information obtained to be used in those states.
    In Kansas, Rep. Brett Hildabrand, R-Shawnee, prefiled a bill that would “ban all state agencies and local governments in the state from possessing data ‘held by a third-party in a system of record’ and would prohibit any such information from being ‘subject to discovery, subpoena or other means of legal compulsion for its release to any person or entity or be admissible in evidence in any judicial or administrative proceeding.’”
    The access the data, under the bill, government would be required to obtain “express informed consent” or a warrant.
    In Kansas, it’s called the Fourth Amendment Protection Act.
    “I want to make sure that electronic privacy in Kansas is protected in the same way that physical letters in the mail are protected from random government searches,” Hildabrand told the center. “Each day, we hear a new revelation about how the NSA is violating our personal privacy. My bill will ensure the state of Kansas doesn’t utilize this illegally obtained data.”

    http://www.wnd.com/2014/01/obama-mov...ayers-lawsuit/

    WND Related Stories

    States to NSA: Get a warrant
    Rand Paul battle against NSA set to launch
    NSA slayer blasts new opinion on secrecy
    Obama's NSA watchdog: 'Reasonable' to track cars
    Bizarre radio meltdown during NSA interview
    NSA slayer calls for firings at CNN
    NSA slayer: White House behind CNN 'hit piece'
    NSA slayer goes on Obama impeachment hunt
    Stunning revelation from man who sued NSA
    U.S. urged to slow down NSA spying train
    Mass surveillance targeted in petition to U.N.



    http://www.wnd.com/2014/01/obama-mov...ayers-lawsuit/
    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  10. #490
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    Report: NSA Bulk Data Collection Has Had No Real Impact On Terror Prevention

    January 14, 2014 by Sam Rolley

    PHOTOS.COM

    Based on an analysis of 225 al-Qaida-linked people charged with terrorism in the United States since Sept. 11, 2001, a public policy nonprofit contends that the embattled National Security Agency’s bulk collection of digital communications data has done little to protect the Nation from terrorists.
    A report released Monday by the Washington-based New America Foundation details how a majority of the 225 terror cases were sparked by more traditional investigative assets, including “informants, tips from local communities, and targeted intelligence operations.”
    In a press release accompanying the report, titled “Do NSA’s Bulk Surveillance Programs Stop Terrorists?,” the foundation acknowledges the few cases in which the bulk collection of so-called metadata has prevented terrorism.
    “Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in initiating, at most, 1.8 percent of these cases,” the foundation notes. “NSA programs involving the surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined.”
    But the according to the overall findings of their analysis, there is little benefit to the NSA’s mass privacy invasions, which have made American citizens and their foreign counterparts equally uncomfortable with the government’s spying power.
    The bottom line, according to the report, is that good old-fashioned police work is still providing the government the most benefit in its pursuit of terror suspects.
    “Regular FISA warrants not issued in connection with Section 215 or Section 702, which are the traditional means for investigating foreign persons, were used in at least 48 (21 percent) of the cases we looked at, although it’s unclear whether these warrants played an initiating role or were used at a later point in the investigation.”
    The New American report goes on to explain a number of instances where U.S. officials have exaggerated the usefulness of bulk collection of digital communications data in an effort to justify the program’s existence.
    The organization carefully examined the case of Basaaly Moalina, a San Diego cab driver who in 2007 and 2008 provided $8,500 to an al-Qaida affiliate, which is the main case government officials have repeatedly used to justify the NSA’s phone records collection.
    From the New American Foundation:
    According to the government, the database of American phone metadata allows intelligence authorities to quickly circumvent the traditional burden of proof associated with criminal warrants, thus allowing them to “connect the dots” faster and prevent future 9/11-scale attacks. Yet in the Moalin case, after using the NSA’s phone database to link a number in Somalia to Moalin, the FBI waited two months to begin an investigation and wiretap his phone. Although it’s unclear why there was a delay between the NSA tip and the FBI wiretapping, court documents show there was a two-month period in which the FBI was not monitoring Moalin’s calls, despite official statements that the bureau had Moalin’s phone number and had identified him. , This undercuts the government’s theory that the database of Americans’ telephone metadata is necessary to expedite the investigative process, since it clearly didn’t expedite the process in the single case the government uses to extol its virtues.
    The foundation also points out three other terror cases in which the government has overhyped the role of bulk surveillance in the apprehension of dangerous suspects.
    The New America report comes just days before President Barack Obama’s planned Jan. 17 announcement about whether he plans to use the power of the executive to alter the NSA’s spy programs based on the findings of a Dec. 18 report produced by a White House advisory panel.

    Filed Under: Conservative Politics, Government, Liberty News, Privacy, Staff Reports

    http://personalliberty.com/2014/01/1...or-prevention/
    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •