Aletho News

ΑΛΗΘΩΣ

Five unanswered questions about the NSA’s surveillance programs

By Brendan Sasso | The Hill | 07/07/13

Leaks by former National Security Agency contractor Edward Snowden have provided new insight into how the government monitors domestic and foreign communications for threats to national security.

Although the government has disclosed some additional details about the programs in response to the leaks, important questions remain about the nature and scope of the surveillance programs.

Without that additional information, it is impossible to know the extent to which the government is peering into the lives of Americans in the name of national security, according to privacy advocates.

1. What other data is being collected under the Patriot Act?

The first leak from Snowden was a secret court order demanding that Verizon turn over vast batches of “metadata” on its U.S. customers. The data included the time and duration of calls, as well as the phone numbers involved, but not the contents of the conversations. The data collection was authorized under Section 215 of the Patriot Act.

The Director of National Intelligence (DNI) clarified that while the government does obtain data on millions of U.S. phone calls (and from more companies than just Verizon), it only “queries” the database a limited number of times for specific national security reasons.

Michelle Richardson, a legislative counsel for the American Civil Liberties Union (ACLU), questioned whether the NSA is using Section 215 to collect more than just phone records.

“Is it also financial data or Internet records or other things?” she asked. “Knowing now that the court has been so broad in its interpretation, it’s even more important to figure out what else they’re getting.”

Greg Nojeim, a senior counsel for the Center for Democracy and Technology, said the NSA is likely using the Patriot Act to collect the credit card records and IP addresses of millions of people within and outside of the United States.

2. How broad are the programs?

How many people have been spied on through the NSA programs remains unclear. According to the NSA, it queried its massive database of phone records fewer than 300 times in 2012. But the agency did not disclose figures on other years or how many phone numbers were accessed in those queries.

Richardson explained that a single query could be an algorithm that scans the database and returns information on many people.

The other major program revealed by Snowden is the NSA’s Internet surveillance program, called PRISM. Unlike the phone record collection program under the Patriot Act, the NSA uses PRISM to access the contents of communications, such as emails, video chats, photographs and other information.

According to the DNI, the NSA only accesses those online records if there is a “foreign intelligence purpose” and the target is “reasonably believed” to be outside of the U.S. The program is authorized by Section 702 of the Foreign Intelligence Surveillance Act, and the searches require approval by a secret FISA court.

The NSA has not disclosed how many people it has targeted under Section 702 or how many people were spied on incidentally as part of the program.

“We have no idea how many U.S. persons have had their communications swept up,” said Sharon Bradford Franklin, senior counsel for the Constitution Project.

3. What’s the legal rationale?

The NSA has insisted the surveillance programs comply with the law and are overseen by independent FISA courts. But the opinions of those courts are secret, so little is known about how the courts are enforcing privacy protections or why they signed off on certain surveillance methods.

Section 215 of the Patriot Act allows the government to collect business records if they are “relevant” to a terrorism investigation. The FISA courts have determined that that provision allows the NSA to collect records on virtually all phone calls within and outside of the U.S. Why the court determined that so much data is “relevant” to a terrorism investigation remains unclear.

“Generally we don’t know the legal rationale being offered by the administration and being accepted by the FISA court to justify these particular types of surveillance programs,” Bradford Franklin said. “We should not have secret law in a democracy.”

4. Is the NSA still collecting email records?

One of the latest leaks revealed that beginning in 2001, the NSA collected vast amounts of email records. The NSA was able to identify the email accounts that sent and received messages, as well as IP addresses. The data collection did not include the contents of the emails.

The Obama administration confirmed the existence of the program, but said it ended in 2011 for “operational and resource reasons.”

One major question, according to privacy advocates, is whether the government is still able to obtain similar email records through a separate program.

5. Are there other programs that we don’t know about?

Although the NSA has provided some details about the programs leaked by Snowden, it is unclear what other programs exist and how they work together as part of a broad surveillance strategy.

“There’s this giant surveillance superstructure out there that we’re finally getting glimpses of, but there’s still a lot of questions of how does the whole thing work,” Richardson said.

July 9, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , , , | Leave a comment

Reassured by NSA’s Internal Procedures? Don’t Be. They Still Don’t Tell the Whole Story.

By Kurt Opsahl and Mark Rumold | EFF | June 21, 2013

Yesterday, the Guardian released two previously-classified documents describing the internal “minimization” and “targeting” procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA’s vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren’t reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant.

Which would be bad enough, if it were the end of the story. But it’s not.

The targeting and minimization documents released yesterday are dated a few months after the first publicly known scandal over the new FAA procedures: In April 2009, the New York Times reported that Section 702 surveillance had “intercepted the private e-mail messages and phone calls of Americans . . . on a scale that went beyond the broad legal limits established by Congress.” In June 2009, the Times reported that members of Congress were saying NSA’s “recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged.” Rep. Rush Holt described the problems as “so flagrant that they can’t be accidental.”

Presumably, following these “flagrant” abuses (and likely in response to the Congressional criticism of the original procedures), the government refined the procedures. The documents released yesterday are the “improved” targeting and minimization procedures, which appear to have been reused the following year, in 2010, in the FISC’s annual certification.

But these amended procedures still didn’t stop illegal spying under Section 702.

Unless the government substantially changed the procedures between August 2010 and October 2011, these are the very procedures that the FISC eventually found resulted in illegal and unconstitutional surveillance. In October 2011, the FISC issued an 86-page opinion finding that collection carried out under the NSA’s classified minimization procedures was unconstitutional. The opinion remains secret, but it is very likely that yesterday’s leaked NSA documents show the very minimization procedures the Director of National Intelligence admitted the FISC had found resulted in surveillance that was “unreasonable under the Fourth Amendment” and “circumvented the spirit of the law.”

And for good reason: the procedures are unconstitutional. They allow for the government to obtain and keep huge amounts of information it could never Constitutionally get without a warrant based on probable cause. As we explained, the procedures are designed such that the NSA will routinely fail to exclude or remove United States persons’ communications, and the removal of those communications are wholly entrusted to the “reasonable discretion” of an analyst.

EFF has been litigating to uncover this critical FISC opinion through the Freedom of Information Act and to uncover the “secret law” the government has been hiding from the American public. And EFF isn’t alone in fighting for the release of these documents. A bipartisan coalition of Senators just announced legislation that would require the Attorney General to declassify significant FISC opinions, a move they say would help put an end to precisely this kind of “secret law.”

When the government, and others, claim these procedures ensure your privacy is respected, know this: they’re only telling you half the story.

Take action now — to put an end to secret law, to demand the American public gets the full story, and to finally put an end to the NSA’s domestic spying program.

June 22, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , | Leave a comment

Spying by the Numbers

By BILL QUIGLEY | CounterPunch | June 20, 2013

Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying.  There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.

Hundreds of Thousands Subject to Government Surveillance

The first reality is that hundreds of thousands of people in the US have been subject to government surveillance in each of the last few years. Government surveillance of people in the US is much more widespread than those in power want to admit.   In the last three years alone about 5000 requests have been granted for complete electronic surveillance authorized by the secret FISA court.  The FBI has authorized another 50,000 surveillance operations with National Security Letters in the last three years.  The government admits that well over 300,000 people have had their phone calls intercepted by state and federal wiretaps in the last year alone.  More than 50,000 government requests for internet information are received each year as reported by internet providers. And, remember, these are the publicly reported numbers so you can be confident there is a whole lot more going on which has not been publicly reported.

Courts Almost Never Deny Government Requests for Surveillance

The second reality is that there is little to no serious oversight or accountability by the courts of this surveillance.  Government spy defenders keep suggesting the courts are looking carefully and rigorously at all this and only letting a tiny number of really bad people be spied on.  Not true.  Despite thousands of requests by the federal government to look deeply into people’s lives, the secret federal FISA court turned down no requests at all in the last three years.  The state and federal courts report on wiretap applications document over 2000 applications annually for surveillance which authorize the interception of hundreds of thousands of calls and emails.  The courts have turned down the government two times in the most recent report.  FBI national security letters do not even have to be authorized by a court at all.  The lack of Congressional oversight is plain to see but the lack of any judicial review of many of these surveillance actions and the very weak oversight where courts do review should concern anyone who cares about government accountability.

Let’s break down the surveillance by the authority for spying.

In FISA Court Government Always Wins  

The US government has tried to say the public should not worry about government scooping up hundreds of millions of phone calls and internet activities because no real information is disclosed unless it is authorized by what is called the FISA court.  Therefore, you can trust us with this information.

The FISA Court, actually called the Foreign Intelligence Surveillance Court, is made up of ten federal judges who deliberate and decide in secret whether the government can gather and review millions of phone and internet records.  This court, though I know and respect several of its members, cannot, be considered an aggressive defender of constitutional rights and civil liberties.

Government lawyers go to these FISA judges in secret.  Government lawyers present secret evidence in secret proceedings with no defense lawyer or public or press allowed and asks for secret orders allowing the government to secretly spy on people.  Its opinions are secret.  The part the public knows is a one paragraph report which is made every year of the number of applications and the number of denials by the court.

What is worse is that the judges in this secret court never turn the secret government lawyers down.

Over the last three years, the government has made 4,976 requests to the secret FISA court for permission to conduct electronic surveillance for foreign intelligence purposes. But the really big FISA number is zero.  Zero is the number of government requests to conduct electronic surveillance the FISA court has turned down in the last three years.

In 2012, the government asked for permission from the judges of the secret Foreign Intelligence Surveillance Court (FISA) 1,789 times to conduct electronic surveillance for foreign intelligence purposes.  There were zero denials.  One time the government withdrew its request.

In 2011, the government asked FISA judges 1,676 times to conduct electronic surveillance for foreign intelligence services.  There were zero denials.  The government withdrew two requests.

In 2010, the government asked FISA judges 1,511 times to conduct electronic surveillance for foreign intelligence purposes.  There were zero denials.  The government withdrew five requests.

Not a bad record, huh?  Nearly five thousand victories for those who want surveillance powers and no defeats is a record that should concern everyone who seeks to protect civil liberties.

FBI National Security Letters Scoop Up Information No Court Approval Even Needed

With a NSL letter the FBI can demand financial records from any institution from banks to casinos, all telephone records, subscriber information, credit reports, employment information, and all email records of the target as well as the email addresses and screen names for anyone who has contacted that account.  The reason is supposed to be for foreign counterintelligence.  There is no requirement for court approval at all.  The Patriot Act has made this much easier for the FBI.

According to Congressional records, there have been over 50,000 of these FBI NSL requests in the last three years.  This does not count the numerous times where the FBI persuades the disclosure of information without getting a NSL.  Nor does it count FBI requests made just to find out who an email account belongs to.

These reported NSL numbers also do not include the very high numbers of administrative subpoenas issued by the FBI which only require approval of a member of the local US Attorney’s office.

In 2012, the FBI issued 15,229 national security letter requests for information concerning US citizens.

In 2011, the FBI made 16,511 national security letter requests for information concerning US persons.

In 2010, the FBI made 24,287 national security letter requests for information on US citizens.

Since there is no court approval needed, there are no denials.  The NSL record is even better than the FISA record at 56,027 wins and no losses for Team Surveillance.

Thousands of Wiretaps Each Impacting Over One Hundred People Authorized Two Denied

According to the latest report to Congress by the US Courts, there were 2,732 applications for wiretaps submitted to all federal and to half of the state courts in 2011.  Half the states did not report on their numbers, so these numbers are certainly quite much too low.  Also, the term wiretap is out of date as this process currently covers providing information on conventional phone lines, cell phones, secret microphones, texts, fax, paging, and email computer transmissions.

For the year 2011, out of 2,732 applications, only two were denied.  Two losses out of 2700 tries is a comparatively poor win loss record for the surveillance folks.

On average, each wiretap intercepted the communications of 113 people, thus over three hundred thousand people had their calls intercepted.

The most prevalent reason reported for the wiretaps was drug offenses.  The average length of the wiretap was 42 days.  One federal wiretap in Michigan resulted in intercepting over 71,000 cellular messages extending over 202 days.  A New York state wiretap intercepted 274,210 messages over 564 days.

 Company Reports on Spying Show Tens of Thousands of Requests

It is well known that user accounts at Google, Apple and others contain a treasure trove of information on the customer’s basic information including searches, likes and dislikes, purchases, friends, and the like.  Government investigators seek this information tens of thousands times each year as the reports from the companies show.

Apple reported receiving 4,000 to 5,000 government requests for information on customers in just the last six months.  From December 1, 2012 to May 31, 2013 Apple received law enforcement requests for customer data on 9-10,000 accounts or devices.  Most of these requests are from police for robberies, missing children, etc.

Facebook reported that in a six month period ending December 31, 2012, it received between 9,000 and 10,000 requests from the US government for user data on 18,000 to 19,000 accounts.

Google reported it received over 15,000 requests for data by US government officials in 2012 for information on over 30,000 accounts.  It produced some data 88% of the time.

Microsoft (including Skype) reported 75,378 law enforcement requests for information on 137,424 accounts world-wide for the year 2012.  In over 11,000 cases, they could find no data to respond to the requests.  Microsoft disclosed non-content information in 56,388 cases, mostly to the US, UK, Turkey, Germany and France. In the US, Microsoft received 11,073 requests from law enforcement for information on 24,565 accounts.  Microsoft rejected 759 requests or 6.9% on legal grounds.  Microsoft provided user content in 1544 cases and subscriber/transactional data in 7,196 cases.

Yahoo said that in the last six months of 2012 it received between 12,000 and 13,000 requests for user data from law enforcement.

In a democracy, transparency and public participation are critical.  This is not just about “the terrorists.”  This is about civil liberty and government accountability.  Hundreds of thousands of people are being spied upon every year by our own government’s public admissions.  There is little oversight by judges and even less by Congress.  If the government admits this much, you can certainly assume there is more to come out.  It is time to wake up.  These secret subpoenas and secret courts and secret processes should be abolished or fundamentally changed.  Otherwise, change the slogan on the dollar to “In Secrecy We Trust.”

Bill Quigley is a human rights lawyer and law professor at Loyola University New Orleans College of Law.  Bill also works with the Center for Constitutional Rights.  A longer version of this article with full sources is available.  You can reach Bill at quigley77@gmail.com

June 20, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular | , , , , , , , | Leave a comment

Leaked: NSA’s Talking Points Defending NSA Surveillance

By Mike Masnick | techdirt | June 14, 2013

The government has been passing around some “talking points” to politicians and the press trying to spin the NSA surveillance story. We’ve got the talking points about scooping up business records (i.e., all data on all phone calls) and on the internet program known as PRISM. Both are embedded below. Let’s dig in on a few of the points, starting with the business records/FISA issue:

The news articles have been discussing what purports to be a classified, lawfully-authorized order that the Foreign Intelligence Surveillance Court (FISA Court) issued under an Act of Congress – the Foreign Intelligence Surveillance Act (FISA). Under this Act, the FISA Court authorized a collection of business records. There is no secret program involved here – it is strictly authorized by a U.S. statute.

“There is no secret program here”? Bullshit. Why, then, have so many people, both in the Congress and the public been shocked at the extent to which the NSA is snarfing up data? This is a secret program, enabled by a secret interpretation of the FISA Amendments Act, by the FISA Court, which the DOJ and the NSA insist the public is not allowed to know. Yes, it’s a secret program. Saying otherwise is simply lying.

It authorizes only metadata collection, which includes barebones records – such as a telephone number or the length of a call.

“Barebones records” and “metadata” are terms being used to play down the extent of the collection of info, but it ignores multiple reports that note the amount of data actually collected — including phone numbers, call times, call location, among other things — is more than enough to identify who someone is and a variety of important characteristics about that person.

This legal tool, as enacted by Congress, has been critical in protecting America. It has been essential in thwarting at least one major terrorist attack to our country in the past few years.

“At least one” is a lot less than the “dozens” NSA boss Keith Alexander recently stated. But, so far the only “one” identified, involving an attempted NYC Subway bombing was shown not to have needed this data collection program to uncover and stop. So, nope.

Despite what appears to be a broad scope in the FISA Court’s order, the Intelligence Community uses only a small fraction of a percent of the business records collected to pursue terrorism subjects.

This is meaningless. That’s like saying, even though we search everyone’s house illegally, we only actually arrest a small number of people. No one would allow such house searches under the 4th Amendment, so why is it okay with phone records?

All three branches – Congress, the Courts, and the Executive Branch – review and sign off on FISA collection authorities. Congress passed FISA, and the Intelligence Committees are regularly and fully briefed on how it is used.

Except many in Congress have made it clear they did not review this kind of program, or were led to believe that the NSA did not collect this kind of information. And those who are being briefed now say the program goes way beyond what they were told. And, those who did know about it beforehand, tried to dig deeper into the program, but were blocked. As for “the Courts” reviewing it, we’re talking about the FISA Court which is a rubberstamp in black robes, having approved every single request of it for the past three years. It last rejected a request back in 2009, and that was only one out of 1320. In its entire history, since 1979, the court has rejected a grand total of 11 applications. 11. Out of 33,939 applications. That’s 0.03%. Not 3%. 0.03% with not a single rejection in over three years. That’s not careful review. That’s a rubber stamp. As for the executive branch signing off on it, what do you expect? They’re going to hold back their own ability to spy on people?

The FISA Court authorizes intelligence collection only after the Intelligence Community has proven its case, based on underlying facts and investigations.

Well, we already covered the rubber stamp issue above, but Section 215 of the Patriot Act requires that the government present a case that the data it is seeking “must be relevant to an authorized preliminary or full investigation to obtain foreign intelligence information not concerning a U.S. person or to protect against international terrorism or clandestine intelligence activities.” I’d love to see the argument that all data is somehow relevant to the investigation. Of course, I can’t see it, because it’s secret.

This legal tool has been reauthorized only after ongoing 90-day renewal periods. That means that every 90 days, the Department of Justice and the FBI must prove to the Foreign Intelligence Surveillance Court that they have the facts and legal basis to renew this legal authority. It is not a rubber stamp.

Ha ha ha. So, we violate your privacy without any opposing view — but we do it every 90 days for seven straight years.

FISA-authorized collections are subject to strict controls and procedures under oversight of the Department of Justice, the Office of the Director of National Intelligence and the FISA Court, to ensure that they comply with the Constitution and laws of the United States and appropriately protect privacy and civil liberties.

What kind of “strict controls and procedures” allow for the collection of every single record of every single phone call, and then also make it accessible to the 29-year-old IT guy in Hawaii? Just wondering…

Moving on to the “NSA internet talking points.”

Section 702 is a vital legal tool that Congress reauthorized in December 2012, as part of the FISA Amendments Act Reauthorization Act, after extensive hearings and debate. Under Section 702, the Foreign Intelligence Surveillance Court (FISA Court) certifies foreign intelligence collection. There is no secret program involved – it is strictly authorized by a U.S. statute.

Again, “no secret program,” merely a secret interpretation of the law, in a secret ruling by a secret court. What’s everyone complaining about?

Section 702 cannot be used to target any U.S. person. Section 702 also cannot be used to target any person located in the United States, whether that person is an American or a foreigner.

Note the careful choice of words: it cannot be used to target a person in the US. It can, however, be used to collect info on a person in the US if they’re not “the target” of the investigation. Fun with words!

The unauthorized disclosure of information about this critical legal tool puts our national security in grave danger, puts Americans at risk of terrorist and cyber attacks, and puts our military intelligence resources in danger of being revealed to our adversaries.

Right. So this is not a new program, it’s no surprise, people shouldn’t be concerned… and now that you know about it we’re all going to die!

How does anyone take these jokers seriously?

June 15, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Mainstream Media, Warmongering | , , , , , , | Leave a comment

Ron Paul Blasts NSA Defenders On Piers Morgan: ‘You’re Justifying Dictatorship!’

Former Republican presidential candidate Ron Paul appeared on CNN tonight to tell Piers Morgan why he objects to the NSA surveillance program. Morgan directly asked Paul if he would have actually ended surveillance programs if he were president. Paul said he would still want intelligence gathering, but it would be done in a more transparent way, maintaining that the current surveillance program are unquestionably unconstitutional. He directly told NSA defenders that they are simply “justifying dictatorship.”

Paul dismissed the use of a FISA court as a significant enough of a check on the executive branch. He said this program is undeniably “destroying the Constitution,”, and posed a question to anyone who defends the widespread surveillance.

“What should the penalty be for the people who destroy the Constitution? They’re always worrying about how they’re going to destroy the American citizens who tell the truth, to let us know what’s going on, but we ask the question: what is the penalty for people who deliberately destroy the Constitution and rationalize and say, ‘Oh, we have to do it for security.’ Well, frankly, you end up losing–you lose your security and you lose your freedoms too.”
He told NSA defenders that the nation is on a “very dangerous course,” and when they try to say there’s nothing wrong with such massive intelligence gathering, “you’re justifying dictatorship!”

Courtesy of CNN: Video

June 11, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular, Video | , , , , , | 4 Comments

The NSA Black Hole: 5 Basic Things We Still Don’t Know About the Agency’s Snooping

By Justin Elliott and Theodoric Meyer | ProPublica | June 10, 2013
The headquarters of the National Security Agency at Fort Meade, Maryland

Last week saw revelations that the FBI and the National Security Agency have been collecting Americans’ phone records en masse and that the agencies have access to data from nine tech companies.

But secrecy around the programs has meant even basic questions are still unanswered. Here’s what we still don’t know:

Has the NSA been collecting all Americans’ phone records, and for how long?

It’s not entirely clear.

The Guardian published a court order that directed a Verizon subsidiary to turn over phone metadata — the time and duration of calls, as well as phone numbers and location data — to the NSA “on an ongoing daily basis” for a three-month period. Citing unnamed sources, the Wall Street Journal reported the program also covers AT&T and Sprint and that it covers the majority of Americans. And Director of National Intelligence James Clapper himself acknowledged that the “collection” is “broad in scope.”

How long has the dragnet has existed? At least seven years, and maybe going back to 2001.

Senate Intelligence Committee chair Dianne Feinstein, D-Calif., and vice chair Saxby Chambliss, R-Ga., said last week that the NSA has been collecting the records going back to 2006. That’s the same year that USA Today revealed a similar-sounding mass collection of metadata, which the paper said had been taking place since 2001. The relationship between the program we got a glimpse of in the Verizon order and the one revealed by USA Today in 2006 is still not clear: USA Today described a program not authorized by warrants. The program detailed last week does have court approval.

What surveillance powers does the government believe it has under the Patriot Act?

That’s classified.

The Verizon court order relies on Section 215 of the Patriot Act. That provision allows the FBI to ask the Foreign Intelligence Surveillance Court for a secret order requiring companies, like Verizon, to produce records – “any tangible things” – as part of a “foreign intelligence” or terrorism investigation. As with any law, exactly what the wording means is a matter for courts to decide. But the Foreign Intelligence Surveillance Court’s interpretation of Section 215 is secret.

As Harvard Law Professor Noah Feldman recently wrote, the details of that interpretation matter a lot: “Read narrowly, this language might require that information requested be shown to be important or necessary to the investigation. Read widely, it would include essentially anything even slightly relevant — which is to say, everything.”

In the case of the Verizon order — signed by a judge who sits on the secret court and requiring the company to hand over “all call detail records” — it appears that the court is allowing a broad interpretation of the Patriot Act. But we still don’t know the specifics.

Has the NSA’s massive collection of metadata thwarted any terrorist attacks?

It depends which senator you ask. And evidence that would help settle the matter is, yes, classified.

Sen. Mark Udall, D-Colo., told CNN on Sunday, “It’s unclear to me that we’ve developed any intelligence through the metadata program that’s led to the disruption of plots that we could [not] have developed through other data and other intelligence.”

He said he could not elaborate on his case “without further declassification.”

Sen. Feinstein told ABC that the collection of phone records described in the Verizon order had been “used” in the case of would-be New York subway bomber Najibullah Zazi. Later in the interview, Feinstein said she couldn’t disclose more because the information is classified. (It’s worth noting that there’s also evidence that old-fashioned police work helped solve the Zazi case — and that other reports suggest the Prism program, not the phone records, helped solve the case.)

How much information, and from whom, is the government sweeping up through Prism?

It’s not clear.

Intelligence director Clapper said in his declassified description that the government can’t get information using Prism unless there is an “appropriate, and documented, foreign intelligence purpose for the acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear proliferation) and the foreign target is reasonably believed to be outside the United States.”

One thing we don’t know is how the government determines who is a “foreign target.” The Washington Post reported that NSA analysts use “search terms” to try to achieve “51 percent confidence” in a target’s “foreignness.” How do they do that? Unclear.

We’ve also never seen a court order related to Prism — they are secret — so we don’t know how broad they are. The Post reported that the court orders can be sweeping, and apply for up to a year. Though Google has maintained it has not “received blanket orders of the kind being discussed in the media.”

So, how does Prism work?

In his statement Saturday, Clapper described Prism as a computer system that allows the government to collect “foreign intelligence information from electronic communication service providers under court supervision.”

That much seems clear. But the exact role of the tech companies is still murky.

Relying on a leaked PowerPoint presentation, the Washington Post originally described Prism as an FBI and NSA program to tap “directly into the central servers” of nine tech companies including Google and Facebook. Some of the companies denied giving the government “direct access” to their servers. In a later story, published Saturday, the newspaper cited unnamed intelligence sources saying that the description from the PowerPoint was technically inaccurate.

The Post quotes a classified NSA report saying that Prism allows “collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,” not the company servers themselves. So what does any of that mean? We don’t know.

For more on mass surveillance in America, read our timeline of loosening laws and practices.

June 11, 2013 Posted by | Civil Liberties | , , , , , , , | 2 Comments

Government Spying: Should We Be Shocked?

By Ron Paul | June 9, 2013

Last week we saw dramatic new evidence of illegal government surveillance of our telephone calls, and of the National Security Agency’s deep penetration into American companies such as Facebook and Microsoft to spy on us. The media seemed shocked.

Many of us are not so surprised.

Some of us were arguing back in 2001 with the introduction of the so-called PATRIOT Act that it would pave the way for massive US government surveillance—not targeting terrorists but rather aimed against American citizens. We were told we must accept this temporary measure to provide government the tools to catch those responsible for 9/11. That was nearly twelve years and at least four wars ago.

We should know by now that when it comes to government power-grabs, we never go back to the status quo even when the “crisis” has passed. That part of our freedom and civil liberties once lost is never regained. How many times did the PATRIOT Act need renewed? How many times did FISA authority need expanded? Why did we have to pass a law to grant immunity to companies who hand over our personal information to the government?

It was all a build-up of the government’s capacity to monitor us.

The reaction of some in Congress and the Administration to last week’s leak was predictable. Knee-jerk defenders of the police state such as Senator Lindsey Graham declared that he was “glad” the government was collecting Verizon phone records—including his own—because the government needs to know what the enemy is up to. Those who take an oath to defend the Constitution from its enemies both foreign and domestic should worry about such statements.

House Intelligence Committee Chairman Mike Rogers tells us of the tremendous benefits of this Big Brother-like program. He promises us that domestic terrorism plots were thwarted, but he cannot tell us about them because they are classified. I am a bit skeptical, however. In April, the New York Times reported that most of these domestic plots were actually elaborate sting operations developed and pushed by the FBI. According to the Times report, “of the 22 most frightening plans for attacks since 9/11 on American soil, 14 were developed in sting operations.”

Even if Chairman Rogers is right, though, and the program caught someone up to no good, we have to ask ourselves whether even such a result justifies trashing the Constitution. Here is what I said on the floor of the House when the PATRIOT Act was up for renewal back in 2011:

“If you want to be perfectly safe from child abuse and wife beating, the government could put a camera in every one of our houses and our bedrooms, and maybe there would be somebody made safer this way, but what would you be giving up? Perfect safety is not the purpose of government. What we want from government is to enforce the law to protect our liberties.”

What most undermines the claims of the Administration and its defenders about this surveillance program is the process itself. First the government listens in on all of our telephone calls without a warrant and then if it finds something it goes to a FISA court and gets an illegal approval for what it has already done! This turns the rule of law and due process on its head.

The government does not need to know more about what we are doing. We need to know more about what the government is doing. We need to turn the cameras on the police and on the government, not the other way around. We should be thankful for writers like Glenn Greenwald, who broke last week’s story, for taking risks to let us know what the government is doing. There are calls for the persecution of Greenwald and the other whistle-blowers and reporters. They should be defended, as their work defends our freedom.

June 9, 2013 Posted by | Civil Liberties, False Flag Terrorism, Full Spectrum Dominance, Timeless or most popular | , , , , , , | Leave a comment

The NSA’s Favorite Weasel Word To Pretend It’s Claiming It Doesn’t Spy On Americans

By Mike Masnick | TechDirt | June 7th 2013

Well, well. In the aftermath of the revelations that the NSA is getting records of every phone call from Verizon, followed up by the news that most of the biggest tech companies are supposedly giving direct access to the NSA, the intelligence community is responding the same way it always does: with weasel words. First up, you can see Director of National Intelligence James Clapper’s statement about the spying, which we’ll be discussing again in a bit.

But, a bunch of folks have been reasonably pointing out that Clapper appears to have lied to Congress. Of course, it’s not like this wasn’t easily called. Two years ago, we wrote about Clapper’s answers to Senators Wyden and Udall, which we pointed out was a ridiculous answer that was clearly sidestepping the real questions. However, looking over that letter again now, and having become a bit more familiar with the weasel words the NSA likes to use, it’s easy to look at Clapper’s statement and explain why he can “stand by it” while the clear implication of it was the opposite of what he meant.

You asked whether communications of Americans have been collected… Section 702 of the FAA [FISA Amendments Act] explicitly prohibits the intentional targeting of persons reasonably believed to be located in the United States or United States persons located abroad. The Intelligence Community has put in place a variety of procedures, which have been approved by the FISA Court as required by law, to ensure that only persons reasonably believed to be located outside the United States are targeted and to prevent the intentional acquisition of any communications as to which the sender and all intended recipients are known to be located in the United States. Guidelines are also required by law to ensure compliance with other limitations on FAA collection, including the requirement that a U.S. person may not be intentionally targeted under section 702. If it is discovered that a target has entered the U.S. or is a U.S. person, he or she is promptly detargeted and reports are made as appropriate to the Department of Justice (DOJ), the Office of the Director of National Intelligence (ODNI) and the FISA Court. Moreover, when communications from persons located in the United States are collected because they are communicating with a lawful target, the privacy and civil liberty rights of U.S. persons are protected through the careful implementation of the procedures required under the FAA to “minimize the acquisition and retention, and prohibit the dissemination ‘of information about U.S. persons.’”

Most people would read this to be him saying that they do not spy on Americans. And that’s obviously what he’s trying to imply. But that’s not what he’s actually saying. He’s using the NSA’s favorite weasel word: “target.” Now, most people assume that means one of the people on the call must be outside the US. But, you could — if you were devious intelligence official trying to mislead Congress and the American public (hypothetically) — interpret the word “target” to mean “if we, in general are ‘targeting’ foreign threats, no matter what they might be like, and this information we’re collecting might help in that process, then we can snarf up this data.”

In other words, most people think that “target” would mean one of the people on the phone. But, the NSA means “this overall investigation is about targeting foreign threats, so we can take whatever data we want because the goal is to stop foreign threats with it — and therefore our mandate not to spy on Americans doesn’t apply.”

So, it shouldn’t be particularly surprising to see that the administration’s “response” to this is to highlight, yet again, that this only “targets” non-US persons:

Information collected through a U.S. government surveillance program that taps into the servers of internet companies targets only non-U.S. persons living outside the United States, a senior administration official said on Thursday.

The U.S. law that allows the collection of data under this program does not allow the targeting of any U.S. citizen or of any person located in the United States, the official said, speaking on condition of anonymity.

Right, but whether or not they’re “targeting” a person, is separate from whether or not they’re spying on the data of Americans. As long as it’s all part of a process that “targets” non-US persons, they can claim that they’re playing by the rules.

Given that, however, I don’t see how Clapper can reasonably standby the following statements:

Wyden: Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?

Clapper: No sir.

Wyden: It does not?

Clapper: Not wittingly. There are cases where they could, inadvertently perhaps, collect—but not wittingly.

Clapper is insisting that he didn’t lie in his comments, but he then pretends that he was only talking about email:

What I said was, the NSA does not voyeuristically pore through U.S. citizens’ e-mails. I stand by that.

Except, that’s not what he was asked, nor was it what he said. He was specifically asked if the NSA collects any type of data at all, and he said no. Up above, he was using weasel words, but here it looks like he was flat out lying directly to Congress. Usually, Congress doesn’t like that.

June 9, 2013 Posted by | Civil Liberties, Deception, Progressive Hypocrite | , , , , , , | Leave a comment

The “Congress knew” defense

left i on the news | June 07, 2013

President Obama defends his super-snooping program, claiming that “they’re not secret in the sense that when it comes to telephone calls, every member of Congress has been briefed on this program.” First of all, I note he also says that “the relevant intelligence committees are fully briefed on these programs,” which suggests that “every member of Congress”, to whom the word “fully” isn’t applied, may or may not know very much at all. But even if every member of Congress were in fact fully briefed, there’s a little problem with that. Because they were briefed in secret and unable to convey that information to their constituents. So if they wanted to, say, campaign for reelection on the grounds of supporting (or opposing) that policy, they couldn’t do so. Furthermore, no challenger could campaign against them on a platform of ending these policies, because no challenger would have known about the policies.

On a related issue, talking to FOX’s Shep Smith earlier today (actually being grilled by Smith, who was having none of his double-talk and evasions), the former deputy director of the NSA claimed that the program was ipso facto Constitutional because “all three branches of government” were involved with it. But the “FISA Court” is a special, secret court. Not only have they never denied a single government request, but no citizen can challenge a decision they make, because their decisions are all secret. Therefore the Constitutionality of the court itself, or of any decision it has made, is not subject to review by the Supreme Court, the only institution which can actually rule on the Constitutionality of a law.

~

Related video:
Related articles

June 9, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Progressive Hypocrite, Video | , , , , , , | Leave a comment

Government Says Secret Court Opinion on Law Underlying PRISM Program Needs to Stay Secret

By Mark Rumold and David Sobel | EFF | June 7, 2013

In a rare public filing in the secret Foreign Intelligence Surveillance Court (FISC), the Justice Department today urged continued secrecy for a 2011 FISC opinion that found the National Security Agency’s surveillance under the FISA Amendments Act to be unconstitutional.  Significantly, the surveillance at issue was carried out under the same controversial legal authority that underlies the NSA’s recently-revealed PRISM program.

EFF filed a suit under the Freedom of Information Act in August 2012, seeking disclosure of the FISC ruling.  Sens. Ron Wyden and Mark Udall revealed the existence of the opinion, which found that collection activities under FISA Section 702  “circumvented the spirit of the law” and violated the Fourth Amendment’s prohibition on unreasonable searches and seizures. But, at the time, the Senators were not permitted to discuss the details publicly. Section 702 has taken on new importance this week, as it appears to form the basis for the extensive PRISM surveillance program reported recently in the Guardian and the Washington Post.

The government has seeked to block EFF’s FOIA suit by arguing that only the FISC, itself, can release the opinion.  In an effort to remove that roadblock, EFF filed a motion with the FISC on April 22 seeking the surveillance court’s consent to disclosure, should the document be found to be otherwise subject to release under FOIA.  In its response filed with the FISC today, the government offers a circular argument, asserting that only the Executive Branch can de-classify the opinion, but that it is somehow prohibited by the FISC rules from doing so.

The government’s argument is guaranteed to make heads spin. DOJ earlier argued that it lacks discretion to release the FISC opinion without the FISC’s consent, but DOJ now argues that if the FISC were to agree with EFF, “the consequence would be that the Government could release the opinion or any portion of it in its discretion.”  But FISC material is classified solely because the Executive Branch demands that it be, so release of the opinion has always been a matter of Executive discretion.

Frankly, it’s difficult to understand what DOJ is saying. The Government seems to have a knee-jerk inclination towards secrecy, one that often – as in this case – simply defies logic. The government’s bottom line is this: their rules trump the public’s statutory rights. But it’s not the province of the Executive branch to determine which rights citizens get to assert.

The events of the past week have demonstrated that the public is angry about the NSA’s domestic surveillance program. EFF hoped the public outcry might lead the government to rethink it’s position in this case (and, notably, DOJ has in two other EFF cases). But, for now, the government is digging in its heels and refusing to budge. But a democracy demands more. When the government acts unconstitutionally, the public has a fundamental right to review, understand, and correct that government action. Despite the DOJ’s filing today, EFF intends to keep fighting against the government’s secret surveillance practices.

June 8, 2013 Posted by | Civil Liberties, Deception, Progressive Hypocrite | , , , , | 1 Comment

Top-secret court order reveals NSA’s daily data collection on millions of Americans

RT | June 06, 2013

The US National Security Agency is currently collecting the telephone records of millions of unwitting individuals via a secret court order issued in April obtained by The Guardian newspaper, which has posted it online.

Unlike warrants that have been issued to collect the information of suspects targeted by intelligence agencies, the newly disclosed top secret order requires Verizon, one of the largest telecom agencies in the US, to provide both the FBI and the NSA information on all telephone calls made through its systems, both domestically and to foreign countries.

According to a copy of the order, Verizon is required to disclose the numbers of both parties during a call, as well as location, call duration, and other unique data on an “ongoing, daily basis.” Meaning that, regardless of whether an individual is suspected of or linked to any crime, the data of all Verizon customers is currently being delivered in bulk to the intelligence agency.

As to the authority claimed by the government via this order, that is specifically cited to fall under the “business records” provision of the PATRIOT Act of 2001, which was granted a four-year extension by President Obama in May of 2011.

It remains unclear as to whether the order, which spans a three-month period, represents a single instance, or is indicative of recurring cases of Verizon and other telephony providers being ordered to disclose all their clients’ call records.

The order itself, signed by Judge Roger Vinson of the Foreign Intelligence Surveillance Court, prohibits Verizon from alerting its customers of the FBI’s request for their records.

According to The Guardian, its reporters approached Verizon, the National Security Agency, the White House and the Department of Justice for comment ahead of its story, though all declined.

Though the agencies have yet to respond to the publication of the secret order, justification for the thus far unprecedented, warrantless request made to Verizon in April would fall under the interpretation of such “business records.” The latter applies to a wide-ranging amount of electronic “metadata,” though not the actual content of texts and voice calls.

The order seems likely to be associated with the NSA’s longstanding collection program over telephone, Internet and email data, which was secretly authorized by former president Bush in 2001, though not disclosed publicly until a 2006 USA Today report. That particular authorization applied to multiple carriers: AT&T, Verizon and BellSouth, and was intended to allow US intelligence services “to analyze calling patterns in an effort to detect terrorist activity.”

Julian Sanchez, a surveillance expert with the libertarian Cato Institute who spoke to The Guardian believes that the newly disclosed court order undermines the legal definition of reasonable suspicion.

“We’ve certainly seen the government increasingly strain the bounds of ‘relevance’ to collect large numbers of records at once — everyone at one or two degrees of separation from a target — but vacuuming all metadata up indiscriminately would be an extraordinary repudiation of any pretense of constraint or particularized suspicion,” said Sanchez.

June 6, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Progressive Hypocrite, Timeless or most popular | , , , , , | Leave a comment