Tag: police state

NSA: A Billion Calls A Day Stored

Friday night, journalist for The Guardian and constitutional lawyer, Glenn Greenwald appeared via Skype at Socialism Conference in Chicago. He was introduced by investigative journalist for The Nation and author, Jeremy Scahill. Glenn hinted that there is still more to come on the NSA Surveillance scandal and spoke briefly on new technology that would enable the NSA to collect and store a billion calls a day to its repositories:

“It talks about a brand new technology that enables the national security agency to redirect into its own repositories one billion cell phone calls every single day. One billion cell phone calls every single day,” he said.

“But what we’re really talking about here is a localized system that prevents any form of electronic communication from taking place without its being stored and monitored by the National Security Agency,” Greenwald continued. “It doesn’t mean that they’re listening to every call, it means they’re storing every call and have the capability to listen to them at any time, and it does mean that they’re collecting millions upon millions upon millions of our phone and email records.”

(my emphasis)

Here is the full video with a lot of cheering of Jeremy and Glenn and some pretty amusing remarks about the White House and media campaign to impugn Glenn.

Glenn Greenwald Speaks Out

Even a Former Stasi Agent Says It’s a Bad Idea

Obama Spy Net photo ObamaSpyNet_zpsa63a3f0b.jpg You know you’ve screwed up when an agent from one of the most secretive and notorious spy agencies tells you so. A former lieutenant colonel in the now defunct East German secret police, the Stasi, Wolfgang Schmidt was “appalled” saying that ” gathering such a broad, seemingly untargeted, amount of information is obvious”

“It is the height of naivete to think that once collected this information won’t be used,” he said. “This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.”

Now the Ecuadoran government has broken its trade pact with the United States to prevent it from being used as “blackmail” over the request for asylum from Edward Snowden.

The waiving of preferential trade rights followed threats from members of the US congress to drop the ATPA in July, when it is due for renewal, unless Ecuador toed the line on Snowden.

“Ecuador does not accept pressure or threats from anyone, nor does it trade with principles or submit them to mercantile interests, however important those may be,” said Fernando Alvarado, the communications secretary.

“Ecuador gives up, unilaterally and irrevocably, the said customs benefits.”

Meanwhile the US Army has blocked access to parts of The Guardian website to preserve ‘network hygiene’

A spokesman said the military was filtering out reports and content relating to government surveillance programs to preserve “network hygiene” and prevent any classified material appearing on unclassified parts of its computer systems.[..]

The Pentagon insisted the Department of Defense was not seeking to block the whole website, merely taking steps to restrict access to certain content.

But a spokesman for the Army’s Network Enterprise Technology Command (Netcom) in Arizona confirmed that this was a widespread policy, likely to be affecting hundreds of defence facilities.

Besides being an illogical in its defense of leaked information that is now public knowledge, the dogs forbid, these young GI’s should know what it is they’re defending.

At least the Senate isn’t slacking on asking for an explanation. In bipartisan letter, 26 Senators are seeking answers from intelligence chief James Clapper over scale of and justification for NSA surveillance

The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.

In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian. [..]

They ask Clapper to publicly provide information about the duration and scope of the program and provide examples of its effectiveness in providing unique intelligence, if such examples exist.

The senators also expressed their concern that the program itself has a significant impact on the privacy of law-abiding Americans and that the Patriot Act could be used for the bulk collection of records beyond phone metadata. [..]

In addition to raising concerns about the law’s scope, the senators noted that keeping the official interpretation of the law secret and the instances of misleading public statements from executive branch officials prevented the American people from having an informed public debate about national security and domestic surveillance.

At the National Rifle Association heads will be exploding. As Marcy Wheeler noted at emptywheel, one of the questions the Senators asked is a “loaded gun”:

It can be used to collect information on credit card purchases, pharmacy records, library records, firearm sales records, financial information, and a range of other sensitive subjects. And the bulk collection authority could potentially be used to supersede bans on maintaining gun owner databases, or laws protecting the privacy of medical records, financial records, and records of book and movie purchases. [Marcy’s emphasis]

At Hullabaloo, David Atkins points out a few problems with the arguments defending the government. He makes two very valid points that should be embarrassing for certain defenders of President Obama and the NSA spying:

In all the manufactured outrage against Snowden for leaking and Greenwald for doing his job as a journalist, there have been two main strains of thought. The first is that whatever the government does in the name of “national security” should be accepted without question, that if one is sworn to secrecy one should never reveal secrets under any circumstance, and that journalistic freedom of speech itself should be called into question if it interferes in any way with whatever government officials say they’re doing in the name of “national security.”

That is a fascist argument that has no place in civil American society, and that should embarrass anyone who uses it.

The second argument is about equal application of rule of law, and it carries a little more moral weight. That argument centers around balance of powers and the notion that it should not be up to random individuals to determine what secrets should remain secrets based on their own moral compass. It’s based around notions of universal rule of law, and is not a fascist one but an institutionalist one. It’s the argument that animates much of the anti-Snowden left.

But for anyone to argue that point with credibility, one must also oppose the rampant leaks coming from inside the government apparatus as well.[..]

If someone denounces Snowden and Greenwald but claims to be to the left of Peter King, they must also denounce the government’s selective leaks and demand prosecution of those involved, or lose all credibility and claims to intellectual consistency. To selectively defend or extol lawbreaking behavior depending on who is in office and what issue is being defended, is the worst sort of political hackery and hypocrisy.

All In host Chris Hayes points to the unequal and uneven response to leaked information that advances the Pentagon’s agenda and leaked information that doesn’t.

On that note this:

The Criminal NSA

by Jennifer Stisa Granick and Christopher Jon Sprigman, The New York Times

THE twin revelations that telecom carriers have been secretly giving the National Security Agency information about Americans’ phone calls, and that the N.S.A. has been capturing e-mail and other private communications from Internet companies as part of a secret program called Prism, have not enraged most Americans. Lulled, perhaps, by the Obama administration’s claims that these “modest encroachments on privacy” were approved by Congress and by federal judges, public opinion quickly migrated from shock to “meh.”

It didn’t help that Congressional watchdogs – with a few exceptions, like Senator Rand Paul, Republican of Kentucky – have accepted the White House’s claims of legality. The leaders of the Senate Intelligence Committee, Dianne Feinstein, Democrat of California, and Saxby Chambliss, Republican of Georgia, have called the surveillance legal. So have liberal-leaning commentators like Hendrik Hertzberg and David Ignatius.

This view is wrong – and not only, or even mainly, because of the privacy issues raised by the American Civil Liberties Union and other critics. The two programs violate both the letter and the spirit of federal law. No statute explicitly authorizes mass surveillance. Through a series of legal contortions, the Obama administration has argued that Congress, since 9/11, intended to implicitly authorize mass surveillance. But this strategy mostly consists of wordplay, fear-mongering and a highly selective reading of the law. Americans deserve better from the White House – and from President Obama, who has seemingly forgotten the constitutional law he once taught.

America’s Animal Farm: Snowden and the Squealer

by Jonathan Turley, law professor Georgetown University

For many, the recent disclosure of massive warrantless surveillance programs of all citizens by the Obama administration has brought back memories of George Orwell’s 1984. Such comparisons are understandable not only with the anniversary of the book occurring the very week of the disclosures but the Administration’s “doublethink” interpretations of common terms like “transparency” and “privacy.” According to President Obama, the secret surveillance program is not only entirely “transparent” but something of a triumph of privacy.

Yet, another Orwell book seems more apt as the White House and its allies try to contain the scandal: Animal Farm.

Orwell wrote the fanciful account of a farm society of animals at the end of World War II during a period of authoritarian power and government propaganda. The farm government proclaimed equality of all animals but, as the pig Squealer explained, “all animals are equal, but some animals are more equal than others.” As our leaders joined together on television to bloviate about the need to capture and try the “traitor” Snowden, they were affirming a system of laws that seems to apply to the governed exclusively.

Spying on Each Other

The revelation of a federal program to “Keep America Safe” got little notice amidst the hullabaloo over the hunt for Edward Snowden. McClatchy News reported on The pervasive program created under the Obama administration to stop leaks and “security threats,” requiring “federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions.”

President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.

Government documents reviewed by McClatchy illustrate how some agencies are using that latitude to pursue unauthorized disclosures of any information, not just classified material. They also show how millions of federal employees and contractors must watch for “high-risk persons or behaviors” among co-workers and could face penalties, including criminal charges, for failing to report them. Leaks to the media are equated with espionage. [..]

As part of the initiative, Obama ordered greater protection for whistleblowers who use the proper internal channels to report official waste, fraud and abuse, but that’s hardly comforting to some national security experts and current and former U.S. officials. They worry that the Insider Threat Program won’t just discourage whistleblowing but will have other grave consequences for the public’s right to know and national security.

The program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations of loyal Americans, according to these current and former officials and experts. Some non-intelligence agencies already are urging employees to watch their co-workers for “indicators” that include stress, divorce and financial problems.

in an unusual Sunday article at Esquire’s Politics Blog, Charles Pierce’s reacted to this program with these remarks:

(T)he Obama administration is the most fertile environment for paranoids since the Nixon people first cut a check to Egil Krogh. [..]

You want “Nixonian”? This, right here, this is Nixonian, if Nixon had grown up in East Germany. You’ve got the entire federal bureaucracy looking for signs of “high-risk persons or behaviors” the way Nixon sent Fred Malek out to count the Jews. You’ve got created within the entire federal bureaucracy a culture of spies and informers, which will inevitably breed fear and deceit and countless acts of interoffice treachery. (Don’t like your boss at the Bureau Of Land Management? Hmm, he looks like a high-risk person. Tell someone.) And this is the clincher.

   Hammer this fact home . . . leaking is tantamount to aiding the enemies of the United States,” says a June 1, 2012, Defense Department strategy for the program that was obtained by McClatchy.

And, out in Yorba Linda, there is a dark stirring deep in the earth, and a faint chuckling is heard in the midnight breeze. [..]

No, Mr. Current President, this is not business as usual. This is not even the NSA sifting through e-mails and phone calls. This is giving Big Brother a desk in every federal agency and telling him to go to work.



Transcript can be read here

For nearly two years, the White House has waged a program called “Insider Threat” that forces government employees to remain on the constant lookout for their colleagues’ behavior and to report their suspicions. It targets government officials who leak any information, not just classified material. All of this leads McClatchy to warn: “The [Insider Threat] program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations.” We’re joined by the reporter who helped break the story, Jonathan Landay, senior national security and intelligence reporter for McClatchy Newspapers. Landay also discusses his reporting that revealed how drone strikes carried out in Pakistan over a four-year period ran contrary to standards set forth publicly by President Obama.

This is what a police state looks like.

Edward Snowden Has Left Hong Kong: Up Date

Up Date: Fugitive Snowden seeks asylum in Ecuador: foreign minister

Ecuadorean Foreign Minister Ricardo Patino, visiting Vietnam, tweeted: “The Government of Ecuador has received an asylum request from Edward J. #Snowden.”

NSA whistleblower, Edward Snowden has left Hong Kong arriving in Moscow aboard a commercial flight, presumably on his way to a third country for asylum.

In a statement, WikiLeaks said the 30-year-old was heading to a democratic country “via a safe route” for asylum purposes and that the organisation was assisting at his request. Snowden had been in hiding in Hong Kong since identifying himself as the source of revelations on US surveillance programmes.

His flight from US authorities, which want to charge him with espionage, appeared set to continue with an onward flight west from Moscow to Havana on Monday. From there, various reports indicated that he would try to get to either Caracas or Quito.

The Hong Kong government said on Sunday he had left of his own accord “through a lawful and normal channel” and said the request filed by the US did not fully comply with legal requirements. Pointedly, it also said it wanted Washington to clarify Snowden’s claims that the US had hacked targets in the territory.

He was accompanied by one of Julian Assange’s closest advisers, Sarah Harrison.

On Friday, Snowden was charged with espionage under the 1917 law. He becomes the eighth whistleblower to be charged under the act by the Obama administration, which has used the charge more than any other president.

Snowden, 29, is charged with theft of government property, unauthorised communication of national defence information and wilful communication of classified communications intelligence information to an unauthorised person, according to court documents.

The head of the NSA, Gen. Keith Alexander stated that Snowden has “caused irreversible damage to US.” This coming from the man who lied to congress and has admitted publicly that the surveillance had violated the Fourth Amendment.

Have I mentioned that David Gregory is a hack and an embarrassment for NBC?

Good luck to Mr. Snowden.

The Most Powerful Man You Never Heard Of

Meet the most powerful man you’ve never heard of until recently, Gen. Keith B. Alexander,  Director of the National Security Agency (DIRNSA)and Chief of the Central Security Service (CHCSS) since August 1, 2005 and Commander of the United States Cyber Command since  May 21, 2010. He is a four star general in the United States Army and, according to Wikipedia, plans to retire in 2014, which may not be soon enough for some. Did I mention that he is also a proven liar? So, when he says, as he did, without any evidence, before the House Permanent Select Committee on Intelligence, that 50 terrorist attack were thwarted by the contested programs of the NSA take it with a large grain of salt.

Chris Hayes, host of MSNBC’s “All In,” looks at Gen. Alexander’s tenure over the NSA with James Bamford and explains why he may be the most powerful man in Washington that you have yet to hear of.

Transcript can be read here

“We jokingly referred to him as Emperor Alexander, because whatever Keith wants, Keith gets.”

The Secret War

by James Bradford, Wired

Infiltration, sabotage, mayhem, for years, four star general Keith Alexander has been building a secret army capable of launching devastating cyberattacks. Now it;s rady to unleash hell.

Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings-the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

“Show Me What You Do”

To quote a phrase from a well known blogger at a formerly liberal, progressive web site:

Don’t tell me what you believe, show me what you do and I will tell you what you believe.

I give you President Barack Obama defending the Bush Administrations surveillance state.

Obama Defends Authorization of Surveillance Programs

by Peter Baker, The New York Times

“Some people say, ‘Well, you know, Obama was this raving liberal before. Now he’s, you know, Dick Cheney,’ ” Mr. Obama told Charlie Rose on his PBS interview show. “Dick Cheney sometimes says, ‘Yeah, you know, he took it all lock, stock and barrel.’ My concern has always been not that we shouldn’t do intelligence gathering to prevent terrorism, but rather, are we setting up a system of checks and balances?” [..]

Yet like Mr. Cheney, who appeared on “Fox News Sunday” over the weekend, Mr. Obama defended the effectiveness of surveillance programs in heading off threats to the United States. “The one thing people should understand about all these programs, though, is they have disrupted plots, not just here in the United States but overseas as well,” he said. He added that while other factors were at work, “we are increasing our chances of preventing a catastrophe like that through these programs.”

Partial transcript:

Barack Obama: Well, in the end, and what I’ve said, and I continue to believe, is that we don’t have to sacrifice our freedom in order to achieve security. That’s a false choice. That doesn’t mean that there are not tradeoffs involved in any given program, in any given action that we take. So all of us make a decision that we go through a whole bunch of security at airports, which when we were growing up that wasn’t the case…. And so that’s a tradeoff we make, the same way we make a tradeoff about drunk driving. We say, “Occasionally there are going to be checkpoints. They may be intrusive.” To say there’s a tradeoff doesn’t mean somehow that we’ve abandoned freedom. I don’t think anybody says we’re no longer free because we have checkpoints at airports.

Charlie Rose: But there is a balance here.

Barack Obama: But there is a balance, so I’m going to get to your – get to your question. The way I view it, my job is both to protect the American people and to protect the American way of life, which includes our privacy. And so every program that we engage in, what I’ve said is “Let’s examine and make sure that we’re making the right tradeoffs.” Now, with respect to the NSA, a government agency that has been in the intelligence gathering business for a very long time –

Charlie Rose: Bigger and better than everybody else.

Barack Obama: Bigger and better than everybody else, and we should take pride in that because they’re extraordinary professionals; they are dedicated to keeping the American people safe. What I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls, and the NSA cannot target your emails … and have not. They cannot and have not, by law and by rule, and unless they – and usually it wouldn’t be “they,” it’d be the FBI – go to a court, and obtain a warrant, and seek probable cause, the same way it’s always been, the same way when we were growing up and we were watching movies, you want to go set up a wiretap, you got to go to a judge, show probable cause….

So point number one, if you’re a U.S. person, then NSA is not listening to your phone calls and it’s not targeting your emails unless it’s getting an individualized court order. That’s the existing rule. There are two programs that were revealed by Mr. Snowden, allegedly, since there’s a criminal investigation taking place, and they caused all the ruckus. Program number one, called the 2015 Program, what that does is it gets data from the service providers like a Verizon in bulk, and basically you have call pairs. You have my telephone number connecting with your telephone number. There are no names. There is no content in that database. All it is, is the number pairs, when those calls took place, how long they took place. So that database is sitting there. Now, if the NSA through some other sources, maybe through the FBI, maybe through a tip that went to the CIA, maybe through the NYPD. Get a number that where there’s a reasonable, articulable suspicion that this might involve foreign terrorist activity related to Al-Qaeda and some other international terrorist actors. Then, what the NSA can do is it can query that database to see did any of the – did this number pop up? Did they make any other calls? And if they did, those calls will be spit out. A report will be produced. It will be turned over to the FBI. At no point is any content revealed because there’s no content that –

Charlie Rose: So I hear you saying, I have no problem with what NSA has been doing.

Barack Obama: Well, let me – let me finish, because I don’t. So, what happens is that the FBI – if, in fact, it now wants to get content; if, in fact, it wants to start tapping that phone – it’s got to go to the FISA court with probable cause and ask for a warrant.

Charlie Rose: But has FISA court turned down any request?

Barack Obama: The – because – the – first of all, Charlie, the number of requests are surprisingly small… number one. Number two, folks don’t go with a query unless they’ve got a pretty good suspicion.

Charlie Rose: Should this be transparent in some way?

Barack Obama: It is transparent. That’s why we set up the FISA court…. The whole point of my concern, before I was president – because some people say, “Well, you know, Obama was this raving liberal before. Now he’s, you know, Dick Cheney.” Dick Cheney sometimes says, “Yeah, you know? He took it all lock, stock, and barrel.” My concern has always been not that we shouldn’t do intelligence gathering to prevent terrorism, but rather are we setting up a system of checks and balances? So, on this telephone program, you’ve got a federal court with independent federal judges overseeing the entire program. And you’ve got Congress overseeing the program, not just the intelligence committee and not just the judiciary committee – but all of Congress had available to it before the last reauthorization exactly how this program works.

Now, one last point I want to make, because what you’ll hear is people say, “Okay, we have no evidence that it has been abused so far.” And they say, “Let’s even grant that Obama’s not abusing it, that all these processes – DOJ is examining it. It’s being renewed periodically, et cetera – the very fact that there is all this data in bulk, it has the enormous potential for abuse,” because they’ll say, you know, “You can – when you start looking at metadata, even if you don’t know the names, you can match it up, if there’s a call to an oncologist, and there’s a call to a lawyer, and – you can pair that up and figure out maybe this person’s dying, and they’re writing their will, and you can yield all this information.” All of that is true. Except for the fact that for the government, under the program right now, to do that, it would be illegal. We would not be allowed to do that.

Charlie Rose: So, what are you going to change? Are you going to issue any kind of instructions to the Director of National Intelligence, Mr. Clapper, and say, “I want you to change it at least in this way”?

Barack Obama: Here’s what we need to do. But before I say that – and I know that we’re running out of time, but I want to make sure I get very clear on this. Because there has been a lot of mis-information out there. There is a second program called the 702 program. And what that does is that does not apply to any U.S. person. Has to be a foreign entity. It can only be narrowly related to counter-terrorism, weapons proliferation, cyber hacking or attacks, and a select number of identifiers – phone numbers, emails, et cetera. Those – and the process has all been approved by the courts – you can send to providers – the Yahoos or the Googles, what have you. And in the same way that you present essentially a warrant. And what will happen then is that you there can obtain content. But again, that does not apply to U.S. persons. And it’s only in these very narrow bands. So, you asked, what should we do? …What I’ve said is – is that what is a legitimate concern – a legitimate critique – is that because these are classified programs – even though we have all these systems of checks and balances, Congress is overseeing it, federal courts are overseeing it – despite all that, the public may not fully know. And that can make the public kind of nervous, right? Because they say, “Well, Obama says it’s okay – or Congress says it’s okay. I don’t know who this judge is. I’m nervous about it.” What I’ve asked the intelligence community to do is see how much of this we can declassify without further compromising the program, number one. And they are in that process of doing so now so that everything that I’m describing to you today, people, the public, newspapers, etc., can look at because frankly, if people are making judgments just based on these slides that have been leaked, they’re not getting the complete story.

Number two. I’ve stood up a privacy and civil liberties oversight board, made up of independent citizens including some fierce civil libertarians. I’ll be meeting with them. And what I want to do is to set up and structure a national conversation, not only about these two programs, but also the general problem of data, big data sets, because this is not going to be restricted to government entities.

Charlie Rose: Let me just ask you this. If someone leaks all this information about NSA surveillance, as Mr. Snowden did…. Did it cause national security damage to the United States, and therefore, should he be prosecuted?

Barack Obama: I’m not going to comment on prosecution…. The case has been referred to the DOJ for criminal investigation… and possible extradition. I will leave it up to them to answer those questions.

Keep in mind that this president employs and supports two known liars, Director of National Intelligence James Clapper and National Security Agency Director Gen. Keith B. Alexander, both of whom have continuously lied to Congress about the surveillance programs. This president has approved unchecked wiretapping something he said he would end when campaigning for office.

Mr. Obama has said he does not believe he has violated the privacy of any American but this is what he does.

So what does he believe? Certainly not the Constitution and our right to protection from illegal searches.

American As Apple Spy

Rep. Alan Grayson on the NSA: American As Apple Spy

I haven’t said this in awhile, what digby said:

It’s astonishing that this is necessary, but apparently it is:

Mind Your Own Business Act photo grayson_zps5587b06f.png

Click on image to enlarge.

Quite simple and to the point. Now you can support The Mind Your Own Business act by signing the petition, here.

The 4th Amendment Need Not Apply

At Crooks and Liars, Suzie Madrak points out an important fact about private government contractors, the Fourth Amendment does not apply to them:

This has been an ongoing scandal in the Iraq and Afghanistan wars. Attorney Susan L. Burke represented several groups of plaintiffs (including Abu Ghraib detainees and female soldiers who had been sexually assaulted) in lawsuits in which she tried to overturn the civil immunity of government contractors. She has not been successful, and the federal government continues to subcontract with private companies to do things that would be illegal if they did them themselves. So keep that in mind as you read these NSA stories.

She highlights an interview with 70’s whistleblower, Chris Pyle at Democracy Now, who disclosed the military’s spying on civilian politics and worked for three congressional committees to end it.

Pyle discovered the Army and CIA were spying on millions of Americans engaged in lawful political activity while he was in the Army working as an instructor. His revelations prompted Senate hearings, including Senator Frank Church’s Select Committee on Intelligence, ultimately leading to a series of laws aimed at curbing government abuses. Now teaching constitutional law and civil liberties at Mount Holyoke College, Pyle says the NSA is known for attacking its critics instead of addressing the problems they expose.



Full transcript can be read here

CHRISTOPHER PYLE: Yes. The forerunner of the PRISM system that Snowden disclosed was called Trailblazer. It wasted $1 billion on private contracts. It replaced a much less expensive system called ThinThread, which had more privacy protections and had been developed inside the government. Now, the reason that private contractors get this business is because members of Congress intercede with them with government agencies. And we now have a situation where members of the Intelligence Committee and other committees of Congress intercede with the bureaucracy to get sweetheart contracts for companies that waste taxpayers’ money and also violate the Constitution and the privacy of citizens. This is a very serious situation, because it means that it’s much more difficult to get effective oversight from Congress. [..]

CHRISTOPHER PYLE: Well, we all want to protect the security of the country. We all want to protect the Constitution. But when government agencies are totally unaccountable, we can’t do that. Members of Congress do not go to those briefings, even if they’re offered, because once you go to the briefing, then you can’t talk about what you’ve been told, because it’s classified. So the briefing system is designed to silence Congress, not to promote effective oversight.

Members of Congress don’t want to spend time on oversight. They’re too busy raising money. New members of the House of Representatives this winter were told by the Democratic Campaign Committee that they should spend between four and six hours a day dialing for dollars. They have no time to do the public’s business. They’re too busy begging for money. President Obama himself attended 220 fundraisers last year. Where does he get the time to be president when he’s spending so much time asking wealthy people for money to support his campaign? [..]

CHRISTOPHER PYLE: Well, it’s true. The NSA doesn’t want to hire people like you and me. We don’t know enough about the Internet. That said, it’s important to note that the vice chairman of Booz Allen happens to be Mike McConnell, who was former director of NSA and of national intelligence. There is a revolving door between high government positions and private corporations, and this revolving door allows these people to make a great deal more money upon leaving the government, and then being rented back to the government in a contractor capacity. And that’s part of the corruption of the system. [..]

CHRISTOPHER PYLE: Well, yes. The Fourth Amendment of the Constitution, which protects us from unreasonable searches and seizures, only binds the government, doesn’t bind corporations. That’s a serious problem. The reason we have privatization of prisons, in some ways, is for governments to escape liability. They put the liability on the private corporations that run the prisons, and they just charge their liabilities as an operating cost.

(All emphasis by Suzie.)

The Fourth Amendment of the Constitution, which protects us from unreasonable searches and seizures, only binds the government, doesn’t bind corporations.

Got that? This is the key to the rational behind privatizing everything from schools and prisons to national security. Keep it in mind as you read anything about the NSA whistleblowing and Edward Snowden.

DSWright at FDL News Desk hits the nail on the head, Freedom isn’t free:

The National Security Agency along with the CIA, FBI and other intelligence agencies of the U.S. government has been swapping information with private companies. In exchange for private companies giving the intelligence agencies information on their users, the private companies receive access to classified intelligence. The Corporate State indeed.

   Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.

   These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from Google Inc (GOOG). and other Internet companies under court order.

No wonder the tech firms did not complain about spying on American citizens, they were getting compensation in the form of access to classified intel. So now Wall Street gets to see classified intelligence? No wonder there were no prosecutions, they’re on the team. Too Big To Fail, Too Big To Jail, and too important to National Security. The National Security Agency along with the CIA, FBI and other intelligence agencies of the U.S. government has been swapping information with private companies. In exchange for private companies giving the intelligence agencies information on their users, the private companies receive access to classified intelligence. The Corporate State indeed. [..]

No wonder the tech firms did not complain about spying on American citizens, they were getting compensation in the form of access to classified intel. So now Wall Street gets to see classified intelligence? No wonder there were no prosecutions, they’re on the team. Too Big To Fail, Too Big To Jail, and too important to National Security.

Quid pro quo, as well, as liability protection, all on the tax payer’s dime.

Metadata: More Intrusive Than You Think

Metadata:

Simply put, metadata is data about data. It is descriptive information about a particular data set, object, or resource, including how it is formatted, and when and by whom it was collected. Although metadata most commonly refers to web resources, it can be about either physical or electronic resources.

Sounds harmless, so how bad could it be? According to mathematician and former Sun Microsystems engineer Susan Landau who was interviewed by Jane Mayer of The New Yorker, it’s worse than many might think:

“The public doesn’t understand,” she told me, speaking about so-called metadata. “It’s much more intrusive than content.” She explained that the government can learn immense amounts of proprietary information by studying “who you call, and who they call. If you can track that, you know exactly what is happening-you don’t need the content.”

For example, she said, in the world of business, a pattern of phone calls from key executives can reveal impending corporate takeovers. Personal phone calls can also reveal sensitive medical information: “You can see a call to a gynecologist, and then a call to an oncologist, and then a call to close family members.” And information from cell-phone towers can reveal the caller’s location. Metadata, she pointed out, can be so revelatory about whom reporters talk to in order to get sensitive stories that it can make more traditional tools in leak investigations, like search warrants and subpoenas, look quaint. “You can see the sources,” she said. When the F.B.I. obtains such records from news agencies, the Attorney General is required to sign off on each invasion of privacy. When the N.S.A. sweeps up millions of records a minute, it’s unclear if any such brakes are applied.

Metadata, Landau noted, can also reveal sensitive political information, showing, for instance, if opposition leaders are meeting, who is involved, where they gather, and for how long. Such data can reveal, too, who is romantically involved with whom, by tracking the locations of cell phones at night.

Ms. Landua joined Amy Goodman and Nermeen Shaikh on Democracy Now to explain just how intrusive the government’s collection of metadata is.



Transcript can be read here.

Even Spying Is a Private Industry

Like much of our government, spying has been privatized. 70% of surveillance is done by private companies that translates to $6 billion dollars with a half a million employees.

Meet the contractors analyzing your private data

by Tim Shorrock

Private companies are getting rich probing your personal information for the government. Call it Digital Blackwater

Amid the torrent of stories about the shocking new revelations about the National Security Agency, few have bothered to ask a central question. Who’s actually doing the work of analyzing all the data, metadata and personal information pouring into the agency from Verizon and nine key Internet service providers for its ever-expanding surveillance of American citizens?

Digital Blackwater: How the NSA Gives Private Contractors Control of the Surveillance State

Over the past decade, the U.S. intelligence community has relied increasingly on the technical expertise of private firms such as Booz Allen, SAIC, the Boeing subsidiary Narus and Northrop Grumman. About 70 percent of the national intelligence budget is now spent on the private sector. Former NSA Director Michael V. Hayden has described these firms as a quote “digital Blackwater.” We speak to Tim Shorrock, author of the book “Spies for Hire: The Secret World of Outsourced Intelligence.”

Load more