Tag: NSA

Mr. Obama’s Bipartisan “Achievements”

There has been a lot of talk, now that the elections are over and the legislature has fallen into the hands of Republicans about what this will mean for President Obama’s agenda and the Democratic agenda generally. This election season my inbox was full of Democratic politicians begging for money to foreclose the possibility of voters choosing the wrong party at the polls, yours probably was, too.

A persistent theme in these begging emails that I was getting was that the (evil) obstructionist Republicans have gummed up our system of government and the Democrats (the good guys) can’t get anything done in order to enact Mr. Obama’s agenda.

Looking at the accomplishments of Mr. Obama and the governing elites, this narrative, of course, is utter rubbish. The government is working. Mr. Obama and the Republicans have been cooperating all along. Great bipartisan advances and accomplishments are indeed being made.

So, what can we expect of this new aggregation of powers? Probably more of what it created before. Hence, let us review the accomplishments that these allegedly competing forces have created together…

Mr. Obama’s bipartisan accomplishments


Two-tiered justice system, rewards for criminal bankers

Mr. Obama’s bipartisan efforts have kept the criminal banksters who crashed and looted our economy free, under-regulated, still dominating the political system, even larger than they were when they were “too big to fail” and paying the largest bonuses since their criminal activities crashed the economy. Mr. Obama’s efforts to prosecute financial frauds were even wimpier and less effective that George W. Bush’s.  Mr. Obama’s much ballyhooed relief program for homeowners injured by the criminal bankster’s behavior failed miserably; some Democrats claim that Obama sabotaged the program behind the scenes. The result of Mr. Obama’s efforts has been to fuel a new era of Wall Street wealth while screwing average citizens:

They didn’t just blow up finance, they oversaw the swiftest transfer of wealth to the very top the world has ever seen. They screwed workers out of their jobs, they screwed homeowners out of their houses, they screwed retirees out of their pensions, and they screwed municipalities out of their revenues and assets.

Financiers are forcing schools, parks, pools, fire departments, senior citizen centers, and libraries to shut down. They are forcing national governments to auction off their cultural heritage to the highest bidder. Everything must go in firesales at prices rigged by twenty-something traders at the biggest and most corrupt institutions the world has ever known.

And since they’ve bought the politicians, the policy-makers, and the courts, no one will stop it.

Austerity, benefitting the 1% at the expense of the rest of us

Mr. Obama’s bipartisan efforts (his budgets, the sequester) have imposed the austerity that enriches the 1% at the expense of the rest of us.  On Mr. Obama’s watch, taxes on the rich have decreased, shifting their burden onto everybody else. Mr. Obama was so intent on cutting social security benefits for older folks that the Progressive Change Committee characterized his dropping a particularly nasty proposal to cut benefits by miscalculating the effect of inflation on beneficiaries from his 2015 budget, a “huge progressive victory.” It’s a sad day when progressives consider it a “huge victory” when the depredations of an allegedly, progressive, liberal president and his partners in congress are diminished. You’d think that progressives would get excited about, um, progress rather than lack of regress. The economy delivered to us by Mr. Obama and his Republican colleagues took a lot of wrangling, but as one analyst put it:

Obama is the first President in post-war history (and maybe all of history) whose economy gave more money to the top 10% than the entire value of all productivity gains in his Presidency.  Even George W. Bush didn’t manage that.

Now that’s an accomplishment!

Not to be forgotten as well are Mr. Obama’s actions to crack down on those outraged by the bankster criminals and the impunity Mr. Obama created for those that crashed our economy.

Your Privacy Matters

The NSA, FBI and DOJ are upset with the new Apple and Google encryption apps that they can’t hack. The poor Director of the FBI, James Comey is “concerned” so he plays the “fear card”

“I am a huge believer in the rule of law, but I also believe that no one in this country is beyond the law,” Comey told reporters at FBI headquarters in Washington. “What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law.”

Apple said last week that it would no longer be technically feasible to unlock encrypted iPhones and iPads for law enforcement because the devices would no longer allow user passcodes to be bypassed. The move comes as tech companies struggle to manage public concerns in the aftermath of last year’s leak of classified National Security Agency documents about government access to private user data. [..]

“Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” the company said. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”

Comey said that while he understood the need for privacy, government access to mobile devices may be needed in extreme circumstances, such as in the event of a terror attack.

“I like and believe very much that we should have to obtain a warrant from an independent judge to be able to take the content of anyone’s closet or their smart phone,” he said. “The notion that someone would market a closet that could never be opened — even if it involves a case involving a child kidnapper and a court order — to me does not make any sense.”

Comey said FBI officials have had conversations with both Apple and Google about the marketing of their devices.

“Google is marketing their Android the same way: Buy our phone and law-enforcement, even with legal process, can never get access to it,” he said.

Why anyone would think that the guy who approved torture believes in the rule of law is beyond me. Trevor Timm at The Guardian dissects what Comey said:

Comey began:

  I am a huge believer in the rule of law, but I also believe that no one in this country is beyond the law. … What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law.

First of all, despite the FBI director’s implication, what Apple and Google have done is perfectly legal, and they are under no obligation under the “the rule of law” to decrypt users’ data if the company itself cannot access your stuff. From 47 U.S. Code § 1002 (emphasis mine):

   A telecommunications carrier shall not be responsible for decrypting, or ensuring the government’s ability to decrypt, any communication encrypted by a subscriber or customer, unless the encryption was provided by the carrier and the carrier possesses the information necessary to decrypt the communication.

Comey continued:

   I like and believe very much that we should have to obtain a warrant from an independent judge to be able to take the content of anyone’s closet or their smart phone.

That’s funny, because literally four months ago, the United States government was saying the exact opposite (pdf) before the US supreme court, arguing that, in fact, the feds shouldn’t need to get a warrant to get inside anyone’s smartphone after you’re arrested. In its landmark June ruling in the case, Riley v California, the court disagreed. So it’s great to see that Jim Comey, too, has come around to the common sense conclusion that cops need a warrant to search your cellphone data, but it would’ve been nice for him to express those sentiments when they actually mattered.

Comey doubled down in another statement with the absurd fear that criminals, like child kidnappers would be able to evade the law. On its face that’s insanely ridiculous since law enforcement has numerous ways tools to access your data. The Intercept‘s Micah Lee points out that Apple still has access to plenty of your data to feed to the Feds. He went on how bemoan the NSA leaks by Edward Snowden has caused the need to protect a person’s private information may have gone too far. How so, Mr. Comey? As Timm notes in his article

Congress has not changed surveillance law at all in the the nearly 16 months since Edward Snowden’s disclosures began, mostly because of the vociferous opposition from intelligence agencies and cops. The pendulum is still permanently lodged squarely on law enforcement’s side. If it has swung at all, it’s because of the aforementioned ruling by the supreme court of the United States, along with tech companies implementing more privacy protections unilaterally because US tech companies are losing billions of dollars because of the government’s spying scandals.

A week ago, The Intercept‘s Glenn Greenwald gave a Ted Talk in Rio de Janeiro on why your privacy matters

Crypto wars redux: why the FBI’s desire to unlock your private life must be resisted

In 1995, the US government tried – and failed – to categorise encryption as a weapon. Today, the same lines are being drawn and the same tactics repeated as the FBI wants to do the same. Here’s why they are wrong, and why they must fail again

Eric Holder, the outgoing US attorney general, has joined the FBI and other law enforcement agencies in calling for the security of all computer systems to be fatally weakened. This isn’t a new project – the idea has been around since the early 1990s, when the NSA classed all strong cryptography as a “munition” and regulated civilian use of it to ensure that they had the keys to unlock any technological countermeasures you put around your data.

In 1995, the Electronic Frontier Foundation won a landmark case establishing that code was a form of protected expression under the First Amendment to the US constitution, and since then, the whole world has enjoyed relatively unfettered access to strong crypto. [..]

The arguments then are the arguments now. Governments invoke the Four Horsemen of the Infocalypse (software pirates, organised crime, child pornographers, and terrorists) and say that unless they can decrypt bad guys’ hard drives and listen in on their conversations, law and order is a dead letter.

On the other side, virtually every security and cryptography expert tries patiently to explain that there’s no such thing as “a back door that only the good guys can walk through” (hat tip to Bruce Schneier). Designing a computer that bad guys can’t break into is impossible to reconcile with designing a computer that good guys can break into.

If you give the cops a secret key that opens the locks on your computerised storage and on your conversations, then one day, people who aren’t cops will get hold of that key, too. The same forces that led to bent cops selling out the public’s personal information to Glen Mulcaire and the tabloid press will cause those cops’ successors to sell out access to the world’s computer systems, too, only the numbers of people who are interested in these keys to the (United) Kingdom will be much larger, and they’ll have more money, and they’ll be able to do more damage.

Long live The Republic.

How To Get On The Terrorist Watch List Without Ever Trying

Are you on the Department of Homeland Security’s Terrorist Watch List or No-Fly List? If you are, there is no way for you to find out but we now know what the criteria is and it’s pretty fast and loose with the rules. The Intercept investigative journalists Jeremy Scahill and Ryan Devereaux have obtained a copy of the guidelines from a document that was issued by the National Counterterrorism Center, the “March 2013 Watchlisting Guidance.” In an extensive article, they examine how the government is using secret rules  “putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings.”

The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place “entire categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted.

Over the years, the Obama and Bush Administrations have fiercely resisted disclosing the criteria for placing names on the databases-though the guidelines are officially labeled as unclassified. In May, Attorney General Eric Holder even invoked the state secrets privilege to prevent watchlisting guidelines from being disclosed in litigation launched by an American who was on the no fly list. In an affidavit, Holder called them a “clear roadmap” to the government’s terrorist-tracking apparatus, adding: “The Watchlisting Guidance, although unclassified, contains national security information that, if disclosed … could cause significant harm to national security.” [..]

The document’s definition of “terrorist” activity includes actions that fall far short of bombing or hijacking. In addition to expected crimes, such as assassination or hostage-taking, the guidelines also define destruction of government property and damaging computers used by financial institutions as activities meriting placement on a list. They also define as terrorism any act that is “dangerous” to property and intended to influence government policy through intimidation.

This combination-a broad definition of what constitutes terrorism and a low threshold for designating someone a terrorist-opens the way to ensnaring innocent people in secret government dragnets. It can also be counterproductive. When resources are devoted to tracking people who are not genuine risks to national security, the actual threats get fewer resources-and might go unnoticed. [..]

The fallout is personal too. There are severe consequences for people unfairly labeled a terrorist by the U.S. government, which shares its watchlist data with local law enforcement, foreign governments, and “private entities.” Once the U.S. government secretly labels you a terrorist or terrorist suspect, other institutions tend to treat you as one. It can become difficult to get a job (or simply to stay out of jail). It can become burdensome-or impossible-to travel. And routine encounters with law enforcement can turn into ordeals. [..]

The government has been widely criticized for making it impossible for people to know why they have been placed on a watchlist, and for making it nearly impossible to get off. The guidelines bluntly state that “the general policy of the U.S. Government is to neither confirm nor deny an individual’s watchlist status.” But the courts have taken exception to the official silence and footdragging: In June, a federal judge described the government’s secretive removal process as unconstitutional and “wholly ineffective.”

The difficulty of getting off the list is highlighted by a passage in the guidelines stating that an individual can be kept on the watchlist, or even placed onto the watchlist, despite being acquitted of a terrorism-related crime. The rulebook justifies this by noting that conviction in U.S. courts requires evidence beyond a reasonable doubt, whereas watchlisting requires only a reasonable suspicion. Once suspicion is raised, even a jury’s verdict cannot erase it.

Not even death provides a guarantee of getting off the list. The guidelines say the names of dead people will stay on the list if there is reason to believe the deceased’s identity may be used by a suspected terrorist-which the National Counterterrorism Center calls a “demonstrated terrorist tactic.” In fact, for the same reason, the rules permit the deceased spouses of suspected terrorists to be placed onto the list after they have died.

Essentially, once a person is on these lists their Fourth Amendment rights are completely ignored, as Mike Masnick at Techdirt points out individuals are subjected to extra scrutiny, essentially allowing the government to sift through every aspect of a person’s life:

In addition to data like fingerprints, travel itineraries, identification documents and gun licenses, the rules encourage screeners to acquire health insurance information, drug prescriptions, “any cards with an electronic strip on it (hotel cards, grocery cards, gift cards, frequent flyer cards),” cellphones, email addresses, binoculars, peroxide, bank account numbers, pay stubs, academic transcripts, parking and speeding tickets, and want ads. The digital information singled out for collection includes social media accounts, cell phone lists, speed dial numbers, laptop images, thumb drives, iPods, Kindles, and cameras. All of the information is then uploaded to the TIDE (Terrorist Identities Datamart Environment) database.

Screeners are also instructed to collect data on any “pocket litter,” scuba gear, EZ Passes, library cards, and the titles of any books, along with information about their condition-“e.g., new, dog-eared, annotated, unopened.” Business cards and conference materials are also targeted, as well as “anything with an account number” and information about any gold or jewelry worn by the watchlisted individual. Even “animal information” – details about pets from veterinarians or tracking chips-is requested. The rulebook also encourages the collection of biometric or biographical data about the travel partners of watchlisted individuals.

At FDL’s The Dissenter, Kevin Gosztola discusses how this loop-hole ridden criteria violate a person’s rights and are inherently discriminatory towards Muslims:

There are a few general points to make in order to fully understand what this vague criteria for watchlisting means.

First of all, it is important not to ignore the anti-Muslim racism that likely influences a number of aspects of the watchlisting process. The idea that Muslims are “predisposed” to commit acts of violence is pervades the national security establishment. Training materials on fighting terrorism have been used by government agencies in previous years that deal with theories of “radicalization” and such training promotes prejudice, as evidenced by the fact that one NSA official used the slur “Mohammed Raghead” in an NSA memo.

Second, a federal district court in Oregon recently decided violated due process rights of Americans placed on the No-Fly List because it is nearly impossible to challenge inclusion and clear one’s name. The ACLU represented thirteen Americans, who have never engaged in any terrorist activity, in this case. Each person experienced hardship because they ended up on the No-Fly List.

The guidance shows why there needs to be a process established for getting off watchlists, especially the No-Fly List.

Finally, there is absolutely no reasonable justification for why this rulebook and any version of it from 2001 to 2014 should be secret. The watchlisting guidance is marked “unclassified.” There is nothing in it that will endanger any Americans.

Jeremy and Ryna sat down for an an interview with Huffington Post‘s Alyona Minkovski. During the discussion, Ryan called the these guidelines a “global stop and frisk program.”

Recently there were two court rulings that pertain to getting off the No-Fly list and a Supreme Court decision that bars warrantless searches of cell phones. Precisely how how those rulings will impact the guidelines remains to be seen but it is fairly obvious that the Obama administration has little regard for the rule of law.

Edward Snowden Calls on Professionals to Protect Private Communications

On July 10, NSA whistleblower Edward Snowden sat down for an interview with Alan Rusbridger, editor-in-chief of the Guardian, and reporter Ewen MacAskill in Moscow.

Over the course of seven hours, he talked about the need for professionals to protect the confidentiality of their clients in the light of the surveillance by spy agencies. He also spoke about his life in Moskow and the specious accusations that he was spying for Russia or had given the information he took from the NSA to Russian authorities.

(Snowden):

• Said if he ended up in US detention in Guantánamo Bay he could live with it.

• Offered rare glimpses into his daily life in Russia, insisting that, contrary to reports that he is depressed, he is not sad and does not have any regrets. He rejected various conspiracy theories surrounding him, describing as “bullshit” suggestions he is a Russian spy.

• Said that, contrary to a claim he works for a Russian organisation, he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world.

• Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in “sexually compromising” situations are routinely passed around.

• Spoke at length about his future, which seems destined to be spent in Russia for the foreseeable future after expressing disappointment over the failure of western European governments to offer him a home.

• Said he was holding out for a jury trial in the US rather a judge-only one, hopeful that it would be hard to find 12 jurors who would convict him if he was charged with an offence to which there was a public interest defence. Negotiations with the US government on a return to his country appear to be stalled.

Americans Spied On By NSA & FBI Without Cause

The National Security Agency and the Federal Bureau if Investigation was given authorization by a judge with the top-secret Foreign Intelligence Surveillance Court to spy on five Americans because of their political activity and, umm, their Middle Eastern names:

Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On

By Glenn Greenwald and Murtaza Hussain

he National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans-including a political candidate and several civil rights activists, academics, and lawyers-under secretive procedures intended to target terrorists and foreign spies.

According to documents provided by NSA whistleblower Edward Snowden, the list of Americans monitored by their own government includes:

• Faisal Gill, a longtime Republican Party operative and one-time candidate for public office who held a top-secret security clearance and served in the Department of Homeland Security under President George W. Bush;

• Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases;

• Hooshang Amirahmadi, an Iranian-American professor of international relations at Rutgers University;

• Agha Saeed, a former political science professor at California State University who champions Muslim civil liberties and Palestinian rights;

• Nihad Awad, the executive director of the Council on American-Islamic Relations (CAIR), the largest Muslim civil rights organization in the country.

The individuals appear on an NSA spreadsheet in the Snowden archives called “FISA recap”-short for the Foreign Intelligence Surveillance Act. Under that law, the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also “are or may be” engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by the court, usually every 90 days for U.S. citizens.he National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans-including a political candidate and several civil rights activists, academics, and lawyers-under secretive procedures intended to target terrorists and foreign spies.

According to documents provided by NSA whistleblower Edward Snowden, the list of Americans monitored by their own government includes:

• Faisal Gill, a longtime Republican Party operative and one-time candidate for public office who held a top-secret security clearance and served in the Department of Homeland Security under President George W. Bush;

• Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases;

• Hooshang Amirahmadi, an Iranian-American professor of international relations at Rutgers University;

• Agha Saeed, a former political science professor at California State University who champions Muslim civil liberties and Palestinian rights;

• Nihad Awad, the executive director of the Council on American-Islamic Relations (CAIR), the largest Muslim civil rights organization in the country.

The individuals appear on an NSA spreadsheet in the Snowden archives called “FISA recap”-short for the Foreign Intelligence Surveillance Act. Under that law, the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also “are or may be” engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by the court, usually every 90 days for U.S. citizens. [..]

The five Americans whose email accounts were monitored by the NSA and FBI have all led highly public, outwardly exemplary lives. All five vehemently deny any involvement in terrorism or espionage, and none advocates violent jihad or is known to have been implicated in any crime, despite years of intense scrutiny by the government and the press. Some have even climbed the ranks of the U.S. national security and foreign policy establishments.

[..]

Asim Ghafoor says his first-hand experience working on behalf of other Muslim-Americans has led him to believe that “the U.S. government embarked on a very systematic approach” to target his community.

“I saw the government specifically go after Muslim people who were involved in certain activities such as charity work, humanitarian work, political activism,” he says. “Maybe they had some website that had some speeches that nobody ever read or even noticed, maybe they had some bloodcurdling speeches. So the government just treated you like you were blowing up the next tower. They treated you like you were going to be the Manchurian Candidate, you were going to destroy America from within. There were U.S. attorneys, FBI agents, DHS agents, customs agents all over the country that were trying to find the next terror cell in their midst. If you were involved in those activities and maybe you were on a student visa and you didn’t quite fill out the paperwork, you were hosed. There is no question about it, you were worse off than a migrant worker in Dubai. You were just packed up and sent home. Life became very, very unbearable for them.”

Even a U.S. citizen like Faisal Gill, who served his country both in the armed forces and in the White House, found himself spied on by his own government. “I was a very conservative, Reagan-loving Republican,” he says. “If somebody like me could be surveilled, then [there are] other people out there I can only imagine who are under surveillance.

“I went to school here as a fourth grader – learned about the Revolutionary War, learned about individual rights, Thomas Jefferson, all these things,” he continues. “That is ingrained in you – your privacy is important. And to have that basically invaded for no reason whatsoever – for the fact that I didn’t do anything – I think that’s troubling. And I think that certainly goes to show how we need to shape policy differently than it is right now.”

As per Huffington Post‘s Ryan Grim, Glenn Greenwald received the permission of all five named in the article before printing their names.

This is the Democratic administration of Barack Hussein Obama.

It’s About the Constitution, Stupid.

During an hour “fireside” chat at this week’s Southland Conference on technology, entrepreneurship and southern culture, former Vice President Al Gore was asked about Eric Snowden by Sarah Lacey. His answer, when asked if Snowden was a hero or traitor, was quite clear:

   I hear this question all the time…I’m like most people, I don’t put (Snowden) in either one of those categories. But I will be candid – if you set up a spectrum, I would push it more away from the traitor side. He clearly violated the law (so) you can’t say OK what he did is alright. It is not.

   But what he revealed in the course of violating important laws included violations of the Constitution that were way more serious than the crimes he committed. In the course of violating important laws he also provided an important service because we did need to know how far this has gone.

He then added his concerns about the mass surveillance by the NSA:

This is a threat to the heart of democracy. Democracy is among other things a state of mind. If any of us are put in a position where we have to self censor, and think twice about what we write in an email, or what we click on for fear that somebody reading a record of this may misunderstand why we looked up some disease or something, some young people who might otherwise get help with a medical condition, might think oh my gosh if I put down a search for bipolar illness I will be stigmatized if my online file is hacked or accessed by my employer. That kills democracy.

Edward Snowden’s NSA leaks ‘an important service’, says Al Gore

By Ewan MacAskill, The Guardian

Former vice-president argues whistleblower exposed ‘violations of US constitution far more serious than crimes he committed’

Asked if he regarded Snowden as a traitor or whistleblower, Gore veered away from the “traitor” label. He refused to go as far as labelling him a whistleblower but signalled he viewed him as being closer to that category than a traitor, saying: “What he revealed in the course of violating important laws included violations of the US constitution that were way more serious than the crimes he committed.” [..]

Gore called on the internet companies to work with the public to help draw up a “digital Magna Carta” that provides protection of freedoms. “They need to pay attention to correcting some of these gross abuses of individual privacy that are ongoing in the business sphere,” he said.

Snowden’s hope of a return to the US is dependent on a change in a major shift in opinion that would allow him to escape a lengthy prison sentence. His supporters will seize on Gore’s comments to help make the case that he is a whistleblower and should be allowed to return to the US as a free man. Ben Wizner, Snowden’s US-based lawyer, said: “Al Gore is quite obviously right. Regrettably, the laws under which Snowden is being charged make no allowance for the value of the information he disclosed. Whether the NSA’s activities violated the law or the constitution would be irrelevant in a trial under the Espionage Act.”

This conversation about our privacy and the government disregard of the Constitution in the name of security is not over by a long shot.

Glenn Greenwald “No PlaceTo Hide”

“No place to hide”

Chris Hayes talks with Glenn Greenwald about his new book and new NSA revelations from his book “No Place to Hide.”


Hating on Glenn Greenwald

Chris Hayes gets journalist Glenn Greenwald to open up about his tendency alienate liberals.

The USA Freedumb Act

President Barack Obama has said that he wanted to reform how the NSA collects and stores metadata. What he says and what he does, again, are two different things.

The “Consult with Congress” Stage of USA Freedumb

By Marcy Wheeler, emptywheel

Remember how, in the days after President Obama announced his principles for reforming the dragnet, his Senior Administration Official pretended that any efforts to make the scope of the program worse would come from Congress? [..]

Well, it looks like the Administration isn’t so passive after all. They’re working with House leadership to gut the bill.

   TROUBLE FOR USA FREEDOM? – House leadership and Obama administration officials met with committee members Sunday to negotiate changes to key NSA reform legislation, parting late in the evening without reaching a final resolution, said a congressional staffer close to the process. Still, it seems clear that the USA FREEDOM Act, approved by the House Judiciary and Intelligence committees little more than a week ago, will not reach the House floor intact. Some passages have been watered down already, the staffer acknowledged, declining to go into specifics. The bill is set for “possible consideration” this week, according to the schedule circulated by House Majority Leader Eric Cantor’s office.

   Word of the talks caused some of the bill’s most ardent privacy and civil liberties backers to cry foul and say they could withdraw support. Areas of concern to watchdogs include possible removal of transparency language allowing companies to tell their customers about the broad numbers of lawful intercept requests they receive; and a debate on whether the search terms used by the NSA to search communications records should be narrowly defined in statute.

   “The version we fear could now be negotiated in secret and introduced on the House floor may not move us forward on NSA reform,” said human rights organization Access. “I am gravely disappointed if the House leadership and the administration chose to disrupt the hard-fought compromise that so many of us were pleased to support just two weeks ago,” said Kevin Bankston, policy director of the New America Foundation’s Open Technology Institute.

And while it’s not clear these secret changes would broaden the scope outside of counterterrorism (though I think that’s possible already), it does seem clear the Administration is pushing for these changes because the already weak bill is too strong for them.

Congress is no better.

Advocates fear NSA bill is being gutted

By Kate Tummarello, The Hill

To win the support of NSA defenders, lawmakers abandoned some reform provisions in Sensenbrenner’s original bill. One of the major changes was dropping the appointment of a constitutional advocate to the Foreign Intelligence Surveillance Court, which approves the NSA’s spying requests, and substituting it for a panel of experts.

The bill was also stripped of language that would have allowed tech companies to publish more specific information about the number and types of government requests for user data they receive.

During Judiciary consideration, an amendment to allow less specific reporting was added back into the bill, but some worry that provision is in danger now because the administration thinks it’s already reached a deal that allows tech companies to publish more information about the NSA requests.

While pro-reform advocacy groups and members hailed the House bill as a positive first step, many lamented the revisions and said the legislation will be in trouble on the floor if it undergoes further changes.

A Deep Dive into the House’s Version of Narrow NSA Reform: The New USA Freedom Act

By Mark Jaycox, Electronic Freedom Foundation

Here’s how the House version of the USA Freedom Act compares to the Senate’s version, what the new House version of the USA Freedom Act does, and what it sorely lacks.

The Senate’s Version of USA Freedom Act

As we mentioned when the original USA Freedom Act was first introduced, it proposed changes to several NSA activities and limited the bulk collection of all Americans’ calling records. It would fix a key problem with Section 702 (.pdf) of the Foreign Intelligence Surveillance Amendments Act (FISAA), bring more transparency to the Foreign Intelligence Surveillance Act Court (FISA court), and introduce a special advocate to champion civil liberties in the FISA court.

The House’s New Version of the USA Freedom Act:

The new USA Freedom Act concentrates on prohibiting the collection of all Americans’ calling records using Section 215 of the Patriot Act. Other sections of the bill would allow the FISA Court to assign amici, or non-parties who can brief issues before the court; create new government reports about the spying powers; and create new company reports detailing how many accounts and customers are affected by FISA Court orders.

First and foremost, the bill introduces a different conceptual approach to prohibiting mass spying under Section 215. Unlike the Senate version, which tries to stop the mass collection of calling records by mandating that the records sought “pertain to” an agent of a foreign power or their activities-an approach that we’ve worried about because “pertains to” and “relevant” are so similar-the House version mandates that a “specific selection term” (currently defined as uniquely describing a person, entity, or account) be the “basis for the production” of the records. The overall language may be stronger than in the old USA Freedom Act, but “specific selection term” must be further defined as “entity” could be construed expansively. After the order is filed, the government can obtain up to “two hops“-which may be too expansive for many investigations-from the selection term.

The bill also tries to tighten the “minimization procedures” that apply to government collection of records using Section 215 and other spying authorities like national security letters and the FISA Pen Register/Trap and Trace (PR/TT) provision. But the procedures only touch the FBI, not other agencies-like the NSA-that may be obtaining records using Section 215. In addition, the House version uses language we’ve seen in Section 702’s minimization procedures. If you remember, those procedures are horrendous. They allow for the overcollection, overretention, and oversharing of Americans’ communications “mistakenly” collected. The House must draft stronger minimization language to completely ensure improper information about untargeted users is not collected. For instance, simply inserting the word “acquisition” or “collection” would help.

End the NSA’s Mass Spying

Tell Congress: Support the USA FREEDOM Act. Stop the FISA Improvements Act & Other Fake Reforms.

There’s a powerful reform proposal moving through Congress. H.R. 3361, the House’s version of the USA FREEDOM Act, would limit bulk collection of phone records and add transparency to the egregious NSA spying.

If it passes, the USA FREEDOM Act will be the most meaningful reform of government surveillance in decades. While the USA FREEDOM Act doesn’t address every issue with NSA surveillance, it’s a powerful first step.

But certain members of Congress don’t want reform. Representatives Mike Rogers and Dutch Ruppersberger have introduced a bill that attempts to make NSA spying worse. And Senator Dianne Feinstein is promoting the FISA Improvements Act, a bill posing as reform that attempts to legalize the worst aspects of NSA surveillance.

We can’t let NSA apologists preserve the status quo. Demand real reform.  Stop mass spying.

“No Place to Hide” Part 2

This is the second part of Glenn’s interview with Democracy Now!‘s Amy Goodman to discuss the book his book. The first part are here.

“No Place to Hide”

Journalist, author and constitutional lawyer Glenn Greenwald’s new book “No Place To Hide” was released this week and Glenn has been on the interview circuit discussing the book, Edward Snowden and the next set of revelations about the NSA spying. In an interview with GQ magazine, he talks about what a whirlwind this last year has been as the hottest story in the world has unfolded:

Glenn Greenwald is trying to lose fifteen pounds. “Um, it’s been a little crazy these past nine months,” he says. “And I will eat French fries or potato chips if they’re in front of me.” On his porch, perched on a jungle mountaintop in Rio, the morning is fresh. Greenwald, in board shorts and a collared short-sleeve shirt, has done his daily hour’s worth of yoga and attached himself to one of his five laptops as his dozen dogs yap and wag to begin the day’s circus in his monkey-and-macaw paradise.

To put it simply, Greenwald has had one hell of a dizzying run. The Bourne plotline is familiar now: In late 2012, a shady contact calling himself Cincinnatus reached out via e-mail with the urgent desire to reveal some top-secret documents. As a blogger, author, and relentless commentator on all things related to the NSA, Greenwald had been here before. He figured it was a setup, or nut job, and disregarded the message. The source then contacted Greenwald’s friend Laura Poitras, an Academy Award-nominated documentary filmmaker, and sent along a sample of encrypted documents. Poitras got in touch with Greenwald immediately: Not only did this seem like a potential jackpot, she said, but Cincinnatus wouldn’t go ahead until Greenwald had been looped in.

Soon, per the source’s instructions, they were on a plane to Hong Kong. Greenwald and Poitras did exactly as they were told, showing up at the Mira hotel at 10:20 a.m. on June 3, in front of a giant plastic alligator, looking for a man holding a Rubik’s Cube. “I thought he would be a 60-year-old senior NSA guy,” says Greenwald. And then here’s this pale, stringbeany kid with glasses, “looking all of twentysomething.” This, of course, was the 29-year-old NSA contractor Edward Snowden. Once they retired to his hotel room, he turned over an estimated tens of thousands of documents, the vast majority of them classified “Top Secret,” comprising arguably the biggest leak of classified material in U.S. history. After days of intensive work with Greenwald and Poitras, Snowden fled-just minutes ahead of the press-only to reappear in Moscow.

This left Greenwald with the most exhilarating and daunting task of his career: to figure out how to curate and publish the vast Snowden archive in his Brazilian self-exile. Once he began, his work triggered an avalanche of articles that branded him a hero, a traitor, a collaborator. In one fell swoop, he had piqued and scandalized and provoked the world into a deeper debate about not just surveillance and privacy but power and truth. The odyssey eventually led him from The Guardian, where the first articles appeared revealing the NSA’s secret surveillance of Verizon records, to his central position in Pierre Omidyar’s $250 million muckraking gambit known as First Look Media and The Intercept, where Greenwald is figurehead, main attraction, and blogitor-in-chief.

The Guardian has a excerpt from the book describing the first hectic days following the first meeting with Mr.Snowden in Hong Kong:

On Thursday 6 June 2013, our fifth day in Hong Kong, I went to Edward Snowden’s hotel room and he immediately said he had news that was “a bit alarming”. An internet-connected security device at the home he shared with his longtime girlfriend in Hawaii had detected that two people from the NSA – a human-resources person and an NSA “police officer” – had come to their house searching for him.

Snowden was almost certain this meant that the NSA had identified him as the likely source of the leaks, but I was sceptical. “If they thought you did this, they’d send hordes of FBI agents with a search warrant and probably Swat teams, not a single NSA officer and a human-resources person.” I figured this was just an automatic and routine inquiry, triggered when an NSA employee goes absent for a few weeks without explanation. But Snowden suggested that perhaps they were being purposely low-key to avoid drawing media attention or setting off an effort to suppress evidence.

Whatever the news meant, it underscored the need for Laura Poitras – the film-maker who was collaborating with me on the story – and I to quickly prepare our article and video unveiling Snowden as the source of the disclosures. We were determined that the world would first hear about Snowden, his actions and his motives, from Snowden himself, not through a demonisation campaign spread by the US government while he was in hiding or in custody and unable to speak for himself.

Our plan was to publish two more articles on the NSA files in the Guardian and then release a long piece on Snowden himself, accompanied by a videotaped interview, and a printed Q&A with him.

Poitras had spent the previous 48 hours editing the footage from my first interview with Snowden, but she said it was too detailed, lengthy, and fragmented to use. She wanted to film a new interview right away; one that was more concise and focused, and wrote a list of 20 or so specific questions for me to ask him. I added several of my own as Poitras set up her camera and directed us where to sit.

Along with the release of the book, Glenn has also released more documents which Kevin Gosztola summarizes at FDL’s Dissenter.

Glenn joined Democracy Now!‘s Amy Goodman to discuss the book in the first part of a two day interview.



Transcript can be read here



Transcript can be read here

Load more