Tag: Privacy

NSA Was Found in Violation of the Fourth Amendment

The Electronic Freedom Foundation has won a victory in its fight with the government in federal court to release a FISA court ruling that found the NSA in violation of the Fourth Amendment, illegally collecting e-mails of tens of thousands of Americans.

NSA illegally collected thousands of emails before Fisa court halted program

by Spencer Ackerman, The Guardian

Declassified court ruling from 2011 found government ‘disclosed substantial misrepresentation’ of data collection program

In his 86-page opinion, declassified on Wednesday, Judge John Bates wrote that the government informed the court that the “volume and nature of the information it has been collecting is fundamentally different from what the court had been led to believe”.

The ruling is one of three documents released in response to a Freedom of Information Act request by the Electronic Frontier Foundation, and comes amid growing public and congressional concern over the scope of NSA surveillance programs. [..]

Wholly domestic communications are banned from the NSA’s collection under section 702 of the 2008 Fisa Amendments Act. An NSA document leaked by whistleblower Edward Snowden and published by the Guardian on August 9 referred to an October 2011 change in the rules, by which the NSA must purge data it improperly collected but that said the NSA could still search its so-called “702” databases for “certain US person names and identifiers,” though not until an “effective oversight process” was implemented.

Senator Ron Wyden, a member of the intelligence committee, refers to the NSA’s still-current authorities to query those databases for US person information as a “backdoor search” loophole.

“The ruling states that the NSA has knowingly acquired tens of thousands of wholly domestic communications under section 702 of the Foreign Intelligence Surveillance Act, even though this law was specifically written to prohibit the warrantless acquisition of wholly domestic communications,” Wyden said.

“The FISA Court has noted that this collection violates the spirit of the law, but the government has failed to address this concern in the two years since this ruling was issued. This ruling makes it clear that FISA Section 702, as written, is insufficient to adequately protect the civil liberties and privacy rights of law-abiding Americans and should be reformed.”

October 3, 2011 FISC Opinion Holding NSA Surveillance Unconstitutional

Anchor and managing editor for “Dan Rather Reports” on AXS-TV, Dan Rather joined Rachel Maddow to talk about the abuse of power and general bungling undermines the credibility of the US and calls into question how the “war on terror’ has been conducted over the last 12 years since 9/11.

The NSA has “built a surveillance network that covers more Americans’ Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans.”

NSA: Oversight or Coverup?

NSA Spying: The Three Pillars of Government Trust Have Fallen

by Cindy Cohn and Mark Jaycox, Electronic Frontier Foundation

With each recent revelation about the NSA’s spying programs government officials have tried to reassure the American people that all three branches of government-the Executive branch, the Judiciary branch, and the Congress-knowingly approved these programs and exercised rigorous oversight over them. President Obama recited this talking point just last week, saying: “as President, I’ve taken steps to make sure they have strong oversight by all three branches of government and clear safeguards to prevent abuse and protect the rights of the American people.”  With these three pillars of oversight in place, the argument goes, how could the activities possibly be illegal or invasive of our privacy?

Today, the Washington Post confirmed that two of those oversight pillars-the Executive branch and the court overseeing the spying, the Foreign Intelligence Surveillance Court (FISA court )- don’t really exist. The third pillar came down slowly over the last few weeks, with Congressional revelations about the limitations on its oversight, including what Representative Sensennbrenner called “rope a dope” classified briefings. With this, the house of government trust has fallen, and it’s time to act.

Latest Leak: NSA Abused Rules To Spy On Americans ‘Thousands Of Times Each Year

by Mike Masnick, TechDirt

(T)he latest report from the Washington Post based on leaked documents shows that an audit of the NSA’s activities shows it broke privacy rules, mostly to spy on Americans, thousands of times per year:

   The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents.

   Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by law and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls.

The audit info comes from Ed Snowden’s leaks, so it seems rather incredible that President Obama, Keith Alexander and Mike Rogers didn’t seem to realize that this audit would eventually come to light, showing that they were flat out 100% lying to the American public.

That’s Not Oversight: Head Of FISC Admits He Relies On NSA’s Statements To Make Sure They’re Obeying The Law

by Mike Masnick, TechDirt

The chief judge of FISC, Reggie Walton, who has reacted angrily in the past to the claims of FISC being a “rubber stamp”, has now admitted that the FISC really can’t check on what the NSA is doing and relies on what they tell him to make sure that they’re not breaking the law.

   “The FISC is forced to rely upon the accuracy of the information that is provided to the Court,” its chief, U.S. District Judge Reggie Walton, said in a written statement to The Washington Post. “The FISC does not have the capacity to investigate issues of noncompliance, and in that respect the FISC is in the same position as any other court when it comes to enforcing [government] compliance with its orders.”

That’s not quite true. You see, with “any other court” when it comes to “enforcing compliance” things aren’t all hidden away from everyone, so there is scrutiny to make sure that there’s compliance. Not here.

Either way, this again shows just how laughable President Obama’s claims are about the FISC’s oversight abilities:

   “We also have federal judges that we’ve put in place who are not subject to political pressure,” Obama said at a news conference in June. “They’ve got lifetime tenure as federal judges, and they’re empowered to look over our shoulder at the executive branch to make sure that these programs aren’t being abused.”

Not quite. Now we know that they rely on the NSA to tell the judges what they might see if they were looking over their shoulders… and the NSA isn’t entirely truthful to FISC about that.

The latest revelation that the House Intelligence Committee withheld surveillance information from Congress before a critical vote to renew the Patriot Act has resulted in pressure from both side of the aisle and government watch dogs on committee chair Mike Rogers (R-MI). The demand is for an explanation of why a document that prepared by the justice department and intelligence community was not shared by the panel’s leadership. From Spencer Ackerman at The Guardian:

The accusations broaden the focus of the surveillance controversy from the National Security Agency to one of the congressional committees charged with exercising oversight of it – and the panel’s closeness to the NSA it is supposed to oversee.

(Michigan Republican Justin) Amash told the Guardian on Monday that he had confirmed with the House intelligence committee that the committee did not make non-committee members aware of the classified overview from 2011 of the bulk phone records collection program first revealed by the Guardian thanks to whistleblower Edward Snowden. The document was expressly designed to be shared with legislators who did not serve on the panel; it appears that a corresponding document for the Senate in 2011 was made available to all senators.

“Nobody I’ve spoken to in my legislative class remembers seeing any such document,” Amash said.

Amash speculated that the House intelligence committee withheld the document in order to ensure the Patriot Act would win congressional reauthorization, as it ultimately did.

On Monday, a former senate staffer Jennifer Hoelzer, who was deputy chief of staff for Sen. Ron Wyden (D-OR), spoke with Amy Goodman of Democracy Now! on President Barack Obama’s proposed changes to reform the government’s surveillance policies and programs.



Full transcript can be read here

“Unfortunately Edward Snowden was the only means by which we have been able to have this debate,” Hoelzer says. “We, working for Senator Wyden, did everything to try to encourage the administration to bring these facts to light. We’re not talking about sources and methods, we’re not talking about sensitive materials, we’re talking about what they believed the law allows them to do.”

As Spencer Ackerman points out in his article, both Chairman Rogers and his ranking Democratic counterpart, Dutch Ruppersberger of Maryland, are “staunch advocates of the NSA bulk surveillance programs.”

This is the government’s definition of “oversight.”

Encrypted E-Mail , FISA and Our Privacy Rights

Last week, Lavabit, the privacy-conscious email service, suspended operations by its owner Ladar Levison while he fights the US government over Constitutional rights in the 4th Circuit Court of Appeals. In his letter to his customers, Mr. Levison wrote

My Fellow Users,

I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what’s going on–the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise. As things currently stand, I cannot share my experiences over the last six weeks, even though I have twice made the appropriate requests.

What’s going to happen now? We’ve already started preparing the paperwork needed to continue to fight for the Constitution in the Fourth Circuit Court of Appeals. A favorable decision would allow me resurrect Lavabit as an American company.

This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.

Sincerely,

Ladar Levison

Owner and Operator, Lavabit LLC

(emphasis mine)

Lavabit allows its customers send highly encrypted emails that even if intercepted by a third party could not be opened without a password. Based in the US, it is the e-mail service that was allegedly used by whistleblower Edward Snowden.

In an exclusive interview with Amy Goodman on Tuesday’s Democracy Now!, Lavabit owner Ladar Levison and his lawyer, Jesse Binnall discuss why the decision was made to shut down rather than comply with a government order



Transcript can be read here

“I think if the American public knew what our government was doing, they wouldn’t be allowed to do it anymore.

“I mean, there’s information that I can’t even share with my lawyer, let alone with the American public. So if we’re talking about secrecy, you know, it’s really been taken to the extreme.

“And I think it’s really being used by the current administration to cover up tactics that they may be ashamed of.”

~Ladar Levison~

Another encrypted service, Silent Circle has also announced it has shut down. Although it had not yet received any government requests for data, Silent Circle told Tech Crunch that it knew the government would come after them because of the high-profile nature of its users.

Despite the Promise, Still No Tranparency on Surveillance

During his press conference on Friday, President Barack Obama admitted, without giving him credit, that the reason the conversation on the NSA is now taking place is thanks to Edward Snowden.

“The leaks triggered a much more rapid and passionate response than would have been the case if I had simply appointed this review board,” Obama said, while adding, “I actually think we would have gotten to the same place-and we would have done so without putting at risk our national security.”

With public opinion rapidly eroding over the surveillance, the president still refused to concede that the program was abused:

“America is not interested in spying on ordinary people,” Obama said. The surveillance programs, he said, were valuable and “should be preserved.” The flaw, if there was one, he said, lay in his assumption that the public would trust that the “checks and balances” in place between the administration, Congress, and the courts was enough to secure personal freedom. Instead, he said, after Snowden’s revelations, “I think people have questions about this program.”

While Obama promised a to create an an independent advisory group made up of “outside experts” who will review controversial surveillance programs, it’s pretty clear that [the group won’t exactly be completely independent of the NSA, as Marcy Wheeler reports:

In the memo Obama just released (pdf) ordering James Clapper to form such a committee, those words “outside” and “independent” disappear entirely.

   I believe it is important to take stock of how these technological advances alter the environment in which we conduct our intelligence mission. To this end, by the authority vested in me as President by the Constitution and the laws of the United States of America, I am directing you to establish a Review Group on Intelligence and Communications Technologies (Review Group).

   The Review Group will assess whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust. Within 60 days of its establishment, the Review Group will brief their interim findings to me through the Director of National Intelligence (DNI), and the Review Group will provide a final report and recommendations to me through the DNI no later than December 15, 2013. [my emphasis]

And neither Obama nor the Intelligence Committees get to hear from this Group themselves. It all goes through James Clapper.

And the other group members

President Obama and Director Clapper may solicit advice from notable figures in the technology industry; the president reportedly met with several leaders last Thursday, including Apple CEO Tim Cook and Google VP Vint Cerf. But with both Apple and Google implicated in some level of cooperation with the government under PRISM, the government may need to solicit input from a broader coalition of stakeholders.

So, Obama is putting the liar in charge, asking advice from those who willingly aided and abetted the spying and isn’t going to make the report public but expects this will win over public opinion. Yeah, right. If the public falls for this malarkey, I have a bridge to sell, too.

The Greatest Lies Ever Told

Someone suggested that latest lie told by President Barack Obama on the Jay Leno Show that other night stating, “There is no spying on Americans. We don’t have a domestic spying program,” was up there with the 10 greatest lies ever told. That fallacy of the president’s declaration was made very obvious in a New York Times article by Charlie Savage on the latest and greatest NSA domestic surveillance program. The NSA has been copying virtually all overseas messages that Americans send or receive, scanning them to see if they contain any references to people or subjects the agency thinks might have a link to terrorists.

Hints of the surveillance appeared in a set of rules, leaked by Mr. Snowden, for how the N.S.A. may carry out the 2008 FISA law. One paragraph mentions that the agency “seeks to acquire communications about the target that are not to or from the target.” The pages were posted online by the newspaper The Guardian on June 20, but the telltale paragraph, the only rule marked “Top Secret” amid 18 pages of restrictions, went largely overlooked amid other disclosures.

In an opinion by the New York Times Editorial Board, these messages could be very private and no connection to terrorists or terrorist activity:

That could very well include innocent communications between family members expressing fears of a terror attack. Or messages between an editor and a reporter who is covering international security issues. Or the privileged conversation between a lawyer and a client who is being investigated.

Data collection on this scale goes far beyond what Congress authorized, and it clearly shreds a common-sense understanding of the Fourth Amendment. It’s as if the government were telling its citizens not to even talk about security issues in private messages or else they will come to the attention of the nation’s spies.

At the Electronic Frontier Foundation, Mark Rumold explains what it means to be an NSA target:

When “Target” Means Searching a Specific Person’s Communications

First, at least this much is clear: a “target” under the FA (FISA Amendments Act ) must be (a) a non-US person and (b) not physically located within the United States. A “person,” for purposes of the FAA, includes individuals as well as “any group, entity, association, corporation, or foreign power.”  Under the FAA, the government can thus “target” a single individual (e.g., Vladimir Putin), a small group of people (e.g., Pussy Riot), or a formal corporation or entity (e.g., Gazprom).

So, when the NSA decides to “target” someone (or something), it turns its specific surveillance vacuum at them. [..]

When “Target” Means Searching Everyone’s Communications

Once a target is established, the NSA believes it can expand the sweep of its interception far more broadly than the communhttp://www.guardian.co.uk/world/interactive/2013/jun/20/exhibit-a-procedures-nsa-documentications of the particular, identified target. Notably, the NSA’s procedures state (emphasis added):

   [I]n those cases where NSA seeks to acquire communications about the target that are not to or from the target, NSA will either employ an Internet Protocol filter to ensure that the person from whom it seeks to obtain foreign intelligence information is located overseas, or it will target Internet links that terminate in a foreign country.

In plain English: the NSA believes it not only can (1) intercept the communications of the target, but also (2) intercept communications about a target, even if the target isn’t a party to the communication. The most likely way to assess if a communication is “about” a target is to conduct a content analysis of communications, probably based on specific search terms or selectors.

And that, folks, is what we call a content dragnet.

Importantly, under the NSA’s rules, when the agency intercepts communications about a target, the author or speaker of those communications does not, thereby, become a target: the target remains the original, non-US person. But, because the target remains a non-US person, the most robust protection for Americans’ communications under the FISA Amendments Act (and, indeed, the primary reassurance the government has given about the surveillance) flies out the window. If you communicate about a target of NSA surveillance, your citizenship is irrelevant: the only thing standing between you and NSA surveillance is your IP address or the fiber optic path through which your communications flow.

Jameel Jaffer, American Civil Liberties Union deputy legal director, made the following comments about the latest revelations:

“The program described by the New York Times involves a breathtaking invasion of millions of people’s privacy.  The NSA has cast a massive dragnet over Americans’ international communications, collecting and monitoring all of them, and retaining some untold number of them in government databases.  This is precisely the kind of generalized spying that the Fourth Amendment was intended to prohibit.

“The government’s scrutiny of virtually every international email sent by Americans will have extraordinary consequences for free expression. Americans will inevitably hesitate to discuss controversial topics, visit politically sensitive websites, or interact with foreigners with dissenting views. By injecting the NSA into virtually every cross-border interaction, the U.S. government will forever alter what has always been an open exchange of ideas.

“There is no spying on Americans. We don’t have a domestic spying program,” is right up there with “I am not a crook” and “I did not have sex with that woman.”

NSA Handing Information to DEA and DOJ

The National Security Agency isn’t just looking to “keep us safe” from terrorists by collecting metadata, the NSA is sharing its information with the secretive Special Operations Division of the U.S. Drug Enforcement Administration (DEA) which is then passing that information to local authorities, covering up the NSA source.

U.S. directs agents to cover up program used to investigate Americans

by John Shiffman and Kristina Cooke, Reuters

A secretive US Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.

It isn’t just the DEA that is doing this, the Justice Department is also receiving information about non-terrorist related criminal activity.

NSA handing over non-terror intelligence

by Stewart M. Powell, SFGate

The National Security Agency is handing the Justice Department information, derived from its secret electronic eavesdropping programs, about suspected criminal activity unrelated to terrorism.

This little-known byproduct of counterterrorism surveillance continues amid controversy over the NSA’s wide-ranging collection of domestic communications intelligence, including Americans’ telephone calling records and Internet use.

It is unclear whether the referrals have been built upon the content of telephone calls and emails. Administration officials have previously assured Congress that NSA surveillance focuses on so-called metadata and in the main does not delve into the content of individual calls or email messages.

Also, some in the legal community question the constitutionality of criminal prosecutions stemming from intelligence-agency eavesdropping.

Other Agencies Clamor for Data N.S.A. Compiles

by Eric Lichtblau and Michael S. Schmidt, The New York Times

The National Security Agency’s dominant role as the nation’s spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.

Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

Intelligence officials say they have been careful to limit the use of the security agency’s troves of data and eavesdropping spyware for fear they could be misused in ways that violate Americans’ privacy rights.

The recent disclosures of agency activities by its former contractor Edward J. Snowden have led to widespread criticism that its surveillance operations go too far and have prompted lawmakers in Washington to talk of reining them in. But out of public view, the intelligence community has been agitated in recent years for the opposite reason: frustrated officials outside the security agency say the spy tools are not used widely enough.

At emptywheel, bmaz points out this is nothing in the Reuter’s article on the SOD wasn’t already known, just no one has been paying attention:

First, the headline is misleading. The caption is:

   Exclusive: U.S. directs agents to cover up program used to investigate Americans

Well, not really (and, in fairness, the actual body of the article is about a practice that is a result of the SOD). DEA’s Special Ops Division is neither new nor secret in the least, and there is no way to “cover it up”. Google it; I got “About 289,000 results (0.29 seconds)” as a return. You will get something similar. The revelation that SOD was used in the Viktor Bout case is also not new, here is a Time story detailing it from 2011.

In fact, any criminal defense attorney who did cocaine hub conspiracy cases in the 90′s could have told you most of the Reuter’s article in their sleep. That was exactly the scene that DEA-SOD was born from. As the war on drugs went nuclear, the DEA devised what they termed the “Kingpin Strategy” (pdf):

   In 1992, the DEA instituted the Kingpin Strategy that focused investigative and enforcement efforts on specific drug trafficking organizations. The DEA planned to dis- able major organizations by attacking their most vulnerable areas-the chemicals needed to process the drugs, their finances, communications, transportation, and leadership structure.

   The Kingpin Strategy held that the greatest impact on the drug trade took place when major drug organizations were dis- rupted, weakened, and destroyed. This strategy focused enforcement efforts and resources against the highest-level traffickers and their organizations, and provided a systematic way of attacking the various vulnerabilities of the organiza- tions. By systematically attacking each of these vulnerabilities, the strategy aimed to destroy the entire organization, and with it, the organization’s capacity to finance, produce, and distrib- ute massive amounts of illegal drugs. Each blow weakened the organization and improved the prospects for arresting and prosecuting the leaders and managers of the organizations.

   The Kingpin Strategy evolved from the DEA’s domestic and overseas intelligence gathering and investigations.

And from Kingpin sprung the Special Operations Division:

   Under the original Kingpin Strategy, DEA headquarters often dictated the selection of Kingpin targets. In response to the SACs’ concerns, Administrator Constantine agreed to allow them more latitude in target selection. In conjuction with this decision, he established the Special Operations Division at Newington, Virginia, in 1994 to coordinate multi-jurisdictional investigations against major drug trafficking organizations responsible for the flow of drugs into the United States.

On this morning’s Democracy Now!, Guardian journalist Glenn Greenwald responded to a report by Reuters.



Transcript can be read here.

“It’s a full-frontal assault on the Fourth, Fifth and Sixth Amendments and on the integrity of the judicial process, because they’re deceiving everyone involved in criminal prosecutions about how this information has been obtained,” Greenwald says.

XKeyscore: Another NSA Program Exposed

As a hearing on reining in the secret surveillance program was taking place, another “tool” in the NSA’s collection of on-line data was revealed to the public.

Senate Panel Presses N.S.A. on Phone Logs

by Charlie Savage and David E. Sanger, The New York Times

Senators of both parties on Wednesday sharply challenged the National Security Agency’s collection of records of all domestic phone calls, even as the latest leaked N.S.A. document provided new details on the way the agency monitors Web browsing around the world.

At a Senate Judiciary Committee hearing, the chairman, Patrick J. Leahy, Democrat of Vermont, accused Obama administration officials of overstating the success of the domestic call log program. He said he had been shown a classified list of “terrorist events” detected through surveillance, and it did not show that “dozens or even several terrorist plots” had been thwarted by the domestic program.

“If this program is not effective it has to end. So far, I’m not convinced by what I’ve seen,” Mr. Leahy said, citing the “massive privacy implications” of keeping records of every American’s domestic calls.

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

by Glenn Greenwald, The Guardian

• XKeyscore gives ‘widest-reaching’ collection of online data

• NSA analysts require no prior authorization for searches

• Sweeps up emails, social media activity and browsing history

• NSA’s XKeyscore program – read one of the presentations

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

All In host Chris Hayes talks about the new efforts at transparency and the latest NSA revelations courtesy of Edward Snowden with Senator Richard Blumenthal (D-CT) and Glenn Greenwald of The Guardian.

With the crackdown on whistleblowers and failure to pursue the crimes they revealed, one wonders just how far is the US from becoming the Soviet Russia of the 21st century.

Wyden: FISA Court is an Anachronism

Before last week’s vote on the Amash/Conyer Amendment, that would have stripped financing for the NSA program of unfettered surveillance, the American people were already shifting in how they viewed these programs. Over the weekend Pew conducted another poll showing that the shift is even more stark.

“Overall, 47% say their greater concern about government anti-terrorism policies is that they have gone too far in restricting the average person’s civil liberties, while 35% say they are more concerned that policies have not gone far enough to protect the country. This is the first time in Pew Research polling that more have expressed concern over civil liberties than protection from terrorism since the question was first asked in 2004.”

Major opinion shifts, in the US and Congress, on NSA surveillance and privacy

by Glenn Greenwald, The Guardian

Pew finds that, for the first time since 9/11, Americans are now more worried about civil liberties abuses than terrorism

Perhaps more amazingly still, this shift has infected the US Congress. Following up on last week’s momentous House vote – in which 55% of Democrats and 45% of Republicans defied the White House and their own leadership to vote for the Amash/Conyers amendment to ban the NSA’s bulk phone records collection program – the New York Times has an article this morning which it summarizes on its front page this way:

Congress Against NSA Xurveillance photo nyt1_zps2e4cb29e.png

Click on image to enlarge

The article describes how opposition to the NSA, which the paper says was recently confined to the Congressional “fringes”, has now “built a momentum that even critics say may be unstoppable, drawing support from Republican and Democratic leaders, attracting moderates in both parties and pulling in some of the most respected voices on national security in the House.” [..]

The strategy for the NSA and its Washington defenders for managing these changes is now clear: advocate their own largely meaningless reform to placate this growing sentiment while doing nothing to actually rein in the NSA’s power. “Backers of sweeping surveillance powers now say they recognize that changes are likely, and they are taking steps to make sure they maintain control over the extent of any revisions,” says the NYT.

The primary problem enabling out-of-control NSA spying has long been the Intelligence Committees in both houses of Congress. That’s an ironic twist given that those were the committees created in the wake of the mid-1970s Church Committee to provide rigorous oversight, as a response to the recognition that Executive Branch’s surveillance powers were being radically abused – and would inevitably be abused in the future – without robust transparency and accountability. [..]

The largest changes toward demanding civil liberties protections have occurred among liberal Democrats, Tea Party Republicans, independents and liberal/moderate Republicans. Only self-identified “moderate/conservative Democrats” – the Obama base – remains steadfast and steady in defense of NSA surveillance. The least divided, most-pro-NSA caucus in the House for last week’s vote was the corporatist Blue Dog Democrat caucus, which overwhelmingly voted to protect the NSA’s bulk spying on Americans.

As I’ve repeatedly said, the only ones defending the NSA at this point are the party loyalists and institutional authoritarians in both parties. That’s enough for the moment to control Washington outcomes – as epitomized by the unholy trinity that saved the NSA in the House last week: Pelosi, John Bohener and the Obama White House – but it is clearly not enough to stem the rapidly changing tide of public opinion.

On Sunday, Sen. Ron Wyden (D-OR), one of the harshest critics of the NSA and the FISA court, was a guest on C-Span’s Newsmankers. He called the FISA court “anachronistic” and stated that he is most likely to support overhaul of the secretive court. He was particularly alarmed by the way that the Patriot Act was being interpreted by the federal government in its fight against terrorism.

At Least Obama Now Honest About Trashing the Fourth Amendment

On Thursday the White House was mum on whether they would seek renewal of the “secret” court order that allows the NSA to collect the phone records and e-mails of Americans without due process.

Officials declined to discuss what action they intend to take about the order at the center of the current surveillance scandal, which formally expires at 5pm Friday. [..]

On Thursday, the administration would not answer a question first posed by the Guardian six days ago about its intentions to continue, modify or discontinue the Verizon bulk-collection order. The White House referred queries to the Justice Department. “We have no announcement at this time,” said Justice Department spokesman Brian Fallon. The NSA and office of the Director of National Intelligence did not respond to questions.

At a hearing on Wednesday before the House Judiciary Committee, the top lawyer for the director of national intelligence, Robert S Litt, was asked by the chairman, Bob Goodlatte, if the administration thought if a surveillance program “of this magnitude … could be indefinitely kept secret from the American people?”

Litt answered, “well, we tried.”

Since the cat is out of the bag, so to speak, the White House decided on Friday to come clean that they would continue to violate the Fourth Amendment with impunity:

In an unprecedented move prompted by the Guardian’s disclosure in June of the NSA’s indiscriminate collection of Verizon metadata, the Office of the Director of National Intelligence (ODNI) has publicly revealed that the scheme has been extended yet again.

The statement does not mention Verizon by name, nor make clear how long the extension lasts for, but it is likely to span a further three months in line with previous routine orders from the secret Foreign Intelligence Surveillance Court (Fisa). [..]

The decision to go public with the latest Fisa court order is an indication of how the Obama administration has opened up the previously hidden world of mass communications surveillance, however slightly, since former NSA contractor Edward Snowden exposed the scheme to the Guardian.

Earlier on Friday, ODNI lawyer, Litt, told the Brookings Institute that the intelligence chiefs would consider NSA data collection changesbut continued defending the unconstitutional program:

“It is, however, not the only way that we could regulate intelligence collection,” Litt said. “We’re currently working to declassify more information about our activities to inform that discussion,” particularly concerning the bulk collection of Americans’ telephone records. [..]

“That could be a significant problem in a fast-moving investigation where speed and agility are critical, such as the plot to bomb the New York City subways in 2009,” Litt said.

But Litt also noted: “All of the metadata we get under this program is information that the telecommunications companies obtain and keep for their own business purposes.”

He acknowledged in the beginning of his speech: “There is an entirely understandable concern that the government may abuse this power.”

In response to a question about the legality of the program, Litt also suggested that congress could pass a law permitting the NSA to collect the records.

“You’d have to make sure that it enables the kind of flexibility and operational agility that we need to conduct the collection,” Litt said. “We don’t think a new statute is necessary. We think we have the authority. But obviously, if Congress thinks a new statute is appropriate for this, Congress can provide that.”

Brilliant, let’s pass another unconstitutional law. Way to go, Barack.

Obama Explains NSA Surveillance

President Obama Address NSA Surveillance Concerns

President Obama explains why Americans should not be concerned about the NSA’s secret data collection program and that he is very different from George W. Bush.

With special thanks to Mike Masnick at Techdirt who also provided a partial transcript of his favorite lines which, as he says, is  most of the video.

Warning: Do Not Eat or Drink While Watching

Load more