Tag: NSA

NOT TO BE MISSED!

I have just finished reading questions and answers that were put forth to Edward Snowden.  Snowden’s answers are intelligent, most articulate and totally understandable/logical.

I urge you to do a read, as well.

Edward Snowden Q and A: “The US Government Destroyed Any Possibility of a Fair Trial at Home”

The whistleblower behind the biggest intelligence leak in NSA history answered questions about the NSA surveillance revelations.

June 17, 2013  

It is the interview the world’s media organisations have been chasing for more than a week, but instead  Edward Snowden is giving Guardian readers the exclusive.

The 29-year-old former NSA contractor and  source of the Guardian’s NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA’s top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.

Snowden, who has fled the US, told the Guardian he “does not expect to see home again”, but where he’ll end up has yet to be determined.

He will be online today from  11am ET/4pm BST today. An important caveat: the live chat is subject to Snowden’s security concerns and also his access to a secure internet connection. It is possible that he will appear and disappear intermittently, so if it takes him a while to get through the questions, please be patient.

To participate, post your question below and recommend your favorites. As he makes his way through the thread, we’ll embed his replies as posts in the live blog. You can also follow along on Twitter using the hashtag # AskSnowden.

We expect the site to experience high demand so we’ll re-publish the Q&A in full after the live chat has finished.

11.07am ET

Question:

GlennGreenwald

17 June 2013 2:11pm

Let’s begin with these:

1) Why did you choose Hong Kong to go to and then tell them about US hacking on their research facilities and universities?

2) How many sets of the documents you disclosed did you make, and how many different people have them? If anything happens to you, do they still exist?

Answer:

   1) First, the US Government, just as they did with other whistleblowers, immediately and predictably destroyed any possibility of a fair trial at home, openly declaring me guilty of treason and that the disclosure of secret, criminal, and even unconstitutional acts is an unforgivable crime. That’s not justice, and it would be foolish to volunteer yourself to it if you can do more good outside of prison than in it. . . .

I cannot see Snowden as anything but a man with a “nagging conscience,” such that steered him to his decision to reveal certain of his knowledges concerning the NSA activities.    

American As Apple Spy

Cross posted from The Stars Hollow Gazette

Rep. Alan Grayson on the NSA: American As Apple Spy

I haven’t said this in awhile, what digby said:

It’s astonishing that this is necessary, but apparently it is:

Mind Your Own Business Act photo grayson_zps5587b06f.png

Click on image to enlarge.

Quite simple and to the point. Now you can support The Mind Your Own Business act by signing the petition, here.

The 4th Amendment Need Not Apply

Cross posted from The Stars Hollow Gazette

At Crooks and Liars, Suzie Madrak points out an important fact about private government contractors, the Fourth Amendment does not apply to them:

This has been an ongoing scandal in the Iraq and Afghanistan wars. Attorney Susan L. Burke represented several groups of plaintiffs (including Abu Ghraib detainees and female soldiers who had been sexually assaulted) in lawsuits in which she tried to overturn the civil immunity of government contractors. She has not been successful, and the federal government continues to subcontract with private companies to do things that would be illegal if they did them themselves. So keep that in mind as you read these NSA stories.

She highlights an interview with 70’s whistleblower, Chris Pyle at Democracy Now, who disclosed the military’s spying on civilian politics and worked for three congressional committees to end it.

Pyle discovered the Army and CIA were spying on millions of Americans engaged in lawful political activity while he was in the Army working as an instructor. His revelations prompted Senate hearings, including Senator Frank Church’s Select Committee on Intelligence, ultimately leading to a series of laws aimed at curbing government abuses. Now teaching constitutional law and civil liberties at Mount Holyoke College, Pyle says the NSA is known for attacking its critics instead of addressing the problems they expose.



Full transcript can be read here

CHRISTOPHER PYLE: Yes. The forerunner of the PRISM system that Snowden disclosed was called Trailblazer. It wasted $1 billion on private contracts. It replaced a much less expensive system called ThinThread, which had more privacy protections and had been developed inside the government. Now, the reason that private contractors get this business is because members of Congress intercede with them with government agencies. And we now have a situation where members of the Intelligence Committee and other committees of Congress intercede with the bureaucracy to get sweetheart contracts for companies that waste taxpayers’ money and also violate the Constitution and the privacy of citizens. This is a very serious situation, because it means that it’s much more difficult to get effective oversight from Congress. [..]

CHRISTOPHER PYLE: Well, we all want to protect the security of the country. We all want to protect the Constitution. But when government agencies are totally unaccountable, we can’t do that. Members of Congress do not go to those briefings, even if they’re offered, because once you go to the briefing, then you can’t talk about what you’ve been told, because it’s classified. So the briefing system is designed to silence Congress, not to promote effective oversight.

Members of Congress don’t want to spend time on oversight. They’re too busy raising money. New members of the House of Representatives this winter were told by the Democratic Campaign Committee that they should spend between four and six hours a day dialing for dollars. They have no time to do the public’s business. They’re too busy begging for money. President Obama himself attended 220 fundraisers last year. Where does he get the time to be president when he’s spending so much time asking wealthy people for money to support his campaign? [..]

CHRISTOPHER PYLE: Well, it’s true. The NSA doesn’t want to hire people like you and me. We don’t know enough about the Internet. That said, it’s important to note that the vice chairman of Booz Allen happens to be Mike McConnell, who was former director of NSA and of national intelligence. There is a revolving door between high government positions and private corporations, and this revolving door allows these people to make a great deal more money upon leaving the government, and then being rented back to the government in a contractor capacity. And that’s part of the corruption of the system. [..]

CHRISTOPHER PYLE: Well, yes. The Fourth Amendment of the Constitution, which protects us from unreasonable searches and seizures, only binds the government, doesn’t bind corporations. That’s a serious problem. The reason we have privatization of prisons, in some ways, is for governments to escape liability. They put the liability on the private corporations that run the prisons, and they just charge their liabilities as an operating cost.

(All emphasis by Suzie.)

The Fourth Amendment of the Constitution, which protects us from unreasonable searches and seizures, only binds the government, doesn’t bind corporations.

Got that? This is the key to the rational behind privatizing everything from schools and prisons to national security. Keep it in mind as you read anything about the NSA whistleblowing and Edward Snowden.

DSWright at FDL News Desk hits the nail on the head, Freedom isn’t free:

The National Security Agency along with the CIA, FBI and other intelligence agencies of the U.S. government has been swapping information with private companies. In exchange for private companies giving the intelligence agencies information on their users, the private companies receive access to classified intelligence. The Corporate State indeed.

   Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.

   These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from Google Inc (GOOG). and other Internet companies under court order.

No wonder the tech firms did not complain about spying on American citizens, they were getting compensation in the form of access to classified intel. So now Wall Street gets to see classified intelligence? No wonder there were no prosecutions, they’re on the team. Too Big To Fail, Too Big To Jail, and too important to National Security. The National Security Agency along with the CIA, FBI and other intelligence agencies of the U.S. government has been swapping information with private companies. In exchange for private companies giving the intelligence agencies information on their users, the private companies receive access to classified intelligence. The Corporate State indeed. [..]

No wonder the tech firms did not complain about spying on American citizens, they were getting compensation in the form of access to classified intel. So now Wall Street gets to see classified intelligence? No wonder there were no prosecutions, they’re on the team. Too Big To Fail, Too Big To Jail, and too important to National Security.

Quid pro quo, as well, as liability protection, all on the tax payer’s dime.

Metadata: More Intrusive Than You Think

Cross posted from The Stars Hollow Gazette

Metadata:

Simply put, metadata is data about data. It is descriptive information about a particular data set, object, or resource, including how it is formatted, and when and by whom it was collected. Although metadata most commonly refers to web resources, it can be about either physical or electronic resources.

Sounds harmless, so how bad could it be? According to mathematician and former Sun Microsystems engineer Susan Landau who was interviewed by Jane Mayer of The New Yorker, it’s worse than many might think:

“The public doesn’t understand,” she told me, speaking about so-called metadata. “It’s much more intrusive than content.” She explained that the government can learn immense amounts of proprietary information by studying “who you call, and who they call. If you can track that, you know exactly what is happening-you don’t need the content.”

For example, she said, in the world of business, a pattern of phone calls from key executives can reveal impending corporate takeovers. Personal phone calls can also reveal sensitive medical information: “You can see a call to a gynecologist, and then a call to an oncologist, and then a call to close family members.” And information from cell-phone towers can reveal the caller’s location. Metadata, she pointed out, can be so revelatory about whom reporters talk to in order to get sensitive stories that it can make more traditional tools in leak investigations, like search warrants and subpoenas, look quaint. “You can see the sources,” she said. When the F.B.I. obtains such records from news agencies, the Attorney General is required to sign off on each invasion of privacy. When the N.S.A. sweeps up millions of records a minute, it’s unclear if any such brakes are applied.

Metadata, Landau noted, can also reveal sensitive political information, showing, for instance, if opposition leaders are meeting, who is involved, where they gather, and for how long. Such data can reveal, too, who is romantically involved with whom, by tracking the locations of cell phones at night.

Ms. Landua joined Amy Goodman and Nermeen Shaikh on Democracy Now to explain just how intrusive the government’s collection of metadata is.



Transcript can be read here.

Even Spying Is a Private Industry

Cross posted from The Stars Hollow Gazette

Like much of our government, spying has been privatized. 70% of surveillance is done by private companies that translates to $6 billion dollars with a half a million employees.

Meet the contractors analyzing your private data

by Tim Shorrock

Private companies are getting rich probing your personal information for the government. Call it Digital Blackwater

Amid the torrent of stories about the shocking new revelations about the National Security Agency, few have bothered to ask a central question. Who’s actually doing the work of analyzing all the data, metadata and personal information pouring into the agency from Verizon and nine key Internet service providers for its ever-expanding surveillance of American citizens?

Digital Blackwater: How the NSA Gives Private Contractors Control of the Surveillance State

Over the past decade, the U.S. intelligence community has relied increasingly on the technical expertise of private firms such as Booz Allen, SAIC, the Boeing subsidiary Narus and Northrop Grumman. About 70 percent of the national intelligence budget is now spent on the private sector. Former NSA Director Michael V. Hayden has described these firms as a quote “digital Blackwater.” We speak to Tim Shorrock, author of the book “Spies for Hire: The Secret World of Outsourced Intelligence.”

Down the Totalitarian Hole of a Security State

Cross posted st The Stars Hollow Gazette

William Binney, a former top official at the National Security Agency, and Glenn Greenwald, the Guardian journalist who has broken the NSA spying stories join Amy Goodman to discuss the crucial matters facing this country over the growing power of the government to secretly collect data and information through secret courts and programs.

“The government is not trying to protect [secrets about NSA surveillance] from the terrorists,” Binney says. “It’s trying to protect knowledge of that program from the citizens of the United States.”

“On a Slippery Slope to a Totalitarian State”: NSA Whistleblower Rejects Gov’t Defense of Spying



Transcript can be read here



Transcript can be read here

NSA Leak Highlights Key Role Of Private Contractors

by Jonathan Fahey and Adam Goldman

The U.S. government monitors threats to national security with the help of nearly 500,000 people like Edward Snowden – employees of private firms who have access to the government’s most sensitive secrets.

When Snowden, an employee of one of those firms, Booz Allen Hamilton, revealed details of two National Security Agency surveillance programs, he spotlighted the risks of making so many employees of private contractors a key part of the U.S. intelligence apparatus. [..]

Booz Allen, based in McLean, Va., provides consulting services, technology support and analysis to U.S. government agencies and departments. Last year, 98 percent of the company’s $5.9 billion in revenue came from U.S. government contracts. Three-fourths of its 25,000 employees hold government security clearances. Half the employees have top secret clearances.

The company has established deep ties with the government – the kinds of ties that contractors pursue and covet. Contractors stand to gain an edge on competitors by hiring people with the most closely held knowledge of the thinking inside agencies they want to serve and the best access to officials inside. That typically means former government officials.

The relationship often runs both ways: Clapper himself is a former Booz Allen executive. The firm’s vice chairman, John “Mike” McConnell, held Clapper’s position under George W. Bush.

Edward Snowden is an American hero who is risking his life to protect our freedom from a government run amok.

The man who broke the leaks story

Is Glenn Greenwald endangering America?

To listen to U.S. security officials, the columnist who revealed secret surveillance by the U.S. National Security Administration has exposed to terrorists the methods that the American government uses to prevent attacks.

Greenwald rejected and took issue with that argument in an interview with CNN’s Christiane Amanpour on Monday.

“I think that suggestion is so ludicrous that it’s actually an insult to the intelligence of the people at whom it’s directed,” he told Amanpour from Hong Kong, where the man who leaked intelligence on the NSA program is in self-imposed exile.

“Any terrorist that’s unaware that the government wants to [spy on them],” Greenwald said, “is a terrorist incapable of writing his own name, let alone detonating a bomb successfully on American soil.”

That has to be the stupidest question asked in the week since the revelations at the extent of the NSA spying on Americans was revelled by the Guardian and the Washington Post.   How is holding government accountable for its actions endangering anyone?   What gives the present administration the right to continue the subversion of the 4th Amendment to the U.S. Constitution? Absolutely nothing.  Yet because these programs where conceived under the Bush administration  and no President feels the need to abrogate a power once enshrined they felt the need to data mine every Americans telephone calls and e-mails.  You never know that recipe for apple pie could literally be a killer.    

NSA Whistleblower Comes Out of the Shadows

Despite the risks to his personal safety, the whistleblower who leaked the FISA court order and NSA surveillance programs to The Guardian has revealed himself. Prior to giving the tapes to columnist Glenn Greenwald, the 29 year old Edward Snowden chose to leave the US for Hong Kong because of it long history of respect for freedom of speech. Like six other whistleblowers, he expects that he will be charged by the Obama administration under the 1917 Espionage Act. In the 12 minute video that was produced and copyrighted* by American documentary film director and producer, Laura Poitras, he explains his decision to give the secret warrant and programs to Greenwald and leave the United States.

Edward Snowden: the whistleblower behind the NSA surveillance revelations

by Glenn Greenwald, Ewen MacAskill and Laura Poitras, The Guardian

The 29-year-old source behind the biggest intelligence leak in the NSA’s history explains his motives, his uncertain future and why he never intended on hiding in the shadows

The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell.

The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. “I have no intention of hiding who I am because I know I have done nothing wrong,” he said.

Snowden will go down in history as one of America’s most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the world’s most secretive organisations – the NSA.

Revealed: NSA collecting phone records of millions of Americans daily

Exclusive: Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama

Read the court order in full here

The National Security Agency is currently collecting the telephone records of millions of US customers of Verizon, one of America’s largest telecoms providers, under a top secret court order issued in April.

The order, a copy of which has been obtained by the Guardian, requires Verizon on an “ongoing, daily basis” to give the NSA information on all telephone calls in its systems, both within the US and between the US and other countries.

The document shows for the first time that under the Obama administration the communication records of millions of US citizens are being collected indiscriminately and in bulk – regardless of whether they are suspected of any wrongdoing.

The secret Foreign Intelligence Surveillance Court (Fisa) granted the order to the FBI on April 25, giving the government unlimited authority to obtain the data for a specified three-month period ending on July 19.

WIth the passage of the USA Patriot Act the U.S. government set about creating a true surveillance society .  Many believed that with the election of Barrack Obama these types of abuses woud end however that was just wishful thinking as the Obama administration has continued to abuse the rights of all Americans.

The order directs Verizon to “continue production on an ongoing daily basis thereafter for the duration of this order”. It specifies that the records to be produced include “session identifying information”, such as “originating and terminating number”, the duration of each call, telephone calling card numbers, trunk identifiers, International Mobile Subscriber Identity (IMSI) number, and “comprehensive communication routing information”.

This  is what authoritarian governments do to control their citizens:  Oppression out of fear of what those people would do if given the chance to actually express their opinions.   Except were talking about the United States of America not some third world dictatorship.  One has to assume that the U.S. Constitution  no longer applies considering the abuses of this and the past administration.  

Blowing in the Stellar Wind

Cross posted from The Stars Hollow Gazette

Stellar Wind  is the open secret code name for certain information collection activities performed by the United States’ National Security Agency and revealed by Thomas M. Tamm to New York Times reporters James Risen and Eric Lichtblau. The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.

The program’s activities involve data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.

There were internal disputes within the Justice Department about the legality of the program, because data is collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants. In March 2004, the Justice Department under Attorney General John Ashcroft ruled that the program was illegal. The day after the ruling, Ashcroft became critically ill with acute pancreatitis. President Bush sent White House counsel Alberto Gonzales and Chief of Staff Andrew Card Jr. to Ashcroft’s hospital bed, where Ashcroft lay semiconscious, to request that he sign a document reversing the Justice Department’s ruling. However, Ashcroft was incapable of signing the document. Bush then reauthorized the operation, over formal Justice Department objections. Federal Bureau of Investigation (FBI) director Robert Mueller, Acting Attorney General James Comey, and many prominent members of the Justice Department were prepared to resign over the matter. Valerie Caproni the FBI general counsel, said, “From my perspective, there was a very real likelihood of a collapse of government.” Bush subsequently reversed the authorization.

During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. Approximately 99 percent of the cases led nowhere, but 1 percent bore fruit. One of the known uses of this data was the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former NY governor Elliot Spitzer‘s use of prostitutes, even though he was not suspected of terrorist activities.

In March 2012 Wired Magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a new NSA facility and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail.” Naming the official William Binney a former NSA code breaker. Binney goes on to say that the NSA has highly secured rooms that tap into major switches, and satellite communications at AT&T and Verizon both. [4] The article suggests that the otherwise dispatched Stellar Wind is actually an active program.

The Program

by Laura Poitras

To those who understand state surveillance as an abstraction, I will try to describe a little about how it has affected me. The United States apparently placed me on a “watch-list” in 2006 after I completed a film about the Iraq war. I have been detained at the border more than 40 times. Once, in 2011, when I was stopped at John F. Kennedy International Airport in New York and asserted my First Amendment right not to answer questions about my work, the border agent replied, “If you don’t answer our questions, we’ll find our answers on your electronics.”‘ As a filmmaker and journalist entrusted to protect the people who share information with me, it is becoming increasingly difficult for me to work in the United States. Although I take every effort to secure my material, I know the N.S.A. has technical abilities that are nearly impossible to defend against if you are targeted.

The 2008 amendments to the Foreign Intelligence Surveillance Act, which oversees the N.S.A. activities, are up for renewal in December. Two members of the Senate Select Committee on Intelligence, Senators Ron Wyden of Oregon and Mark Udall of Colorado, both Democrats, are trying to revise the amendments to insure greater privacy protections. They have been warning about “secret interpretations” of laws and backdoor “loopholes” that allow the government to collect our private communications. Thirteen senators have signed a letter expressing concern about a “loophole” in the law that permits the collection of United States data. The A.C.L.U. and other groups have also challenged the constitutionality of the law, and the Supreme Court will hear arguments in that case on Oct. 29.

Laura Poitras is a documentary filmmaker who has been nominated for an Academy Award and whose work was exhibited in the 2012 Whitney Biennial. She is working on a trilogy of films about post-9/11 America. This Op-Doc is adapted from a work in progress to be released in 2013.

This video is part of a series by independent filmmakers who have received grants from the BRITDOC Foundation and the Sundance Institute.

Who is watching the NSA?

Giving In to the Surveillance

by Shane Harris

IN March 2002, John M. Poindexter, a former national security adviser to President Ronald Reagan, sat down with Gen. Michael V. Hayden, the director of the National Security Agency. Mr. Poindexter sketched out a new Pentagon program called Total Information Awareness, that proposed to scan the world’s electronic information – including phone calls, e-mails and financial and travel records – looking for transactions associated with terrorist plots. The N.S.A., the government’s chief eavesdropper, routinely collected and analyzed such signals, so Mr. Poindexter thought the agency was an obvious place to test his ideas.

He never had much of a chance. When T.I.A.’s existence became public, it was denounced as the height of post-9/11 excess and ridiculed for its creepy name. Mr. Poindexter’s notorious role in the Iran-contra affair became a central focus of the debate. He resigned from government, and T.I.A. was dismantled in 2003.

But what Mr. Poindexter didn’t know was that the N.S.A. was already pursuing its own version of the program, and on a scale that he had only imagined. A decade later, the legacy of T.I.A. is quietly thriving at the N.S.A. It is more pervasive than most people think, and it operates with little accountability or restraint. [..]

Senator Ron Wyden (D-OR) and Mark Udall (D-CO) asked the NSA a simple question: how many persons inside the United States have been spied upon by the NSA? I. Charles McCullough, the Inspector General of the Office of the Director of National Intelligence, answer was that to answer that question would violate the privacy of citizens. In other words, they probably don’t know.

In July, in response to a request from Sen. Wyden, IG McCullough declassified three statements “one of which indicated that the FISA court agreed with Wyden that the government had “circumvented the spirit of the law.” Even the Wall Street Journal reported that this “represented the first time the government has acknowledged U.S. spy activities violated the Constitution since the passage of” the Amendments Act in 2008.

Whistleblowers like Mr. Binney, Thomas Drake, as well as, journalists like Ms. Poitras and James Risen put their reputations, freedom and lives on the line to warn us about the unregulated, unmonitored surveillance of the NSA. No one is watching the NSA but they are watching us.

Trapwire: Worse Than 1984

Cross posted from The Stars Hollow Gazette

The recent release of e-mails from STRATFOR, a right wing global intelligence company, and documents about the surveillance system Trapwire by Wikileaks, has become the talk of the web and Twitter. David Seaman, an up and coming new media advocate and host of The DL Show, explains everything you need to know about Trapwire:

Anyway, here’s what Trapwire is, according to Russian-state owned media network RT (apologies for citing “foreign media”… if we had a free press, I’d be citing something published here by an American media conglomerate): “Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology-and have installed it across the U.S. under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. [..]

So: those spooky new “circular” dark globe cameras installed in your neighborhood park, town, or city-they aren’t just passively monitoring. They’re plugged into Trapwire and they are potentially monitoring every single person via facial recognition. [..]

In related news, the Obama administration is fighting in federal court this week for the ability to imprison American citizens under NDAA’s indefinite detention provisions-and anyone else-without charge or trial, on suspicion alone.

So we have a widespread network of surveillance cameras across America monitoring us and reporting suspicious activity back to a centralized analysis center, mixed in with the ability to imprison people via military force on the basis of suspicious activity alone.

The Young Turks’ host Cenk Uygur breaks down what Trapwire is and why it is a danger to individual freedom.

Noah Shachtman at The Danger Room takes an in depth look at the “sleazy” connection of STRATFOR to Trapwire and the CIA:

On Nov. 4, 2009, Fred Burton, the vice president of the private intelligence firm Stratfor, co-wrote an essay on emerging terrorist threats and the means to stop them. Particularly impressive, Burton wrote, was a new software tool called Trapwire, which works “with camera systems to help detect patterns of preoperational surveillance … to help cut through the fog of noise and activity and draw attention to potential threats.” [..]

What his customers reading that November 2009 essay may not have realized was that Burton was also marketing them a product. On Aug. 17 of that year, Stratfor and Trapwire signed a contract (.pdf) giving Burton’s company an 8 percent referral fee for any business they send Trapwire’s way. The essay was partially a sales pitch – a fact that Burton neglected to mention. [..]

That’s a breach of trust and possibly worse, says Matthew Aid, author of Intel Wars: The Secret History of the Fight Against Terror. “It’s a conflict of interest.” [..]

Stratfor’s now-famous business partner, Trapwire Inc., began as a division of Abraxas Corporation, one of the more prominent intelligence contractors to crop up after the 9/11 attacks. Begun by Richard “Hollis” Helms, the former head of the CIA’s European division, the company grew so quickly that by 2005, Helms boasted it was “the largest aggregate of analytical counter-terrorism capabilities outside of the U.S. government.” The CIA began entrusting Abraxas with one of its most sensitive tasks: constructing false identities, front companies, and cover stories for agents traveling overseas. At one point, so many CIA employees were jumping ship for Abraxas that the director of the CIA asked it, and a handful of other firms, to stop recruiting in the agency cafeteria.

Today, contractors make up about one-third of the 845,000 people with top-secret security clearances in this country, the Washington Post estimates. It’s safe to assume that at least the same portion of the $80 billion annual intelligence budget goes to these outside firms. The Post counted 1,931 private companies in nearly 10,000 locations across America working on counterterrorism, homeland security and intelligence efforts.

TrapWire is already used in New York, Los Angeles, Las Vegas, Texas, DC, London, and other locales around the USA. Although a spokesperson from NYPD denies that they are using Trapwire, there are other companies that are doing the same surveillance that are just as sinister. Remember that NYPD has labeled people “professional agitators” for filming their activities but now they have a tool that can be used to shut down peaceful demonstration and association. It could be easily used to violate the First and Fourth Amendment rights of citizens wherever this type of surveillance is used.

The Surveillance State of America

Cross posted from The Stars Hollow Gazette

NSA EagleIn 2005 while George W. Bush still sat in the Oval Office, James Bamford penned this article for the New York Times Week in Review titled The Agency That Could Be Big Brother. Mr. Bamford, the author of “Puzzle Palace” and “Body of Secrets: Anatomy of the Ultra-Secret National Security Agency“, wrote about the National Security Agency which was created in absolute secrecy in 1952 by President Harry S. Truman. This agency is now the largest of the security agencies surpassing the CIA and other spy organizations. And it is still growing. The agency now has sites all over the US and around the globe and we have no idea what their budget is or for that matter what they are doing with all that information. In 2005, controversy over whether the Pres. Bush broke the law when he secretly ordered the N.S.A. to bypass a special court (FISA) and conduct warrantless eavesdropping on American citizens had provoked some Democrats to call for his impeachment. Now today, Pres. Barack Obama, a Democrat, expands the NSA’a power and there is not silence, but support from the Democrats. We don’t even know how much is spent by the NSA since their budget is classified. Heh, Congress doesn’t know either. But I digress.

Columnist David Sirota wrote in the Seattle Times that the NSA now claims that “it can’t tell Congress about its activities violating the privacy of Americans because doing so might violate Americans’ privacy”.

In a letter to senators Ron Wyden, D-Ore., and Mark Udall, D-Colo., the agency wrote: “(A) review of the sort suggested would itself violate the privacy of U.S. persons.” [..]

So why would the NSA nonetheless refuse to provide one? Most likely because such an estimate would be a number so big as to become a political problem for the national-security establishment.

According to the nonpartisan Electronic Frontier Foundation, “The U.S. government, with assistance from major telecommunications carriers including AT&T, has engaged in a massive program of illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001.”

That’s right, millions – and that’s merely what happened with one of many programs over the last decade.

Moving forward, Wired notes that the NSA is building the “Utah Data Center” – “a project of immense secrecy” designed “to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.”

Appearing at the Socialism 2012 conference in Chicago, Salon.com contributing editor and civil rights lawyer, Glenn Greenwald gave a speech on Challenging the Surveillance State. Glen suggests that if you can’t watch all four videos the last one about the harms from ubiquitous surveillance is the most important one. He also points out FDL’s Kevin Gosztola’s excellent commentary and summation of the speech.

Load more