Tag: fourth amendment

NSA Excuses Get Moronic

We can’t tell you that we spied on you because it would violate your privacy??!!! This is precisely what the head of the NSA, General Keith B. Alexander told Senator Bernie Sanders (I-VT) in a letter responding to Sen. Sanders’ question about whether it collects information on members of Congress because doing so would violate the law.

“Among those protections is the condition that NSA can query the metadata only based on phone numbers reasonably suspected to be associated with specific foreign terrorist groups,” Alexander wrote. “For that reason, NSA cannot lawfully search to determine if any records NSA has received under the program have included metadata of the phone calls of any member of Congress, other American elected officials, or any other American without the predicate.” [..]

Alexander doesn’t actually say so in his letter, but it’s very possible that the NSA collects data on members of Congress just as it does on everyone else, in bulk. The NSA said in a statement earlier this month that members of Congress have the “same privacy protections” as ordinary citizens, which means that they too might be caught up in the NSA’s terrorism queries of its telephone database, which may sweep up millions of innocent people in a single search.

Seriously. I want to know what drugs they have given the heads of the DNI & NSA that they think that this is a plausible explanation of why that can’t tell a United States Senator whether or not they have spied on him. Alexander really wants us to believe that searching the NSA data base for information would violate the law

This certainly comes under the category of the most lamest excuses for abuse of power.



Will the NSA Be “Reformed”?

In the run up to President Barack Obama’s promised decision on reforms the National Security Agency and its surveillance programs, there has been an  unsubstantiated press release, by House Intelligence Committee chairman Rep. Mike Rogers and his Democratic counterpart Rep. Dutch Ruppersberger, that the material taken by whistleblower Edward Snowden gravely impacted America’s national security, put the lives of US military personnel at risk and aided terrorists. There are no specifics about these allegations that Snowden had downloaded 1.7 million files or had considerable information on current U.S. military operations because the Pentagon report is, of course, classified.

Meanwhile top NSA officials and their allies are making their public appeals to retain their surveillance powers

In a lengthy interview that aired on Friday on National Public Radio (NPR), the NSA’s top civilian official, the outgoing deputy director John C Inglis, said that the agency would cautiously welcome a public advocate to argue for privacy interests before the secret court which oversees surveillance. Such a measure is being promoted by some of the agency’s strongest legislative critics. [..]

But security officials are arguing strongly against curtailing the substance of domestic surveillance activities.

While Inglis conceded in his NPR interview that at most one terrorist attack might have been foiled by NSA’s bulk collection of all American phone data – a case in San Diego that involved a money transfer from four men to al-Shabaab in Somalia – he described it as an “insurance policy” against future acts of terrorism. [..]

Inglis was bolstered on Thursday by the new FBI director James Comey, who said he opposed curbing the bureau’s power to collect information from businesses through a non-judicial subpoena called a national security letter. The use of national security letters, which occurs in secret, came under sharp criticism from Obama’s surveillance review panel, which advocated judicial approval over them.

Comey told reporters that would make it harder for his agency to investigate national security issues than conduct bank fraud investigations.

What we have learned is that the massive data collection has not led to the prevention of one terrorist attack and that conventional methods using court orders were more effective (pdf).

Activist and journalist Chris Hedges, along with former NSA technical director and NSA whistle-blower William Binney, tell Real News Network‘s Paul Jay that there should be accountability, including the President himself, for the criminal practices used by the NSA against the American people.

This Friday the president will publicly announce the results of his review of National Security Agency surveillance programs at the Department of Justice, not the White House.

Could Snowden Get a Fair Trial in the US

NSA whistleblower Thomas Drake and Jessalyn Raddack, Edward Snowden’s legal adviser appeared on Meet the Press, December 29, discussed the NSA leaks by Snowden and why they believe that he could not get a fair trial in this country.

In editorials over New Year’s Day, the New York Times and The Guardian called on President Barack Obama to grant Edward Snowden some form of clemency or a pardon to allow him to return home.

Edward Snowden, Whistle-Blower

By The New York Times Editorial Board

Considering the enormous value of the information he has revealed, and the abuses he has exposed, Mr. Snowden deserves better than a life of permanent exile, fear and flight. He may have committed a crime to do so, but he has done his country a great service. It is time for the United States to offer Mr. Snowden a plea bargain or some form of clemency that would allow him to return home, face at least substantially reduced punishment in light of his role as a whistle-blower, and have the hope of a life advocating for greater privacy and far stronger oversight of the runaway intelligence community.  [..]

The shrill brigade of his critics say Mr. Snowden has done profound damage to intelligence operations of the United States, but none has presented the slightest proof that his disclosures really hurt the nation’s security. Many of the mass-collection programs Mr. Snowden exposed would work just as well if they were reduced in scope and brought under strict outside oversight, as the presidential panel recommended.

When someone reveals that government officials have routinely and deliberately broken the law, that person should not face life in prison at the hands of the same government. That’s why Rick Ledgett, who leads the N.S.A.’s task force on the Snowden leaks, recently told CBS News that he would consider amnesty if Mr. Snowden would stop any additional leaks. And it’s why President Obama should tell his aides to begin finding a way to end Mr. Snowden’s vilification and give him an incentive to return home.

Snowden affair: the case for a pardon

The Guardian Editorial, Comment is Free

Snowden gave classified information to journalists, even though he knew the likely consequences. That was an act of courage

Mr Snowden gave classified information to journalists, even though he knew the likely consequences. That was an act of some moral courage. Presidents – from Franklin Roosevelt to Ronald Reagan – have issued pardons. The debate that Mr Snowden has facilitated will no doubt be argued over in the US supreme court. If those justices agree with Mr Obama’s own review panel and Judge Richard Leon in finding that Mr Snowden did, indeed, raise serious matters of public importance which were previously hidden (or, worse, dishonestly concealed), is it then conceivable that he could be treated as a traitor or common felon? We hope that calm heads within the present administration are working on a strategy to allow Mr Snowden to return to the US with dignity, and the president to use his executive powers to treat him humanely and in a manner that would be a shining example about the value of whistleblowers and of free speech itself.

Attorney for Julian Assange and President Emeritus of the Center for Constitutional Rights (CCR) in New York discussed how the New York Times Editorial should have also supported other whistleblowers with Real News Network’s Jaisal Noor.



Full transcript can be read here

Every Stroke You Make

Yes, quite literally the NSA will be watching every keystroke you make on you computer, cell phone, or i-pad. How you say? Quite simply collusion with the the telecommunications industry along with companies like Microsoft and through its special unit of hackers within the agency’s department for Tailored Access Operations (TAO). In an article in Der Spiegel, these specialists are described as as “master carpenters” who step in when the usual hacking and data-skimming methods fail. These hackers at ANT, which may stand for Advanced or Access Network Technology, step in with their special tools to get the job done.

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives — from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets’ data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. [..]

Some of the equipment available is quite inexpensive. A rigged monitor cable that allows “TAO personnel to see what is displayed on the targeted monitor,” for example, is available for just $30. But an “active GSM base station” — a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones — costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million. [..]

The ANT division doesn’t just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer’s motherboard that is the first thing to load when a computer is turned on.

In another article at FDL‘s Dissenter, Peter Van Buren notes that private enterprise have also become the “tools of the national security state

Once the NSA identifies a “target” (whom we’ll refer here to as “You”), the NSA needs to know when You order a new laptop they want to intercept. That means the NSA has to spy on Your credit card, Your online activities and/or probe into the ordering systems of places like Amazon, Dell and the like. Perhaps there is a sort of “no fly” list distributed to manufacturers that requires notification to the NSA when someone like You on it buys something. Or all of the above.

The NSA then must know when and how Your laptop will be sent to you. That means they need to have been accessing the computer systems of Amazon, Dell and the like, and/or UPS, Fedex and other shippers. Or all of the above.

The NSA then has to have physical access to the warehouse of the shipping company. Or, the shipping company has to agree to mark your package, and deliver it instead to an NSA location. That all means the shipping companies are in on the NSA plot, or the NSA has to be hacking into the shipping companies’ data systems and substituting their address for Yours.

Once in NSA hands, Your package has to be opened, and Your laptop must be altered in some undetectable way. They can’t steam open a box like a letter in the old movies; someone has to open it physically and then get it all buttoned up again without a trace. Does the NSA have a way to unstick packing tape and reseal internal bags, or do they have a ready supply from Dell and Apple of packing materials?

Lastly, the NSA has to return the package into the shipping stream. That means the box, with say Amazon’s return address and Your home address, has to reenter say Fedex’s system from a third location without too many people knowing it happened. It would not do for the low-level UPS guy to pick up a ton of boxes everyday from a nondescript warehouse, all with third-party address labels. This strongly suggests cooperation by the shipping companies.

You then open Your new laptop on Christmas morning. Yeah, be sure to select a secure password. [..]

What we have here is an example of the depths into which You have fallen. The government has recruited private industry into its national security state, down to the level of the Fedex guy delivering packages to Your door in time for Christmas. For those of You who still foolishly insist that such spying is OK because they “have nothing to hide,” I sure as hell hope You are right, because whatever You do have now belongs to Them.

It is fairly certain that whether or not the NSA will be allowed to continues its bulk collection of data will be argued before the Supreme Court after two conflicting ruling from lower courts on the constitutionality of the program. Jameel Jaffer, ACLU deputy legal director and director of its Center for Democracy; and Glenn Greenwald, the journalist who first broke the story about Edward Snowden’s NSA leaks joined Amy Goodman at Democracy Now! to discuss the court rulings and how the NSA can literally watch every keystroke you make.



Transcript can gbe read here.



Transcript can be read here

Thank you, Edward Snowden.

Edward Snowden’s Christmas Message

Hi, and Merry Christmas. I’m honored to have the chance to speak with you and your family this year.

Recently, we learned that our governments, working in concert, have created a system of worldwide mass surveillance, watching everything we do.

Great Britain’s George Orwell warned us of the danger of this kind of information. The types of collection in the book — microphones and video cameras, TVs that watch us — are nothing compared to what we have available today. We have sensors in our pockets that track us everywhere we go.

Think about what this means for the privacy of the average person. A child born today will grow up with no conception of privacy at all. They’ll never know what it means to have a private moment to themselves — an unrecorded, unanalyzed thought. And that’s a problem, because privacy matters. Privacy is what allows us to determine who we are and who we want to be.

The conversation occurring today will determine the amount of trust we can place both in the technology that surrounds us and the government that regulates it. Together, we can find a better balance. End mass surveillance. And remind the government that if it really wants to know how we feel, asking is always cheaper than spying.

For everyone out there listening, thank you, and Merry Christmas.

The Ayes Have It, The NSA Went Too Far

President Obama’s panel of security and civil liberties experts finished their work giving their recommendations to the president last Friday. The report was released to the public Tuesday. Much to the surprise of the war on terror hawks, it slammed the mass surveillance programs vindicating what critics have been saying since Edward Snowden’s revelations.

A presidential advisory panel has recommended sweeping limits on the government’s surveillance programs, including requiring a court to sign off on individual searches of phone records and stripping the National Security Agency of its ability to store that data from Americans. [..]

The recommendations include tightening federal law enforcement’s use of so-called national security letters, which give the government sweeping authority to demand financial and phone records without prior court approval in national security cases. The task force recommended that authorities should be required to obtain a prior “judicial finding” showing “reasonable grounds” that the information sought is relevant to terrorism or other intelligence activities.

In addition, the panel proposed terminating the NSA’s ability to store telephone data and instead require it to be held by the phone companies or a third party. Access to the data would then be permitted only through an order from a Foreign Intelligence Surveillance Court.

The panel called for more independent review of what the NSA collects and the process by which it goes about gathering data.

Amid an international furor over NSA spying on the leaders of allied nations such as Germany, the review group recommended that the president personally approve all sensitive methods used by the intelligence community.

President’s Review Group on Intelligence  and Communications Technologies Report On NSA

Marcy Wheeler, at emptywheel, has been pouring over the report and has pulled out what she thinks is pertinent here, here and here.

In a re-published article by Kara Brandeisky of ProPublica, that she wrote for Techdirt back in August, the folks there note that the surveillance reforms the Pres. Obama supported before he was president are remarkably similar to the Task Force’s proposals:

As a senator, Obama wanted to limit bulk records collection.

Obama co-sponsored a 2007 bill, introduced by Sen. Russ Feingold, D-Wis., that would have required the government to demonstrate, with “specific and articulable facts,” that it wanted records related to “a suspected agent of a foreign power” or the records of people with one degree of separation from a suspect. The bill died in committee. Following pressure from the Bush administration, lawmakers had abandoned a similar 2005 measure, which Obama also supported. [..]

As a senator, Obama wanted to require government analysts to get court approval before accessing incidentally collected American data.

In Feb. 2008, Obama co-sponsored an amendment, also introduced by Feingold, which would have further limited the ability of the government to collect any communications to or from people residing in the U.S.

The measure would have also required government analysts to segregate all incidentally collected American communications. If analysts wanted to access those communications, they would have needed to apply for individualized surveillance court approval.

The amendment pfailed 35-63 http://thomas.loc.gov/cgi-bin/… Obama later reversed his position and supported what became the law now known to authorize the PRISM program. That legislation – the FISA Amendments Act of 2008 – also granted immunity to telecoms that had cooperated with the government on surveillance. [..]

As a senator, Obama wanted the executive branch to report to Congress how many American communications had been swept up during surveillance.

Feingold’s 2008 amendment, which Obama supported, would have also required the Defense Department and Justice Department to complete a joint audit of all incidentally collected American communications and provide the report to congressional intelligence committees. The amendment failed 35-63. [..]

The White House has already made it clear that the recommendations are just that and has already said it will not separate the US Cyber Command from the NSA. So basically, as Charles Pierce pointedly put it, “the White House can tell the committee to pound sand.”

And, even if it doesn’t, there is no reason on god’s earth why anyone should believe that the NSA actually would abide by any agreement going forward. The all-too-human, but curiously error-prone heroes of our intelligence community, imbued as they are with a mission mindset that is perilously close to messianic, can be presumed eventually to breach by unfortunate accident almost any new protocol put in place. (And that’s not even to mingle with the wilder fauna in the jungle.)

At Democracy Now!, Amy Goodman and Juan González discuss the panel recommendations with Kirk Wiebe, a retired National Security Agency official who worked there for over 32 years, and Ben Wizner, Edward Snowden’s legal adviser and director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union.



Transcript can be read here



Transcript can be read here

Let the conversation continue.

Federal Judge Rules NSA Phone Program Possibly Unconstitutional

In response to a lawsuit filed by an activist in June against the NSA’s massive collection of private phone data, a federal judge ruled that the program is possibly a violation of the Fourth Amendment but fell short of ordering the program shut down.

udge Richard Leon declared that the mass collection of so-called metadata probably violates the fourth amendment, relating to unreasonable searches and seizures, and is “almost Orwellian” in its scope.

He also expressed doubt about the central rationale for the program cited by the NSA: that it is necessary for preventing terrorist attacks. “The government does not cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack,” wrote Leon, a US district judge in the District of Columbia. [..]

Leon, an appointee of George W Bush, granted a preliminary injunction sought by plaintiffs Larry Klayman and Charles Strange, concluding that their constitutional challenge was likely to be successful. In what was the only comfort to the NSA in a stinging judgment, he put the ruling on hold, pending an appeal by the government.

But Leon’s opinion contained stern and repeated warnings that he was inclined to rule that the metadata collection performed by the NSA – and defended vigorously by the NSA director Keith Alexander on CBS on Sunday night – was unconstitutional.

D.C. District Court NSA Opinion

Glenn Greenwald weighed in on this on MSNBC’s 4 PM program and there was a discussion with a former Obama administration DOJ lawyer and a spokesperson for the ACLU. If the video becomes available, I’ll add it.

NSA: “Electronic Omnivore”

“Yes, I believe it is in the nation’s best interest to put all the phone records into a lockbox that we could search.”

   –Keith B. Alexander, September 2013

Inside the “Electronic Omnivore”: New Leaks Show NSA Spying on U.N., Climate Summit, Text Messaging

The New York Times has revealed new details about how the National Security Agency is spying on targets ranging from the United Nations to foreign governments to global text messages. We are joined by New York Times reporter Scott Shane, who reports that the NSA has emerged “as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations.” The Times article reveals how the NSA intercepted the talking points of U.N. Secretary-General Ban Ki-moon ahead of a meeting with President Obama in April and mounted a major eavesdropping effort focused on the United Nations Climate Change Conference in Bali in 2007. The Times also reveals the existence of an NSA database called Dishfire that “stores years of text messages from around the world, just in case.” Another NSA program called Tracfin “accumulates gigabytes of credit card purchases.”



Transcript can be read here

As U.S. Weighs Spying Changes, Officials Say Data Sweeps Must Continue

by David E. Sanger, The New York Times

The Obama administration has told allies and lawmakers it is considering reining in a variety of National Security Agency practices overseas, including holding White House reviews of the world leaders the agency is monitoring, forging a new accord with Germany for a closer intelligence relationship and minimizing collection on some foreigners.

But for now, President Obama and his top advisers have concluded that there is no workable alternative to the bulk collection of huge quantities of “metadata,” including records of all telephone calls made inside the United States.

Instead, the administration has hinted it may hold that information for only three years instead of five while it seeks new technologies that would permit it to search the records of telephone and Internet companies, rather than collect the data in bulk in government computers. Gen. Keith B. Alexander, the director of the N.S.A., has told industry officials that developing the new technology would take at least three years.

NSA official cites ‘stop and frisk’ in effort to explain searches of phone records

by Ali Watkins, McClatchy Washington Bureau

The general counsel of the National Security Agency on Monday compared the agency’s telephone metadata collection program to the highly controversial “stop-and-frisk” practice used by law enforcement officers, saying the agency uses that same standard to choose which phone numbers to query in its database.

“It’s effectively the same standard as stop-and-frisk,” Rajesh De said in an attempt to explain the evidentiary use of “reasonable and articulable suspicion” to identify which phone numbers to target from the agency’s huge database of stored cellphone records.

De made the comment during a rare hearing of an obscure government body, the Privacy and Civil Liberties Oversight Board, which Congress created in 2004 to oversee the government’s expanded intelligence collection operations but which until Monday had never held a substantive hearing. [..]

The comparison was the latest in questionable analogies that intelligence officials have used in an effort to explain the agency’s metadata collection programs since former defense contractor Edward Snowden revealed their existence in June.

Intelligence officials, for example, have said repeatedly that the collection of hundreds of millions of phone records allows them to build a haystack in which to find a needle, apparently missing the irony that “finding a needle in a haystack” is an expression meant to convey that a task is all but impossible.

NSA’s Path to Totalitarianism

by Norman Pollack, Counterpunch

The New York Times, a recipient, along with the Guardian, of Snowden’s disclosures about the illegal activities of Obama and USG, is breaking out, as now, of its reticence about the nation’s profound disregard of constitutional principles AND its related policies of global hegemony at all costs-here Scott Shane’s lengthy article (3 Nov.), “No Morsel Too Miniscule for All-Consuming N.S.A.”  NSA to all intents and purposes appears as a “rogue” organization, extremism in the putative service of liberty, except that the designation is a way of distracting attention, and removing accountability, from its authorization and mission at the highest levels-call it, licensed roguery, official (with Obama’s eyes supposedly averted).  Or better, call it, stripped of all cosmetics, the unerring mark of a Police State, itself become identical  with Fortress America, the National-Security State.

Eavesdropping on foreign leaders speaks to an arrogance of power, in which the US claims for itself every right, unilaterally, to script both sides of the foreign dialogue as well as micromanage to its own advantage the rhythm and content of global events, from regional trade partnerships to the use of military force in shoring up alliance systems against a host of enemies, some terrorist groups to be sure, but, using that as pretext, mounting counterrevolution globally against alternative modes, notably, socialist, of modernization: autonomous national and/or radical aspirations seeking distance from US market penetration, the tarnished necklace of its worldwide military bases and CIA stations, and not least, the ideological saturation (assisted by IMF and World Bank applications of pressure) of market fundamentalism, the property right, unrestricted capital flows, and the honor of serving American industry with the lowest possible labor costs, as meanwhile we see the financialization of capitalism here and the gutting of the manufacturing base.

Eavesdropping, of course, is the polite term for control freak, which translates, in the realm of power politics, into societal desperation to employ any and all means for staying on top, cyber-strategies of disruption as well as information-gathering, campaigns of disinformation, CIA-JSOC paramilitary programs of regime change, and, upping the ante, as here, learning every move in advance of foreign leaders, the better-take no chances, take no prisoners-to orchestrate world politics in our favor.

US Spying: “An Institutional Obsession”

Former constitutional lawyer and columnist on civil liberties and U.S. national security issues for The Guardian, Glenn Greenwald joined Democracy Now!‘s Amy Goodman to discuss how US spying in out allies has become an institutionalized obsession with surveillance.

The spat over U.S. spying on Germany grew over the weekend following reports the National Security Agency has monitored the phone calls of Chancellor Angela Merkel since as early as 2002, before she even came to office. The NSA also spied on Merkel’s predecessor, Gerhard Schroeder, after he refused to support the Iraq War. NSA staffers working out of the U.S. embassy in Berlin reportedly sent their findings directly to the White House. The German tabloid Bild also reports President Obama was made aware of Merkel’s phone tap in 2010, contradicting his apparent claim to her last week that he would have stopped the spying had he known. In another new disclosure, the Spanish newspaper El Mundo reports today the NSA tracked some 60 million calls in Spain over the course of a month last year. A delegation of German and French lawmakers are now in Washington to press for answers on the allegations of U.S. spying in their home countries.

Jay Ackroyd at Eschaton thought this part of the lengthy interview deserved to be highlighted:

    So, for the top national security official in the United States to go to the Senate and lie to their faces and deny that the NSA is doing exactly that which our reporting proved that the NSA was in fact doing is plainly a crime, and of course he should be prosecuted, and would be prosecuted if we lived under anything resembling the rule of law, where everybody is held and treated equally under the law, regardless of position or prestige. Of course, we don’t have that kind of system, which is why no Wall Street executives have been prosecuted, no top-level Bush officials were prosecuted for torture or warrantless eavesdropping, and why James Clapper hasn’t been prosecuted despite telling an overt lie to Congress. And what’s even more amazing, though, Amy, is that not only has James Clapper not been prosecuted, he hasn’t even lost his job. He’s still the director of national intelligence many months after his lie was revealed, because there is no accountability for the top-level people in Washington.

   And the final thing to say about that is, there’s all kinds of American journalists who love to go on television and accuse Edward Snowden of committing all these grave and horrible crimes. They’re so brave when it comes to declaring Edward Snowden to be a criminal and calling for [inaudible]. Not one of them has ever gone on television and said, “James Clapper committed crimes, and he ought to be prosecuted.” The question that you just asked journalistically is such an important and obvious one, yet not-none of the David Gregorys or Jeffrey Toobins or all these American journalists who fancy themselves as aggressive, tough reporters, would ever dare utter the idea that James Clapper ought to be arrested or prosecuted for the crimes that he committed, because they’re there to serve those interests and not to challenge or be adversarial to them.

Jay also pointed out e-mail exchange between Glenn and Bill Keller, the former executive editor of The New York Times, in an op-ed by Keller.

Is Glenn Greenwald the Future of News?

by Bill Keller

Much of the speculation about the future of news focuses on the business model: How will we generate the revenues to pay the people who gather and disseminate the news? But the disruptive power of the Internet raises other profound questions about what journalism is becoming, about its essential character and values. This week’s column is a conversation – a (mostly) civil argument – between two very different views of how journalism fulfills its mission.

Glenn Greenwald broke what is probably the year’s biggest news story, Edward Snowden’s revelations of the vast surveillance apparatus constructed by the National Security Agency. He has also been an outspoken critic of the kind of journalism practiced at places like The New York Times, and an advocate of a more activist, more partisan kind of journalism. Earlier this month he announced he was joining a new journalistic venture, backed by eBay billionaire Pierre Omidyar, who has promised to invest $250 million and to “throw out all the old rules.” I invited Greenwald to join me in an online exchange about what, exactly, that means.

It’s long but worth the read.  

The NSA: Bigger Is Not Better

In the case of the NSA’s scooping up and storing all that private data, they ran into a glitch, too much information makes the job of surveillance harder

The volume of NSA contacts collection is so high that it has occasionally threatened to overwhelm storage repositories, forcing the agency to halt its intake with “emergency detasking” orders. Three NSA documents describe short-term efforts to build an “across-the-board technology throttle for truly heinous data” and longer-term efforts to filter out information that the NSA does not need.

Spam has proven to be a significant problem for NSA – clogging databases with data that holds no foreign intelligence value. The majority of all e-mails, one NSA document says, “are SPAM from ‘fake’ addresses and never ‘delivered’ to targets.”

In fall 2011, according to an NSA presentation, the Yahoo account of an Iranian target was “hacked by an unknown actor,” who used it to send spam. The Iranian had “a number of Yahoo groups in his/her contact list, some with many hundreds or thousands of members.”

The cascading effects of repeated spam messages, compounded by the automatic addition of the Iranian’s contacts to other people’s address books, led to a massive spike in the volume of traffic collected by the Australian intelligence service on the NSA’s behalf.

After nine days of data-bombing, the Iranian’s contact book and contact books for several people within it were “emergency detasked.”

LOL. The NSA has a spam problem.

Meanwhile, the head of the NSA, Gen. Keith Alexander has had to admit to the Senate Intelligence Committee that he lied back in June about those 54 terrorists plots he claimed were “thwarted” by the agency’s phone surveillance program.

Alexander admitted that only 13 of the 54 cases were connected to the United States. He also told the committee that only one or two suspected plots were identified as a result of bulk phone record collection.

Leahy was not happy. “We’re told we have to (conduct mass phone surveillance) to protect us, and the statistics are rolled out that they’re not accurate,” he said. “It doesn’t have the credibility here in the Congress, it doesn’t have the credibility with this chairman and it doesn’t have the credibility with the country.”

Over at the Wall Street Journal, in an op-ed behind a paywall, the committee chair, Sen Dianne Feinstein trotted out the old “9/11 be very afraid” canard and repeated the debunked Alexander lie.

Consider the case of 9/11 hijacker Khalid al-Mihdhar, who was being watched by the CIA while he was in Malaysia. U.S. intelligence agencies failed to connect the dots before the attack to recognize that al-Mihdhar had flown with (future) hijacker Nawaf al-Hazmi to Los Angeles in January 2000.

Intelligence officials knew about an al Qaeda safe house in Yemen with ties to al-Mihdhar as well as the safe house’s telephone number, but they had no way of knowing if anyone inside the U.S. was in contact with that phone number in Yemen. Only after 9/11 did we learn that al-Mihdhar, while living in San Diego, had called the safe house. [..]

Working in combination, the call-records database and other NSA programs have aided efforts by U.S. intelligence agencies to disrupt terrorism in the U.S. approximately a dozen times in recent years, according to the NSA. This summer, the agency disclosed that 54 terrorist events have been interrupted-including plots stopped and arrests made for support to terrorism. Thirteen events were in the U.S. homeland and nine involved U.S. persons or facilities overseas. Twenty-five were in Europe, five in Africa and 11 in Asia.

Can everyone say say Richard Clark.

At Techdirt, Mike Masnick points out none of what Sen. Feinstein said is true:

First off, as has been explained over and over again, the intelligence community already had certain tools in place to discover such phone calls. The problem wasn’t that they didn’t have the information — they did. It was that they failed to “connect the dots.” In other words, they had too much information which obscured the important information they needed. [..]

Note the all important “and other NSA programs” language here. Also the use of “terrorist events” not plots. And, remember, those “thirteen events… in the U.S. homeland,” have since been whittled down to only one that actually relied on the call records program that she’s defending — and that wasn’t a terrorist plot but a cab driver in San Diego sending some cash to a Somali group judged to be a terrorist organization.

So, we have elected representatives and high paid appointees blatantly lying and getting away with it to protect their turf with no one is holding them accountable,

Load more