No Canadian NSA connection, but very own data snooping program
RT | June 11, 2013
Canada does not use the US NSA’s top secret surveillance PRISM program, officials revealed. Instead, it has a spying platform of its own that it claims manages to distinguish between domestic and international telephone and internet data collected.
The Communication Security Establishment (CSE) spokesman separated the National Security Agency and the Canadian surveillance program.
“The Communications Security Establishment does not have access to data in PRISM”, Ryan Foreman told Reuters, confirming that the “CSE uses metadata to isolate and identify foreign communications,” as CSEC is prohibited by law from directing its activities at Canadians.
Officials admitted that CSEC “incidentally” intercepts Canadian communications, but removes such data after it is obtained, according to the Globe and Mail.
Secret spying programs have come under scrutiny this week as whistleblower and former technical assistant for the CIA Edward Snowden leaked information about the NSA’s PRISM project, describing it as a massive data mining surveillance program which gave the agency backdoor access to emails, videos, chats, photos and search queries from nine worldwide tech giants, including Google and Facebook.
A secret electronic spying program was approved in 2011 by Canada’s Defense Minister Peter MacKay. It searches through international and domestic telephone records and internet data for suspicious activity, Canada’s newspaper Globe and Mail revealed.
Despite the reports, the government’s metadata surveillance program remains a mystery with little information available publicly. The records obtained from the Access to Information requests by the Globe had many pages blacked out, citing national security.
The program was first passed in a secret decree signed in 2005 by Bill Graham, the defense minister at the time then put on hold in 2008 for more than a year due to privacy concerns. On November 21, 2011, it was once again renewed, along with other top-secret espionage programs. And currently it is headed by the Communications Security Establishment Canada (CSEC), part of the Department of National Defense.
It is still not known how the data is being collected. Mining metadata can reveal who knows who and help the authorities to map out social networks and even terrorist cells.
“Metadata is information associated with a telecommunication … And not a communication,” according to a PowerPoint briefing sent to MacKay in 2011.
The Canadian surveillance program has been authorized by ministerial decrees, bypassing the parliament, and is under the sole oversight of the Office of the CSE Commissioner.
Opposition MPs have questioned MacKay about the surveillance reports, to which he replied that Canada’s surveillance initiative “is specifically prohibited from looking at the information of Canadians” and that “this program is very much directed at activities outside the country, foreign threats, in fact. There is rigorous oversight, there is legislation in place that specifically dictates what can and cannot be examined.”
Canada’s privacy commissioner admitted a lack of clarity on the subject.
“When it comes to the metadata program, we know very little specific information at this point – but we want to find out more”, Scott Hutchinson, of the Office of the Privacy Commissioner of Canada, told the Globe and Mail.
The Canadian program was criticized 2008 by a retired Supreme Court judge Charles Gonthier, who questioned whether CSEC could be passing any data collected to other partner agencies such as Royal Canadian Mounted Police (RCMP) and Canadian Security Intelligence Service (CSIS).
Gonthier’s biggest fear was that the data collection would lead to unlawful surveillance.
The NSA Black Hole: 5 Basic Things We Still Don’t Know About the Agency’s Snooping
By Justin Elliott and Theodoric Meyer | ProPublica | June 10, 2013
The headquarters of the National Security Agency at Fort Meade, Maryland
Last week saw revelations that the FBI and the National Security Agency have been collecting Americans’ phone records en masse and that the agencies have access to data from nine tech companies.
But secrecy around the programs has meant even basic questions are still unanswered. Here’s what we still don’t know:
Has the NSA been collecting all Americans’ phone records, and for how long?
It’s not entirely clear.
The Guardian published a court order that directed a Verizon subsidiary to turn over phone metadata — the time and duration of calls, as well as phone numbers and location data — to the NSA “on an ongoing daily basis” for a three-month period. Citing unnamed sources, the Wall Street Journal reported the program also covers AT&T and Sprint and that it covers the majority of Americans. And Director of National Intelligence James Clapper himself acknowledged that the “collection” is “broad in scope.”
How long has the dragnet has existed? At least seven years, and maybe going back to 2001.
Senate Intelligence Committee chair Dianne Feinstein, D-Calif., and vice chair Saxby Chambliss, R-Ga., said last week that the NSA has been collecting the records going back to 2006. That’s the same year that USA Today revealed a similar-sounding mass collection of metadata, which the paper said had been taking place since 2001. The relationship between the program we got a glimpse of in the Verizon order and the one revealed by USA Today in 2006 is still not clear: USA Today described a program not authorized by warrants. The program detailed last week does have court approval.
What surveillance powers does the government believe it has under the Patriot Act?
That’s classified.
The Verizon court order relies on Section 215 of the Patriot Act. That provision allows the FBI to ask the Foreign Intelligence Surveillance Court for a secret order requiring companies, like Verizon, to produce records – “any tangible things” – as part of a “foreign intelligence” or terrorism investigation. As with any law, exactly what the wording means is a matter for courts to decide. But the Foreign Intelligence Surveillance Court’s interpretation of Section 215 is secret.
As Harvard Law Professor Noah Feldman recently wrote, the details of that interpretation matter a lot: “Read narrowly, this language might require that information requested be shown to be important or necessary to the investigation. Read widely, it would include essentially anything even slightly relevant — which is to say, everything.”
In the case of the Verizon order — signed by a judge who sits on the secret court and requiring the company to hand over “all call detail records” — it appears that the court is allowing a broad interpretation of the Patriot Act. But we still don’t know the specifics.
Has the NSA’s massive collection of metadata thwarted any terrorist attacks?
It depends which senator you ask. And evidence that would help settle the matter is, yes, classified.
Sen. Mark Udall, D-Colo., told CNN on Sunday, “It’s unclear to me that we’ve developed any intelligence through the metadata program that’s led to the disruption of plots that we could [not] have developed through other data and other intelligence.”
He said he could not elaborate on his case “without further declassification.”
Sen. Feinstein told ABC that the collection of phone records described in the Verizon order had been “used” in the case of would-be New York subway bomber Najibullah Zazi. Later in the interview, Feinstein said she couldn’t disclose more because the information is classified. (It’s worth noting that there’s also evidence that old-fashioned police work helped solve the Zazi case — and that other reports suggest the Prism program, not the phone records, helped solve the case.)
How much information, and from whom, is the government sweeping up through Prism?
It’s not clear.
Intelligence director Clapper said in his declassified description that the government can’t get information using Prism unless there is an “appropriate, and documented, foreign intelligence purpose for the acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear proliferation) and the foreign target is reasonably believed to be outside the United States.”
One thing we don’t know is how the government determines who is a “foreign target.” The Washington Post reported that NSA analysts use “search terms” to try to achieve “51 percent confidence” in a target’s “foreignness.” How do they do that? Unclear.
We’ve also never seen a court order related to Prism — they are secret — so we don’t know how broad they are. The Post reported that the court orders can be sweeping, and apply for up to a year. Though Google has maintained it has not “received blanket orders of the kind being discussed in the media.”
So, how does Prism work?
In his statement Saturday, Clapper described Prism as a computer system that allows the government to collect “foreign intelligence information from electronic communication service providers under court supervision.”
That much seems clear. But the exact role of the tech companies is still murky.
Relying on a leaked PowerPoint presentation, the Washington Post originally described Prism as an FBI and NSA program to tap “directly into the central servers” of nine tech companies including Google and Facebook. Some of the companies denied giving the government “direct access” to their servers. In a later story, published Saturday, the newspaper cited unnamed intelligence sources saying that the description from the PowerPoint was technically inaccurate.
The Post quotes a classified NSA report saying that Prism allows “collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,” not the company servers themselves. So what does any of that mean? We don’t know.
For more on mass surveillance in America, read our timeline of loosening laws and practices.
Related articles
- Why Did Edward Snowden Go to Hong Kong?
- NSA Document Leak Proves Conspiracy To Create Big Brother Style World Control System
- DOJ launches criminal probe of NSA leaker
- US security officials said NSA leaker, journalist should be ‘disappeared’ – report
- Government Spying: Should We Be Shocked?
- Boundless Informant: NSA’s complex tool for classifying global intelligence
- The NSA’s Favorite Weasel Word To Pretend It’s Claiming It Doesn’t Spy On Americans
- The “Congress knew” defense
- NSA memo pushed to ‘rethink’ 4th Amendment
NSA Document Leak Proves Conspiracy To Create Big Brother Style World Control System
By Lee Rogers | Blacklisted News | June 10, 2013
The Obama regime which was already in the midst of three high profile scandals now has a fourth one to deal with. Top secret documents were recently leaked to the Washington Post and the London Guardian detailing a vast government surveillance program code named PRISM. According to the leaked documents, the program allows the National Security Agency (NSA) back door access to data from the servers of several leading U.S. based Internet and software companies. The documents list companies such as Google, Facebook, Yahoo, Microsoft, AOL and Apple as some of the participants in the program. There have also been other reports indicating that the NSA is able to access real-time user data from as many as 50 separate American companies. Under the program, the NSA is able to collect information ranging from e-mails, chats, videos, photographs, VoIP calls and more. Most importantly is the fact that PRISM allows the NSA to obtain this data without having to make individual requests from the service providers or without having to obtain a court order. To say that this is a violation of the Fourth Amendment which forbids unreasonable searches and seizures would be a gross understatement. This is actually much more than that. This is a program designed specifically to serve as a Big Brother like control grid and to end privacy as we know it.
In some ways this is not really a new story. This is just confirmation of what many people involved in the alternative research community have known for years. Going as far back as the 1990s there were reports revealing how Microsoft provided the NSA with back door access to their Windows operating system. Google’s cozy relationship with the NSA has also been discussed off and on over the past decade. There have even been other whistleblowers that have come forward previously detailing a number of unconstitutional and unlawful abuses conducted by the agency. This includes revelations of how the NSA was spying on American service members stationed overseas. The only difference with this is that these newly leaked documents provide definitive details on just how wide reaching the NSA’s activities have become.
It is now painfully obvious that James Clapper the Director of National Intelligence when testifying before the Senate this past March blatantly lied when asked by Senator Ron Wyden if the NSA was involved in collecting data from the American people. Clapper flatly denied that the NSA was engaged in these types of domestic surveillance activities. What makes the situation such a joke is that the Obama regime is not focused on the fact that Clapper lied to the Senate which in of itself is unlawful. Instead they have been more focused on determining the source of the leak that exposed these broad abuses of power. This is probably not surprising considering that this is a regime that rewards corruption by promoting people involved in all sorts of questionable activity. The promotion of Susan Rice as Obama’s new National Security Advisor is a perfect example of this considering her involvement in spreading bogus Benghazi related talking points. On the other hand, the Obama regime has severely punished a variety of whistleblowers who have dared to expose any wrong doing.
At least the Obama regime won’t have to spend much time and energy trying to identify the whistleblower as this person who leaked these documents has already come forward publically. At his own request the Guardian revealed his identity as Edward Snowden a 29-year old Information Technology specialist who has been working at the NSA for different contractors including Booz Allen Hamilton and Dell. Snowden had previously worked at an NSA office in Hawaii but boarded a flight to Hong Kong a few weeks ago where he has stayed since turning over these documents to the media. He expects that he will never set foot on U.S. soil again and may possibly seek political asylum in a country like Iceland. The Guardian interviewed Snowden over several days and has recently posted an interview transcript that provides more detail on the abuses he became aware of and why he decided to come forward as a whistleblower. In the interview Snowden confirms that the NSA has the infrastructure that allows them to intercept almost any type of data that you can imagine from phone records, e-mails to credit cards. He also reveals how the U.S. government is engaged in hacking systems everywhere around the world and how the NSA has consistently lied to Congress about their activities. There is little doubt that Snowden is thus far one of the most important whistleblowers to come along in the 21st century and he will likely face retaliation considering the vast reach and capabilities of the U.S. intelligence community.
Many individuals within the Obama regime including Obama himself have claimed that this type of widespread data collection is needed to fight terrorism and is used for national security purposes. Even if we were to assume that the war on terror is real, this claim is ridiculous and absurd on its face. It would be one thing if they were collecting information based upon a specific criteria identified by legitimate human intelligence. Instead they are collecting indiscriminate amounts of information which makes it much more difficult to analyze and target anything that might indicate a potential threat. If the NSA’s goal is really to detect and target terrorism then all they are doing is making their job more difficult by vastly increasing the noise they have to filter through. Either the people running the NSA are incredibly stupid or the goal of this program is to establish the infrastructure necessary to centrally collect data from communications everywhere around the world.
Other evidence to support this notion is the fact that the NSA is building a huge new facility in Utah that is being designed to store an enormous amount of data. A Fox News report indicates that, when completed, the facility will be able to store billions of terabytes worth of information. It is hard to fathom how the NSA would need this much storage space unless it was being used to collect and store any and all communications.
The Obama regime has tried to justify all of this by saying that PRISM helped stop an alleged New York City subway bomb plot back in 2009. This has been proven to be factually incorrect as regular police work and help from the British were larger factors in stopping the plot. This is assuming you even believe the official story of this terror plot to begin with. The government and more specifically the FBI have manufactured so many fake terror plots that it is difficult to determine fact from fiction at this point. So with this said, there is really no proof that PRISM has even helped to stop any so-called terror plot. They are collecting information simply for the sake of collecting information with no probable cause or reasonable justification.
At this point it is an undeniable fact that the NSA has been illegally collecting information on the American people. For years what has been dismissed as conspiracy theory is now without question a conspiracy fact. It is laughable that Obama and his assorted cronies are even trying to defend this program as a useful tool to fight terrorists. It is more likely that this program is being used to help find people domestically who dislike the government and would potentially fight back against it. A striking similarity to what is depicted in George Orwell’s dystopic novel 1984 where political dissidents are identified as thought criminals. A tool the NSA uses called Boundless Informant which counts and categorizes the information they collect shows that more data is actually gathered from domestic sources in the U.S. than from Russia. So based on this one could argue that the NSA almost seems to view the American people as more of a threat to national security than the Russians.
The three scandals the Obama regime was dealing with prior to this new scandal are all grounds for impeachment and one could easily argue that this one is many times worse than the previous three. Obama should resign in disgrace but being that he’s a narcissist who seems unwilling to admit making any mistakes it is highly doubtful he will do this. Obama and the rest of the useful idiots in his regime who have tried to defend and justify this and other criminal programs need to be … removed from office and put on trial. The criminal activity from the Obama regime is so vastly transparent it has become a complete and total joke to anyone who is even remotely paying attention.
Related articles
- The NSA Black Hole: 5 Basic Things We Still Don’t Know About the Agency’s Snooping
- Why Did Edward Snowden Go to Hong Kong?
- DOJ launches criminal probe of NSA leaker
- US security officials said NSA leaker, journalist should be ‘disappeared’ – report
- Government Spying: Should We Be Shocked?
- Boundless Informant: NSA’s complex tool for classifying global intelligence
- The NSA’s Favorite Weasel Word To Pretend It’s Claiming It Doesn’t Spy On Americans
- The “Congress knew” defense
- NSA memo pushed to ‘rethink’ 4th Amendment
Venezuela arrests Colombian paramilitaries plotting instability
Xinhua | June 10, 2013
CARACAS — Venezuelan authorities have detained two groups of Colombian paramilitary members allegedly plotting against Venezuela’s government, Venezuela’s Minister of the Interior, Justice and Peace Miguel Rodriguez Torres said Monday.
“These two groups that were captured in our territory belong to two well-known Colombian paramilitary gangs. In fact, one of the groups belongs to ‘El Chepe Barrera’s’ gang, one of the most wanted criminals in Colombia,” Rodriguez said at a press conference in Caracas.
The first group, which included six people, was captured in Venezuela’s southwest Tachira state, along the border with Colombia, and their arms were confiscated.
The second three-member group of paramilitaries, who also carried arms, were captured in Guanare in western Portugesa state.
They were also carrying a black box, such as the ones used to record flight information and aeronautical data, and a box with aviation tools, “which are being analyzed by experts to determine what type of airplane we’re talking about,” said Rodriguez.
After questioning, it became clear both groups were linked and headed to Caracas, Rodriguez said.
“They planned to travel to the capital of the country to accomplish a mission that would be assigned them once they were in Caracas,” said Rodriguez.
Rodriguez said the detained revealed the existence of a third armed group, “with weapons for sharpshooters” and other long-range arms, which may already be in Caracas as part of a plot to destabilize the country.
“All of this may be part of a plan that is being orchestrated from Colombia against the life of our president (Nicolas Maduro) and against the stability of the Bolivarian government,” Rodriguez said.
Venezuelan opposition groups may be involved in the plots, said the minister, adding the country’s intelligence units are on alert to capture the third paramilitary group.
Following the announcement, Maduro congratulated the Bolivarian Intelligence Service (Sebin) via Twitter and blamed the opposition for the presence in Venezuela of the paramilitary groups.
“I congratulate Sebin for its work in defense of the peace; these violent groups are the armed wing that carries out the plan of the fascist right,” said Maduro, adding that neighboring Colombia is being used to conspire against Venezuela.
Related article
US agents in massive sex, drug cover-up
Press TV – June 11, 2013
The US State Department may have hushed up allegations of misconduct by its employees worldwide that range from soliciting prostitutes to getting narcotics from a drug ring, a report says.
The CBS News uncovered on Monday a memo that showed the department’s security force, the Diplomatic Security Service (DSS), tried to cover up sex and drugs charges against agents and diplomats working for the State Department.
The DSS is responsible for protecting nearly 70,000 employees at the State Department and 275 US embassies around the world.
The memo by the State Department inspector general made direct reference to eight specific cases in which inquiries into alleged criminal activities by diplomatic security agents or contractors were “influenced, manipulated, or simply called off” by more senior officials.
The cases included an unnamed US ambassador who repeatedly solicited prostitutes, a security official “engaged in sexual assaults” on foreign nationals hired as embassy guards in Beirut, and the members of former Secretary of State Hillary Clinton’s security team who “engaged prostitutes while on official trips in foreign countries.”
The ambassador involved in the case was called to Washington D. C. to have a meeting with Undersecretary of State for Management Patrick Kennedy about the issue but was permitted to go back to his regular duties, the report said.
The document also revealed details of an alleged “underground drug ring” close to the US embassy in the Iraqi capital Baghdad, which provided the DSS staffers with drugs.
State Department spokeswoman Jen Psaki on Monday did not deny any of the allegations in the CBS report, but refused to go into details.
“We take allegations of misconduct seriously and we investigate thoroughly. All cases mentioned in the CBS report were thoroughly investigated or are under investigation,” she said.