Aletho News

ΑΛΗΘΩΣ

The advantages of knowing everything

Xymphora | June 16, 2013

Here we go:  “NSA admits listening to U.S. phone calls without warrants”:

“A requirement of the 2008 law is that the NSA “may not intentionally target any person known at the time of acquisition to be located in the United States.” A possible interpretation of that language, some legal experts said, is that the agency may vacuum up everything it can domestically — on the theory that indiscriminate data acquisition was not intended to “target” a specific American citizen.”

Gathering everything is OK.  Also:

“Director of National Intelligence Michael McConnell indicated during a House Intelligence hearing in 2007 that the NSA’s surveillance process involves “billions” of bulk communications being intercepted, analyzed, and incorporated into a database.
They can be accessed by an analyst who’s part of the NSA’s “workforce of thousands of people” who are “trained” annually in minimization procedures, he said. (McConnell, who had previously worked as the director of the NSA, is now vice chairman at Booz Allen Hamilton, Snowden’s former employer.)”

As far as the NSA is concerned, gathering everything without warrants is legally permitted, and once they have it, NSA analysts who are ‘trained’ to NSA standards are legally allowed to listen to whatever they want.  Gathering everything is actually better than getting a FISA warrant for a particular target.

PRISM is going to take over the entire discussion, and, lo and behold, it is not that bad.  Get  a few more keys for the ‘lockbox’, and all will be deemed to be well.

The three big questions concerning Total Information Awareness are:

  1. economic – can we pay to store all this information?;
  2. technical – can we develop search engines that will allow us to handle all this information without becoming paralyzed by the sheer volume of it (remember that Simon’s big straw man was the ridiculousness of having FBI agents listen to all the conversations!!!), the traditional problem with totalitarian states?; and
  3. legal – in a country with constitutional protections for basic liberties, how is any of this allowed?

The NSA believes it has an answer to the first two of these problems, and just needs to fool Americans into believing that the presence of those scary Moooooooslims under their beds justifies a bit of bending of the constitution to finesse the legal problem.  Some tinkering will be done to PRISM, and everybody will go back to sleep.

The final step will be to continue to expand the exploitation of the information as a method of social control using blackmail or something like blackmail – even the awareness that there is information out there that could be used for blackmail will start to influence behavior, particularly repressing any kind of political protest (not that there is much of that anyway) – and to use the insider information to siphon up whatever wealth is not yet in the hands of the 1% (it is a fun fact that Booz Allen is owned by the Carlyle Group).

June 16, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance | , , , , , , , | 1 Comment

The Deeper Meaning of Mass Spying in America

By James Petras | June 14, 2013

The exposure of the Obama regime’s use of the National Security Agency to secretly spy on the communications of hundreds of millions of US and overseas citizens has provoked world-wide denunciations. In the United States, despite widespread mass media coverage and the opposition of civil liberties organizations, there has not been any mass protest. Congressional leaders from both the Republican and Democratic Parties, as well as top judges, approved of the unprecedented domestic spy program. Even worse, when the pervasive spy operations were revealed, top Senate and Congressional leaders repeated their endorsement of each and every intrusion into all electronic and written communication involving American citizens. President Obama and his Attorney General Holder openly and forcefully defended the NSA’s the universal spy operations.

The issues raised by this vast secret police apparatus and its penetration into and control over civil society, infringing on the citizens freedom of expression, go far beyond mere ‘violations of privacy’, as raised by many legal experts.

Most civil libertarians focus on the violations of individual rights, constitutional guarantees and the citizen’s privacy rights. These are important legal issues and the critics are right in raising them. However, these constitutional–legal critiques do not go far enough; they fail to raise even more fundamental issues; they avoid basic political questions.

Why has such a massive police-state apparatus and universal spying become so central to the ruling regime? Why has the entire executive, legislative and judicial leadership come out in public for such a blatant repudiation of all constitutional guarantees? Why do elected leaders defend universal political espionage against the citizenry? What kind of politics requires a police state? What kind of long-term, large scale domestic and foreign policies are illegal and unconstitutional as to require the building of a vast network of domestic spies and a hundred billion dollar corporate-state techno-espionage infrastructure in a time of budget ‘austerity’ with the slashing of social programs?

The second set of questions arises from the use of the espionage data. So far most critics have questioned the existence of massive state espionage but have avoided the vital issue of what measures are taken by the spymasters once they target individuals, groups, movements? The essential question is: What reprisals and sanctions follow from the ‘information’ that is collected, classified and made operational by these massive domestic spy networks? Now that the ‘secret’ of all-encompassing, state political spying has entered public discussion, the next step should be to reveal the secret operations that follow against those targeted by the spymasters as a ‘risk to national security’.

The Politics behind the Police State

The fundamental reason for the conversion of the state into a gigantic spy apparatus is the nature of deeply destructive domestic and foreign policies which the government has so forcefully pursued. The vast expansion of the police state apparatus is not a response to the terror attack of 9/11. The geometrical growth of spies, secret police budgets, and the vast intrusion into all citizen communications coincides with the wars across the globe. The decisions to militarize US global policy requires vast budgetary re-allocation , slashing social spending to fund empire-building; shredding public health and social security to bailout Wall Street. These are policies which greatly enhance profits for bankers and corporations while imposing regressive taxes on wage and salaried workers

Prolonged and extended wars abroad have been funded at the expense of citizens’ welfare at home. This policy had led to declining living standards for many tens of millions of citizens and rising dissatisfaction. The potential of social resistance as evidenced by the brief “Occupy Wall Street” movement which was endorsed by over 80% of the population. The positive response alarmed the state and led to an escalation of police state measures. Mass spying is designed to identify the citizens who oppose both imperial wars and the destruction of domestic welfare; labeling them as ‘security threats’ is a means of controlling them through the use of arbitrary police powers. The expansion of the President’s war powers has been accompanied by the growth and scope of the state spy apparatus: the more the President orders overseas drone attacks, the greater the number of his military interventions, the greater the need for the political elite surrounding the President to increase its policing of citizens in anticipation of a popular backlash. In this context, the policy of mass spying is taken as ‘pre-emptive action’. The greater the police state operations, the greater the fear and insecurity among dissident citizens and activists.

The assault on the living standards of working and middle class Americans in order to fund the endless series of wars, and not the so-called ‘war on terror’, is the reason the state has developed massive cyber warfare against the US citizenry. The issue is not only a question of a violation of individual privacy: it is fundamentally an issue of state infringement of the collective rights of organized citizens to freely engage in public opposition to regressive socio-economic policies and question the empire. The proliferation of permanent bureaucratic institutions, with over a million security ‘data collectors’, is accompanied by tens of thousands of ‘field operators’, analysts and inquisitors acting arbitrarily to designate dissident citizens as ‘security risks’ and imposing reprisals according to the political needs of their ruling political bosses. The police state apparatus has its own rules of self-protection and self-perpetuation; it has its own linkages and may occasionally compete with the Pentagon. The police state links up with and protects the masters of Wall Street and the propagandists of the mass media – even as it (must) spy on them!

The police state is an instrument of the Executive Branch acting as a vehicle for its arbitrary prerogative powers. However on administrative matters, it possesses a degree of ‘autonomy’ to target dissident behavior. What is clear is the high degree of cohesion, vertical discipline and mutual defense, up and down the hierarchy. The fact that one whistle-blower, Edward Snowden, emerged from the hundreds of thousands of citizen spies is the exception, the lone whistle blower, which proves the rule: There are fewer defectors to be found among the million-member US spy network than in all the Mafia families in Europe and North America.

The domestic spy apparatus operates with impunity because of its network of powerful domestic and overseas allies. The entire bi-partisan Congressional leadership is privy to and complicit with its operations. Related branches of government, like the Internal Revenue Service, cooperate in providing information and pursuing targeted political groups and individuals. Israel is a key overseas ally of the National Security Agency, as has been documented in the Israeli press (Haaretz, June 8, 2013). Two Israeli high tech firms (Verint and Narus) with ties to the Israeli secret police (MOSSAD), have provided the spy software for the NSA and this, of course, has opened a window for Israeli spying in the US against Americans opposed to the Zionist state. The writer and critic, Steve Lendman points out that Israeli spymasters via their software “front companies” have long had the ability to ‘steal proprietary commercial and industrial data” with impunity. Because of the power and influence of the Presidents of the 52 Major American Jewish organizations, Justice Department officials have ordered dozens of Israeli espionage cases to be dropped. The tight Israeli ties to the US spy apparatus serves to prevent deeper scrutiny into its operation and political goals — at a very high price in terms of the security of US citizens. In recent years two incidents stand out: Israeli security ‘experts’ were contracted to advise the Pennsylvania Department of Homeland Security in their investigation and ‘Stasi-like’ repression of government critics and environmental activists (compared to ‘al Queda terrorists’ by the Israelis) – the discovery of which forced the resignation of OHS Director James Powers in 2010. In 2003, New Jersey governor, Jim McGreevy appointed his lover, an Israeli government operative and former IDF officer, to head that state’s ‘Homeland Security Department and later resigned, denouncing the Israeli, Golan Cipel, for blackmail in late 2004. These examples are a small sample illustrating the depth and scope of Israeli police state tactics intersecting in US domestic repression.

The Political and Economic Consequences of the Spy State

The denunciations of the mass spy operations are a positive step, as far as they go. But equally important is the question of what follows from the act of spying? We now know that hundreds of millions of Americans are being spied on by the state. We know that mass spying is official policy of the Executive and is approved by Congressional leaders. But we have only fragmented information on the repressive measures resulting from the investigations of “suspect individuals”. We can assume that there is a division of labor among data collectors, data analysts and field operatives following up “risky individuals and groups”, based on the internal criteria known only to the secret police. The key spy operatives are those who devise and apply the criteria for designating someone as a “security risk”. Individuals and groups who express critical views of domestic and foreign policy are “a risk”; those who act to protest are a “higher risk”; those who travel to conflict regions are presumed to be in the “highest risk” category, even if they have violated no law. The question of the lawfulness of a citizen’s views and actions does not enter into the spymasters’ equation; nor do any questions regarding the lawfulness of the acts committed by the spies against citizens. The criteria defining a security risk supersede any constitutional considerations and safeguards.

We know from a large number of published cases that lawful critics, illegally spied upon, have subsequently been arrested, tried and jailed – their lives and those of their friends and family members shattered. We know that hundreds of homes, workplaces and offices of suspects have been raided in ‘fishing expeditions’. We know that family members, associates, neighbors, clients, and employers of “suspects” have been interrogated, pressured and intimidated. Above all, we know that tens of millions of law abiding citizens, critical of domestic economic and overseas war policies, have been censored by the very real fear of the massive operations carried out by the police state. In this atmosphere of intimidation, any critical conversation or word spoken in any context or relayed via the media can be interpreted by nameless, faceless spies as a “security threat” – and one’s name can enter into the ever growing secret lists of “potential terrorists”. The very presence and dimensions of the police state is intimidating. There are citizens who would claim that the police state is necessary to protect them from terrorists – but how many others feel compelled to embrace their state terrorists just to fend off any suspicion, hoping to stay off the growing lists? How many critical-minded Americans now fear the state and will never voice in public what they whisper at home?

The bigger the secret police, the greater its operations. The more regressive domestic economic policy, the greater the fear and loathing of the political elite.

Even as President Obama and his Democratic and Republican partners boast and bluster about their police state and its effective “security function”, the vast majority of Americans are becoming aware that fear instilled at home serves the interest of waging imperial wars abroad; that cowardice in the face of police state threats only encourages further cuts in their living standards. When will they learn that exposing spying is only the beginning of a solution? When will they recognize that ending the police state is essential to dismantling the costly empire and creating a safe, secure and prosperous America?

June 15, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Militarism, Solidarity and Activism | , , , , , , , | Leave a comment

Leaked: NSA’s Talking Points Defending NSA Surveillance

By Mike Masnick | techdirt | June 14, 2013

The government has been passing around some “talking points” to politicians and the press trying to spin the NSA surveillance story. We’ve got the talking points about scooping up business records (i.e., all data on all phone calls) and on the internet program known as PRISM. Both are embedded below. Let’s dig in on a few of the points, starting with the business records/FISA issue:

The news articles have been discussing what purports to be a classified, lawfully-authorized order that the Foreign Intelligence Surveillance Court (FISA Court) issued under an Act of Congress – the Foreign Intelligence Surveillance Act (FISA). Under this Act, the FISA Court authorized a collection of business records. There is no secret program involved here – it is strictly authorized by a U.S. statute.

“There is no secret program here”? Bullshit. Why, then, have so many people, both in the Congress and the public been shocked at the extent to which the NSA is snarfing up data? This is a secret program, enabled by a secret interpretation of the FISA Amendments Act, by the FISA Court, which the DOJ and the NSA insist the public is not allowed to know. Yes, it’s a secret program. Saying otherwise is simply lying.

It authorizes only metadata collection, which includes barebones records – such as a telephone number or the length of a call.

“Barebones records” and “metadata” are terms being used to play down the extent of the collection of info, but it ignores multiple reports that note the amount of data actually collected — including phone numbers, call times, call location, among other things — is more than enough to identify who someone is and a variety of important characteristics about that person.

This legal tool, as enacted by Congress, has been critical in protecting America. It has been essential in thwarting at least one major terrorist attack to our country in the past few years.

“At least one” is a lot less than the “dozens” NSA boss Keith Alexander recently stated. But, so far the only “one” identified, involving an attempted NYC Subway bombing was shown not to have needed this data collection program to uncover and stop. So, nope.

Despite what appears to be a broad scope in the FISA Court’s order, the Intelligence Community uses only a small fraction of a percent of the business records collected to pursue terrorism subjects.

This is meaningless. That’s like saying, even though we search everyone’s house illegally, we only actually arrest a small number of people. No one would allow such house searches under the 4th Amendment, so why is it okay with phone records?

All three branches – Congress, the Courts, and the Executive Branch – review and sign off on FISA collection authorities. Congress passed FISA, and the Intelligence Committees are regularly and fully briefed on how it is used.

Except many in Congress have made it clear they did not review this kind of program, or were led to believe that the NSA did not collect this kind of information. And those who are being briefed now say the program goes way beyond what they were told. And, those who did know about it beforehand, tried to dig deeper into the program, but were blocked. As for “the Courts” reviewing it, we’re talking about the FISA Court which is a rubberstamp in black robes, having approved every single request of it for the past three years. It last rejected a request back in 2009, and that was only one out of 1320. In its entire history, since 1979, the court has rejected a grand total of 11 applications. 11. Out of 33,939 applications. That’s 0.03%. Not 3%. 0.03% with not a single rejection in over three years. That’s not careful review. That’s a rubber stamp. As for the executive branch signing off on it, what do you expect? They’re going to hold back their own ability to spy on people?

The FISA Court authorizes intelligence collection only after the Intelligence Community has proven its case, based on underlying facts and investigations.

Well, we already covered the rubber stamp issue above, but Section 215 of the Patriot Act requires that the government present a case that the data it is seeking “must be relevant to an authorized preliminary or full investigation to obtain foreign intelligence information not concerning a U.S. person or to protect against international terrorism or clandestine intelligence activities.” I’d love to see the argument that all data is somehow relevant to the investigation. Of course, I can’t see it, because it’s secret.

This legal tool has been reauthorized only after ongoing 90-day renewal periods. That means that every 90 days, the Department of Justice and the FBI must prove to the Foreign Intelligence Surveillance Court that they have the facts and legal basis to renew this legal authority. It is not a rubber stamp.

Ha ha ha. So, we violate your privacy without any opposing view — but we do it every 90 days for seven straight years.

FISA-authorized collections are subject to strict controls and procedures under oversight of the Department of Justice, the Office of the Director of National Intelligence and the FISA Court, to ensure that they comply with the Constitution and laws of the United States and appropriately protect privacy and civil liberties.

What kind of “strict controls and procedures” allow for the collection of every single record of every single phone call, and then also make it accessible to the 29-year-old IT guy in Hawaii? Just wondering…

Moving on to the “NSA internet talking points.”

Section 702 is a vital legal tool that Congress reauthorized in December 2012, as part of the FISA Amendments Act Reauthorization Act, after extensive hearings and debate. Under Section 702, the Foreign Intelligence Surveillance Court (FISA Court) certifies foreign intelligence collection. There is no secret program involved – it is strictly authorized by a U.S. statute.

Again, “no secret program,” merely a secret interpretation of the law, in a secret ruling by a secret court. What’s everyone complaining about?

Section 702 cannot be used to target any U.S. person. Section 702 also cannot be used to target any person located in the United States, whether that person is an American or a foreigner.

Note the careful choice of words: it cannot be used to target a person in the US. It can, however, be used to collect info on a person in the US if they’re not “the target” of the investigation. Fun with words!

The unauthorized disclosure of information about this critical legal tool puts our national security in grave danger, puts Americans at risk of terrorist and cyber attacks, and puts our military intelligence resources in danger of being revealed to our adversaries.

Right. So this is not a new program, it’s no surprise, people shouldn’t be concerned… and now that you know about it we’re all going to die!

How does anyone take these jokers seriously?

June 15, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Mainstream Media, Warmongering | , , , , , , | Leave a comment

Foreign Surveillance Post-9/11: A History of Privacy Erosion

By Katitza Rodriguez, Mark Rumold and Tamir Israel | EFF | June 15, 2013

In order to fully appreciate how the revelations of this past week will impact non-Americans based outside of the United States, a little background on the legal framework on how the U.S. foreign intelligence apparatus operates is helpful. The centerpiece of this framework is the Foreign Intelligence Surveillance Act (FISA), enacted in the late 70s. Historically, relying on a national security exception contained in the Wiretap Act, the United States government considered it had no obligation to obtain authorization from a court before intercepting communications for the purpose of national security. This changed in 1972, when the Supreme Court of the United States first held that the Fourth Amendment warrant requirement does apply to surveillance carried out in the name of national security – at least with respect to domestic threats:

Security surveillance is especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillance to oversee political dissent. We recognize, as we have before, the constitutional basis of the President’s domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure.

These words of caution rang true when it was later revealed that the Government’s unauthorized intelligence-gathering activities had included extensive surveillance of journalists, anti-war protestors, dissident groups and even political opponents. The congressional hearings that followed, called the Church Committee, led to what was perhaps the first comprehensive public look at the activities of the National Security Agency–a clandestine intelligence entity that had been colloquially dubbed “No Such Agency” to reflect its unique ability to defy any attempt to document or oversee its activities. Against this backdrop, FISA was passed specifically for the purpose of limiting foreign intelligence activities from being directed at U.S. persons.

While FISA was always generous in the powers it granted U.S. government agencies with respect to the surveillance of foreign agents, a series of amendments beginning with the USA PATRIOT Act and culminating with the FISA Amendment Act, 2008, transformed FISA into the vehicle for mass surveillance it is today. Notably, these amendments, as the U.S. government ultimately interpreted them:

  • (a) provided a broader set of powers under which various digital service providers were compelled to assist U.S. foreign intelligence agencies in their activities;
  • (b) removed the need for intelligence agencies to direct their activities at ‘foreign powers’ or ‘agents of foreign powers’ by making any non-U.S. person the legitimate focus of surveillance; and
  • (c) applied these extra-ordinary powers to a broader set of circumstances by removing the obligation to ensure ‘foreign intelligence’ is a primary objective for their use.

These amendments furnished the United States government with at least two powerful secret legal surveillance powers that have apparently been used by the NSA to conduct broad surveillance of both U.S. and non-U.S. persons:

  • a business records power (section 215 of the USA PATRIOT Act, codified as 50 USC §1861) under which the U.S. Government can compel production of ‘any tangible thing’ reasonably believed to be relevant to an authorized investigation conducted for the purpose of obtaining foreign intelligence. The government has now confirmed that it has secretly interpreted ‘any tangible thing’ to include ”all call detail records”, and its telephone metadata surveillance program is based on this power; and
  • a new general acquisition and interception power (section 702 of FISA, codified as 50 USC §1881a) that allows U.S. government agencies to compel access –possibly in real-time – to information from a diverse range of communications and data processing services. This second power has played a central role in populating the PRISM program.

Lots of problems surround the breadth of these powers and the secretive manner by which they have been interpreted. Very few substantive limits are placed on these powers. To make matters worse, these powers are interpreted secretly and are highly and effectively insulated from any adversarial challenge. This permits the government to adopt the most favourable interpretations it can devise, as has been shown in other contexts. The secret and non-adversarial context in which these interpretations are occurring is particularly problematic given the challenges inherent in applying privacy protections to technologically advanced state surveillance techniques.

Of the few existing internal limits FISA places on its powers, most relate to the need to limit exposure of U.S. persons. The only substantive protections that do not relate to this objective include a loose obligation that the powers be employed for foreign intelligence purposes, compatibility with the Fourth Amendment and the fact that both powers are subject to some limited, but highly secretive Judicial and Congressional review. None of these safeguards is highly reassuring, particularly to non-U.S. persons.

Safeguards primarily designed to limit exposure of U.S. persons

To the extent there are limitations placed on these two FISA powers, they are primarily designed to limit the exposure of U.S. persons. The business records power, for example, cannot be directed at U.S. persons solely on the basis of activities protected by the First Amendment. The general acquisition power can only be directed at persons reasonably believed to be located outside the United States and reasonably believed to be non-U.S. persons. A recent leak, however, suggests that the United States Government has secretly interpreted this to require only 51% assurance of foreignness.

The general acquisition power is also subject to general minimization (§1801 (h)) and targeting (§1881a (i)(2)(B)) procedures, which must be approved by FISC. The sole objective of these requirements is to minimize the targeting, collection and retention of private information of U.S. persons. Of course, it remains secret how the specific techniques adopted seek to achieve this. The business records power also includes minimization procedures, but these only relate to minimizing the retention and dissemination of non-public information concerning U.S. persons, not, apparently, its collection (§1861 (g)(2)).

It has become clear over the past several days that the Government and FISC have secretly interpreted these various safeguards in a woefully inadequate manner that fails to achieve even the basic requirement of insulating U.S. persons from their reach. Non-U.S. persons, however, will probably be most concerned by the fact that nothing in FISA or elsewhere in U.S. law seems to effectively limit the extent to which their own online activities are being surveiled.

Next in our Spies Without Borders series, we will examine how the few protections FISA offers to individuals outside the United States provide little or no protection under US law.

June 15, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Progressive Hypocrite, Timeless or most popular | , , , , , , | Leave a comment

We could use more rebels

By Charles Davis | false dichotomy | June 13, 2013
What should you do if you uncover wrongdoing and the people responsible are the same ones who are supposed to investigate it? The way our politicians and elite media figures talk, you would think there’s something honorable about tipping them off (or shutting your mouth). In the political arena, the bold person of conscience – the rebel, the maverick, the damn-the-costs truth-teller – is the bad guy, not the action hero; the company man is played by Bruce Willis.

When Edward Snowden gave up a lucrative career in an island paradise to blow the whistle about the US government’s staggeringly broad spying operations – revealing what thousands of others with access to the same information wouldn’t – he was going up against a system that values loyalty to those who sign your paychecks over loyalty to principle or the public. A columnist for The New York Times, which is very much a part of that system, denounced him in terms one would think would be reserved for our leaders, declaring that Snowden had “betrayed the Constitution” and “the privacy of us all” by leaking evidence of the Obama administration doing just that.

 
Snowden need not be the world’s greatest human being for us to recognize the courage it took to do what he did. When compliance with a system makes one an accomplice to wrongdoing, there’s no virtue in being compliant. There’s no virtue in abiding by the “honor codes of all those who enabled [one] to rise,” as the Times columnist put it, when that code doesn’t respect the rights of everyone else. We recognize that when we go to the movies. Maybe we should stop condemning it in real life?
 
Instead of getting caught up in media attempts to pathologize a whistle-blower, we should also probably look more closely at what the whistle was blown on, because what Snowden revealed should be concerning, even if you don’t have relatives in Yemen.
This Matters
 
According to leaked classified documents, the US National Security Agency (NSA) is collecting data on nearly every call made by nearly every American, from the time it was placed, who was called and from where it originated. The NSA also has relationships with nearly every major Internet company, from Facebook to Google, granting the agency streamlined access to your user history. Everything you email or post to your wall could end up on an NSA server somewhere. That’s a lot of data, which is why the agency is building a 1.5 million square feet server farm in Utah to hold it, at a cost of $1.2 billion.
 
The Obama administration claims the information it belatedly admits it collects is only later accessed with a court order. But then, those court orders are classified, granted by judges in a secret court in front of which only the government can appear. Meanwhile, the White House has refused to release its legal rationale for the spying program, which senators from the president’s own party suggest is both illegal and unnecessary. It has, however, publicly credited the program with breaking up terrorist plots, though those claims – like its earlier denials that the spying program existed – have proven false.
 
But while it’s intrusive, sure, if you have nothing to hide, you have nothing to fear, right? Well, no. Even if you don’t have grandparents in Yemen, you should be concerned about any agency – that is, a collection of fallible human beings – that claims the right and has the power to know pretty much everything you’ve ever done on your iPhone. Go ahead and assume the best motives on the part of those in power, just don’t forget that even the most honorable people have ex-lovers too. Even saints can be seduced by power.
 
Most spooks aren’t saints, either. They’re like us: fallen. And what would you do if you were invisible? For some NSA employees, listening to your phone calls is the equivalent of sneaking into the locker room, several of them telling ABC News that the agency routinely eavesdrops on the phone calls of Americans abroad as they call friends and family back home.
 
“Hey, check this out,” the agents would tell each other, according to one whistle-blower. “There’s good phone sex or there’s some pillow talk, pull up this call, it’s really funny, go check it out.” Not exactly the model of professionalism one would hope for in someone who has god-like eavesdropping powers.
 
“These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones,” said another military whistleblower. Journalists and aid workers had their communications intercepted on a regular basis.
 
That was a decade ago.
 
It’s Gotten Worse
 
These days, the NSA is now known to be intercepting a much broader range of communication. Revelations to The Guardian show it claims the ability to tap into not just email communication, but live Skype calls. Basically everything you do on the Internet could potentially be viewed by a US government agent. There’s no need for black helicopters when you voluntarily divulge your life secrets with the help of a black box made by Sony. Or a white one by Apple.
 
You should be especially concerned if you have opinions about things going on in our world. When a group of Pennsylvanians began working to stop a natural gas fracking project in their community, they found themselves listed on a state Department of Homeland Security bulletin. “We want to continue providing this support to the Marcellus Shale Formation natural gas stakeholders while not feeding those groups fomenting dissent against those same companies,” the Secretary of Homeland Security, a Democrat, stated in an email.
 
If you oppose corporate America’s destruction of your community, you could end up being lumped in with actual terrorist threats. And once the word “terrorism” is invoked, all bets are off, potentially leading to a government agent, working on behalf of their corporate stakeholders, going through every ill-considered email you ever sent.
 
Sometimes, simply stating one’s political beliefs is enough to grab the state’s attention. In Seattle, the NSA’s partners in surveillance at the FBI tracked a group of young anarchists to a May Day demonstration, not because they were wanted for any crimes, but because they called themselves anarchists.
 
“Although many anarchists are law-abiding,” an FBI agent explained, “there is a history in the Pacific Northwest of some anarchists participating in property destruction and other criminal activity in support of their political philosophy.” And so we track them. And with the surveillance capabilities we have today, it’s not hard to make even the most innocent acts seem sinister, particularly when one has unpopular political beliefs or presents a challenge to corporate or state power.
 
It Could Be You
 
Combined with expansive terrorism laws, that could be a nightmare for those who fall in the arbitrary crosshairs of a government prosecutor looking to make a name for themselves. In 2010, the Supreme Court ruled that humanitarian groups can be convicted of “material support” for terrorism even if that support consists solely of helping seek conflict resolution. As former president Jimmy Carter said at the time, “the vague language of the law leaves us wondering if we will be prosecuted for our work to promote peace and freedom.”
 
Others don’t have to wonder. Since 2010, antiwar activists across the country have been subpoened and forced to testify before grand juries into a “material support” for terrorism investigation that has succeeded in scaring those who do humanitarian work in Palestine and Colombia, but as of yet yielded no convictions. Perhaps our broad spying and terrorism laws are working, just not in the way our leaders tell us. And, as these activists can attest: you don’t need to be convicted of anything to be constantly spied on.
 
As another NSA whistle-blower, William Binney, recently told journalist Amy Goodman, “if you’re doing something that irritates or is against what the government wants to be expressed to the American public, then you can become a target.” It’s as easy as that. And whenever you call a friend, keep in mind that you’re calling every friend your friend has ever called. Are you absolutely sure you have nothing to hide?
 
In Washington, most politicians seem annoyed that you now know this. They wish you didn’t. As Senator Al Franken explained, “Anything that the American people know, the bad guys know so there’s a line here, right?”
 
That’s how those in Washington often view those they claim to represent in our representative democracy: lumped in with the bad guys. Indeed, aiding us in our knowledge of what the government is doing in our name, as Bradley Manning and now Edward Snowden have done, is often likened with aiding the enemy.
 
“I don’t look at this as being a whistle-blower,” Senator Dianne Feinstein said of the NSA leaks. “I think it’s an act of treason.”
 
Feinstein voted for a war in Iraq that she and her husband personally profited from, so she knows a thing or two dozen about treachery. But she’s off base here. The American public is not the enemy, nor should informing them about the things being done to them with their own money be construed as the act of a traitor. Edward Snowden may not be the world’s greatest human being; who reading this has met him? What we do know is that his act did a lot of good by exposing a lot of wrong and took a lot more courage than it takes to criticize him on Capitol Hill. Since they don’t see that very often there, no wonder they mistake it as treason.

June 14, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance, Progressive Hypocrite | , , , , , | 1 Comment

US firms in bed with intelligence agencies in info swap – report

RT | June 14, 2013

Thousands of US tech, finance, and manufacturing firms have secret agreements with national security agencies to trade sensitive information in return for classified intelligence, Bloomberg’s sources revealed.

The firms involved are referred to as ‘trusted partners’ by US intelligence organizations such as the National Security Agency (NSA), Central Intelligence Agency (CIA), the Federal Bureau of Investigation (FBI) and branches of US military.

In fact, thousands of US companies voluntarily provide US agencies with data (i.e. equipment specifications), Bloomberg’s four sources, who either worked for the government or in companies that have these agreements, said. And the information received can be used to gain access to computers of America’s rivals.

Cooperation between companies and intelligence agencies is legal, reported Bloomberg. And the fact that the companies provide information voluntarily means there is no need for US agencies to get court orders and no oversight is required under the Foreign Intelligence Surveillance Act, one out of four sources said.

Also, some of the companies’ executives are guaranteed immunity from civil actions related to transfer of information.

For example, Microsoft passes on information about bugs in its software before it publicly releases a fix to the problem, two sources confirmed. This kind of information can protect US government computers, as well as help to infiltrate those used by foreign governments by exploiting vulnerabilities in the Microsoft’s system.

Microsoft is reportedly not told how the US government uses the information passed on down to it, according to one official. Spokesman for Microsoft Frank Shaw confirmed such releases and stated that they give the government a chance to get “an early start: on risk assessment and mitigation.”

McAfee, America’s global computer security software company, is another ‘trusted partner’ and is known for its cooperation with the NSA, CIA, and FBI. It can share valuable data including malicious internet traffic, one of the sources said.

The company’s worldwide chief technology officer, Michael Fey, rebuffed the claim that the company does not share any personal information with the government.

“McAfee’s function is to provide security technology, education, and threat intelligence to governments … [including] emerging new threats, cyber-attack patterns and hacker group activity,” he stated.

Due to the sensitivity of information being traded, these kinds of agreements are usually made strictly between companies’ chief executive officers and heads of the US agencies. At times the chief executives could clear a few trusted people to work directly with the agencies.

Sharing info: Out of ‘patriotism’ or for ‘classified’ info?

In return for their cooperation, companies are showered with attention and gratitude.

“If I were the director and had a relationship with a company who was doing things that were not just directed by law, but were also valuable to the defense of the Republic, I would go out of my way to thank them and give them a sense as to why this is necessary and useful”, Michael Hayden, former director of the NSA and the CIA said.

One of the sources said that public would be surprised how much help the government is seeking in terms of collecting information. Reportedly, it is currently implementing a new expensive program called Einstein 3. The program was developed by the NSA to protect the government from hackers by analyzing billions of emails being sent to the government computers.

Five of America’s major internet companies, including AT&T and Verizon, have agreed to install the program on their servers and have received immunity guarantees, which specify that they would not be held liable under US wiretap laws, one of the sources revealed.

In the past companies like AT&T, Verizon and BellSouth were already reportedly involved for eavesdropping on behalf of the NSA. In 2006 sources revealed that the companies collected call records of tens of millions of Americans and shared them with NSA.

US companies are willing to participate in these kinds of agreements because they either believe they are helping to protect the nation and/or helping to advance their own interests by receiving classified information in return, sources said.

Google’s co-founder Sergey Brin, for example, was given sensitive government information a year into its data sharing agreement with NSA. The info provided linked the 2010 attack on Google to a specific unit within the Chinese military – the People’s Liberation Army – one of the sources confirmed. Brin was even given a classified clearance to attend a secret briefing on the subject.

Google was reportedly one of the participants in the secret NSA PRISM program that was revealed by ex-CIA staffer and whistleblower Edward Snowden. The program uses data mining surveillance to access emails, videos, chats, photos and search queries from nine worldwide tech giants.

Snowden also disclosed a secret NSA program called Blarney, which gathers metadata on computers and devices that send emails or browse the Internet through principal data routes, known as a backbone.

The whistleblower was last seen Monday, checking out of his hotel in Hong Kong, where he stayed for three weeks after leaving the US.

Snowden is hoping that staying in Hong Kong would help him avoid any extradition attempts on behalf of the US. In terms of the US-Hong Kong Extradition Treaty, both Hong Kong and Beijing have the power to stymie Snowden’s extradition. China for its part has no extradition treaty with the United States.

China has thus far refrained from making statements on the Snowden case. But a popular Chinese Communist Party-backed newspaper has printed an article demonstrating the benefits of not sending Snowden back to US, arguing that his knowledge of US surveillance programs are key to China’s national interest.

The article comes after Snowden resurfaced and gave an exclusive interview to the South China Morning Post, revealing top-secret US government records that show dates and IP addresses of computers in Hong Kong and on the mainland that were hacked by the NSA over a four-year period.

In the meantime, the FBI has launched an investigation into Snowden leaking US top secret surveillance tactics and has promised to hold the whistleblower accountable.

June 14, 2013 Posted by | Civil Liberties, Corruption, Deception, Full Spectrum Dominance, Timeless or most popular | , , , , , , , , , , | Leave a comment

Obama Speaks with Forked Tongue on Surveillance

By Sheldon Richman | FFF | June 11, 2013

It’s bad enough the federal government spies on us. Must it insult our intelligence too?

The government’s response to Edward Snowden’s leaks about the National Security Agency’s secret monitoring of the Internet and collection of our telephone logs is a mass of contradictions. Officials have said the disclosures are (1) old news, (2) grossly inaccurate, and (3) a blow to national security. It’s hard to see how any two of these can be true, much less all three.

Can’t they at least get their story straight? If they can’t do better than that, why should we have confidence in anything else that they do?

Snowden exposed the government’s indiscriminate snooping because, among other things, it violates the Fourth Amendment protection against unreasonable searches and he had no other recourse.

Director of National Intelligence James Clapper says Snowden should have used established channels to raise his concerns, but there are no effective channels. Members of the congressional intelligence committees are prohibited from telling the public what they learn from their briefings. Two members of the Senate committee, Ron Wyden and Mark Udall, for years have warned — without disclosing secrets — that the Obama administration is interpreting the Patriot Act and related laws far more broadly than was ever intended by those who voted for those pieces of legislation. Their warnings have made no difference.

A court challenge wasn’t open to Snowden either. Glenn Greenwald, who published Snowden’s leaks in the Guardian, notes that for years the ACLU has tried to challenge the surveillance programs in court on Fourth Amendment grounds, but the Obama administration has blocked the effort by arguing that the ACLU has no standing to bring the suit. It’s a classic Catch-22. Since the surveillance is secret, no one can know if he has been spied on. But if no one knows, no one can go into court claiming to be a victim, and the government will argue that therefore the plaintiff has no standing to challenge the surveillance. Well played, Obama administration.

The administration should not be allowed to get away with the specious claim that telling its secrets to a few privileged members of Congress is equivalent to informing the people. It is not. It’s merely one branch of government telling some people in another branch. Calling those politicians “our representatives” is highly misleading. In what sense do they actually represent us?

Equally specious is the assertion that the NSA can’t monitor particular people without court authorization. The secret FISA court is a rubber stamp.

When Obama ran for president in 2008, he said Americans shouldn’t have to choose between privacy and security. Now he says that “one of the things that we’re going to have to discuss and debate is how are we striking this balance between the need to keep the American people safe and our concerns about privacy? Because there are some tradeoffs involved.”

What do you take us for, Mr. President? Do you say whatever serves your momentary interest?

It’s outrageous for Obama to say he welcomes this debate — when his regime is plotting to capture and prosecute the heroic whistleblower who made it possible.

The debate would be bogus anyway. No one has a right to make a security/privacy tradeoff for you. Our rights should not be subject to vote, particularly when a ruling elite ultimately will make the decision — out of public view!

Americans have learned nothing from the last 40 years if they have not learned that the executive branch — regardless of party — will interpret any power as broadly as it wishes. Congressional oversight is worse than useless; it’s a myth, especially when one chamber is controlled by the president’s party and the other chamber’s majority embraces big government as long as it carries a “national security” label.

Obama says, “If people can’t trust not only the executive branch but also don’t trust Congress and don’t trust federal judges to make sure that we’re abiding by the Constitution, due process and rule of law, then we’re going to have some problems here.”

That’s wrong. If the politicians’ only response to revelations that they’re violating our privacy is to ask for trust, then we already have problems.

June 12, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Progressive Hypocrite | , , , , , | Leave a comment

Should the Director of National Intelligence Be Impeached for Lying to Congress About PRISM?

By Derek Khanna | Politix | June, 2013

Director of National Intelligence James Clapper being grilled by Sen. Ron Wyden

Director of National Intelligence James Clapper being grilled by Sen. Ron Wyden • Screenshot

In March 2013, Senator Ron Wyden (D-OR) put the Director of National Intelligence James Clapper on the spot on NSA’s dragnet style surveillance of American citizens.

Wyden had been briefed (according to his comments here) on the ongoing program that is now known as PRISM. At the hearing on March 12 before the Senate Intelligence Committee, Wyden appeared to be trying to expose this program to Congress and the general public.

The senator was likely taken by surprise when Director Clapper appeared to directly deny the existence of the program Wyden was aware of, which is probably why he asked Clapper to repeat himself. The following is from the hearing:

Wyden: And this is for you, Director Clapper, again on the surveillance front. And I hope we can do this in just a yes or no answer because I know Senator Feinstein wants to move on. Last summer the NSA director was at a conference and he was asked a question about the NSA surveillance of Americans. He replied, and I quote here, ‘…the story that we have millions or hundreds of millions of dossiers on people is completely false.’ The reason I’m asking the question is, having served on the committee now for a dozen years, I don’t really know what a dossier is in this context. So what I wanted to see is if you could give me a yes or no answer to the question: Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?”

Clapper: “No, sir.”

Wyden: “It does not.”

Clapper: “Not wittingly. There are cases where they could inadvertently perhaps collect, but not wittingly.”

Wyden: “All right. Thank you. I’ll have additional questions to give you in writing on that point, but I thank you for the answer.”

Wyden is on the Intelligence Committee and knew what he was asking about. He was not phishing with this question; rather, he was specifically asking about what we now know as PRISM and trying to get Clapper to discuss this issue with Congress. And Clapper, who could clearly have said something along the lines of “any program of that nature would be classified…” instead chose to answer the question, which he likely knew was referring to PRISM, in a way that he knew, or should have known, would mislead Congress.

Wyden seems to have done everything he could to shed light on this information for the American people without violating American law. He previously asked the NSA for a “ballpark estimate” on how many Americans are being spied upon under FISA. The NSA responded that they could not answer the question: “Obtaining such an estimate was beyond the capacity of his office…An IG review of the sort suggested would itself violate the privacy of U.S. persons.”

Wyden’s question to Clapper was quite explicit: he asked, does the NSA collect “any type of data.” And Clapper said no. If the reports in the Washington Post and elsewhere on PRISM are accurate, then this statement appears to be a lie.

Clapper was asked to clarify his remarks on Thursday and told the National Journal, “What I said was, the NSA does not voyeuristically pore through U.S. citizens’ e-mails. I stand by that.”

This is an interesting “update” to his comment and logical damage control. But this is not necessarily clear either. Wittingly means “with full knowledge and deliberation.” The Powerpoint released last week, if facts substantiate what has already been reported, appears to show that in the PRISM program the NSA is wittingly and deliberately collecting information on millions of Americans.

Clapper’s statement appears to be untrue; however, legal experts may be able to parse it in a different way. If it wasn’t a lie it appears to be clearly misleading.

Lying to Congress is an extremely serious offense, although few have been found guilty. Roger Clemens was indicted for lying to Congress (but ultimately found innocent of perjury). Many of the cases of individuals convicted of lying to Congress arose from Watergate, including President Nixon’s Attorney General, John Mitchell, and Nixon’s Chief of staff, H.R Haldeman.

Executive officials can be impeached for “treason, bribery or other high crimes and misdemeanors.” As a non-criminal matter, there are serious grounds to argue that lying to Congress is among the most severe potential “high crimes and misdemeanors.”

Lying to a Grand Jury was the grounds for President Clinton’s impeachment; and that was lying to a grand jury, not lying to Congress when Congress is the relevant oversight branch. Furthermore, lying to Congress while Congress is performing oversight impedes a Congressional inquiry and investigation; Clinton’s lying to a Grand Jury did not impede Congressional functioning. This may be a poor example, because many disagreed with Clinton’s impeachment. The point is only that Clapper’s statement rises to or even exceeds previous standards for impeachment. (Impeachment is the House essentially “indicting” an Executive official which would require the Senate to convict for ultimate removal.)

Under the Constitution, Congress has a few major roles: to pass legislation and to oversee the Executive branch. The Intelligence Committee was specifically created to oversee the Intelligence Community in the wake of systemic abuses from the 1960s and 1970s. This oversight of intelligence organizations is critical to protecting average citizens from abuses that were well documented, including the wiretapping of Martin Luther King Jr. But this oversight process can only work if members of the Executive branch are honest with Congress. Members of the Executive branch know this, and these high stakes are precisely why in confrontations between the Executive and the Legislative branch, sometimes Executive branch officials try to refuse to appear before Congress – citing executive privilege.

Clapper’s statement appears to have misled the relevant Congressional Committee, and more importantly, misled Members of Congress who don’t receive the information that the Intelligence Committee receives. Ultimately these statements misled the general public. This obfuscation of the truth inhibited the Intelligence Committee from performing proper oversight, which is the primary role of the Intelligence Committee. There is little point in having an oversight committee for intelligence if members of the intelligence community can simply lie when asked questions before a hearing.

Misspeaking at a hearing may be a mistake. Misspeaking before the Intelligence Committee is an extremely grievous mistake. But even more egregious here is that Clapper had ample time to correct the record and apparently failed to do so. Statements made at hearings are not coffee shop like discussions; rather, they are carefully prepared in advance. If Clapper did not have a prepared answer for this question, it’s extremely likely that the NSA counsel would have reviewed his statement after the hearing – putting him on notice that if his statement was incorrect he had the obligation to correct it. In fact, if the NSA’s counsel knew that Clapper was lying or misspeaking, he may have had a legal obligation to tell Clapper to inform the Committee of his misstatement. And, under a similar procedure for lying at court, if Clapper refused to correct the record then the Counsel may have had an obligation to tell the Committee anyway. This gives some perspective on the legal severity of lying to a congressional committee.

President Obama has claimed that Congress was aware of all ongoing programs of this nature. The Administration can’t have it both ways. It can’t claim that Congress was in the loop and signed off when the Director of National Intelligence appears to have at best misled and at worst lied to the relevant oversight branch.

Our entire national security infrastructure was restructured because of the major scandals in the 1960s and 70s which ultimately culminated in the Church and Pike Committees. The Congressional Intelligence Committees were created to oversee the intelligence community and protect against abuses. The Committees were designed particularly to ensure protection of American citizens’ civil liberties. If the PRISM program represents the most significant and controversial ongoing intelligence operations impacting civil liberties in the past forty years (so we hope), then shouldn’t misleading the relevant committee be treated as among the most serious offenses that an executive official can commit? If not, how can Congress have any ability to oversee intelligence operations at all? If being in charge of the intelligence community, as Clapper is, and misleading the relevant committee overseeing your operations when they are trying to investigate is not a “high crime and misdemeanor,” then what other forms of misbehavior would meet that threshold? What message would it send to other governmental officials when asked to speak to Congress?

Twitter: #ImpeachClapper

Check out my testimony on cell phone unlocking at the House Judiciary Committee hearing last week.

Derek Khanna (@DerekKhanna and Facebook.com/derekkhanna) is the maverick former Republican staffer and civil liberties advocate whose op-eds on cell phone unlocking went viral in January. He is now a Yale Law

June 12, 2013 Posted by | Civil Liberties, Deception | , , , , | 2 Comments

Germany slams US for ‘Stasi methods’ ahead of Obama visit

RT | June 12, 2013

Germans are expressing outrage as details of a US internet spy program – revealed by a former CIA employee-turned-whistleblower – are prompting comparisons with that of former communist East Germany’s Ministry for State Security.

Unfortunately for Obama’s upcoming trip to Berlin, it was revealed that Germany ranks as the most-spied-on EU country by the US, a map of secret surveillance activities by the National Security Agency (NSA) shows.

German ministers are expressing their outrage over America’s sweeping intelligence-gathering leviathan, with one parliamentarian comparing US spying methods to that of the communist East Germany’s much-dreaded Ministry for State Security (Stasi).

Washington is using “American-style Stasi methods,” said Markus Ferber, a member of Chancellor Angela Merkel’s Bavarian sister party and member of the European Parliament.

“I thought this era had ended when the DDR fell,” he said, using the German acronym for the disposed German Democratic Republic.

Clearly, enthusiasm for the American leader’s upcoming visit will be much more tempered than it was in 2008 when 200,000 people packed around the Victory Column in central Berlin to hear Obama speak of a world that would be dramatically different from that of his hawkish Republican predecessor, George W. Bush.

Merkel will question Obama about the NSA program when he visits in Berlin on June 18, government spokesman Steffen Seibert told reporters on Monday. Some political analysts fear the issue will dampen a visit that was intended to commemorate US-German relations on the 50th anniversary of John F. Kennedy’s famous “Ich bin ein Berliner” speech.

Bush excesses, Obama digresses

One year into his second term, Barack Obama seems powerless to roll back the military and security apparatus bolted down by the Bush administration in the ‘War on Terror.’

One consequence of this failure of the Obama administration to reign in Bush-era excesses emerged last week when former National Security Agency employee Edward Snowden, 29, blew the whistle on a top-secret intelligence system named Prism, which collects data on individuals directly from the servers of the largest US telecommunications companies.

According to documents leaked to the Washington Post and Guardian newspapers, PRISM gave US intelligence agencies access to emails, internet chats and photographs from companies like Google, Facebook, Twitter, Verizon and Skype.

Justice Minister Sabine Leutheusser-Schnarrenberger said leaked reports that US intelligence services are able to track virtually all forms of Internet communication demanded an explanation.

“The more a society monitors, controls and observes its citizens, the less free it is,” she wrote in a guest editorial for Spiegel Online on Tuesday. “The suspicion of excessive surveillance of communication is so alarming that it cannot be ignored. For that reason, openness and clarification by the US administration itself is paramount at this point.”

All of the facts must be put on the table, the minister added.

Obama has defended the intelligence-gathering system as a “modest encroachment” that Americans should be willing to accept on behalf of security.

“You can’t have 100 per cent security and also then have 100 per cent privacy and zero inconvenience,” he said. “We’re going to have to make some choices as a society. There are trade-offs involved.”

The United States, however, is not legally restricted from eavesdropping on the communications of foreigners, meaning in theory that Washington could be listening to and collecting the private communications of individuals anywhere in the world.

Peter Schaar, Germany’s federal data protection commissioner, said the leaked intelligence was grounds for “massive concern” in Europe.

“The problem is that we Europeans are not protected from what appears to be a very comprehensive surveillance program,” he told the Handelsblatt newspaper. “Neither European nor German rules apply here, and American laws only protect Americans.”

Meanwhile, German opposition parties hope to gain from the scandal, especially with parliamentary elections approaching in September, and Merkel looking to win a third term.

“This looks to me like it could become one of the biggest data privacy scandals ever,” Greens leader Renate Kuenast told Reuters.

Obama is scheduled to hold talks and a news conference with Merkel on Wednesday followed by a speech in front of the Brandenburg Gate, the 18th triumphal arch that is one of Germany’s most recognizable landmarks.

June 12, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , , , , , , , , , , | Leave a comment

Why Did Edward Snowden Go to Hong Kong?

By Dave Lindorff | This Can’t Be Happening | June 11, 2013

A lot of people in the US media are asking why America’s most famous whistleblower, 29-year old Edward Snowden, hied himself off to the city state of Hong Kong, a wholly owned subsidiary of the People’s Republic of China, to seek at least temporary refuge.

Hong Kong has an extradition treaty with the US, they say. And as for China, which controls the international affairs of its Hong Kong Special Administrative Region, while granting it local autonomy to govern its domestic affairs, its leaders “may not want to irritate the US” at a time when the Chinese economy is stumbling.

These people don’t have much understanding of either Hong Kong or of China.

As someone who has spent almost seven years in China and Hong Kong, let me offer my thoughts about why Snowden, obviously a very savvy guy despite his lack of a college education, went where he did.

First of all, forget about Hong Kong’s extradition treaty. When it comes to deciding whether someone will be extradited, particularly for a political crime, as opposed to a simple murder or bank heist, the decision will be made in Beijing, not in a Hong Kong courtroom. Second, Hong Kong has a long history of providing a haven to dissidents — even to dissidents wanted by the Chinese government. Consider, for example, the Chinese labor movement activist Han Dongfang, who was the subject of a massive dragnet after the Tiananmen protests, but who successfully fled to Hong Kong before the handover of the place from Britain to China, and is continuing to monitor Chinese labor strife and protest from his home on Hong Kong’s Lamma Island. Hong Kong also has a public that is very supportive of democratic values — certainly more so than the majority of American citizens. Hong Kong people may not be paying too much attention to Snowden’s situation right now, but if the US were to actively seek to extradite him, I am confident that the place would erupt in support for him, including the local media.

As for China, while the issue that has Snowden on the run — exposing an Orwellian spying program targeting the American people and run by the super-secret National Security Agency — is certainly not one that the Chinese like to discuss in terms of their own locked-down society, you can bet that the folks in the Propaganda Bureau in Beijing, and in the inner circle of the government, are rubbing their hands with glee both at the incredible embarrassment their harboring of Snowden causes the hypocritical US, and at the trove of intelligence information he has, which they may be able ultimately to lure him into disclosing if they treat him well.

Then too, there is the matter of the Confucian concept of gift-giving and mutual obligations. It was, I am sure, no accident that Snowden chose the weekend that President Obama was hosting a summit in California with China’s new president Xi Jinping to disclose his identity as the NSA whistleblower who exposed the national spying program to the Guardian and the Washington Post. In doing that, he gave President Xi an incredible gift — the chance to hold the upper hand in his negotiations with a hugely embarrassed and compromised Obama over issues like Chinese computer hacking of US corporate and government secrets, and theft of intellectual property. For of course it is clear that the NSA is at least as active in hacking Chinese computers and spying on Chinese communications.

Such a gift as that is not easily ignored or forgotten in Chinese culture. President Xi owes Snowden a lot, and I believe he will honor that debt by seeing that Snowden is protected from any threat that might be posed to him by a vindictive or frightened US government.

But Snowden isn’t relying solely on Chinese cultural values to protect himself.

He was also careful to send a powerful message of warning to the US officials in the videoed public interview he gave outing himself. As he told interviewer Glenn Greenwald, “I had access to the full rosters of everyone working at the NSA, the entire intelligence community, and undercover assets all over the world. The locations of every station, we have what their missions are and so forth. If I had just wanted to harm the US? You could shut down the surveillance system in an afternoon.”

That one line at the end had to make the folks in Langley and at NSA headquarters sit up straight or to head to the bar for a stiff one! And indeed he could. And I will guarantee you, Snowden being as smart as he is, that he has already taken that information and dispersed it to a number of trusted people, perhaps including Greenwald, with instructions that they should put it all out on the Web if anything happens to him, such as his being kidnapped or disappeared or terminated. It’s a wonderful insurance policy and one that would not have escaped him. Nor would he have bothered to discover that he had all that information available to him if he hadn’t thought that he might need it.

It would be a relatively easy matter for the high-tech spooks at the NSA to retrace Snowden’s electronic trail to see if he really did download all that super-secret information and really could blow up the entire US spy machine. If they find out that he really has that information, he’s basically untouchable.

The real question is not what they are going to do to Snowden. It’s what we Americans are going to do now that we know how truly insane and totalitarian our government has become.

Will we go back to watching our sports teams and our reality TV programming, and forget about the fact that we no longer have any privacy in our lives, that our elected leaders and our judges are operating on the assumption that if they get out of line the fascist machine at the NSA that works in service of the corporate elite will blackmail or destroy them with its access to all their communications. Or will we rise up and demand an end to this high-tech tyranny in the name of a fraudulent “War” on Terror?

Snowden exiled himself and gave up a great job in Hawaii in the hope that we would rise up when we learned that our democracy has been hijacked.

Let’s hope he’s right.

June 11, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance, Timeless or most popular | , , , , , | 2 Comments

No Canadian NSA connection, but very own data snooping program

RT | June 11, 2013

Canada does not use the US NSA’s top secret surveillance PRISM program, officials revealed. Instead, it has a spying platform of its own that it claims manages to distinguish between domestic and international telephone and internet data collected.

The Communication Security Establishment (CSE) spokesman separated the National Security Agency and the Canadian surveillance program.

“The Communications Security Establishment does not have access to data in PRISM”, Ryan Foreman told Reuters, confirming that the “CSE uses metadata to isolate and identify foreign communications,” as CSEC is prohibited by law from directing its activities at Canadians.

Officials admitted that CSEC “incidentally” intercepts Canadian communications, but removes such data after it is obtained, according to the Globe and Mail.

Secret spying programs have come under scrutiny this week as whistleblower and former technical assistant for the CIA Edward Snowden leaked information about the NSA’s PRISM project, describing it as a massive data mining surveillance program which gave the agency backdoor access to emails, videos, chats, photos and search queries from nine worldwide tech giants, including Google and Facebook.

A secret electronic spying program was approved in 2011 by Canada’s Defense Minister Peter MacKay. It searches through international and domestic telephone records and internet data for suspicious activity, Canada’s newspaper Globe and Mail revealed.

Despite the reports, the government’s metadata surveillance program remains a mystery with little information available publicly. The records obtained from the Access to Information requests by the Globe had many pages blacked out, citing national security.

The program was first passed in a secret decree signed in 2005 by Bill Graham, the defense minister at the time then put on hold in 2008 for more than a year due to privacy concerns. On November 21, 2011, it was once again renewed, along with other top-secret espionage programs. And currently it is headed by the Communications Security Establishment Canada (CSEC), part of the Department of National Defense.

It is still not known how the data is being collected. Mining metadata can reveal who knows who and help the authorities to map out social networks and even terrorist cells.

“Metadata is information associated with a telecommunication … And not a communication,” according to a PowerPoint briefing sent to MacKay in 2011.

The Canadian surveillance program has been authorized by ministerial decrees, bypassing the parliament, and is under the sole oversight of the Office of the CSE Commissioner.

Opposition MPs have questioned MacKay about the surveillance reports, to which he replied that Canada’s surveillance initiative “is specifically prohibited from looking at the information of Canadians” and that “this program is very much directed at activities outside the country, foreign threats, in fact. There is rigorous oversight, there is legislation in place that specifically dictates what can and cannot be examined.”

Canada’s privacy commissioner admitted a lack of clarity on the subject.

“When it comes to the metadata program, we know very little specific information at this point – but we want to find out more”, Scott Hutchinson, of the Office of the Privacy Commissioner of Canada, told the Globe and Mail.

The Canadian program was criticized 2008 by a retired Supreme Court judge Charles Gonthier, who questioned whether CSEC could be passing any data collected to other partner agencies such as Royal Canadian Mounted Police (RCMP) and Canadian Security Intelligence Service (CSIS).

Gonthier’s biggest fear was that the data collection would lead to unlawful surveillance.

June 11, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , , , , | Leave a comment

Ron Paul Blasts NSA Defenders On Piers Morgan: ‘You’re Justifying Dictatorship!’

Former Republican presidential candidate Ron Paul appeared on CNN tonight to tell Piers Morgan why he objects to the NSA surveillance program. Morgan directly asked Paul if he would have actually ended surveillance programs if he were president. Paul said he would still want intelligence gathering, but it would be done in a more transparent way, maintaining that the current surveillance program are unquestionably unconstitutional. He directly told NSA defenders that they are simply “justifying dictatorship.”

Paul dismissed the use of a FISA court as a significant enough of a check on the executive branch. He said this program is undeniably “destroying the Constitution,”, and posed a question to anyone who defends the widespread surveillance.

“What should the penalty be for the people who destroy the Constitution? They’re always worrying about how they’re going to destroy the American citizens who tell the truth, to let us know what’s going on, but we ask the question: what is the penalty for people who deliberately destroy the Constitution and rationalize and say, ‘Oh, we have to do it for security.’ Well, frankly, you end up losing–you lose your security and you lose your freedoms too.”
He told NSA defenders that the nation is on a “very dangerous course,” and when they try to say there’s nothing wrong with such massive intelligence gathering, “you’re justifying dictatorship!”

Courtesy of CNN: Video

June 11, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular, Video | , , , , , | 4 Comments