Results 1 to 4 of 4

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

  1. #1
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696

    NSA “Metadata” Can Tell the Government More About You Than the Content of Your Phonec

    “Metadata” Can Tell the Government More About You Than the Content of Your Phonecalls

    Submitted by George Washington on 06/12/2013 12:15 -0400

    “Metadata” Can Tell the Government More About You Than the Content of Your Phonecalls

    The government has sought to “reassure” us that it is only tracking “metadata” such as the time and place of the calls, and not the actual content of the calls.
    But technology experts say that “metadata” can be more revealing than the content of your actual phone calls.

    For example, the ACLU notes:

    A Massachusetts Institute of Technology study a few years back found that reviewing people’s social networking contacts alone was sufficient to determine their sexual orientation. Consider, metadata from email communications was sufficient to identify the mistress of then-CIA Director David Petraeus and then drive him out of office.

    The “who,” “when” and “how frequently” of communications are often more revealing than what is said or written. Calls between a reporter and a government whistleblower, for example, may reveal a relationship that can be incriminating all on its own.

    Repeated calls to Alcoholics Anonymous, hotlines for gay teens, abortion clinics or a gambling bookie may tell you all you need to know about a person’s problems. If a politician were revealed to have repeatedly called a phone sex hotline after 2:00 a.m., no one would need to know what was said on the call before drawing conclusions. In addition sophisticated data-mining technologies have compounded the privacy implications by allowing the government to analyze terabytes of metadata and reveal far more details about a person’s life than ever before.


    The Electronic Frontier Foundation points out:

    What [government officials] are trying to say is that disclosure of metadata—the details about phone calls, without the actual voice—isn’t a big deal, not something for Americans to get upset about if the government knows. Let’s take a closer look at what they are saying:

    • They know you rang a phone sex service at 2:24 am and spoke for 18 minutes. But they don’t know what you talked about.
    • They know you called the suicide prevention hotline from the Golden Gate Bridge. But the topic of the call remains a secret.


    • They know you spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour. But they don’t know what was discussed.


    • They know you received a call from the local NRA office while it was having a campaign against gun legislation, and then called your senators and congressional representatives immediately after. But the content of those calls remains safe from government intrusion.


    • They know you called a gynecologist, spoke for a half hour, and then called the local Planned Parenthood’s number later that day. But nobody knows what you spoke about.


    Sorry, your phone records—oops, “so-called metadata”—can reveal a lot more about the content of your calls than the government is implying. Metadata provides enough context to know some of the most intimate details of your lives. And the government has given no assurances that this data will never be correlated with other easily obtained data.

    New York Magazine explains:

    “When you take all those records of who’s communicating with who, you can build social networks and communities for everyone in the world,” mathematician and NSA whistle-blower William Binney — “one of the best analysts in history,” who left the agency in 2001 amid privacy concerns — told Daily Intelligencer. “And when you marry it up with the content,” which he is convinced the NSA is collecting as well, “you have leverage against everybody in the country.”

    “You are unique in the world,” Binney explained, based on the identifying attributes of the machines you use. “If I want to know who’s in the tea party, I can put together the metadata and see who’s communicating with who. I can construct the network of the tea party. If I want to pass that data to the IRS, then I can do that. That’s the danger here.”

    At The New Yorker, Jane Mayer quoted mathematician and engineer Susan Landau’s hypothetical: “For example, she said, in the world of business, a pattern of phone calls from key executives can reveal impending corporate takeovers. Personal phone calls can also reveal sensitive medical information: ‘You can see a call to a gynecologist, and then a call to an oncologist, and then a call to close family members.’”

    “There’s a lot you can infer,” Binney continued. “If you’re calling a physician and he’s a heart specialist, you can infer someone is having heart problems. It’s all in the databases.” The data, he said, is “all compiled by code. The software does it all from the beginning — they have dossiers of everyone in the country. That’s done automatically. When you want to investigate or target somebody, a human becomes involved.”

    ***

    “The public doesn’t understand,” Landau told Mayer. “It’s much more intrusive than content.”

    The Guardian reports:

    The information collected on the AP [in the recent scandal regarding the government spying on reporters] was telephony metadata: precisely what the court order against Verizon shows is being collected by the NSA on millions of Americans every day.

    ***

    Discussing the use of GPS data collected from mobile phones, an appellate court noted that even location information on its own could reveal a person’s secrets: “A person who knows all of another’s travels can deduce whether he is a weekly churchgoer, a heavy drinker, a regular at the gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of particular individuals or political groups,” it read, “and not just one such fact about a person, but all such facts.”

    Indeed, the government’s spying on our metadata arguably violates our right to freedom of expression, guaranteed by numerous laws and charters including the U.S. Constitution, the European Convention on Human Rights, the Canadian Charter of Rights and Freedoms, and international law, including articles 20 and 23 of the Universal Declaration of Human Rights, and Conventions 87 and 98 of the International Labor Organization.

    Remember, a U.S. federal judge found that the statute allowing indefinite detention of Americans without due process has a “chilling effect” on free speech. Top reporters have said that they are less likely to interview controversial people, for fear of being accused of “supporting” terrorists.

    Given the insanely broad list of actions and beliefs which may get one labeled as a “potential terrorist” by local, state or federal law enforcement, the free association of Americans is being chilled. For example, people may be less willing to call their niece calling to end the Fed, their Occupy-attending aunt, their Tea Party-promoting cousin, their anti-war teacher, or their anti-fracking uncle.

    Spying on Americans’ metadata rolls back everything our freedom of association … and virtually everything the Founding Fathers fought for.

    Indeed, computer experts have used an analogy to explain how powerful metadata is: the English monarchy could have stopped the Founding Fathers in their tracks if they only possessed “metadata” regarding which colonist talked to whom.

    Postscript: The government is – in factgathering content, as well as metadata.

    And mass surveillance doesn’t work to keep us safe. It does, however, set up a technological framework allowing for “turnkey tyranny”.

    The Dirty Little Secret About Mass Surveillance: It Doesn’t Keep Us Safe



    William Binney knows as much about spying as anyone alive.

    Binney – a 32-year National Security Agency veteran – is the former head of the NSA’s global digital data gathering program, and a very highly-regarded cryptographer.

    Binney told Daily Caller yesterday that the spying “dragnet” being carried out by the government is useless:

    Daily Caller: There’s been some talk about the authorities having a recording of a phone call Tamerlan Tsarnaev had with his wife. That would be something before the bombing?

    Binney: Before the bombing, yes. [This information comes from former FBI counterrorism agent Tim Clemente.]

    Daily Caller: Then how would they have that audio?

    Binney: Because the NSA recorded it.

    Daily Caller: But apparently the Russians tipped off the FBI, which then did a cursory interview and cleared him. So how were they recording him?

    Binney: Because the Russians gave a warning for him as a target. Once you’re on a list, they start recording everything. That’s what I’m saying.

    Daily Caller: So why didn’t they prevent the bombing?

    Binney: Once you’ve recorded something, that doesn’t mean they have it transcribed. It depends on what they transcribe and what they do with the transcription.

    Daily Caller: So it seems logical to ask: Why do we need all of this new data collection when they’re not following up obvious leads, such as an intelligence agency calling and saying you need to be aware of this particular terrorist?

    Binney: It’s sensible to ask, but that’s exactly what they’re doing. They’re making themselves dysfunctional by collecting all of this data. They’ve got so much collection capability but they can’t do everything.

    ***

    Daily Caller: So what are they doing with all of this information? If they can’t stop the Boston marathon bombing, what are they doing with it?

    Binney: Well again, they’re putting an extra burden on all of their analysts. It’s not something that’s going to help them; it’s something that’s burdensome. There are ways to do the analysis properly, but they don’t really want the solution because if they got it, they wouldn’t be able to keep demanding the money to solve it. I call it their business statement, “Keep the problems going so the money keeps flowing.” It’s all about contracts and money.

    Daily Caller: But isn’t data collection getting easier and processing speeds getting faster and data collection cheaper? Isn’t the falling price one of the reasons they can collect data at this massive level?

    Binney: Yes, but that’s not the issue. The issue is, can you figure out what’s important in it? And figure out the intentions and capabilities of the people you’re monitoring? And they are in no way prepared to do that, because that takes analysis. That’s what the big data initiative was all about out of the White House last year. It was to try to get algorithms and figure out what’s important and tell the people what’s important so that they can find things. The probability of them finding what’s really there is low.

    Similarly, Fortune notes that the NSA’s “big data” strategy is ineffective:

    The evidence for big data is scant at best. To date, large fields of data have generated meaningful insights at times, but not on the scale many have promised. This disappointment has been documented in the Wall Street Journal, Information Week, and SmartData Collective.

    ***

    According to my firm’s research, local farmers in India with tiny fields frequently outperform — in productivity and sustainability — a predictive global model developed by one of the world’s leading agrochemical companies. Why? Because they develop unique planting, fertilizing, or harvesting practices linked to the uniqueness of their soil, their weather pattern, or the rare utilization of some compost. There is more to learn from a local Indian outlier than from building a giant multivariate yield prediction model of all farms in the world. The same is true for terrorism. Don’t look for a needle in a giant haystack. Find one needle in a small clump of hay and see whether similar clumps of hay also contain needles.

    You need local knowledge to glean insights from any data. I once ran a data-mining project with Wal-Mart (WMT) where we tried to figure out sales patterns in New England. One of the questions was, “Why are our gun sales lower in Massachusetts than in other states, even accounting for the liberal bias of the state?” The answer: There were city ordinances prohibiting the sale of guns in many towns. I still remember the disappointed look of my client when he realized the answer had come from a few phone calls to store managers rather than from a multivariate regression model.

    So, please, Mr. President, stop building your giant database in the sky and quit hoping that algorithm experts will generate a terrorist prevention strategy from that data. Instead, rely on your people in the field to detect suspicious local patterns of behavior, communication, or spending, then aggregate data for the folks involved and let your data hounds loose on these focused samples. You and I will both sleep better. And I won’t have to worry about who is lurking in the shadows of my business or bedroom.

    Likewise, Nassim Taleb writes:

    Big data may mean more information, but it also means more false information.

    ***
    Because of excess data as compared to real signals, someone looking at history from the vantage point of a library will necessarily find many more spurious relationships than one who sees matters in the making; he will be duped by moreepiphenomena. Even experiments can be marred with bias, especially when researchers hide failed attempts or formulate a hypothesis after the results — thus fitting the hypothesis to the experiment (though the bias is smaller there).



    This is the tragedy of big data: The more variables, the more correlations that can show significance. Falsity also grows faster than information; it is nonlinear (convex) with respect to data (this convexity in fact resembles that of a financial option payoff). Noise is antifragile. Source: N.N. Taleb

    If big data leads to more false correlations, then mass surveillance may lead to more false accusations of terrorism.

    Professor Jonathan Turley – one of the nation’s top constitutional and military law expertsnoted after the Boston bombing:

    For civil libertarians, all terrorist attacks come in two equally predictable parts.

    First, there is the terrorist attack itself — a sad reality of our modern life. Second, comes the inevitable explosion of politicians calling for new security measures and surveillance. We brace ourselves for this secondary blow, which generally comes before we even fully know what occurred in an attack or how it was allowed to occur.

    Politicians need to be seen as actively protecting public safety and the easiest way is to add surveillance, reduce privacy and expand the security state. What they are not willing to discuss is the impossibility of detecting and deterring all attacks. The suggestion is that more security measures translate to more public safety. The fact is that even the most repressive nations with the most abusive security services, places such as China and Iran, have not been able to stop terrorist acts.

    While police were still combing through the wreckage from the Boston Marathon, politicians ran to cameras to pledge more security measures and surveillance. Indeed, Chicago Mayor Rahm Emanuel demanded more cameras in response to the Boston attack. Chicago already is one of the most surveilled cities in the United States. Emanuel’s solution: add some more. It is a perfectly Pavlovian response of politicians eager to appear as champions of public safety.

    We need to resist the calls for a greater security state and put this attack into perspective. These two brothers built homemade bombs with over-the-counter pressure cookers. They placed the devices in one of the most surveilled areas of Boston with an abundance of police and cameras [Proof here]. There is only so much that a free nation can do to avoid such an attack. Two men walked in a crowd and put two bags down on the ground shortly before detonation.

    No one is seriously questioning the value of having increased surveillance and police at major events. That was already the case with the Boston Marathon. However, privacy is dying in the United States by a thousand papercuts from countless new laws and surveillance systems. Before we plunge ahead in creating a fishbowl society of surveillance, we might want to ask whether such new measures or devices will actually make us safer or just make us appear safer.

    Not only did mass surveillance fail to stop the Boston bombing, it also failed to stop 9/11:

    Widespread spying on Americans began before 9/11 (confirmed here and here. And see this [and this.])

    And U.S. and allied intelligence heard the 9/11 hijackers plans from their own mouths:


    • An FBI informant hosted and rented a room to two hijackers in 2000. Specifically, investigators for the Congressional Joint Inquiry discovered that an FBI informant had hosted and even rented a room to two hijackers in 2000 and that, when the Inquiry sought to interview the informant, the FBI refused outright, and then hid him in an unknown location, and that a high-level FBI official stated these blocking maneuvers were undertaken under orders from the White House. As the New York Times notes:

      Senator Bob Graham, the Florida Democrat who is a former chairman of the Senate Intelligence Committee, accused the White House on Tuesday of covering up evidence ….The accusation stems from the Federal Bureau of Investigation’s refusal to allow investigators for a Congressional inquiry and the independent Sept. 11 commission to interview an informant, Abdussattar Shaikh, who had been the landlord in San Diego of two Sept. 11 hijackers.







    • The National Security Agency and the FBI were each independently listening in on the phone calls between the supposed mastermind of the attacks and the lead hijacker. Indeed, the FBI built its own antenna in Madagascar specifically to listen in on the mastermind’s phone calls


    • According to various sources, on the day before 9/11, the mastermind told the lead hijacker “tomorrow is zero hour” and gave final approval for the attacks. The NSA intercepted the message that day and the FBI was likely also monitoring the mastermind’s phone calls






    • According to the Sunday Herald, two days before 9/11, Bin Laden called his stepmother and told her “In two days, you’re going to hear big news and you’re not going to hear from me for a while.” U.S. officials later told CNN that “in recent years they’ve been able to monitor some of bin Laden’s telephone communications with his [step]mother. Bin Laden at the time was using a satellite telephone, and the signals were intercepted and sometimes recorded.” Indeed, before 9/11, to impress important visitors, NSA analysts would occasionally play audio tapes of bin Laden talking to his stepmother.


    • And according to CBS News, at 9:53 a.m on 9/11, just 15 minutes after the hijacked plane had hit the Pentagon, “the National Security Agency, which monitors communications worldwide, intercepted a phone call from one of Osama bin Laden’s operatives in Afghanistan to a phone number in the former Soviet Republic of Georgia”, and secretary of Defense Rumsfeld learned about the intercepted phone call in real-time (if the NSA monitored and transcribed phone calls in real-time on 9/11, that implies that it did so in the months leading up to 9/11 as well)


    But even with all of that spying, the government didn’t stop the hijackers … even though 9/11 was entirely foreseeable.

    If you have a hard time believing that the government would push a program on the basis of national security which impinges on our freedoms and yet is ineffective in keeping us safe, please review the following statements by top national security experts saying that the following government programs do nothing at all to make us safer:












    http://www.zerohedge.com/contributed...our-phonecalls

    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  2. #2
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    22 Nauseating Quotes From Hypocritical Establishment Politicians About The NSA Spying Scandal

    By Michael, on June 12th, 2013

    Establishment politicians from both major political parties are rushing to defend the NSA and condemn whistleblower Edward Snowden. They are attempting to portray Edward Snowden as a "traitor" and the spooks over at the NSA that are snooping on all of us as "heroes". In fact, many of the exact same politicians that once railed against government spying during the Bush years are now staunchly defending it now that Obama is in the White House. But it isn't just Democrats that are acting shamefully.

    Large numbers of Republican politicians that love to give speeches about "freedom" and "liberty" are attempting to eviscerate the Fourth Amendment to the U.S. Constitution. The government is not supposed to invade our privacy and investigate us unless there is probable cause to do so. Apparently many of our politicians misunderstood when they read the novel 1984 by George Orwell. It wasn't supposed to be an instruction manual. We should be thanking Edward Snowden for exposing the deep corruption that is eating away at our own government like cancer. Now the American people need to pick up the ball and start demanding answers, because without a doubt we are going to see establishment politicians from both major political parties try to shut this scandal down. Establishment Democrats and establishment Republicans both love the Big Brother surveillance grid that the U.S. government has constructed, and they are both making it abundantly clear that they will defend the NSA to the very end. The following are 22 nauseating quotes from hypocritical establishment politicians that show exactly how they feel about the NSA spying scandal...

    #1 Barack Obama: "I think it’s important to understand that you can’t have 100 percent security and then have 100 percent privacy and zero inconvenience. We’re going to have to make some choices as a society."

    #2 Barack Obama in 2007: "This Administration also puts forward a false choice between the liberties we cherish and the security we demand… That means no more illegal wire-tapping of American citizens. No more national security letters to spy on citizens who are not suspected of a crime. No more tracking citizens who do nothing more than protest a misguided war. No more ignoring the law when it is inconvenient. That is not who we are. And it is not what is necessary to defeat the terrorists… We will again set an example for the world that the law is not subject to the whims of stubborn rulers, and that justice is not arbitrary."

    #3 Speaker Of The House John Boehner on what he thinks about NSA leaker Edward Snowden: "He’s a traitor."

    #4 U.S. Senator Lindsey Graham: "I hope we follow Mr. Snowden to the ends of the Earth to bring him to justice."

    #5 U.S. Senator Al Franken: "I can assure you, this is not about spying on the American people."

    #6 Senate Majority Leader Harry Reid: "For senators to complain that they didn’t know this was happening, we had many, many meetings that have been both classified and unclassified that members have been invited to"

    #7 U.S. Senator Mitch McConnell: "Given the scope of these programs, it’s understandable that many would be concerned about issues related to privacy. But what’s difficult to understand is the motivation of somebody who intentionally would seek to warn the nation’s enemies of lawful programs created to protect the American people. And I hope that he is prosecuted to the fullest extent of the law."

    #8 U.S. Representative Peter King on why he believes that reporters should be prosecuted for revealing NSA secrets: "There is an obligation both moral, but also legal, I believe, against a reporter disclosing something which would so severely compromise national security."

    #9 Director of National Intelligence James Clapper making a joke during an awards ceremony last Friday night: "Some of you expressed surprise that I showed up—so many emails to read!"

    #10 Director Of National Intelligence James Clapper about why he lied about NSA spying in front of Congress: "I responded in what I thought was the most truthful, or least untruthful manner"

    #11 National Security Council spokeswoman Caitlin Hayden: "The president has full faith in director Clapper and his leadership of the intelligence community"

    #12 White House press secretary Jay Carney: "...Clapper has been straight and direct in the answers that he's given, and has actively engaged in an effort to provide more information about the programs that have been revealed through the leak of classified information"

    #13 Dianne Feinstein, the chairwoman of the Senate intelligence committee: "There is no more direct or honest person than Jim Clapper."

    #14 Gus Hunt, the chief technology officer at the CIA: "We fundamentally try to collect everything and hang onto it forever."

    #15 Barack Obama: "Nobody is listening to your telephone calls."

    #16 Keith Alexander, director of the National Security Agency: "We do not see a tradeoff between security and liberty."

    #17 An exchange between NSA director Keith Alexander and U.S. Representative Hank Johnson in March 2012...

    JOHNSON: Does the NSA routinely intercept American citizens’ emails?
    ALEXANDER: No.
    JOHNSON: Does the NSA intercept Americans’ cell phone conversations?
    ALEXANDER: No.
    JOHNSON: Google searches?
    ALEXANDER: No.
    JOHNSON: Text messages?
    ALEXANDER: No.
    JOHNSON: Amazon.com orders?
    ALEXANDER: No.
    JOHNSON: Bank records?
    ALEXANDER: No.

    #18 Deputy White House press secretary Dana Perino: "The intelligence activities undertaken by the United States government are lawful, necessary and required to protect Americans from terrorist attacks"

    #19 U.S. Senator Saxby Chambliss: "This is nothing new. It has proved meritorious because we have gathered significant information on bad guys and only on bad guys over the years."

    #20 Former U.N. Ambassador John Bolton on NSA leaker Edward Snowden: "Let me ask, who died and made him king? Who gave him the authority to endanger 300 million Americans? That's not the way it works, and if he thinks he can get away with that, he's got another think coming."

    #21 Senior spokesman for the NSA Don Weber: "Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide"

    #22 The White House website: "My administration is committed to creating an unprecedented level of openness in government. We will work together to ensure the public trust and establish a system of transparency, public participation, and collaboration."

    Right now, the NSA is building a data collection center out in Utah that is so massive that it is hard to describe with words. It is going to cost 40 million dollars a year just to provide the energy needed to run it. According to a 2012 Wired article entitled "The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)", this data center will contain "the complete contents of private emails, cell phone calls, and Google searches" in addition to "parking receipts, travel itineraries, bookstore purchases" and anything else that the NSA decides to collect...

    Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

    The goal is to know as much about everyone on the planet as possible.

    And the NSA does not keep this information to itself. As an article in USA Today recently reported, the NSA shares the data that it collects with other government agencies "as a matter of practice"...

    As a matter of practice, the NSA regularly shares its information — known as "product" in intelligence circles — with other intelligence groups.

    So when the NSA collects information about you, there is a very good chance that the FBI, the CIA, the Department of Homeland Security and the IRS will have access to it as well.

    But the U.S. government is not the only one collecting data on American citizens.

    Guess who else has been collecting massive amounts of data on the American people?

    Barack Obama.

    According to those that have seen it, the "Obama database" is unlike anything that any politician has ever put together before. According to CNSNews.com, U.S. Representative Maxine Waters says that this database "will have information about everything on every individual"...

    "The president has put in place an organization that contains a kind of database that no one has ever seen before in life," she added. "That’s going to be very, very powerful."

    Martin asked if Waters if she was referring to "Organizing for America."

    "That’s right, that’s right," Waters said. "And that database will have information about everything on every individual in ways that it’s never been done before."

    Waters said the database would also serve future Democratic candidates seeking the presidency.

    Perhaps this helps to explain why so many big donors got slapped with IRS audits immediately after they wrote big checks to the Romney campaign.

    We are being told to "trust" Barack Obama and the massive government surveillance grid that is being constructed all around us, but there has been example after example of government power being grossly abused in recent years.
    A lot of Americans say that they do not care if the government is watching them because they do not have anything to hide, but is there anyone out there that would really not mind the government watching them and listening to them 24 hours a day?

    For example, it has been documented that NSA workers eavesdropped on conversations between U.S. soldiers serving in Iraq and their loved ones back home. Some of these conversations involved very intimate talk between husbands and wives. The following is from a 2008 ABC News story...

    Faulk says he and others in his section of the NSA facility at Fort Gordon routinely shared salacious or tantalizing phone calls that had been intercepted, alerting office mates to certain time codes of "cuts" that were available on each operator's computer.

    "Hey, check this out," Faulk says he would be told, "there's good phone sex or there's some pillow talk, pull up this call, it's really funny, go check it out. It would be some colonel making pillow talk and we would say, 'Wow, this was crazy'," Faulk told ABC News.

    Faulk said he joined in to listen, and talk about it during breaks in Back Hall's "smoke pit," but ended up feeling badly about his actions.

    Is this really what we want the future of America to look like?

    Do we really want the government to watch us and listen to us during our most intimate moments?

    Feel free to express what you think about this NSA spying scandal by posting a comment below...


    Be Sociable, Share!

    June 12th, 2013 | Tags: Big Brother, Cancer, Corruption, Democrats,Edward Snowden, Establishment Politicians, Freedom, Government Spying, Liberty, NSA Spying Scandal, Obama, Privacy, Republicans,Scandal, Surveillance, The American People, The Fourth Amendment,The NSA, The U.S. Constitution | Category: Commentary

    http://theeconomiccollapseblog.com/a...spying-scandal
    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  3. #3
    Senior Member AirborneSapper7's Avatar
    Join Date
    May 2007
    Location
    South West Florida (Behind friendly lines but still in Occupied Territory)
    Posts
    117,696
    NSA Deception Operation? Questions Surround Leaked PRISM Document’s Authenticity

    Was Edward Snowden spotted before he decided to leak documents, and set up by the NSA?

    By Steve Kinney
    Global Research, June 12, 2013


    Region: USA
    Theme: Intelligence





    “I can’t in good conscience allow the US government to destroy privacy, Internet freedom and basic liberties for people around the world with this massive surveillance machine they’re secretly building.” - Edward Snowden
    Intelligence services have been feeding false information to known enemy informants in their own ranks for a long time, and they are very good at it.
    Today, the potential whistleblower is one of the most dangerous informants an intelligence service can confront.
    Was Edward Snowden spotted before he decided to leak documents, and set up by the NSA?
    Substantial evidence supports the possibility that he was. Numerous questions cast doubt on the authenticity of the Power Point slide show describing PRISM, but the UK Guardian has not seen fit to release it to the public. Perhaps Glenn Greenwald should anonymously leak this file: In the words of Snowden himself, “The public needs to decide.”
    Was Edward Snowden under surveillance at intelligence contractor Booz Allen in advance of releasing the PRISM document?
    In the wake of the Wikileaks scandals, the U.S. intelligence community has answered “Who shall watch the watchmen?” by introducing active surveillance and detailed profiling of their own analysts and contractors, looking for potential whistleblowers.[1] By his own account, Snowden often discussed perceived Agency wrongdoing with his co-workers, which suggests that he should have been profiled and flagged as a potential leaker by the NSA’s internal surveillance process.
    Interviewd by Glenn Greenwald, Snowden described his workplace behavior in the time leading up to his decision to leak documents:
    “When you see everything, you see them on a more frequent basis and you recognize that some of these things are actually abuses, and when you talk about them in a place like this, were this is the normal state of business, people tend not to take them very seriously and move on from them. But over time that awareness of wrongdoing sort of builds up and you feel compelled to talk about it, and the more you talk about it, the more you’re ignored, the more you’re told it’s not a problem, until eventually you realize that these things need to be determined by the public, not by somebody who is simply hired by the government.”[2]
    Questioning The Document
    Classified DoD briefing files are created to meet formal style specifications and are subject to stringent internal reviews. After the publication of pages from the PRISM presentation, independent analysts were quick to notice and report substantial deficiencies in the document.[3] Others have expressed serious doubts about the PRISM slide show’s pedigree, including the NSA’s former top attorney:
    “Stewart Baker, the NSA’s general counsel in the 1990s and now an attorney at Steptoe and Johnson, said he was not familiar with PRISM or similar government activity, but the leaked Powerpoint presentation sounds “flaky,” as do the initial reports.
    “The Powerpoint is suffused with a kind of hype that makes it sound more like a marketing pitch than a briefing — we don’t know what its provenance is and we don’t know the full context,” Baker said. He added, referring to the Post’s coverage: “It looks rushed and it looks wrong.” – Declan McCullagh, Wired, June 7, 2013[4]
    The logos of major U.S. IT and communication service providers are splashed across the top of PRISM power point slides like sponsor patches on a NASCAR driver’s jacket. Vendor logos often do appear next to product illustrations in DoD briefing documents, and are sometimes used to indicate a vendor’s position in process or procurement flow charts. But the “ad banner” format present in the leaked PRISM slides is very unusual and apparently unique to the PRISM document. All of the vendors named have vehemently denied knowledge of the PRISM program described in the slides.[5] Some of these denials, such as those by Twitter and Google, are from companies which have previously fought court battles against arbitrary disclosure of their users’ data to Federal agencies.[6]
    A second PRISM?
    Unclassified documents available on the Internet identify a completely different PRISM program, a powerful integrated network communications tool for Department of Homeland Security counter-terrorism crisis management. This PRISM integrates incident reporting, GPS tracking of emergency service and law enforcement vehicles, “outbound 911″ public alert networks, CBN and other technical sensor data, etc. A detailed, unclassified 2004 description of the “DHS PRISM” is available at Cryptome.[7] A 2007 report from the RAND Corporation defines PRISM as a “Planning Tool for Resource Integration, Synchronization, and Management”[8]. It seems unlikely that two network-centric programs as large and different as the DHS and NSA PRISMs, both operating inside the United States, would bear the same name. Only Monty Python calls everyone Bruce “to avoid confusion.”
    Would the NSA lie to us?
    The National Security Administration is one of the country’s most officially secretive agencies. In the Washington press corps, its popular nicknames have included “No Such Agency” and the “Never Say Anything” agency.
    It is against long standing Agency policy to comment directly on any classified matter, and its Directors have consistently refused to confirm or deny any Agency activity when questioned by the press. But when the UK Guardian broke the story of the PRISM leak, the Director of National Intelligence promptly confirmed the document as authentic, calling the leak “reprehensible”:
    “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.” – James R. Clapper, Director of National Intelligence[9]
    This very unusual confirmation raises more questions about the PRISM document than it answers.
    Is it possible that the PRISM leak was set up by the NSA as a deception operation in support of the Obama Administration’s ongoing wars against whistleblowers and the 4th Amendment? Documents from Federal intelligence contractor HBGary, published in 2011 by anonymous hackers, include a Power Point presentation proposing methods for attacking Wikileaks, and this document names Glenn Greenwald, who broke the PRISM story, as a specific target:
    “The presentation, which has been seen by The Independent, recommends a multi-pronged assault on WikiLeaks including deliberately submitting false documents to the website to undermine its credibility, pioneering cyber attacks to expose who the leakers to WikiLeaks are and going after sympathetic journalists.
    “One of those mentioned is Glenn Greenwald, a pro-WikiLeaks reporter in the US. Writing on Salon.com. Greenwald stated that his initial reaction was “to scoff at its absurdity.” – Jerome Taylor, The Independent[10]
    The UK Guardian released the PRISM story on the opening day of PFC Bradley Manning’s court martial. The leaked PRISM document will certainly influence public debate on both whistleblower protections and State surveillance – and influence is one of our intelligence community’s regular daily chores. Some commentators have been very quick to present forceful talking points in favor of free and unrestrained State surveillance[11], and there is growing consensus that reports depicting PRISM as a mass domestic surveillance dragnet were a false alarm. The Washington Post, which broke the story at the same time as the UK Guardian, has walked back its position on the civil rights implications of the PRISM materials.[12] Meanwhile, it seems that everyone has forgotten about Romas/COIN.
    Universal Surveillance: Romas/COIN, Odyssey and beyond
    The same security breach at HBGary that revealed formal proposals to plant false leaks and target reporter Glenn Greenwald personally, also disclosed the existence of a real surveillance program with dramatically more dangerous civil liberty implications than PRISM: Romas/COIN, and its planned successor, Odyssey. Barrett Brown summarizes what is known about this program in an article on the Project PM website:
    “A successful bid for the relevant contract was seen to require the combined capabilities of perhaps a dozen firms – capabilities whereby millions of conversations can be monitored and automatically analyzed, whereby a wide range of personal data can be obtained and stored in secret, and whereby some unknown degree of information can be released to a given population through a variety of means and without any hint that the actual source is U.S. military intelligence. All this is merely in addition to whichever additional capabilities are not evident from the limited description available, with the program as a whole presumably being operated in conjunction with other surveillance and propaganda assets controlled by the U.S. and its partners.”[13]
    According to its internal e-mail from 2010 and 2011, HBGary was a prime contractor coordinating bids from Google, Apple, AT&T and others to build an expanded, upgraded version of the Romas/COIN information warfare system. Minor publicity attending the naming of these high profile vendors in the HBGary documents may have inspired the NASCAR-style sponsor logos decorating the dubious PRISM slides.
    When HBGary’s e-mails were disclosed, the Odyssey bid was on hold with HBGary and its partners waiting for a revision in program requirements from the DoD. Two years have passed since HBGary was preparing to bid against Northrop Grumman for the prime contractor position on the Odyssey program. Odyssey should now be completed or nearing completion.
    Is it possible that the PRISM leak was intended to mislead the American people into dramatically under-estimating the real domestic surveillance capabilities of our National Security Agency? You might well think so, but this reporter could not possibly comment.
    Notes
    1) Eric Schmitt, White House Orders New Computer Security Rules, New York Times, October 6, 2011
    https://www.nytimes.com/2011/10/07/u...ity-rules.html
    2) Glenn Greenwald interviews Edward Snowden, Guardian US, Sunday 9 June 2013
    http://www.guardian.co.uk/world/vide...nterview-video
    3) Are the NSA’s PRISM slides photoshopped?, Top Level Telecommunications, June 7, 2013
    http://electrospaces.blogspot.nl/201...toshopped.html
    4) Declan McCullagh, “No evidence of NSA’s ‘direct access’ to tech companies”, Wired, June 7, 2013 at
    http://news.cnet.com/8301-13578_3-57...ech-companies/
    5) Joanna Stern, NSA PRISM: Dissecting the Tech Companies’ Adamant Denials of Involvement in Government Spying Program, ABC News, June 7, 2013
    http://abcnews.go.com/Technology/nsa...ry?id=19350095
    6) Declan McCullagh, Justice Department tries to force Google to hand over user data, CNET News, May 31, 2013
    http://news.cnet.com/8301-13578_3-57...ver-user-data/
    Declan McCullagh, DOJ sends order to Twitter for WikiLeaks-related account info, CNET News, January 7, 2011
    http://news.cnet.com/8301-31921_3-20027893-281.html
    7) MAJ Gregg Powell and COL Charles Dunn III, Homeland Security: Requirements for Installation Security Decision Support Systems, Battle Command Battle Lab (Gordon), March 21, 2004
    http://cryptome.org/2013/06/dhs-prism.pdf
    Carl Rhodes, Jeff Hagen, Mark Westergren, A Strategies-to-Tasks Framework for Planning and Executing Intelligence, Surveillance, and Reconnaissance (ISR) Operations, RAND Corporation, 2007
    http://www.rand.org/pubs/technical_reports/TR434.html
    9) James R. Clapper, Director of National Intelligence, DNI Statement on Activities Authorized Under Section 702 of FISA, June 06, 2013
    http://www.dni.gov/index.php/newsroo...on-702-of-fisa
    10) Jerome Taylor, The US bank and the secret plan to destroy WikiLeaks, The Independent February 13, 2011
    http://www.independent.co.uk/news/wo...s-2215059.html
    11) Tim Worstall, NSA’s PRISM Sounds Like A Darn Good Idea To Me: This Is What Governments Are For, Forbes, June 7, 2011
    http://www.forbes.com/sites/timworst...ments-are-for/
    12) Peter Weber, Is the NSA PRISM leak much less than it seems?, Yahoo! News, Jun 10, 2013
    http://news.yahoo.com/nsa-prism-leak...l?.tsrc=rtlde/
    13) Barrett Brown, Romas/COIN, Project PM, http://wiki.echelon2.org/wiki/Romas/COIN,
    See also Barrett Brown, A sinister cyber-surveillance scheme exposed, UK Guardian, June 22, 2011
    http://www.guardian.co.uk/commentisf...king-anonymous
    Steve Kinney is an independent researcher and writer on computer and network security topics, with a long standing interest in the civil and human rights implications of Internet censorship and surveillance by State and corporate actors.

    http://www.globalresearch.ca/nsa-dec...ticity/5338673

    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  4. #4
    Banned
    Join Date
    Jun 2013
    Posts
    8,546
    Passed in Missouri and to the Voters: Bill to Protect Electronic Communications and Data

    JEFFERSON CITY, Mo., May 16, 2014 – Legislation to protect electronic communications and data was given final approval by the Missouri State Senate today. Because it is a proposal for a state constitutional amendment, it will now bypass the Governor’s desk, instead going directly to the People on the ballot this November.

    When proponents of mass, warrantless surveillance are backed into a corner on the basis that such activities violate the 4th Amendment’s warrant requirements, they often make the claim that electronic data is outside the scope of the amendment because it doesn’t qualify as “persons, houses, papers, or effects.”

    Instead of worrying about a long legal debate with opponents who likely hold a political agenda, the Missouri legislature took a different path. They passed legislation to expressly give “electronic data and communications” the same state constitutional protections as “persons, homes, papers and effects.”

    Introduced by Sen. Rob Schaaf, Senate Joint Resolution 27 (SJR27) was passed by the full House today. It previously passed the Senate by a vote of 31-1.

    The text of SJR27 is short and concise, replacing the “privacy rights” section in the state constitution with the following language adding electronic communications to the objects protected from search or seizure without a warrant.

    “That the people shall be secure in their persons, papers, homes [and], effects, and electronic communications and data, from unreasonable searches and seizures; and no warrant to search any place, or seize any person or thing, or access electronic data or communication, shall issue without describing the place to be searched, or the person or thing to be seized, or the data or communication to be accessed, as nearly as may be; nor without probable cause, supported by written oath or affirmation.”

    The effect of this resolution would be significant. The addition of electronic communications to the list of privacy items would make emails, phone records, Internet records and other electronic information gathered without a warrant inadmissible in state court. That would include data gathered illegally by overzealous state and local law enforcement as well as the federal government.

    OffNow coalition spokesman Shane Trejo welcomed the progress that SJR27 represents in the on-going battle against warrantless spying.
    “While Missouri might not be able to physically stop the NSA and other federal agencies from collecting our data without a warrant, legislation such as this can significantly reduce the practical effect of what they are trying to do with it. Compliance with the NSA’s illegal spying program would be illegal in Missouri if this is passed, and that is no small feat,” he said.

    SJR27 addresses one aspect of OffNow’s campaign to thwart NSA spying at the state and local level – data sharing.
    As Reuters reported in August, 2013, the secretive Special Operations Division (SOD) is “funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.”

    Documents obtained by Reuters show that these cases “rarely involve national security issues,” and that local law enforcement is directed by SOD to “conceal how such investigations truly begin.”

    Reports in the Washington Post and USA Today last fall documented how “the FBI and most other investigative bodies in the federal government” are regularly using a mobile device known as a “stingray” to intercept and collect electronic data without a warrant. Local and state police “have access through sharing agreements.”

    SJR27 will now move to the November ballot, where approval by a majority vote of the people will make it a part of the state constitution and give it legal force.

    http://blog.tenthamendmentcenter.com.../#.U3oCwC9qP5Y


Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •