June 2013 archive

On This Day In History June 26

This is your morning Open Thread. Pour your favorite beverage and review the past and comment on the future.

Find the past “On This Day in History” here.

Click on images to enlarge.

June 26 is the 177th day of the year (178th in leap years) in the Gregorian calendar. There are 188 days remaining until the end of the year.

On this day in 1959, St. Lawrence Seaway opened.

In a ceremony presided over by U.S. President Dwight D. Eisenhower and Queen Elizabeth II, the St. Lawrence Seaway is officially opened, creating a navigational channel from the Atlantic Ocean to all the Great Lakes. The seaway, made up of a system of canals, locks, and dredged waterways, extends a distance of nearly 2,500 miles, from the Atlantic Ocean through the Gulf of St. Lawrence to Duluth, Minnesota, on Lake Superior.

History

The Saint Lawrence Seaway was preceded by a number of other canals. In 1871, locks on the Saint Lawrence allowed transit of vessels 186 ft (57 m) long, 44 ft 6 in (13.56 m) wide, and 9 ft (2.7 m) deep. The Welland Canal at that time allowed transit of vessels 142 ft (43 m) long, 26 ft (7.9 m) wide, and 10 ft (3.0 m) deep, but was generally too small to allow passage of larger ocean-going ships.

The first proposals for a binational comprehensive deep waterway along the St. Lawrence came in the 1890s. In the following decades the idea of a power project became inseparable from the seaway – in fact, the various governments involved believed that the deeper water created by the hydro project were necessary to make the seaway channels feasible. American proposals for development up to and including the First World War met with little interest from the Canadian federal government. But the two national government submitted St. Lawrence plans, and the Wooten-Bowden Report and the International Joint Commission both recommended the project in the early 1920s. Although the Liberal Mackenzkie King was reluctant to proceed, in part of because of opposition to the project in Quebec, in 1932 the two countries inked a treaty. This failed to receive the assent of Congress. Subsequent attempts to forge an agreement in the 1930s came to naught as the Ontario government of Mitchell Hepburn, along with Quebec, got in the way. By 1941, President Roosevelt and Prime Minister King made an executive agreement to build the joint hydro and navigation works, but this too failed to receive the assent of Congress. Proposals for the seaway were met with resistance from railway and port lobbyists in the United States.

In the post-1945 years, proposals to introduce tolls still could not induce the U.S. Congress to approve the project. Growing impatient, and with Ontario desperate for hydro-electricity, Canada began to consider “going it alone.” This seized the imagination of Canadians, engendering a groundswell of St. Lawrence nationalism. Fueled by this support, the Canadian Louis St. Laurent government decided over the course of 1951 and 1952 to construct the waterway alone, combined with a hydro project (which would prove to be the joint responsibility of Ontario and New York – as a power dam would change the water levels, it required bilateral cooperation). However, the Truman and Eisenhower administrations considered it a national security threat for Canada to alone control the deep waterway, and used various means – such as delaying and stalling the Federal Power Commission license for the power aspect – until Congress in early 1954 approved an American seaway role via the Wiley act. Canada, out of concern for the ramifications of the bilateral relationship, reluctantly acquiesced.

In the United States, Dr. N.R. Danelian (who was the Director of the 13 volume St. Lawrence Seaway Survey in the U.S. Department of Navigation (1932-1963)), worked with the U.S. Secretary of State on Canadian-United States issues regarding the Seaway and worked for over 15 years on passage of the Seaway Act. He later became President of the Great Lakes St. Lawrence Association to further the interests of the Seaway development to benefit the American Heartland.

The seaway opened in 1959 and cost $638 million in Canadian dollars, $336.2 million of which was paid by the U.S. government.[1] Queen Elizabeth II and President Dwight D. Eisenhower formally opened the Seaway with a short cruise aboard Royal Yacht Britannia after addressing the crowds in St. Lambert, Quebec.

The seaway’s opening is often credited with making the Erie Canal obsolete, thus setting off the severe economic decline of several cities in Upstate New York.

More Video

The Last Word

Yellow Journalism

Assange on Manning

Chronic Tonic: Fun With Fibromyalgia!

Originally posted at Voices on the Square

Yes! It’s Tonic Time Again!

This week I’m dealing with one of those regally crappy oh so much fun aspects of Fibromyalgia, lucky girl that I am!

I am the classic princess and the pea. I can feel every single bump in my mattress, every last wrinkle in the sheets, any bunching of my pajamas – everything. Normally, the biggest problem I have with this is a little soft bruising wherever the “pea” lumpy was, or that my hip joint starts hurting and i have to turn over: wash rinse repeat.

Spying on Each Other

The revelation of a federal program to “Keep America Safe” got little notice amidst the hullabaloo over the hunt for Edward Snowden. McClatchy News reported on The pervasive program created under the Obama administration to stop leaks and “security threats,” requiring “federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions.”

President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.

Government documents reviewed by McClatchy illustrate how some agencies are using that latitude to pursue unauthorized disclosures of any information, not just classified material. They also show how millions of federal employees and contractors must watch for “high-risk persons or behaviors” among co-workers and could face penalties, including criminal charges, for failing to report them. Leaks to the media are equated with espionage. [..]

As part of the initiative, Obama ordered greater protection for whistleblowers who use the proper internal channels to report official waste, fraud and abuse, but that’s hardly comforting to some national security experts and current and former U.S. officials. They worry that the Insider Threat Program won’t just discourage whistleblowing but will have other grave consequences for the public’s right to know and national security.

The program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations of loyal Americans, according to these current and former officials and experts. Some non-intelligence agencies already are urging employees to watch their co-workers for “indicators” that include stress, divorce and financial problems.

in an unusual Sunday article at Esquire’s Politics Blog, Charles Pierce’s reacted to this program with these remarks:

(T)he Obama administration is the most fertile environment for paranoids since the Nixon people first cut a check to Egil Krogh. [..]

You want “Nixonian”? This, right here, this is Nixonian, if Nixon had grown up in East Germany. You’ve got the entire federal bureaucracy looking for signs of “high-risk persons or behaviors” the way Nixon sent Fred Malek out to count the Jews. You’ve got created within the entire federal bureaucracy a culture of spies and informers, which will inevitably breed fear and deceit and countless acts of interoffice treachery. (Don’t like your boss at the Bureau Of Land Management? Hmm, he looks like a high-risk person. Tell someone.) And this is the clincher.

   Hammer this fact home . . . leaking is tantamount to aiding the enemies of the United States,” says a June 1, 2012, Defense Department strategy for the program that was obtained by McClatchy.

And, out in Yorba Linda, there is a dark stirring deep in the earth, and a faint chuckling is heard in the midnight breeze. [..]

No, Mr. Current President, this is not business as usual. This is not even the NSA sifting through e-mails and phone calls. This is giving Big Brother a desk in every federal agency and telling him to go to work.



Transcript can be read here

For nearly two years, the White House has waged a program called “Insider Threat” that forces government employees to remain on the constant lookout for their colleagues’ behavior and to report their suspicions. It targets government officials who leak any information, not just classified material. All of this leads McClatchy to warn: “The [Insider Threat] program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations.” We’re joined by the reporter who helped break the story, Jonathan Landay, senior national security and intelligence reporter for McClatchy Newspapers. Landay also discusses his reporting that revealed how drone strikes carried out in Pakistan over a four-year period ran contrary to standards set forth publicly by President Obama.

This is what a police state looks like.

Punting the Pundits

“Punting the Pundits” is an Open Thread. It is a selection of editorials and opinions from around the news medium and the internet blogs. The intent is to provide a forum for your reactions and opinions, not just to the opinions presented, but to what ever you find important.

Thanks to ek hornbeck, click on the link and you can access all the past “Punting the Pundits”.

Follow us on Twitter @StarsHollowGzt

Valerie Plame Wilson and Joe Wilson: The NSA’s Metastasized Intelligence-Industrial Complex Is Ripe for Abuse

Where oversight and accountability have failed, Snowden’s leaks have opened up a vital public debate on our rights and privacy

Let’s be absolutely clear about the news that the NSA collects massive amounts of information on US citizens – from emails, to telephone calls, to videos, under the Prism program and other Fisa court orders: this story has nothing to do with Edward Snowden. As interesting as his flight to Hong Kong might be, the pole-dancing girlfriend, and interviews from undisclosed locations, his fate is just a sideshow to the essential issues of national security versus constitutional guarantees of privacy, which his disclosures have surfaced in sharp relief.

Snowden will be hunted relentlessly and, when finally found, with glee, brought back to the US in handcuffs and severely punished. (If Private Bradley Manning’s obscene conditions while incarcerated are any indication, it won’t be pleasant for Snowden either, even while awaiting trial.) Snowden has already been the object of scorn and derision from the Washington establishment and mainstream media, but, once again, the focus is misplaced on the transiently shiny object. The relevant issue should be: what exactly is the US government doing in the people’s name to “keep us safe” from terrorists?

Dean Baker: Baffling Budget Numbers: Making Reporters Do Their Job

Polls consistently show that the vast majority of the public has almost no idea of where their tax dollars go.

They tend to hugely overestimate the portion of the budget that goes to items such as food stamps, public broadcasting and foreign aid, and to underestimate the importance of Medicare, the military and other core items in the budget. As a result, people are often ill-informed when it comes to political debates on budget priorities.

This can lead to absurd situations where large numbers of people tell pollsters things like they would like to see foreign aid cut. But then say they would like government to spend much more in this area than we are now spending.

John Nichols: Glenn Greenwald is “Aiding and Abetting” Democracy

Criminalizing investigative reporting may undermine and intimidate journalism, but it is even more devastating to democracy. Thomas Jefferson got it right when explained to John Jay that: “Our liberty cannot be guarded but by the freedom of the press, nor that be limited without danger of losing it.”

Jefferson’s friend and comrade, Tom Paine argued similarly that citizens must be informed in order to be free. “A nation under a well regulated government, should permit none to remain uninstructed,” he observed in The Rights of Man. “It is monarchical and aristocratical government only that requires ignorance for its support.”

Jefferson, Paine and their contemporaries often griped about the newspapers of their day. But they recognized, correctly, that the chains of ignorance had to be broken. They supported a free and freewheeling press as an underpinning of democracy in their day. As we should in ours.

New York Times Editorial Board: A Reprieve for Affirmative Action

By a vote of 7 to 1 on Monday, the Supreme Court issued a narrow ruling about a public university’s use of race as a factor in admissions. The good news is that the court affirmed major precedents going back 35 years. It asserted that a more diverse student body – and an admission policy that helps produce one – serves a compelling interest of government by achieving educational and social benefits. Diversity, in turn, helps realize what the court has called “the dream of one nation, indivisible.”

At the same time, the court sent the case at hand – Fisher v. University of Texas at Austin – back for review by the United States Court of Appeals for the Fifth Circuit, which had upheld the university’s use of race in its admissions policy. The court did not say that race could not be used to achieve diversity. It did say, however, that the appeals court must closely reconsider the university’s admissions process to determine whether a race-neutral approach could achieve the level of diversity it seeks.

Richard (RJ) Eskow: On Too Big to Fail, All the Warning Lights Are Flashing Red (VIDEO)

“Too Big to Fail” banks played a key role in causing the last financial crisis. Since then they’ve grown even bigger, without much discouragement from the government (and in some cases with government support). Not a single executive has been prosecuted, despite their rampant lawbreaking, which means that there’s been no effective deterrent against reckless and illegal behavior.

And, with millions still unemployed and hundreds of millions still suffering the economic after-effects of the last crisis, we’re just about due for the next one.  That’s why we convened a panel at last weekend’s Netroots Nation conference titled “Stopping the Next Depression: Ending Too Big to Fail.”  And that’s why our first question was, “What would happen if the 40 million people who live in underwater American homes went on a mortgage strike?”

Norman Solomon: The Pursuit of Edward Snowden: Washington in a Rage, Striving to Run the World

Rarely has any American provoked such fury in Washington’s high places. So far, Edward Snowden has outsmarted the smartest guys in the echo chamber — and he has proceeded with the kind of moral clarity that U.S. officials seem to find unfathomable.

Bipartisan condemnations of Snowden are escalating from Capitol Hill and the Obama administration. More of the NSA’s massive surveillance program is now visible in the light of day — which is exactly what it can’t stand.

The central issue is our dire shortage of democracy. How can we have real consent of the governed when the government is entrenched with extreme secrecy, surveillance and contempt for privacy?

On This Day In History June 25

This is your morning Open Thread. Pour your favorite beverage and review the past and comment on the future.

Find the past “On This Day in History” here.

Click on images to enlarge.

June 25 is the 176th day of the year (177th in leap years) in the Gregorian calendar. There are 189 days remaining until the end of the year.

On this day in 1876, Native American forces led by Chiefs Crazy Horse and Sitting Bull defeat the U.S. Army troops of Lieutenant Colonel George Armstrong Custer in a bloody battle near southern Montana’s Little Bighorn River.

Background

In 1875, Sitting Bull created the Sun Dance alliance between the Lakota and the Cheyenne, a religious ceremony which celebrates the spiritual rebirth of participants. One had taken place around June 5, 1876, on the Rosebud River in Montana, involving Agency Native Americans who had slipped away from their reservations to join the hostiles. During the event, Sitting Bull reportedly had a vision of “soldiers falling into his camp like grasshoppers from the sky.” At the same time, military officials had a summer campaign underway to force the Lakota and Cheyenne back to their reservations, using infantry and cavalry in a three-pronged approach.

Col. John Gibbon’s column of six companies of the 7th Infantry and four companies of the 2nd Cavalry marched east from Fort Ellis in western Montana on March 30, to patrol the Yellowstone River. Brig. Gen. George Crook’s column of ten companies of the 3rd Cavalry, five of the 2nd Cavalry, two companies of the 4th Infantry, and three companies of the 9th Infantry, moved north from Fort Fetterman in the Wyoming Territory on May 29, marching toward the Powder River area. Brig. Gen. Alfred Terry’s column, including twelve companies of the 7th Cavalry under Lieutenant Colonel George Armstrong Custer’s immediate command, Companies C and G of the 17th U.S. Infantry, and the Gatling gun detachment of the 20th Infantry departed westward from Fort Abraham Lincoln in the Dakota Territory on May 17. They were accompanied by teamsters and packers with 150 wagons and a large contingent of pack mules that reinforced Custer. Companies C, D, and I of the 6th U.S. Infantry, moved along the Yellowstone River from Fort Buford on the Missouri River to set up a supply depot, and joined Terry on May 29 at the mouth of the Powder River.

The coordination and planning began to go awry on June 17, 1876, when Crook’s column was delayed after the Battle of the Rosebud. Surprised and, according to some accounts, astonished by the unusually large numbers of Native Americans in the battle, a defeated Crook was compelled to pull back, halt and regroup. Unaware of Crook’s battle, Gibbon and Terry proceeded, joining forces in early June near the mouth of the Rosebud River. They reviewed Terry’s plan calling for Custer’s regiment to proceed south along the Rosebud, while Terry and Gibbon’s united forces would move in a westerly direction toward the Bighorn and Little Bighorn rivers. As this was the likely location of Indian encampments, all Army elements were to converge around June 26 or 27, attempting to engulf the Native Americans. On June 22, Terry ordered the 7th Cavalry, composed of 31 officers and 566 enlisted men under Custer, to begin a reconnaissance and pursuit along the Rosebud, with the prerogative to “depart” from orders upon seeing “sufficient reason.” Custer had been offered the use of Gatling guns but declined, believing they would slow his command.

While the Terry/Gibbon column was marching toward the mouth of the Little Bighorn, on the evening of June 24, Custer’s scouts arrived at an overlook known as the Crow’s Nest, 14 miles (23 km) east of the Little Bighorn River. At sunrise on June 25, Custer’s scouts reported they could see a massive pony herd and signs of the Native American village roughly 15 miles (24 km) in the distance. After a night’s march, the tired officer sent with the scouts could see neither, and when Custer joined them, he was also unable to make the sighting. Custer’s scouts also spotted the regimental cooking fires that could be seen from 10 miles away, disclosing the regiment’s position.

Custer contemplated a surprise attack against the encampment the following morning of June 26, but he then received a report informing him several hostile Indians had discovered the trail left by his troops. Assuming his presence had been exposed, Custer decided to attack the village without further delay. On the morning of June 25, Custer divided his 12 companies into three battalions in anticipation of the forthcoming engagement. Three companies were placed under the command of Major Marcus Reno (A, G, and M); and three were placed under the command of Capt. Frederick Benteen. Five companies remained under Custer’s immediate command. The 12th, Company B, under Capt. Thomas McDougald, had been assigned to escort the slower pack train carrying provisions and additional ammunition.

Unbeknownst to Custer, the group of Native Americans seen on his trail were actually leaving the encampment on the Big Horn and did not alert the village. Custer’s scouts warned him about the size of the village, with scout Mitch Bouyer reportedly saying, “General, I have been with these Indians for 30 years, and this is the largest village I have ever heard of.” Custer’s overriding concern was that the Native American group would break up and scatter in different directions. The command began its approach to the Native American village at 12 noon and prepared to attack in full daylight.

Around the Blogosphere

 photo Winter_solstice.gifThe main purpose our blogging is to communicate our ideas, opinions, and stories both fact and fiction. The best part about the the blogs is information that we might not find in our local news, even if we read it online. Sharing that information is important, especially if it educates, sparks conversation and new ideas. We have all found places that are our favorites that we read everyday, not everyone’s are the same. The Internet is a vast place. Unlike Punting the Pundits which focuses on opinion pieces mostly from the mainstream media and the larger news web sites, “Around the Blogosphere” will focus more on the medium to smaller blogs and articles written by some of the anonymous and not so anonymous writers and links to some of the smaller pieces that don’t make it to “Pundits” by Krugman, Baker, etc.

We encourage you to share your finds with us. It is important that we all stay as well informed as we can.

Follow us on Twitter @StarsHollowGzt

This is an Open Thread.

Paul Krugman has been in France the last week, at a conference and now hanging out on the beach in Normandy. The weather sounds pretty unbeach like.

At Beat the Press, Dean Baker schooled Robert Samuelson on inflation and and now gives him a lesson about supply and demand.

Over at Corrente, lambert has that found Margaret Thatcher has been living in Ottowa, Canada. He also doesn’t think that Edward Snowden is not a traitor despite what former VVAW medal-tosser John Kerry says he is. He could use aome advice about fencing to keep the woodchuck at bay.

Marcy Wheeler, proprietress of emptywheel, tells us that Senators Wyden and Udall sent a letter to the head of the NSA, Gen. Keith Alexander asking why the NSA is still publicly lying and dissects Alexander’s appearance on ABC’s “The Week with George Stephanopolis this Sunday.

The gang at FDL has been really busy. On the main page, Jon Walker gives us the skinny on the Massachusetts senate race to replace John Kerry. Democratic candidate Rep. Ed Markey has a solid lead over Republican Gabriel Gomez. Like anyone didn’t see that coming. He also reports that the Conference of Mayors who are asking the federal government to respect state marijuana laws.  

.

Over at the News Desk, DSWright tells us, amazingly, that NSA Director Alexander doesn’t know “who WikiLeaks are other than this Assange person.”. Not only does Keith lie, he has a attention deficit problem. Or he’s just telling more lies. I’ll go with the latter.

Kevin Gosztola at The Dissenter has a round up of Week Three of Bradley Manning’s trial.

At Hullabaloo, digby isn’t as obsessed with Snowden, he’s not the story, but madder than a wet hen at the traditional MSM for now wanting to arrest Glenn Greenwald: “News is what somebody somewhere wants to suppress; all the rest is advertising.” She hasn’t read that huge formerly left wing liberal faded orange blog lately. That’ll set her hair on fire.

At naked capitalism, Bill Black reports how Ecuador won by defying the Neoliberal “Washington Consensus” Playbook. Yves Smith tells us that Administration Keeps Pretending Mortgage Servicing Has Been Fixed, Whistleblowers Say Otherwise.

From the Mike Masnick at Techdirt:

At Esquire’s Politics Blog, Charles Pierce came off his weekend hiatus the expound on a report from McClatchy News that the Obama administration has become “the most fertile environment for paranoids since the Nixon people first cut a check to Egil Krogh.” he has some rather unkind words for the president for creating “within the entire federal bureaucracy a culture of spies and informers, which will inevitably breed fear and deceit and countless acts of interoffice treachery. [..]  I continue to wonder precisely what Constitution of which nation this president taught back in his days in law school.” Ouch, indeed.

The last words got to Atrios at Eschaton: CRASH, BABY, CRASH

I don’t really want it to crash, but a crash is about the only thing which might cause Our Galtian Overlords to notice that maybe, just maybe, the economy isn’t perfect.

More Video

A Public Service Announcement

The Young Turks (June 7th)

Brandenburg Gate (Full)

Journalism is not a profession or a trade.

It is a cheap catch-all for fuckoffs and misfits — a false doorway to the backside of life, a filthy piss-ridden little hole nailed off by the building inspector, but just deep enough for a wino to curl up from the sidewalk and masturbate like a chimp in a zoo-cage.

What Are The Gobshites Saying These Days?

By Charles P. Pierce, Esquire

Jun 24, 2013 at 9:50AM

Every actual journalist at NBC should spit every time David Gregory walks by. Hell, the janitorial staff should spit as he walks by, but that would simply be making more work for themselves, so I guess they won’t. As someone who’s now straddle the Big Ditch between the old media and the new, I will grant you that the definition of who’s a journalist has become rather fluid over the past few decades. Whatever you may think of Glenn Greenwald — and, Jesus, he makes it tough sometimes — what he’s doing with Edward Snowden is journalism by any definition anyone ever proposed for it. (He’s arranging logistical help for an important source? Newspapers used to do that with some regularity. It’s even an important plot point in both the greatest newspaper movie ever made (His Girl Friday) and in the second-greatest newspaper movie ever made (Deadline USA with Humphrey Bogart.)) Meanwhile, let us recall that a former chief of staff for Dick Cheney testified under oath in the Scooter Libby trial that MTP was that White House’s preferred launching pad for arrant bullshit. Let us recall the marvelous quote the late, sainted Tim Russert gave to Bill Moyers in which he said he’d wished “somebody had called him” to warn him that we were being lied into a war. Under the Dancin’ Master, the show has devolved further into being a playground for the courtier press. Maybe we do need a new definition of what journalism is. But, whatever new definition emerges, it shouldn’t be developed by the host of Meet The Fking Press, which is no more “journalism” than Duck Dynasty is a nature program.

This was a career defining moment. It’s rare that someone reveals himself quite as clearly as the Dancin’ Master does in that little by-play. He will “debate” who is or is not a journalist, and the rest of us can wait under the balcony and wait for scraps. The clearly batty Peggy Noonan is a journalist, but Glenn Greenwald may not be.  Journalism has sickened itself with respectability, debilitated itself with manners, crippled itself with politesse, and David Gregory may well be Patient Zero for all of this. As my Irish grandmother used to say, mother of god, who the hell is he when he’s at home?

Some Lies About Warrantless Surveillance

Fisa court oversight: a look inside a secret and empty process

Glenn Greenwald, The Guardian

Tuesday 18 June 2013 19.36 EDT

Since we began began publishing stories about the NSA’s massive domestic spying apparatus, various NSA defenders – beginning with President Obama – have sought to assure the public that this is all done under robust judicial oversight. “When it comes to telephone calls, nobody is listening to your telephone calls,” he proclaimed on June 7 when responding to our story about the bulk collection of telephone records, adding that the program is “fully overseen” by “the Fisa court, a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them”.



The GOP chairman of the House Intelligence Committee, Mike Rogers, told CNN that the NSA “is not listening to Americans’ phone calls. If it did, it is illegal. It is breaking the law.” Talking points issued by the House GOP in defense of the NSA claimed that surveillance law only “allows the Government to acquire foreign intelligence information concerning non-U.S.-persons (foreign, non-Americans) located outside the United States.”

The NSA’s media defenders have similarly stressed that the NSA’s eavesdropping and internet snooping requires warrants when it involves Americans. The Washington Post’s Charles Lane told his readers: “the government needs a court-issued warrant, based on probable cause, to listen in on phone calls.” The Post’s David Ignatius told Post readers that NSA internet surveillance “is overseen by judges who sit on the Foreign Intelligence Surveillance Court” and is “lawful and controlled”. Tom Friedman told New York Times readers that before NSA analysts can invade the content of calls and emails, they “have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress.”

This has become the most common theme for those defending NSA surveillance. But these claim are highly misleading, and in some cases outright false.



Under the FAA, which was just renewed last December for another five years, no warrants are needed for the NSA to eavesdrop on a wide array of calls, emails and online chats involving US citizens. Individualized warrants are required only when the target of the surveillance is a US person or the call is entirely domestic. But even under the law, no individualized warrant is needed to listen in on the calls or read the emails of Americans when they communicate with a foreign national whom the NSA has targeted for surveillance.

As a result, under the FAA, the NSA frequently eavesdrops on Americans’ calls and reads their emails without any individualized warrants – exactly that which NSA defenders, including Obama, are trying to make Americans believe does not take place.



Contrary to the claims by NSA defenders that the surveillance being conducted is legal, the Obama DOJ has repeatedly thwarted any efforts to obtain judicial rulings on whether this law is consistent with the Fourth Amendment or otherwise legal. Every time a lawsuit is brought contesting the legality of intercepting Americans’ communications without warrants, the Obama DOJ raises claims of secrecy, standing and immunity to prevent any such determination from being made.



The supposed safeguard under the FAA is that the NSA annually submits a document setting forth its general procedures for how it decides on whom it can eavesdrop without a warrant. The Fisa court then approves those general procedures. And then the NSA is empowered to issue “directives” to telephone and internet companies to obtain the communications for whomever the NSA decides – with no external (i.e. outside the executive branch) oversight – complies with the guidelines it submitted to the court.

In his interview with the president last night, Charlie Rose asked Obama about the oversight he claims exists: “Should this be transparent in some way?” Obama’s answer: “It is transparent. That’s why we set up the Fisa Court.” But as Politico’s Josh Gerstein noted about that exchange: Obama was “referring to the Foreign Intelligence Surveillance Court – which carries out its work almost entirely in secret.” Indeed, that court’s orders are among the most closely held secrets in the US government. That Obama, when asked about transparency, has to cite a court that operates in complete secrecy demonstrates how little actual transparency there is to any this.



When it is time for the NSA to obtain Fisa court approval, the agency does not tell the court whose calls and emails it intends to intercept. It instead merely provides the general guidelines which it claims are used by its analysts to determine which individuals they can target, and the Fisa court judge then issues a simple order approving those guidelines. The court endorses a one-paragraph form order stating that the NSA’s process “‘contains all the required elements’ and that the revised NSA, FBI and CIA minimization procedures submitted with the amendment ‘are consistent with the requirements of [50 U.S.C. §1881a(e)] and with the fourth amendment to the Constitution of the United States'”. As but one typical example, the Guardian has obtained an August 19, 2010, Fisa court approval from Judge John Bates which does nothing more than recite the statutory language in approving the NSA’s guidelines.

Once the NSA has this court approval, it can then target anyone chosen by their analysts, and can even order telecoms and internet companies to turn over to them the emails, chats and calls of those they target. The Fisa court plays no role whatsoever in reviewing whether the procedures it approved are actually complied with when the NSA starts eavesdropping on calls and reading people’s emails.

The guidelines submitted by the NSA to the Fisa court demonstrate how much discretion the agency has in choosing who will be targeted. Those guidelines also make clear that, contrary to the repeated assurances from government officials and media figures, the communications of American citizens are – without any individualized warrant – included in what is surveilled.



The only oversight for monitoring whether there is abuse comes from the executive branch itself: from the DOJ and Director of National Intelligence, which conduct “periodic reviews … to evaluate the implementation of the procedure.” At a hearing before the House Intelligence Committee Tuesday afternoon, deputy attorney general James Cole testified that every 30 days, the Fisa court is merely given an “aggregate number” of database searches on US domestic phone records.

Obama and other NSA defenders have repeatedly claimed that “nobody” is listening to Americans’ telephone calls without first obtaining warrants. This is simply false. There is no doubt that some of the communications intercepted by the NSA under this warrantless scheme set forth in FAA’s section 702 include those of US citizens. Indeed, as part of the Fisa court approval process, the NSA submits a separate document, also signed by Holder, which describes how communications of US persons are collected and what is done with them.



The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.

The top secret rules that allow NSA to use US data without a warrant

Glenn Greenwald and James Ball, The Guardian

Thursday 20 June 2013 18.59 EDT

Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders which allow the NSA to make use of information “inadvertently” collected from domestic US communications without a warrant.



The documents show that even under authorities governing the collection of foreign intelligence from foreign targets, US communications can still be collected, retained and used.



The Fisa court’s oversight role has been referenced many times by Barack Obama and senior intelligence officials as they have sought to reassure the public about surveillance, but the procedures approved by the court have never before been publicly disclosed.



(T)he Fisa court-approved policies allow the NSA to:

• Keep data that could potentially contain details of US persons for up to five years;

• Retain and make use of “inadvertently acquired” domestic communications if they contain usable intelligence, information on criminal activity, threat of harm to people or property, are encrypted, or are believed to contain any information relevant to cybersecurity;

• Preserve “foreign intelligence information” contained within attorney-client communications;

• Access the content of communications gathered from “U.S. based machine[s]” or phone numbers in order to establish if targets are located in the US, for the purposes of ceasing further surveillance.

The broad scope of the court orders, and the nature of the procedures set out in the documents, appear to clash with assurances from President Obama and senior intelligence officials that the NSA could not access Americans’ call or email information without warrants.

The documents also show that discretion as to who is actually targeted under the NSA’s foreign surveillance powers lies directly with its own analysts, without recourse to courts or superiors – though a percentage of targeting decisions are reviewed by internal audit teams on a regular basis.



One such warrant seen by the Guardian shows that they do not contain detailed legal rulings or explanation. Instead, the one-paragraph order, signed by a Fisa court judge in 2010, declares that the procedures submitted by the attorney general on behalf of the NSA are consistent with US law and the fourth amendment.

Those procedures state that the “NSA determines whether a person is a non-United States person reasonably believed to be outside the United States in light of the totality of the circumstances based on the information available with respect to that person, including information concerning the communications facility or facilities used by that person”.

It includes information that the NSA analyst uses to make this determination – including IP addresses, statements made by the potential target, and other information in the NSA databases, which can include public information and data collected by other agencies.

Where the NSA has no specific information on a person’s location, analysts are free to presume they are overseas, the document continues.

“In the absence of specific information regarding whether a target is a United States person,” it states “a person reasonably believed to be located outside the United States or whose location is not known will be presumed to be a non-United States person unless such person can be positively identified as a United States person.”

If it later appears that a target is in fact located in the US, analysts are permitted to look at the content of messages, or listen to phone calls, to establish if this is indeed the case.

Referring to steps taken to prevent intentional collection of telephone content of those inside the US, the document states: “NSA analysts may analyze content for indications that a foreign target has entered or intends to enter the United States. Such content analysis will be conducted according to analytic and intelligence requirements and priorities.”



The NSA is empowered to retain data for up to five years and the policy states “communications which may be retained include electronic communications acquired because of limitations on the NSA’s ability to filter communications”.

Even if upon examination a communication is found to be domestic – entirely within the US – the NSA can appeal to its director to keep what it has found if it contains “significant foreign intelligence information”, “evidence of a crime”, “technical data base information” (such as encrypted communications), or “information pertaining to a threat of serious harm to life or property”.

All boldface is my emphasis, italics and links are from the original.

Load more