Tag: surveillance

The Ayes Have It, The NSA Went Too Far

President Obama’s panel of security and civil liberties experts finished their work giving their recommendations to the president last Friday. The report was released to the public Tuesday. Much to the surprise of the war on terror hawks, it slammed the mass surveillance programs vindicating what critics have been saying since Edward Snowden’s revelations.

A presidential advisory panel has recommended sweeping limits on the government’s surveillance programs, including requiring a court to sign off on individual searches of phone records and stripping the National Security Agency of its ability to store that data from Americans. [..]

The recommendations include tightening federal law enforcement’s use of so-called national security letters, which give the government sweeping authority to demand financial and phone records without prior court approval in national security cases. The task force recommended that authorities should be required to obtain a prior “judicial finding” showing “reasonable grounds” that the information sought is relevant to terrorism or other intelligence activities.

In addition, the panel proposed terminating the NSA’s ability to store telephone data and instead require it to be held by the phone companies or a third party. Access to the data would then be permitted only through an order from a Foreign Intelligence Surveillance Court.

The panel called for more independent review of what the NSA collects and the process by which it goes about gathering data.

Amid an international furor over NSA spying on the leaders of allied nations such as Germany, the review group recommended that the president personally approve all sensitive methods used by the intelligence community.

President’s Review Group on Intelligence  and Communications Technologies Report On NSA

Marcy Wheeler, at emptywheel, has been pouring over the report and has pulled out what she thinks is pertinent here, here and here.

In a re-published article by Kara Brandeisky of ProPublica, that she wrote for Techdirt back in August, the folks there note that the surveillance reforms the Pres. Obama supported before he was president are remarkably similar to the Task Force’s proposals:

As a senator, Obama wanted to limit bulk records collection.

Obama co-sponsored a 2007 bill, introduced by Sen. Russ Feingold, D-Wis., that would have required the government to demonstrate, with “specific and articulable facts,” that it wanted records related to “a suspected agent of a foreign power” or the records of people with one degree of separation from a suspect. The bill died in committee. Following pressure from the Bush administration, lawmakers had abandoned a similar 2005 measure, which Obama also supported. [..]

As a senator, Obama wanted to require government analysts to get court approval before accessing incidentally collected American data.

In Feb. 2008, Obama co-sponsored an amendment, also introduced by Feingold, which would have further limited the ability of the government to collect any communications to or from people residing in the U.S.

The measure would have also required government analysts to segregate all incidentally collected American communications. If analysts wanted to access those communications, they would have needed to apply for individualized surveillance court approval.

The amendment pfailed 35-63 http://thomas.loc.gov/cgi-bin/… Obama later reversed his position and supported what became the law now known to authorize the PRISM program. That legislation – the FISA Amendments Act of 2008 – also granted immunity to telecoms that had cooperated with the government on surveillance. [..]

As a senator, Obama wanted the executive branch to report to Congress how many American communications had been swept up during surveillance.

Feingold’s 2008 amendment, which Obama supported, would have also required the Defense Department and Justice Department to complete a joint audit of all incidentally collected American communications and provide the report to congressional intelligence committees. The amendment failed 35-63. [..]

The White House has already made it clear that the recommendations are just that and has already said it will not separate the US Cyber Command from the NSA. So basically, as Charles Pierce pointedly put it, “the White House can tell the committee to pound sand.”

And, even if it doesn’t, there is no reason on god’s earth why anyone should believe that the NSA actually would abide by any agreement going forward. The all-too-human, but curiously error-prone heroes of our intelligence community, imbued as they are with a mission mindset that is perilously close to messianic, can be presumed eventually to breach by unfortunate accident almost any new protocol put in place. (And that’s not even to mingle with the wilder fauna in the jungle.)

At Democracy Now!, Amy Goodman and Juan González discuss the panel recommendations with Kirk Wiebe, a retired National Security Agency official who worked there for over 32 years, and Ben Wizner, Edward Snowden’s legal adviser and director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union.



Transcript can be read here



Transcript can be read here

Let the conversation continue.

Federal Judge Rules NSA Phone Program Possibly Unconstitutional

In response to a lawsuit filed by an activist in June against the NSA’s massive collection of private phone data, a federal judge ruled that the program is possibly a violation of the Fourth Amendment but fell short of ordering the program shut down.

udge Richard Leon declared that the mass collection of so-called metadata probably violates the fourth amendment, relating to unreasonable searches and seizures, and is “almost Orwellian” in its scope.

He also expressed doubt about the central rationale for the program cited by the NSA: that it is necessary for preventing terrorist attacks. “The government does not cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack,” wrote Leon, a US district judge in the District of Columbia. [..]

Leon, an appointee of George W Bush, granted a preliminary injunction sought by plaintiffs Larry Klayman and Charles Strange, concluding that their constitutional challenge was likely to be successful. In what was the only comfort to the NSA in a stinging judgment, he put the ruling on hold, pending an appeal by the government.

But Leon’s opinion contained stern and repeated warnings that he was inclined to rule that the metadata collection performed by the NSA – and defended vigorously by the NSA director Keith Alexander on CBS on Sunday night – was unconstitutional.

D.C. District Court NSA Opinion

Glenn Greenwald weighed in on this on MSNBC’s 4 PM program and there was a discussion with a former Obama administration DOJ lawyer and a spokesperson for the ACLU. If the video becomes available, I’ll add it.

Spying on Democracy for a Price

The Central Intelligence Agency (CIA) is prohibited by law from spying on the domestic activities of Americans but that hasn’t stopped them from paying a giant telecommunications company for the phone records of Americans making call overseas, as reported by the New York Times in an article by Charlie Savage:

The C.I.A. is paying AT&T more than $10 million a year to assist with overseas counterterrorism investigations by exploiting the company’s vast database of phone records, which includes Americans’ international calls, according to government officials. [..]

The program adds a new dimension to the debate over government spying and the privacy of communications records, which has been focused on National Security Agency programs in recent months. The disclosure sheds further light on the ties between intelligence officials and communications service providers. And it shows how agencies beyond the N.S.A. use metadata – logs of the date, duration and phone numbers involved in a call, but not the content – to analyze links between people through programs regulated by an inconsistent patchwork of legal standards, procedures and oversight.

Author of Spying on Democracy: Government Surveillance, Corporate Power, and Public Resistance, Heidi Boghosian joined Bill Moyers on Moyers and Company to discuss spying and  our civil liberties



Transcript can be read here

Book Excerpt: Spying on Democracy

by Heidi Boghosian

In describing the National Security Agency’s (NSA) Terrorist Identities Datamart Environment (TIDE), best-selling author James Bamford, whose reporting in the 1980s revealed the existence of the NSA, calls the database used to store names gathered from the federal eavesdropping programs a disaster. The advent of digital communications and mass storage, he says, coupled with a failure of law and policy to keep abreast of technological advancements and an NSA “where the entire world’s knowledge is stored, but not a single word understood,” yields “the capacity to make tyranny total in America.”

Much of the information in government databases such as TIDE is collected with the cooperation of corporations. Although the US surveillance state is colossal in scope, Americans need not be complicit in sustaining it. Tethered to electronic gadgets, under watchful corporate and government command, Americans have a choice about the amount of information afforded to authorities. We can embrace the positive aspects of technology while electing to actively resist and dismantle its invasive and anti-democratic aspects.

To do so, it is essential to reject outright the premise on which a domestic surveillance grid has been erected: that it makes us safer. Comprehensive monitoring and the targeting of certain individuals and social networks for greater observation, is demonstrably ineffective in its purported function of making Americans more secure.

 

NSA: “Electronic Omnivore”

“Yes, I believe it is in the nation’s best interest to put all the phone records into a lockbox that we could search.”

   –Keith B. Alexander, September 2013

Inside the “Electronic Omnivore”: New Leaks Show NSA Spying on U.N., Climate Summit, Text Messaging

The New York Times has revealed new details about how the National Security Agency is spying on targets ranging from the United Nations to foreign governments to global text messages. We are joined by New York Times reporter Scott Shane, who reports that the NSA has emerged “as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations.” The Times article reveals how the NSA intercepted the talking points of U.N. Secretary-General Ban Ki-moon ahead of a meeting with President Obama in April and mounted a major eavesdropping effort focused on the United Nations Climate Change Conference in Bali in 2007. The Times also reveals the existence of an NSA database called Dishfire that “stores years of text messages from around the world, just in case.” Another NSA program called Tracfin “accumulates gigabytes of credit card purchases.”



Transcript can be read here

As U.S. Weighs Spying Changes, Officials Say Data Sweeps Must Continue

by David E. Sanger, The New York Times

The Obama administration has told allies and lawmakers it is considering reining in a variety of National Security Agency practices overseas, including holding White House reviews of the world leaders the agency is monitoring, forging a new accord with Germany for a closer intelligence relationship and minimizing collection on some foreigners.

But for now, President Obama and his top advisers have concluded that there is no workable alternative to the bulk collection of huge quantities of “metadata,” including records of all telephone calls made inside the United States.

Instead, the administration has hinted it may hold that information for only three years instead of five while it seeks new technologies that would permit it to search the records of telephone and Internet companies, rather than collect the data in bulk in government computers. Gen. Keith B. Alexander, the director of the N.S.A., has told industry officials that developing the new technology would take at least three years.

NSA official cites ‘stop and frisk’ in effort to explain searches of phone records

by Ali Watkins, McClatchy Washington Bureau

The general counsel of the National Security Agency on Monday compared the agency’s telephone metadata collection program to the highly controversial “stop-and-frisk” practice used by law enforcement officers, saying the agency uses that same standard to choose which phone numbers to query in its database.

“It’s effectively the same standard as stop-and-frisk,” Rajesh De said in an attempt to explain the evidentiary use of “reasonable and articulable suspicion” to identify which phone numbers to target from the agency’s huge database of stored cellphone records.

De made the comment during a rare hearing of an obscure government body, the Privacy and Civil Liberties Oversight Board, which Congress created in 2004 to oversee the government’s expanded intelligence collection operations but which until Monday had never held a substantive hearing. [..]

The comparison was the latest in questionable analogies that intelligence officials have used in an effort to explain the agency’s metadata collection programs since former defense contractor Edward Snowden revealed their existence in June.

Intelligence officials, for example, have said repeatedly that the collection of hundreds of millions of phone records allows them to build a haystack in which to find a needle, apparently missing the irony that “finding a needle in a haystack” is an expression meant to convey that a task is all but impossible.

NSA’s Path to Totalitarianism

by Norman Pollack, Counterpunch

The New York Times, a recipient, along with the Guardian, of Snowden’s disclosures about the illegal activities of Obama and USG, is breaking out, as now, of its reticence about the nation’s profound disregard of constitutional principles AND its related policies of global hegemony at all costs-here Scott Shane’s lengthy article (3 Nov.), “No Morsel Too Miniscule for All-Consuming N.S.A.”  NSA to all intents and purposes appears as a “rogue” organization, extremism in the putative service of liberty, except that the designation is a way of distracting attention, and removing accountability, from its authorization and mission at the highest levels-call it, licensed roguery, official (with Obama’s eyes supposedly averted).  Or better, call it, stripped of all cosmetics, the unerring mark of a Police State, itself become identical  with Fortress America, the National-Security State.

Eavesdropping on foreign leaders speaks to an arrogance of power, in which the US claims for itself every right, unilaterally, to script both sides of the foreign dialogue as well as micromanage to its own advantage the rhythm and content of global events, from regional trade partnerships to the use of military force in shoring up alliance systems against a host of enemies, some terrorist groups to be sure, but, using that as pretext, mounting counterrevolution globally against alternative modes, notably, socialist, of modernization: autonomous national and/or radical aspirations seeking distance from US market penetration, the tarnished necklace of its worldwide military bases and CIA stations, and not least, the ideological saturation (assisted by IMF and World Bank applications of pressure) of market fundamentalism, the property right, unrestricted capital flows, and the honor of serving American industry with the lowest possible labor costs, as meanwhile we see the financialization of capitalism here and the gutting of the manufacturing base.

Eavesdropping, of course, is the polite term for control freak, which translates, in the realm of power politics, into societal desperation to employ any and all means for staying on top, cyber-strategies of disruption as well as information-gathering, campaigns of disinformation, CIA-JSOC paramilitary programs of regime change, and, upping the ante, as here, learning every move in advance of foreign leaders, the better-take no chances, take no prisoners-to orchestrate world politics in our favor.

“We Don’t Have a Domestic Spying Program”

We don’t have a domestic spying program.” That was the statement made by President Barack Obama on the “Jay Leno Show” on August 6, 2013 in the aftermath of the revelations by whistleblower Edward Snowden. We know now that there was no truth in that. We know, through the NSA program called “PRISM,” the NSA had been collecting internet data since 2007, including encrypted communications, from the tech giants, such as Google, Yahoo and Verizon, under Section 702 of the FISA Amendments Act of 2008. That’s the one that Obama said he would filibuster, then voted for with the promise of fixing it later.

The latest revelation is the NSA went beyond PRISM’s front door approach and behind the back of Google and Yahooo to infiltrate links to their data centers world wide. This newest document from Edward Snowden’s stash of NSA files exposed a program called MUSCULAR that was jointly operated with the NSA’s British counterpart, GCHQ. As it was reported by  Barton Gellman and Ashkan Soltani at The Washington Post, through this program they secretly broke into the main communication links that connect Yahoo and Google around the world enabling them to “collect at will from hundreds of millions of user accounts, many of them belonging to Americans.

According to a top-secret accounting dated Jan. 9, 2013, the NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records – including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video.

The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, the Government Communications Headquarters . From undisclosed interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that carry information among the data centers of the Silicon Valley giants. [..]

Intercepting communications overseas has clear advantages for the NSA, with looser restrictions and less oversight. NSA documents about the effort refer directly to “full take,” “bulk access” and “high volume” operations on Yahoo and Google networks. Such large-scale collection of Internet content would be illegal in the United States, but the operations take place overseas, where the NSA is allowed to presume that anyone using a foreign data link is a foreigner.

Outside U.S. territory, statutory restrictions on surveillance seldom apply and the FISC has no jurisdiction. Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) has acknowledged that Congress conducts little oversight of intelligence-gathering under the presidential authority of Executive Order 12333, which defines the basic powers and responsibilities of the intelligence agencies.

Needless to say the news that the NSA can collect information sent by fibre optic cable between the two tech giants infuriated them:

In a statement, Google’s chief legal officer, David Drummond, said the company was “outraged” by the latest revelations.

“We have long been concerned about the possibility of this kind of snooping, which is why we have continued to extend encryption across more and more Google services and links, especially the links in the slide,” he said.

“We do not provide any government, including the US government, with access to our systems. We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform.”

Yahoo said: “We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency.”

It was this slide from the NSA presentation on “Google Cloud Exploitation,” that caused two engineers with close ties to Google exploded in profanity when they saw the drawing.

NSA Infiltrates Yahoo Google photo GOOGLE-CLOUD-EXPLOITATION1383148810_zpsbdce47a5.jpg

Click on image to enlarge.

The tech giants are now calling for real reforms of the NSA. In a letter sent to the Senate Intelligence Committee, chaired by Senator Dianne Feinstein (D-CA), they called for passage of the USA Freedom Act  a bill sponsored by Democrat senator Patrick Leahy and Republican congressman James Sensenbrenner that would end the bulk collection of data from millions of Americans and set up a privacy advocate to monitor the Fisa court, which oversees the NSA’s US activities.

“Recent disclosures regarding surveillance activity raise important concerns in the United States and abroad. The volume and complexity of the information that has been disclosed in recent months has created significant confusion here and around the world, making it more difficult to identify appropriate policy prescriptions,” the letter states.

“Our companies have consistently made clear that we only respond to legal demands for customer and user information that are targeted and specific.

“Allowing companies to be transparent about the number and nature of requests will help the public better understand the facts about the government’s authority to compel technology companies to disclose user data and how technology companies respond to the targeted legal demands we receive,” they write. [..]

“We urge the administration to work with Congress in addressing these critical reforms that would provide much needed transparency and help rebuild the trust of Internet users around the world,” the letter said.

The lack of credibility that this administration and congress has on this issue is eclipsed only by the enormity of the Grand Canyon. The sham House Intelligence Committee led by chief NSA apologist Rep. Mike Rogers featured inveterate liars NSA boss General Keith Alexander and Director of National Intelligence James Clapper, along with  Deputy Attorney General James Cole and number 2 guy at NSA Chris Inglis who were tossed easy questions. When push back from Democratic committee members came, Rogers interrupted, incredibly suggesting that they should just shut up if they’re going to say they weren’t informed:

(Rep. Adam) Schiff quite reasonably, appeared to take offense to this, and challenged Rogers, asking for more details as to when and how the Committee was told about spying on foreign leaders. Rogers without actually answering the question kept “warning” other members not to say something about this. Schiff broke in again (with Rogers trying to stop him from talking) to ask if the Committee was directly informed about this or if it was just a giant data dump of information that he would have had to go through carefully to find out who they were spying on. Rogers again refused to answer the question, and again hinted that those who put in the “effort” would have known about this — and then flat out cut off Schiff [..]

So we are now supposed to trust the liars?

 

US Spying: “An Institutional Obsession”

Former constitutional lawyer and columnist on civil liberties and U.S. national security issues for The Guardian, Glenn Greenwald joined Democracy Now!‘s Amy Goodman to discuss how US spying in out allies has become an institutionalized obsession with surveillance.

The spat over U.S. spying on Germany grew over the weekend following reports the National Security Agency has monitored the phone calls of Chancellor Angela Merkel since as early as 2002, before she even came to office. The NSA also spied on Merkel’s predecessor, Gerhard Schroeder, after he refused to support the Iraq War. NSA staffers working out of the U.S. embassy in Berlin reportedly sent their findings directly to the White House. The German tabloid Bild also reports President Obama was made aware of Merkel’s phone tap in 2010, contradicting his apparent claim to her last week that he would have stopped the spying had he known. In another new disclosure, the Spanish newspaper El Mundo reports today the NSA tracked some 60 million calls in Spain over the course of a month last year. A delegation of German and French lawmakers are now in Washington to press for answers on the allegations of U.S. spying in their home countries.

Jay Ackroyd at Eschaton thought this part of the lengthy interview deserved to be highlighted:

    So, for the top national security official in the United States to go to the Senate and lie to their faces and deny that the NSA is doing exactly that which our reporting proved that the NSA was in fact doing is plainly a crime, and of course he should be prosecuted, and would be prosecuted if we lived under anything resembling the rule of law, where everybody is held and treated equally under the law, regardless of position or prestige. Of course, we don’t have that kind of system, which is why no Wall Street executives have been prosecuted, no top-level Bush officials were prosecuted for torture or warrantless eavesdropping, and why James Clapper hasn’t been prosecuted despite telling an overt lie to Congress. And what’s even more amazing, though, Amy, is that not only has James Clapper not been prosecuted, he hasn’t even lost his job. He’s still the director of national intelligence many months after his lie was revealed, because there is no accountability for the top-level people in Washington.

   And the final thing to say about that is, there’s all kinds of American journalists who love to go on television and accuse Edward Snowden of committing all these grave and horrible crimes. They’re so brave when it comes to declaring Edward Snowden to be a criminal and calling for [inaudible]. Not one of them has ever gone on television and said, “James Clapper committed crimes, and he ought to be prosecuted.” The question that you just asked journalistically is such an important and obvious one, yet not-none of the David Gregorys or Jeffrey Toobins or all these American journalists who fancy themselves as aggressive, tough reporters, would ever dare utter the idea that James Clapper ought to be arrested or prosecuted for the crimes that he committed, because they’re there to serve those interests and not to challenge or be adversarial to them.

Jay also pointed out e-mail exchange between Glenn and Bill Keller, the former executive editor of The New York Times, in an op-ed by Keller.

Is Glenn Greenwald the Future of News?

by Bill Keller

Much of the speculation about the future of news focuses on the business model: How will we generate the revenues to pay the people who gather and disseminate the news? But the disruptive power of the Internet raises other profound questions about what journalism is becoming, about its essential character and values. This week’s column is a conversation – a (mostly) civil argument – between two very different views of how journalism fulfills its mission.

Glenn Greenwald broke what is probably the year’s biggest news story, Edward Snowden’s revelations of the vast surveillance apparatus constructed by the National Security Agency. He has also been an outspoken critic of the kind of journalism practiced at places like The New York Times, and an advocate of a more activist, more partisan kind of journalism. Earlier this month he announced he was joining a new journalistic venture, backed by eBay billionaire Pierre Omidyar, who has promised to invest $250 million and to “throw out all the old rules.” I invited Greenwald to join me in an online exchange about what, exactly, that means.

It’s long but worth the read.  

Democrats: Bought & Sold by the Spies

Who Buys the Spies? The Hidden Corporate Cash Behind America’s Out-of-Control National Surveillance State

by Thomas Ferguson, Paul Jorgensen, and Jie Chen

Democratic leaders are full-fledged players in the national surveillance state, right along with Republicans.

Long before President Obama kicked off his 2008 campaign, many Americans took it for granted that George W. Bush’s vast, sprawling national security apparatus needed to be reined in. For Democrats, many independents, and constitutional experts of various persuasions, Vice President Dick Cheney’s notorious doctrine of the “unitary executive” (which holds that the President controls the entire executive branch), was the ultimate statement of the imperial presidency. It was the royal road to easy (or no) warrants for wiretaps, sweeping assertions of the government’s right to classify information secret, and arbitrary presidential power. When Mitt Romney embraced the neoconservatives in the 2012 primaries, supporters of the President often cited the need to avoid a return to the bad old days of the Bush-Cheney-Rumsfeld National Security State as a compelling reason for favoring his reelection. Reelect President Obama, they argued, or Big Brother might be back.

But that’s not how this movie turned out: The 2012 election proved to be a post-modern thriller, in which the main characters everyone thought they knew abruptly turned into their opposites and the plot thickened just when you thought it was over.[..]

As the storm over surveillance broke, we were completing a statistical analysis of campaign contributions in 2012, using an entirely new dataset that we constructed from the raw material provided by the Federal Election Commission and the Internal Revenues Service (which compiles contributions from so-called “527”s).  In light of what has transpired, our quantitative analysis of presidential election funding invites closer scrutiny, particularly of the finding that we had already settled upon as perhaps most important:  In sharp contrast to endlessly repeated claims that big business was deeply suspicious of the President, our statistical results show that a large and powerful bloc of  “industries of the future” – telecommunications, high tech, computers, and software – showed essentially equal or higher percentages of support for the President in 2012 than they did for Romney [..]

But the point that our findings document is perhaps most instructive of all. Many of the firms and industries at the heart of this Orwellian creation have strong ties to the Democrats. Bush and Cheney may have invented it, but national Democratic leaders are full-fledged players in this 21st century National Surveillance State and the interest group pressures that now help to sustain its defenders in Washington work just as powerfully on Democrats as on Republicans.

Party Competition and Industrial Structure in the 2012 Elections

Key Findings:

   

  • Existing data sources used for studies of campaign finance have a variety of serious flaws.
  • As a result, the degree to which major parties’ presidential candidates depend on very large donors has been underestimated and the role small donors play exaggerated.
  • The relation between the money split between the parties and the proportion of votes received by their candidates in House and Senate races appears to be quite straightforward.
  • Firms and executives in industries strongly affected by proposed regulations limiting greenhouse gas emissions heavily backed Mitt Romney. So did much, but not all, of finance.
  • President Obama’s support within big business was broader than hitherto recognized. His level of support from firms in telecommunications and software was very strong indeed, sometimes equaling or exceeding Romney’s. Many firms and sectors most involved in the recent controversies over surveillance were among the President’s strongest supporters.
  • Republican candidates showed sharply different levels of contributions from small donors; President Obama’s campaign, while heavily dependent on large donors, attracted more support from small donors than did his Republican opponent.
  • Big business support for Tea Party candidates for Congress was substantial, but well below levels for more mainstream Republicans. Many of the same sectors that strongly supported Romney also backed Tea Party candidates. Backing for Tea Party candidates by Too Big To Fail banks ran above the average of business as a whole by every measure.

Read “Party Competition and Industrial Structure in the 2012 Elections: Who’s Really Driving the Taxi to the Dark Side?” (pdf), by Thomas Ferguson, Paul Jorgensen, and Jie Chen.

Professor of Political Science at the University of Massachusetts and a Senior Fellow of the Roosevelt Institute, Thomas Ferguson discusses the finding of the study with Real New Networks Jaisal Noor.

As Yves Smith at naked capitalism noted this is a good explanation why “Obama started looking more stressed than usual around the time of the Snowden revelations.”

Live Stream: Stop Watching Us Rally

Livestream: Stop Watching Us Rally

Live streaming video by Ustream

On October 26th, the 12th anniversary of the PATRIOT Act,

The full list, in order of appearance, includes:

Daniel Ellsberg, “Pentagon Papers” whistleblower

Phil Donahue, television talk-show pioneer

US Rep. John Conyers Jr. (D-MI), ranking Democrat on the House Judiciary Committee

David Segal, executive director of Demand Progress

Maggie Gyllenhaal, actor and activist

Oliver Stone, director of The Untold History of the United States and Nixon

John Cusack, actor and activist

Wil Wheaton, actor and writer

Molly Crabapple, artist and writer

Jesselyn Radack, U.S. Department of Justice whistleblower and national security and human rights director at the Government Accountability Project

J. Kirk Wiebe, NSA whistleblower

Mark Klein, AT&T whistleblower who revealed the telecommunications company’s collaboration with the NSA in collecting customer data

Thomas Drake, NSA whistleblower

Cindy Cohn, Legal Director at the Electronic Frontier Foundation

Dan Choi, LGBTQ activist and Iraq War veteran

Lawrence Lessig, Roy L. Furman Professor of Law and Leadership at Harvard Law School

NSA Busted for Spying on Other Countries For Profit

The revelation that the NSA was using its hoovering of data from other countries broke in August with the Der Spiegel report that the NSA had bugged the UN Headquarters in New York City, as well as,  European Union and the International Atomic Energy Agency (IAEA). In early September, a week before the UN General Assembly meeting in NYC, Brazil’s president, Dilma Rousseff, cancelled her visit in Washington with President Barack Obama over the NSA’s spying on her, her inner circle of top aides and Brazil’s largest company, the oil giant Petrobras.

Now, this week its Mexico and France and its not about keeping us safe, its about industrial espionage:

In France, grabbed the data of over 70,000 phone calls:

Le Monde said the documents gave grounds to think the NSA targeted not only people suspected of being involved in terrorism but also high-profile individuals from the world of business or politics. [..]

French Prime Minister Jean-Marc Ayrault [said]  “I am deeply shocked…. It’s incredible that an allied country like the United States at this point goes as far as spying on private communications that have no strategic justification, no justification on the basis of national defence,” he told journalists in Copenhagen.

Mexico:

   The NSA has been systematically eavesdropping on the Mexican government for years. [..]

   In the space of a single year, according to the internal documents, this operation produced 260 classified reports that allowed US politicians to conduct successful talks on political issues and to plan international investments.

As has been revealed this summer, the NSA was recently revealed to have been spying on Brazil’s largest oil company. We now know they were also spying on the biggest financial payments systems such as VISA and Swift and on the on Chinese technology company Huawei.

One of the slides leaked by Edward Snowden from from a 2012 NSA presentation explained “economic” was one of the main justifications for spying.

The NSA would also like to keep better tabs on Wall Street under the guise of protecting it:

Drawing an analogy to how the military detects an incoming missile with radar and other sensors, (General Keith) Alexander imagined the NSA being able to spot “a cyberpacket that’s about to destroy Wall Street.” In an ideal world, he said, the agency would be getting real-time information from the banks themselves, as well as from the NSA’s traditional channels of intelligence, and have the power to take action before a cyberattack caused major damage.

Wall Street saw through Alexander’s “collect it all” ploy and quickly labeled it “wild:”

His proposed solution: Private companies should give the government access to their networks so it could screen out the harmful software. The NSA chief was offering to serve as an all-knowing virus-protection service, but at the cost, industry officials felt, of an unprecedented intrusion into the financial institutions’ databases.

The group of financial industry officials, sitting around a table at the Office of the Director of National Intelligence, were stunned, immediately grasping the privacy implications of what Alexander was politely but urgently suggesting. As a group, they demurred.

“He’s an impressive person,” the participant said, recalling the group’s collective reaction to Alexander. “You feel very comfortable with him. He instills a high degree of trust.”

But he was proposing something they thought was high-risk.

“Folks in the room looked at each other like, ‘Wow. That’s kind of wild.’ ”

DSWRight at FDL News Desk duly notes that the US government has been doing what it has prosecuted others for doing under  the Computer Fraud and Abuse Act (CFAA), the same law that was used to harass Aaron Swartz:

The hypocrisy is epic and disgusting. The NSA has disgraced and embarrassed the American people at home and abroad.

The rampant criminality and antisocial behavior of America’s intelligence community has not only diminished American rule of law at home, but is leading to increasing friction internationally with our allies. It is well past time for us to reexamine the power of the NSA and friends.

It is well past time the NSA was stopped before it shreds what remains of US credibility in the international and business community

The NSA: Bigger Is Not Better

In the case of the NSA’s scooping up and storing all that private data, they ran into a glitch, too much information makes the job of surveillance harder

The volume of NSA contacts collection is so high that it has occasionally threatened to overwhelm storage repositories, forcing the agency to halt its intake with “emergency detasking” orders. Three NSA documents describe short-term efforts to build an “across-the-board technology throttle for truly heinous data” and longer-term efforts to filter out information that the NSA does not need.

Spam has proven to be a significant problem for NSA – clogging databases with data that holds no foreign intelligence value. The majority of all e-mails, one NSA document says, “are SPAM from ‘fake’ addresses and never ‘delivered’ to targets.”

In fall 2011, according to an NSA presentation, the Yahoo account of an Iranian target was “hacked by an unknown actor,” who used it to send spam. The Iranian had “a number of Yahoo groups in his/her contact list, some with many hundreds or thousands of members.”

The cascading effects of repeated spam messages, compounded by the automatic addition of the Iranian’s contacts to other people’s address books, led to a massive spike in the volume of traffic collected by the Australian intelligence service on the NSA’s behalf.

After nine days of data-bombing, the Iranian’s contact book and contact books for several people within it were “emergency detasked.”

LOL. The NSA has a spam problem.

Meanwhile, the head of the NSA, Gen. Keith Alexander has had to admit to the Senate Intelligence Committee that he lied back in June about those 54 terrorists plots he claimed were “thwarted” by the agency’s phone surveillance program.

Alexander admitted that only 13 of the 54 cases were connected to the United States. He also told the committee that only one or two suspected plots were identified as a result of bulk phone record collection.

Leahy was not happy. “We’re told we have to (conduct mass phone surveillance) to protect us, and the statistics are rolled out that they’re not accurate,” he said. “It doesn’t have the credibility here in the Congress, it doesn’t have the credibility with this chairman and it doesn’t have the credibility with the country.”

Over at the Wall Street Journal, in an op-ed behind a paywall, the committee chair, Sen Dianne Feinstein trotted out the old “9/11 be very afraid” canard and repeated the debunked Alexander lie.

Consider the case of 9/11 hijacker Khalid al-Mihdhar, who was being watched by the CIA while he was in Malaysia. U.S. intelligence agencies failed to connect the dots before the attack to recognize that al-Mihdhar had flown with (future) hijacker Nawaf al-Hazmi to Los Angeles in January 2000.

Intelligence officials knew about an al Qaeda safe house in Yemen with ties to al-Mihdhar as well as the safe house’s telephone number, but they had no way of knowing if anyone inside the U.S. was in contact with that phone number in Yemen. Only after 9/11 did we learn that al-Mihdhar, while living in San Diego, had called the safe house. [..]

Working in combination, the call-records database and other NSA programs have aided efforts by U.S. intelligence agencies to disrupt terrorism in the U.S. approximately a dozen times in recent years, according to the NSA. This summer, the agency disclosed that 54 terrorist events have been interrupted-including plots stopped and arrests made for support to terrorism. Thirteen events were in the U.S. homeland and nine involved U.S. persons or facilities overseas. Twenty-five were in Europe, five in Africa and 11 in Asia.

Can everyone say say Richard Clark.

At Techdirt, Mike Masnick points out none of what Sen. Feinstein said is true:

First off, as has been explained over and over again, the intelligence community already had certain tools in place to discover such phone calls. The problem wasn’t that they didn’t have the information — they did. It was that they failed to “connect the dots.” In other words, they had too much information which obscured the important information they needed. [..]

Note the all important “and other NSA programs” language here. Also the use of “terrorist events” not plots. And, remember, those “thirteen events… in the U.S. homeland,” have since been whittled down to only one that actually relied on the call records program that she’s defending — and that wasn’t a terrorist plot but a cab driver in San Diego sending some cash to a Somali group judged to be a terrorist organization.

So, we have elected representatives and high paid appointees blatantly lying and getting away with it to protect their turf with no one is holding them accountable,

Load more