Tag: Patriot Act

NSA Excuses Get Moronic

We can’t tell you that we spied on you because it would violate your privacy??!!! This is precisely what the head of the NSA, General Keith B. Alexander told Senator Bernie Sanders (I-VT) in a letter responding to Sen. Sanders’ question about whether it collects information on members of Congress because doing so would violate the law.

“Among those protections is the condition that NSA can query the metadata only based on phone numbers reasonably suspected to be associated with specific foreign terrorist groups,” Alexander wrote. “For that reason, NSA cannot lawfully search to determine if any records NSA has received under the program have included metadata of the phone calls of any member of Congress, other American elected officials, or any other American without the predicate.” [..]

Alexander doesn’t actually say so in his letter, but it’s very possible that the NSA collects data on members of Congress just as it does on everyone else, in bulk. The NSA said in a statement earlier this month that members of Congress have the “same privacy protections” as ordinary citizens, which means that they too might be caught up in the NSA’s terrorism queries of its telephone database, which may sweep up millions of innocent people in a single search.

Seriously. I want to know what drugs they have given the heads of the DNI & NSA that they think that this is a plausible explanation of why that can’t tell a United States Senator whether or not they have spied on him. Alexander really wants us to believe that searching the NSA data base for information would violate the law

This certainly comes under the category of the most lamest excuses for abuse of power.



Every Stroke You Make

Yes, quite literally the NSA will be watching every keystroke you make on you computer, cell phone, or i-pad. How you say? Quite simply collusion with the the telecommunications industry along with companies like Microsoft and through its special unit of hackers within the agency’s department for Tailored Access Operations (TAO). In an article in Der Spiegel, these specialists are described as as “master carpenters” who step in when the usual hacking and data-skimming methods fail. These hackers at ANT, which may stand for Advanced or Access Network Technology, step in with their special tools to get the job done.

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives — from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets’ data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. [..]

Some of the equipment available is quite inexpensive. A rigged monitor cable that allows “TAO personnel to see what is displayed on the targeted monitor,” for example, is available for just $30. But an “active GSM base station” — a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones — costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million. [..]

The ANT division doesn’t just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer’s motherboard that is the first thing to load when a computer is turned on.

In another article at FDL‘s Dissenter, Peter Van Buren notes that private enterprise have also become the “tools of the national security state

Once the NSA identifies a “target” (whom we’ll refer here to as “You”), the NSA needs to know when You order a new laptop they want to intercept. That means the NSA has to spy on Your credit card, Your online activities and/or probe into the ordering systems of places like Amazon, Dell and the like. Perhaps there is a sort of “no fly” list distributed to manufacturers that requires notification to the NSA when someone like You on it buys something. Or all of the above.

The NSA then must know when and how Your laptop will be sent to you. That means they need to have been accessing the computer systems of Amazon, Dell and the like, and/or UPS, Fedex and other shippers. Or all of the above.

The NSA then has to have physical access to the warehouse of the shipping company. Or, the shipping company has to agree to mark your package, and deliver it instead to an NSA location. That all means the shipping companies are in on the NSA plot, or the NSA has to be hacking into the shipping companies’ data systems and substituting their address for Yours.

Once in NSA hands, Your package has to be opened, and Your laptop must be altered in some undetectable way. They can’t steam open a box like a letter in the old movies; someone has to open it physically and then get it all buttoned up again without a trace. Does the NSA have a way to unstick packing tape and reseal internal bags, or do they have a ready supply from Dell and Apple of packing materials?

Lastly, the NSA has to return the package into the shipping stream. That means the box, with say Amazon’s return address and Your home address, has to reenter say Fedex’s system from a third location without too many people knowing it happened. It would not do for the low-level UPS guy to pick up a ton of boxes everyday from a nondescript warehouse, all with third-party address labels. This strongly suggests cooperation by the shipping companies.

You then open Your new laptop on Christmas morning. Yeah, be sure to select a secure password. [..]

What we have here is an example of the depths into which You have fallen. The government has recruited private industry into its national security state, down to the level of the Fedex guy delivering packages to Your door in time for Christmas. For those of You who still foolishly insist that such spying is OK because they “have nothing to hide,” I sure as hell hope You are right, because whatever You do have now belongs to Them.

It is fairly certain that whether or not the NSA will be allowed to continues its bulk collection of data will be argued before the Supreme Court after two conflicting ruling from lower courts on the constitutionality of the program. Jameel Jaffer, ACLU deputy legal director and director of its Center for Democracy; and Glenn Greenwald, the journalist who first broke the story about Edward Snowden’s NSA leaks joined Amy Goodman at Democracy Now! to discuss the court rulings and how the NSA can literally watch every keystroke you make.



Transcript can gbe read here.



Transcript can be read here

Thank you, Edward Snowden.

NSA: “Electronic Omnivore”

“Yes, I believe it is in the nation’s best interest to put all the phone records into a lockbox that we could search.”

   –Keith B. Alexander, September 2013

Inside the “Electronic Omnivore”: New Leaks Show NSA Spying on U.N., Climate Summit, Text Messaging

The New York Times has revealed new details about how the National Security Agency is spying on targets ranging from the United Nations to foreign governments to global text messages. We are joined by New York Times reporter Scott Shane, who reports that the NSA has emerged “as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations.” The Times article reveals how the NSA intercepted the talking points of U.N. Secretary-General Ban Ki-moon ahead of a meeting with President Obama in April and mounted a major eavesdropping effort focused on the United Nations Climate Change Conference in Bali in 2007. The Times also reveals the existence of an NSA database called Dishfire that “stores years of text messages from around the world, just in case.” Another NSA program called Tracfin “accumulates gigabytes of credit card purchases.”



Transcript can be read here

As U.S. Weighs Spying Changes, Officials Say Data Sweeps Must Continue

by David E. Sanger, The New York Times

The Obama administration has told allies and lawmakers it is considering reining in a variety of National Security Agency practices overseas, including holding White House reviews of the world leaders the agency is monitoring, forging a new accord with Germany for a closer intelligence relationship and minimizing collection on some foreigners.

But for now, President Obama and his top advisers have concluded that there is no workable alternative to the bulk collection of huge quantities of “metadata,” including records of all telephone calls made inside the United States.

Instead, the administration has hinted it may hold that information for only three years instead of five while it seeks new technologies that would permit it to search the records of telephone and Internet companies, rather than collect the data in bulk in government computers. Gen. Keith B. Alexander, the director of the N.S.A., has told industry officials that developing the new technology would take at least three years.

NSA official cites ‘stop and frisk’ in effort to explain searches of phone records

by Ali Watkins, McClatchy Washington Bureau

The general counsel of the National Security Agency on Monday compared the agency’s telephone metadata collection program to the highly controversial “stop-and-frisk” practice used by law enforcement officers, saying the agency uses that same standard to choose which phone numbers to query in its database.

“It’s effectively the same standard as stop-and-frisk,” Rajesh De said in an attempt to explain the evidentiary use of “reasonable and articulable suspicion” to identify which phone numbers to target from the agency’s huge database of stored cellphone records.

De made the comment during a rare hearing of an obscure government body, the Privacy and Civil Liberties Oversight Board, which Congress created in 2004 to oversee the government’s expanded intelligence collection operations but which until Monday had never held a substantive hearing. [..]

The comparison was the latest in questionable analogies that intelligence officials have used in an effort to explain the agency’s metadata collection programs since former defense contractor Edward Snowden revealed their existence in June.

Intelligence officials, for example, have said repeatedly that the collection of hundreds of millions of phone records allows them to build a haystack in which to find a needle, apparently missing the irony that “finding a needle in a haystack” is an expression meant to convey that a task is all but impossible.

NSA’s Path to Totalitarianism

by Norman Pollack, Counterpunch

The New York Times, a recipient, along with the Guardian, of Snowden’s disclosures about the illegal activities of Obama and USG, is breaking out, as now, of its reticence about the nation’s profound disregard of constitutional principles AND its related policies of global hegemony at all costs-here Scott Shane’s lengthy article (3 Nov.), “No Morsel Too Miniscule for All-Consuming N.S.A.”  NSA to all intents and purposes appears as a “rogue” organization, extremism in the putative service of liberty, except that the designation is a way of distracting attention, and removing accountability, from its authorization and mission at the highest levels-call it, licensed roguery, official (with Obama’s eyes supposedly averted).  Or better, call it, stripped of all cosmetics, the unerring mark of a Police State, itself become identical  with Fortress America, the National-Security State.

Eavesdropping on foreign leaders speaks to an arrogance of power, in which the US claims for itself every right, unilaterally, to script both sides of the foreign dialogue as well as micromanage to its own advantage the rhythm and content of global events, from regional trade partnerships to the use of military force in shoring up alliance systems against a host of enemies, some terrorist groups to be sure, but, using that as pretext, mounting counterrevolution globally against alternative modes, notably, socialist, of modernization: autonomous national and/or radical aspirations seeking distance from US market penetration, the tarnished necklace of its worldwide military bases and CIA stations, and not least, the ideological saturation (assisted by IMF and World Bank applications of pressure) of market fundamentalism, the property right, unrestricted capital flows, and the honor of serving American industry with the lowest possible labor costs, as meanwhile we see the financialization of capitalism here and the gutting of the manufacturing base.

Eavesdropping, of course, is the polite term for control freak, which translates, in the realm of power politics, into societal desperation to employ any and all means for staying on top, cyber-strategies of disruption as well as information-gathering, campaigns of disinformation, CIA-JSOC paramilitary programs of regime change, and, upping the ante, as here, learning every move in advance of foreign leaders, the better-take no chances, take no prisoners-to orchestrate world politics in our favor.

“We Don’t Have a Domestic Spying Program”

We don’t have a domestic spying program.” That was the statement made by President Barack Obama on the “Jay Leno Show” on August 6, 2013 in the aftermath of the revelations by whistleblower Edward Snowden. We know now that there was no truth in that. We know, through the NSA program called “PRISM,” the NSA had been collecting internet data since 2007, including encrypted communications, from the tech giants, such as Google, Yahoo and Verizon, under Section 702 of the FISA Amendments Act of 2008. That’s the one that Obama said he would filibuster, then voted for with the promise of fixing it later.

The latest revelation is the NSA went beyond PRISM’s front door approach and behind the back of Google and Yahooo to infiltrate links to their data centers world wide. This newest document from Edward Snowden’s stash of NSA files exposed a program called MUSCULAR that was jointly operated with the NSA’s British counterpart, GCHQ. As it was reported by  Barton Gellman and Ashkan Soltani at The Washington Post, through this program they secretly broke into the main communication links that connect Yahoo and Google around the world enabling them to “collect at will from hundreds of millions of user accounts, many of them belonging to Americans.

According to a top-secret accounting dated Jan. 9, 2013, the NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records – including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video.

The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, the Government Communications Headquarters . From undisclosed interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that carry information among the data centers of the Silicon Valley giants. [..]

Intercepting communications overseas has clear advantages for the NSA, with looser restrictions and less oversight. NSA documents about the effort refer directly to “full take,” “bulk access” and “high volume” operations on Yahoo and Google networks. Such large-scale collection of Internet content would be illegal in the United States, but the operations take place overseas, where the NSA is allowed to presume that anyone using a foreign data link is a foreigner.

Outside U.S. territory, statutory restrictions on surveillance seldom apply and the FISC has no jurisdiction. Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) has acknowledged that Congress conducts little oversight of intelligence-gathering under the presidential authority of Executive Order 12333, which defines the basic powers and responsibilities of the intelligence agencies.

Needless to say the news that the NSA can collect information sent by fibre optic cable between the two tech giants infuriated them:

In a statement, Google’s chief legal officer, David Drummond, said the company was “outraged” by the latest revelations.

“We have long been concerned about the possibility of this kind of snooping, which is why we have continued to extend encryption across more and more Google services and links, especially the links in the slide,” he said.

“We do not provide any government, including the US government, with access to our systems. We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform.”

Yahoo said: “We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency.”

It was this slide from the NSA presentation on “Google Cloud Exploitation,” that caused two engineers with close ties to Google exploded in profanity when they saw the drawing.

NSA Infiltrates Yahoo Google photo GOOGLE-CLOUD-EXPLOITATION1383148810_zpsbdce47a5.jpg

Click on image to enlarge.

The tech giants are now calling for real reforms of the NSA. In a letter sent to the Senate Intelligence Committee, chaired by Senator Dianne Feinstein (D-CA), they called for passage of the USA Freedom Act  a bill sponsored by Democrat senator Patrick Leahy and Republican congressman James Sensenbrenner that would end the bulk collection of data from millions of Americans and set up a privacy advocate to monitor the Fisa court, which oversees the NSA’s US activities.

“Recent disclosures regarding surveillance activity raise important concerns in the United States and abroad. The volume and complexity of the information that has been disclosed in recent months has created significant confusion here and around the world, making it more difficult to identify appropriate policy prescriptions,” the letter states.

“Our companies have consistently made clear that we only respond to legal demands for customer and user information that are targeted and specific.

“Allowing companies to be transparent about the number and nature of requests will help the public better understand the facts about the government’s authority to compel technology companies to disclose user data and how technology companies respond to the targeted legal demands we receive,” they write. [..]

“We urge the administration to work with Congress in addressing these critical reforms that would provide much needed transparency and help rebuild the trust of Internet users around the world,” the letter said.

The lack of credibility that this administration and congress has on this issue is eclipsed only by the enormity of the Grand Canyon. The sham House Intelligence Committee led by chief NSA apologist Rep. Mike Rogers featured inveterate liars NSA boss General Keith Alexander and Director of National Intelligence James Clapper, along with  Deputy Attorney General James Cole and number 2 guy at NSA Chris Inglis who were tossed easy questions. When push back from Democratic committee members came, Rogers interrupted, incredibly suggesting that they should just shut up if they’re going to say they weren’t informed:

(Rep. Adam) Schiff quite reasonably, appeared to take offense to this, and challenged Rogers, asking for more details as to when and how the Committee was told about spying on foreign leaders. Rogers without actually answering the question kept “warning” other members not to say something about this. Schiff broke in again (with Rogers trying to stop him from talking) to ask if the Committee was directly informed about this or if it was just a giant data dump of information that he would have had to go through carefully to find out who they were spying on. Rogers again refused to answer the question, and again hinted that those who put in the “effort” would have known about this — and then flat out cut off Schiff [..]

So we are now supposed to trust the liars?

 

Live Stream: Stop Watching Us Rally

Livestream: Stop Watching Us Rally

Live streaming video by Ustream

On October 26th, the 12th anniversary of the PATRIOT Act,

The full list, in order of appearance, includes:

Daniel Ellsberg, “Pentagon Papers” whistleblower

Phil Donahue, television talk-show pioneer

US Rep. John Conyers Jr. (D-MI), ranking Democrat on the House Judiciary Committee

David Segal, executive director of Demand Progress

Maggie Gyllenhaal, actor and activist

Oliver Stone, director of The Untold History of the United States and Nixon

John Cusack, actor and activist

Wil Wheaton, actor and writer

Molly Crabapple, artist and writer

Jesselyn Radack, U.S. Department of Justice whistleblower and national security and human rights director at the Government Accountability Project

J. Kirk Wiebe, NSA whistleblower

Mark Klein, AT&T whistleblower who revealed the telecommunications company’s collaboration with the NSA in collecting customer data

Thomas Drake, NSA whistleblower

Cindy Cohn, Legal Director at the Electronic Frontier Foundation

Dan Choi, LGBTQ activist and Iraq War veteran

Lawrence Lessig, Roy L. Furman Professor of Law and Leadership at Harvard Law School

The NSA: Bigger Is Not Better

In the case of the NSA’s scooping up and storing all that private data, they ran into a glitch, too much information makes the job of surveillance harder

The volume of NSA contacts collection is so high that it has occasionally threatened to overwhelm storage repositories, forcing the agency to halt its intake with “emergency detasking” orders. Three NSA documents describe short-term efforts to build an “across-the-board technology throttle for truly heinous data” and longer-term efforts to filter out information that the NSA does not need.

Spam has proven to be a significant problem for NSA – clogging databases with data that holds no foreign intelligence value. The majority of all e-mails, one NSA document says, “are SPAM from ‘fake’ addresses and never ‘delivered’ to targets.”

In fall 2011, according to an NSA presentation, the Yahoo account of an Iranian target was “hacked by an unknown actor,” who used it to send spam. The Iranian had “a number of Yahoo groups in his/her contact list, some with many hundreds or thousands of members.”

The cascading effects of repeated spam messages, compounded by the automatic addition of the Iranian’s contacts to other people’s address books, led to a massive spike in the volume of traffic collected by the Australian intelligence service on the NSA’s behalf.

After nine days of data-bombing, the Iranian’s contact book and contact books for several people within it were “emergency detasked.”

LOL. The NSA has a spam problem.

Meanwhile, the head of the NSA, Gen. Keith Alexander has had to admit to the Senate Intelligence Committee that he lied back in June about those 54 terrorists plots he claimed were “thwarted” by the agency’s phone surveillance program.

Alexander admitted that only 13 of the 54 cases were connected to the United States. He also told the committee that only one or two suspected plots were identified as a result of bulk phone record collection.

Leahy was not happy. “We’re told we have to (conduct mass phone surveillance) to protect us, and the statistics are rolled out that they’re not accurate,” he said. “It doesn’t have the credibility here in the Congress, it doesn’t have the credibility with this chairman and it doesn’t have the credibility with the country.”

Over at the Wall Street Journal, in an op-ed behind a paywall, the committee chair, Sen Dianne Feinstein trotted out the old “9/11 be very afraid” canard and repeated the debunked Alexander lie.

Consider the case of 9/11 hijacker Khalid al-Mihdhar, who was being watched by the CIA while he was in Malaysia. U.S. intelligence agencies failed to connect the dots before the attack to recognize that al-Mihdhar had flown with (future) hijacker Nawaf al-Hazmi to Los Angeles in January 2000.

Intelligence officials knew about an al Qaeda safe house in Yemen with ties to al-Mihdhar as well as the safe house’s telephone number, but they had no way of knowing if anyone inside the U.S. was in contact with that phone number in Yemen. Only after 9/11 did we learn that al-Mihdhar, while living in San Diego, had called the safe house. [..]

Working in combination, the call-records database and other NSA programs have aided efforts by U.S. intelligence agencies to disrupt terrorism in the U.S. approximately a dozen times in recent years, according to the NSA. This summer, the agency disclosed that 54 terrorist events have been interrupted-including plots stopped and arrests made for support to terrorism. Thirteen events were in the U.S. homeland and nine involved U.S. persons or facilities overseas. Twenty-five were in Europe, five in Africa and 11 in Asia.

Can everyone say say Richard Clark.

At Techdirt, Mike Masnick points out none of what Sen. Feinstein said is true:

First off, as has been explained over and over again, the intelligence community already had certain tools in place to discover such phone calls. The problem wasn’t that they didn’t have the information — they did. It was that they failed to “connect the dots.” In other words, they had too much information which obscured the important information they needed. [..]

Note the all important “and other NSA programs” language here. Also the use of “terrorist events” not plots. And, remember, those “thirteen events… in the U.S. homeland,” have since been whittled down to only one that actually relied on the call records program that she’s defending — and that wasn’t a terrorist plot but a cab driver in San Diego sending some cash to a Somali group judged to be a terrorist organization.

So, we have elected representatives and high paid appointees blatantly lying and getting away with it to protect their turf with no one is holding them accountable,

Never Mind Bush, Obama Worse Than Nixon

This is the most closed, control-freak administration I’ve ever covered.

That is what David E. Sanger, the chief Washington correspondent for the New York Times, told former Washington Post executive editor Leonard Downie. Sanger was one of 30 journalists Downie interviewed for a report on the Obama administration’s efforts to control leaks. Downie, who was one of the editors involved in the Post’s Watergate investigation, called the administration’s “war on leaks” the most aggressive since the Nixon administration.

The Obama Administration and the Press

by Leonard Downie Jr. with reporting by Sara Rafsky, Committee to Protect Journalists

Leak investigations and surveillance in post-9/11 America

U.S. President Barack Obama came into office pledging open government, but he has fallen short of his promise. Journalists and transparency advocates say the White House curbs routine disclosure of information and deploys its own media to evade scrutiny by the press. Aggressive prosecution of leakers of classified information and broad electronic surveillance programs deter government sources from speaking to journalists.

Compounding the concerns of journalists and the government officials they contact, news stories based on classified documents obtained from Snowden have revealed extensive surveillance of Americans’ telephone and e-mail traffic by the National Security Agency. Numerous Washington-based journalists told me that officials are reluctant to discuss even unclassified information with them because they fear that leak investigations and government surveillance make it more difficult for reporters to protect them as sources. “I worry now about calling somebody because the contact can be found out through a check of phone records or e-mails,” said veteran national security journalist R. Jeffrey Smith of the Center for Public Integrity, an influential nonprofit government accountability news organization in Washington. “It leaves a digital trail that makes it easier for the government to monitor those contacts,” he said.

“I think we have a real problem,” said New York Times national security reporter Scott Shane. “Most people are deterred by those leaks prosecutions. They’re scared to death. There’s a gray zone between classified and unclassified information, and most sources were in that gray zone. Sources are now afraid to enter that gray zone. It’s having a deterrent effect. If we consider aggressive press coverage of government activities being at the core of American democracy, this tips the balance heavily in favor of the government.”

At the same time, the journalists told me, designated administration spokesmen are often unresponsive or hostile to press inquiries, even when reporters have been sent to them by officials who won’t talk on their own. Despite President Barack Obama’s repeated promise that his administration would be the most open and transparent in American history, reporters and government transparency advocates said they are disappointed by its performance in improving access to the information they need.

In an interview with Amy Goodman on Democracy Now!, Leonard Downey discusses freedom of the press and the Obama administration.

I found that these leaks investigations and a program called the Insider Threat Program, instituted since the Bradley Manning leaks, that requires government employees to monitor each other to make sure that they’re not leaking information to anyone, including journalists, to have really frightened government officials. Many, many reporters that I interviewed here in Washington say that government officials are afraid to talk to them. They’re afraid that their telephone conversations and their email exchanges would be monitored. That is to say that investigators could come in later, as they did in several leaks investigations, and use their telephone and email records in order to find the contacts between government officials and reporters. So they’re simply scared to talk to reporters.

And this, this is not good, because-I just heard the president saying that he was concerned about the safety of our troops and our intelligence officers. It’s important that responsible, knowledgeable government officials be able to talk to reporters about these matters, so that, among other things, they can alert reporters to information that might be harmful to national security or harmful to human life, in which case no responsible news organization would publish those.



Transcript can be read here

Let the Debate Continue

The Work of a Generation

NSA whistleblower Edward Snowden’s words were entered as testimony at the European Parliament’s Civil Liberties Committee in Brussels on Monday.

Jesselyn Radack of the US Government Accountability Project (GAP) and a former whistleblower and ethics adviser to the US Department of Justice, read Snowden’s statement into the record.



This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License

Transcript can be read here.

The First Thing We Do, Fire All the Liars

In Shakespeare’s “Henry VI,” the character Dick the Butcher, a follower of the rebel Jack Cade, uttered the words, “The first thing we do, let’s kill all the lawyers.” If taken in the context of the play, the line, intended as a comedic aside, was actually a compliment to those lawyers who upheld the laws and protected society. Those words have taken on different meaning over the years and are now often used in reference to those lawyers who have twisted the laws to protect the corrupt and dishonest and, often as not, defend illegal wars and torture, as well as, circumvent the US Constitution. It has often been rephrased, as the title of this article, to fit a narrative, as in the case of “reforming” the NSA, “the first thing we do, is fire all the liars.

Leading First Amendment lawyer, James Goodale, is the former general council to the New York Times and was the driving force behind the NYT‘s decision to publish the Pentagon Papers in 1971. He was instrumental in the winning strategy that resulted in the 6 – 3 Supreme Court ruling that the US government could not stop the Times from publishing the documents. In his opinion piece at The Guardian on the proposed reforming of the NSA, Prof. Goodale noted that President Barack Obama’s first concern should be to fire all the liars, starting with the Director of National Intelligence, James R Clapper and  General Keith Alexander, director of the National Security Agency, among others who have both blatantly lied to Congress.

NSA lawyers lied to secret Fisa court Judges John D Bates and Reggie B Walton. In recently released opinions, Bates said he had been lied to on three separate occasions and Walton said he had been lied to several times also.

But Clapper and Alexander have not been held in contempt of Congress. Nor have the Justice Department attorneys, who lied to Judges Walton and Bates, been disciplined. Part of the answer as to why this is so came out last week.

The Justice Department told USA Today that it had no intention of investigating the attorneys who lied to those judges. In the ordinary course, the Justice Department’s office of professional responsibility investigates the behavior of lawyers who have been subject to accusations such as those made by Judges Bates and Walton.

(emphasis mine)

You read that correctly, the Obama DOJ has no intention of investigating the attorneys who lied to Judges Bates and Walton

The Justice Department’s Office of Professional Responsibility routinely probes judges’ allegations that the department’s lawyers may have violated ethics rules that prohibit attorneys from misleading courts. Still, OPR said in response to a Freedom of Information Act request by USA TODAY that it had no record of ever having investigated – or even being made aware of – the scathing and, at the time, classified, critiques from the Foreign Intelligence Surveillance Court between 2009 and 2011.

Prof. Goodall also calls Pres. Obama’s statement in his August 9, 2013 address on the NSA that he would appoint experts to examine NSA practices, “reasonable” but points out that it doesn’t appear to be going anywhere:

Robert Atkinson, the president of the Information Technology and Innovation Foundation and an attendee, told the Guardian the he “did not hear much discussion” of changes to the bulk surveillance activities.

“My fear is it’s a simulacrum of meaningful reform,” said Sascha Meinrath, a vice president of the New America Foundation, an influential Washington think tank, and the director of the Open Technology Institute, who also attended. “Its function is to bleed off pressure, without getting to the meaningful reform.”

It’s pretty predictable that there will be no meaningful reform coming from a committee comprised of intelligence insiders, former White House officials and Obama advisers.

Michael Morell, a former deputy CIA director, is a member, as is Richard Clarke, a White House counter-terrorism aide to three presidents. Cass Sunstein, a former White House regulatory staffer who is married to the new US ambassador to the United Nations; Geoffrey Stone, a University of Chicago law professor; and Peter Swire, a Georgia Tech professor and former aide to Obama and Bill Clinton, round out the panel.

Over at emptywheel, Marcy Wheeler pointed out a detail that Prof. Goodale missed:

In just its third open hearing this year, the Senate Intelligence Committee has arranged the following witnesses for tomorrow’s hearing on NSA’s spying.

   Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) and Vice Chairman Saxby Chambliss (R-Ga.) today announced the committee will hold an open hearing to consider legislative changes to the Foreign Intelligence Surveillance Act, to include the NSA call records program, on Thursday, September 26, at 2 p.m.

   WHAT:  Public hearing on FISA, NSA call records

   WHO:

   Panel I

       Director of National Intelligence James Clapper

       National Security AgencyDirector General Keith Alexander

       Deputy Attorney General James Cole

   Panel II

       Ben Wittes, Brookings Institution

       Tim Edgar, Watson Institute for International Studies, Brown University

So DiFi’s idea of an “open hearing” is to invite two established liars. And for her non-governmental witnesses, one keeps declaring Congress NAKED! in the face of evidence the government lies to them, and the other tells fanciful stories about how much data NSA shares.

It’s like DiFi goes out of her way to find liars and their apologists to testify publicly. [..]

It’s DiFi’s committee. And if she wants every single open hearing to serve as a platform for accomplished liars, I guess that’s her prerogative.

But observers should be clear that’s the purpose of the hearings.

As Prof Goodale concludes, the culture of lying to the public and courts by the US intelligence community is nothing new but it lies with President Obama to force the NSA to change. The best place for that change would be to fire the liars, Clapper and Alexander. So far, it appears the president is not much interested in that solution.

Obama Defends NSA Surveillance on the Way to the G-20

During his stop over in Stockholm, Sweden on the way to the G-20, President Barack Obama renewed his defense of unfettered surveillance

“I can give assurances to the publics in Europe and around the world that we’re not going around snooping at people’s emails or listening to their phone calls,” Obama said in response to a Swedish reporter’s question during a news conference with Prime Minister Fredrik Reinfeldt as he began a whirlwind, 24-hour trip to Sweden. “What we try to do is to target very specifically areas of concern.”

Still, the president acknowledged that questions about privacy were likely to trail him in Europe – a continent that is protective of privacy rights – for some time. The issue also bubbled up during his trip to Germany in June, shortly after newspapers published reports based on documents leaked by former government contractor Edward Snowden.

Despite Obama’s assertions of a more narrow-scope effort, the Snowden-leaked documents show the NSA collects and stores all kinds of data traveling through the Internet, including emails, video chats and instant messages. Under one such classified program, known as Prism, the government can obtain secret court orders and gather mass amounts of data from major Internet companies such as Google, Apple, Microsoft and Facebook.

The ACLU is challenging the constitutionality of the intelligence agency’s action filing a complaint in the Southern District of New York against James Clapper in June. An up date on that lawsuit was posted today on their web site. (please note that the link contains an interesting but really annoying gif).

An impressive array of organizations and individuals filed amicus briefs yesterday in support of the ACLU’s constitutional challenge to the government’s collection of the call records of virtually everyone in the United States. The range of voices joining the protest against mass government surveillance-not to mention the bipartisan storm that has swept Congress since the recent NSA disclosures – is a real testament to the fact that the government’s dragnet surveillance practices are offensive to Americans from across the political spectrum.

Among the groups supporting our lawsuit are the National Rifle Association, the Reporters Committee for Freedom of the Press, and the PEN American Center. Philosophy Professor Michael Lynch submitted a brief arguing that privacy is fundamental to human dignity. Our friends at the Electronic Frontier Foundation submitted a brief on behalf of Rep. Jim Sensenbrenner (R-Wis.), one of the authors of the Patriot Act. Rep. Sensenbrenner has decried the now-public call-records program as outside the scope of the law he authored.

Yes, you’re reading that right, the NRA and Rep. Sensenbrenner.

NSA surveillance: National Rifle Association backs ACLU challenge

by Ewen MacAskill, The Guardian

Anger at US government’s data trawling creates unlikely alliance in court between NRA and American Civil Liberties Union

The NRA, in an amicus brief in support of the ACLU, argues that the mass surveillance programme provides “the government not only with the means of identifying members and others who communicate with the NRA and other advocacy groups, but also with the means of identifying gun owners without their knowledge or consent”.

EFF Files Brief on Behalf of Rep. Sensenbrenner in NSA Spying Case

Press release from Electronic Freedom Foundation

Original Patriot Act Author Says Call-Data Collection Exceeds Congressional Intent

San Francisco – The Electronic Frontier Foundation (EFF) today filed a brief on behalf of Rep. Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, in a case brought by the American Civil Liberties Union (ACLU) against the National Security Agency (NSA). In the brief, Sensenbrenner argues that Congress never intended the Patriot Act to permit the NSA’s collection of the records of every telephone call made to, from and within the United States. Sensenbrenner urges the court to deny the NSA’s motion to dismiss and grant the ACLU’s motion for a preliminary injunction, which would halt the program until the case is decided.

In another development today, hundreds of pages from NSA spying documents are to be released in response to an FOIA request by EFF:

In a major victory in one of EFF’s Freedom of Information Act (FOIA) lawsuits, the Justice Department conceded yesterday that it will release hundreds of pages of documents, including FISA court opinions, related to the government’s secret interpretation of Section 215 of the Patriot Act, the law the NSA has relied upon for years to mass collect the phone records of millions of innocent Americans. [..]

While the government finally released a white paper detailing its expansive (and unconstitutional) interpretation of Section 215 last month, more important FISA court opinions adopting at least part of that interpretation have remained secret. The results of EFF’s FOIA lawsuit will finally lift the veil on the dubious legal underpinnings of NSA’s domestic phone surveillance program.

This victory for EFF comes on the heels of another FOIA success two weeks ago, when the Justice Department was also forced to release a 2011 FISA court opinion ruling some NSA surveillance unconstitutional.

Now to that gif. It is visualization demonstrating the staggering scope of the NSA’s surveillance. Click on the image to view.

ACLU NRA photo blog-3hops-500x280-v01_zpsa00e2a91.jpg

Load more