Tag: PATRIOT Act

Live Stream: Stop Watching Us Rally

Livestream: Stop Watching Us Rally

Live streaming video by Ustream

On October 26th, the 12th anniversary of the PATRIOT Act,

The full list, in order of appearance, includes:

Daniel Ellsberg, “Pentagon Papers” whistleblower

Phil Donahue, television talk-show pioneer

US Rep. John Conyers Jr. (D-MI), ranking Democrat on the House Judiciary Committee

David Segal, executive director of Demand Progress

Maggie Gyllenhaal, actor and activist

Oliver Stone, director of The Untold History of the United States and Nixon

John Cusack, actor and activist

Wil Wheaton, actor and writer

Molly Crabapple, artist and writer

Jesselyn Radack, U.S. Department of Justice whistleblower and national security and human rights director at the Government Accountability Project

J. Kirk Wiebe, NSA whistleblower

Mark Klein, AT&T whistleblower who revealed the telecommunications company’s collaboration with the NSA in collecting customer data

Thomas Drake, NSA whistleblower

Cindy Cohn, Legal Director at the Electronic Frontier Foundation

Dan Choi, LGBTQ activist and Iraq War veteran

Lawrence Lessig, Roy L. Furman Professor of Law and Leadership at Harvard Law School

The NSA: Bigger Is Not Better

Cross posted from The Stars Hollow Gazette

In the case of the NSA’s scooping up and storing all that private data, they ran into a glitch, too much information makes the job of surveillance harder

The volume of NSA contacts collection is so high that it has occasionally threatened to overwhelm storage repositories, forcing the agency to halt its intake with “emergency detasking” orders. Three NSA documents describe short-term efforts to build an “across-the-board technology throttle for truly heinous data” and longer-term efforts to filter out information that the NSA does not need.

Spam has proven to be a significant problem for NSA – clogging databases with data that holds no foreign intelligence value. The majority of all e-mails, one NSA document says, “are SPAM from ‘fake’ addresses and never ‘delivered’ to targets.”

In fall 2011, according to an NSA presentation, the Yahoo account of an Iranian target was “hacked by an unknown actor,” who used it to send spam. The Iranian had “a number of Yahoo groups in his/her contact list, some with many hundreds or thousands of members.”

The cascading effects of repeated spam messages, compounded by the automatic addition of the Iranian’s contacts to other people’s address books, led to a massive spike in the volume of traffic collected by the Australian intelligence service on the NSA’s behalf.

After nine days of data-bombing, the Iranian’s contact book and contact books for several people within it were “emergency detasked.”

LOL. The NSA has a spam problem.

Meanwhile, the head of the NSA, Gen. Keith Alexander has had to admit to the Senate Intelligence Committee that he lied back in June about those 54 terrorists plots he claimed were “thwarted” by the agency’s phone surveillance program.

Alexander admitted that only 13 of the 54 cases were connected to the United States. He also told the committee that only one or two suspected plots were identified as a result of bulk phone record collection.

Leahy was not happy. “We’re told we have to (conduct mass phone surveillance) to protect us, and the statistics are rolled out that they’re not accurate,” he said. “It doesn’t have the credibility here in the Congress, it doesn’t have the credibility with this chairman and it doesn’t have the credibility with the country.”

Over at the Wall Street Journal, in an op-ed behind a paywall, the committee chair, Sen Dianne Feinstein trotted out the old “9/11 be very afraid” canard and repeated the debunked Alexander lie.

Consider the case of 9/11 hijacker Khalid al-Mihdhar, who was being watched by the CIA while he was in Malaysia. U.S. intelligence agencies failed to connect the dots before the attack to recognize that al-Mihdhar had flown with (future) hijacker Nawaf al-Hazmi to Los Angeles in January 2000.

Intelligence officials knew about an al Qaeda safe house in Yemen with ties to al-Mihdhar as well as the safe house’s telephone number, but they had no way of knowing if anyone inside the U.S. was in contact with that phone number in Yemen. Only after 9/11 did we learn that al-Mihdhar, while living in San Diego, had called the safe house. [..]

Working in combination, the call-records database and other NSA programs have aided efforts by U.S. intelligence agencies to disrupt terrorism in the U.S. approximately a dozen times in recent years, according to the NSA. This summer, the agency disclosed that 54 terrorist events have been interrupted-including plots stopped and arrests made for support to terrorism. Thirteen events were in the U.S. homeland and nine involved U.S. persons or facilities overseas. Twenty-five were in Europe, five in Africa and 11 in Asia.

Can everyone say say Richard Clark.

At Techdirt, Mike Masnick points out none of what Sen. Feinstein said is true:

First off, as has been explained over and over again, the intelligence community already had certain tools in place to discover such phone calls. The problem wasn’t that they didn’t have the information — they did. It was that they failed to “connect the dots.” In other words, they had too much information which obscured the important information they needed. [..]

Note the all important “and other NSA programs” language here. Also the use of “terrorist events” not plots. And, remember, those “thirteen events… in the U.S. homeland,” have since been whittled down to only one that actually relied on the call records program that she’s defending — and that wasn’t a terrorist plot but a cab driver in San Diego sending some cash to a Somali group judged to be a terrorist organization.

So, we have elected representatives and high paid appointees blatantly lying and getting away with it to protect their turf with no one is holding them accountable,

Never Mind Bush, Obama Worse Than Nixon

Cross posted from The Stars Hollow Gazette

This is the most closed, control-freak administration I’ve ever covered.

That is what David E. Sanger, the chief Washington correspondent for the New York Times, told former Washington Post executive editor Leonard Downie. Sanger was one of 30 journalists Downie interviewed for a report on the Obama administration’s efforts to control leaks. Downie, who was one of the editors involved in the Post’s Watergate investigation, called the administration’s “war on leaks” the most aggressive since the Nixon administration.

The Obama Administration and the Press

by Leonard Downie Jr. with reporting by Sara Rafsky, Committee to Protect Journalists

Leak investigations and surveillance in post-9/11 America

U.S. President Barack Obama came into office pledging open government, but he has fallen short of his promise. Journalists and transparency advocates say the White House curbs routine disclosure of information and deploys its own media to evade scrutiny by the press. Aggressive prosecution of leakers of classified information and broad electronic surveillance programs deter government sources from speaking to journalists.

Compounding the concerns of journalists and the government officials they contact, news stories based on classified documents obtained from Snowden have revealed extensive surveillance of Americans’ telephone and e-mail traffic by the National Security Agency. Numerous Washington-based journalists told me that officials are reluctant to discuss even unclassified information with them because they fear that leak investigations and government surveillance make it more difficult for reporters to protect them as sources. “I worry now about calling somebody because the contact can be found out through a check of phone records or e-mails,” said veteran national security journalist R. Jeffrey Smith of the Center for Public Integrity, an influential nonprofit government accountability news organization in Washington. “It leaves a digital trail that makes it easier for the government to monitor those contacts,” he said.

“I think we have a real problem,” said New York Times national security reporter Scott Shane. “Most people are deterred by those leaks prosecutions. They’re scared to death. There’s a gray zone between classified and unclassified information, and most sources were in that gray zone. Sources are now afraid to enter that gray zone. It’s having a deterrent effect. If we consider aggressive press coverage of government activities being at the core of American democracy, this tips the balance heavily in favor of the government.”

At the same time, the journalists told me, designated administration spokesmen are often unresponsive or hostile to press inquiries, even when reporters have been sent to them by officials who won’t talk on their own. Despite President Barack Obama’s repeated promise that his administration would be the most open and transparent in American history, reporters and government transparency advocates said they are disappointed by its performance in improving access to the information they need.

In an interview with Amy Goodman on Democracy Now!, Leonard Downey discusses freedom of the press and the Obama administration.

I found that these leaks investigations and a program called the Insider Threat Program, instituted since the Bradley Manning leaks, that requires government employees to monitor each other to make sure that they’re not leaking information to anyone, including journalists, to have really frightened government officials. Many, many reporters that I interviewed here in Washington say that government officials are afraid to talk to them. They’re afraid that their telephone conversations and their email exchanges would be monitored. That is to say that investigators could come in later, as they did in several leaks investigations, and use their telephone and email records in order to find the contacts between government officials and reporters. So they’re simply scared to talk to reporters.

And this, this is not good, because-I just heard the president saying that he was concerned about the safety of our troops and our intelligence officers. It’s important that responsible, knowledgeable government officials be able to talk to reporters about these matters, so that, among other things, they can alert reporters to information that might be harmful to national security or harmful to human life, in which case no responsible news organization would publish those.



Transcript can be read here

Let the Debate Continue

Cross posted from The Stars Hollow Gazette

The Work of a Generation

NSA whistleblower Edward Snowden’s words were entered as testimony at the European Parliament’s Civil Liberties Committee in Brussels on Monday.

Jesselyn Radack of the US Government Accountability Project (GAP) and a former whistleblower and ethics adviser to the US Department of Justice, read Snowden’s statement into the record.



This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License

Transcript can be read here.

The First Thing We Do, Fire All the Liars

Cross posted from The Stars Hollow Gazette

In Shakespeare’s “Henry VI,” the character Dick the Butcher, a follower of the rebel Jack Cade, uttered the words, “The first thing we do, let’s kill all the lawyers.” If taken in the context of the play, the line, intended as a comedic aside, was actually a compliment to those lawyers who upheld the laws and protected society. Those words have taken on different meaning over the years and are now often used in reference to those lawyers who have twisted the laws to protect the corrupt and dishonest and, often as not, defend illegal wars and torture, as well as, circumvent the US Constitution. It has often been rephrased, as the title of this article, to fit a narrative, as in the case of “reforming” the NSA, “the first thing we do, is fire all the liars.

Leading First Amendment lawyer, James Goodale, is the former general council to the New York Times and was the driving force behind the NYT‘s decision to publish the Pentagon Papers in 1971. He was instrumental in the winning strategy that resulted in the 6 – 3 Supreme Court ruling that the US government could not stop the Times from publishing the documents. In his opinion piece at The Guardian on the proposed reforming of the NSA, Prof. Goodale noted that President Barack Obama’s first concern should be to fire all the liars, starting with the Director of National Intelligence, James R Clapper and  General Keith Alexander, director of the National Security Agency, among others who have both blatantly lied to Congress.

NSA lawyers lied to secret Fisa court Judges John D Bates and Reggie B Walton. In recently released opinions, Bates said he had been lied to on three separate occasions and Walton said he had been lied to several times also.

But Clapper and Alexander have not been held in contempt of Congress. Nor have the Justice Department attorneys, who lied to Judges Walton and Bates, been disciplined. Part of the answer as to why this is so came out last week.

The Justice Department told USA Today that it had no intention of investigating the attorneys who lied to those judges. In the ordinary course, the Justice Department’s office of professional responsibility investigates the behavior of lawyers who have been subject to accusations such as those made by Judges Bates and Walton.

(emphasis mine)

You read that correctly, the Obama DOJ has no intention of investigating the attorneys who lied to Judges Bates and Walton

The Justice Department’s Office of Professional Responsibility routinely probes judges’ allegations that the department’s lawyers may have violated ethics rules that prohibit attorneys from misleading courts. Still, OPR said in response to a Freedom of Information Act request by USA TODAY that it had no record of ever having investigated – or even being made aware of – the scathing and, at the time, classified, critiques from the Foreign Intelligence Surveillance Court between 2009 and 2011.

Prof. Goodall also calls Pres. Obama’s statement in his August 9, 2013 address on the NSA that he would appoint experts to examine NSA practices, “reasonable” but points out that it doesn’t appear to be going anywhere:

Robert Atkinson, the president of the Information Technology and Innovation Foundation and an attendee, told the Guardian the he “did not hear much discussion” of changes to the bulk surveillance activities.

“My fear is it’s a simulacrum of meaningful reform,” said Sascha Meinrath, a vice president of the New America Foundation, an influential Washington think tank, and the director of the Open Technology Institute, who also attended. “Its function is to bleed off pressure, without getting to the meaningful reform.”

It’s pretty predictable that there will be no meaningful reform coming from a committee comprised of intelligence insiders, former White House officials and Obama advisers.

Michael Morell, a former deputy CIA director, is a member, as is Richard Clarke, a White House counter-terrorism aide to three presidents. Cass Sunstein, a former White House regulatory staffer who is married to the new US ambassador to the United Nations; Geoffrey Stone, a University of Chicago law professor; and Peter Swire, a Georgia Tech professor and former aide to Obama and Bill Clinton, round out the panel.

Over at emptywheel, Marcy Wheeler pointed out a detail that Prof. Goodale missed:

In just its third open hearing this year, the Senate Intelligence Committee has arranged the following witnesses for tomorrow’s hearing on NSA’s spying.

   Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) and Vice Chairman Saxby Chambliss (R-Ga.) today announced the committee will hold an open hearing to consider legislative changes to the Foreign Intelligence Surveillance Act, to include the NSA call records program, on Thursday, September 26, at 2 p.m.

   WHAT:  Public hearing on FISA, NSA call records

   WHO:

   Panel I

       Director of National Intelligence James Clapper

       National Security AgencyDirector General Keith Alexander

       Deputy Attorney General James Cole

   Panel II

       Ben Wittes, Brookings Institution

       Tim Edgar, Watson Institute for International Studies, Brown University

So DiFi’s idea of an “open hearing” is to invite two established liars. And for her non-governmental witnesses, one keeps declaring Congress NAKED! in the face of evidence the government lies to them, and the other tells fanciful stories about how much data NSA shares.

It’s like DiFi goes out of her way to find liars and their apologists to testify publicly. [..]

It’s DiFi’s committee. And if she wants every single open hearing to serve as a platform for accomplished liars, I guess that’s her prerogative.

But observers should be clear that’s the purpose of the hearings.

As Prof Goodale concludes, the culture of lying to the public and courts by the US intelligence community is nothing new but it lies with President Obama to force the NSA to change. The best place for that change would be to fire the liars, Clapper and Alexander. So far, it appears the president is not much interested in that solution.

Obama Defends NSA Surveillance on the Way to the G-20

Cross posted from The Stars Hollow Gazette

During his stop over in Stockholm, Sweden on the way to the G-20, President Barack Obama renewed his defense of unfettered surveillance

“I can give assurances to the publics in Europe and around the world that we’re not going around snooping at people’s emails or listening to their phone calls,” Obama said in response to a Swedish reporter’s question during a news conference with Prime Minister Fredrik Reinfeldt as he began a whirlwind, 24-hour trip to Sweden. “What we try to do is to target very specifically areas of concern.”

Still, the president acknowledged that questions about privacy were likely to trail him in Europe – a continent that is protective of privacy rights – for some time. The issue also bubbled up during his trip to Germany in June, shortly after newspapers published reports based on documents leaked by former government contractor Edward Snowden.

Despite Obama’s assertions of a more narrow-scope effort, the Snowden-leaked documents show the NSA collects and stores all kinds of data traveling through the Internet, including emails, video chats and instant messages. Under one such classified program, known as Prism, the government can obtain secret court orders and gather mass amounts of data from major Internet companies such as Google, Apple, Microsoft and Facebook.

The ACLU is challenging the constitutionality of the intelligence agency’s action filing a complaint in the Southern District of New York against James Clapper in June. An up date on that lawsuit was posted today on their web site. (please note that the link contains an interesting but really annoying gif).

An impressive array of organizations and individuals filed amicus briefs yesterday in support of the ACLU’s constitutional challenge to the government’s collection of the call records of virtually everyone in the United States. The range of voices joining the protest against mass government surveillance-not to mention the bipartisan storm that has swept Congress since the recent NSA disclosures – is a real testament to the fact that the government’s dragnet surveillance practices are offensive to Americans from across the political spectrum.

Among the groups supporting our lawsuit are the National Rifle Association, the Reporters Committee for Freedom of the Press, and the PEN American Center. Philosophy Professor Michael Lynch submitted a brief arguing that privacy is fundamental to human dignity. Our friends at the Electronic Frontier Foundation submitted a brief on behalf of Rep. Jim Sensenbrenner (R-Wis.), one of the authors of the Patriot Act. Rep. Sensenbrenner has decried the now-public call-records program as outside the scope of the law he authored.

Yes, you’re reading that right, the NRA and Rep. Sensenbrenner.

NSA surveillance: National Rifle Association backs ACLU challenge

by Ewen MacAskill, The Guardian

Anger at US government’s data trawling creates unlikely alliance in court between NRA and American Civil Liberties Union

The NRA, in an amicus brief in support of the ACLU, argues that the mass surveillance programme provides “the government not only with the means of identifying members and others who communicate with the NRA and other advocacy groups, but also with the means of identifying gun owners without their knowledge or consent”.

EFF Files Brief on Behalf of Rep. Sensenbrenner in NSA Spying Case

Press release from Electronic Freedom Foundation

Original Patriot Act Author Says Call-Data Collection Exceeds Congressional Intent

San Francisco – The Electronic Frontier Foundation (EFF) today filed a brief on behalf of Rep. Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, in a case brought by the American Civil Liberties Union (ACLU) against the National Security Agency (NSA). In the brief, Sensenbrenner argues that Congress never intended the Patriot Act to permit the NSA’s collection of the records of every telephone call made to, from and within the United States. Sensenbrenner urges the court to deny the NSA’s motion to dismiss and grant the ACLU’s motion for a preliminary injunction, which would halt the program until the case is decided.

In another development today, hundreds of pages from NSA spying documents are to be released in response to an FOIA request by EFF:

In a major victory in one of EFF’s Freedom of Information Act (FOIA) lawsuits, the Justice Department conceded yesterday that it will release hundreds of pages of documents, including FISA court opinions, related to the government’s secret interpretation of Section 215 of the Patriot Act, the law the NSA has relied upon for years to mass collect the phone records of millions of innocent Americans. [..]

While the government finally released a white paper detailing its expansive (and unconstitutional) interpretation of Section 215 last month, more important FISA court opinions adopting at least part of that interpretation have remained secret. The results of EFF’s FOIA lawsuit will finally lift the veil on the dubious legal underpinnings of NSA’s domestic phone surveillance program.

This victory for EFF comes on the heels of another FOIA success two weeks ago, when the Justice Department was also forced to release a 2011 FISA court opinion ruling some NSA surveillance unconstitutional.

Now to that gif. It is visualization demonstrating the staggering scope of the NSA’s surveillance. Click on the image to view.

ACLU NRA photo blog-3hops-500x280-v01_zpsa00e2a91.jpg

Worse Than NSA: DEA Deal with AT&T

Cross posted fromThe Stars Hollow Gazette

In the midst of the angst of the debate over Obama bombing Syria, a front page article in Monday’s New York Times has revealed a new surveillance scandal involving a little known deal between the Drug Enforcement Agency (DEA) and AT&T called the Hemisphere Project. That deal gives the DEA access to 26 years of its phone records:

Unlike the controversial call record accesses obtained by the NSA, the data is stored by AT&T, not the government, but officials can access individual’s phone records within an hour of an administrative subpoena.

AT&T receives payment from the government in order to sit its employees alongside drug units to aid with access to the data.

The AT&T database includes every phone call which passes through the carrier’s infrastructure, not just those made by AT&T customers.

Details of the program – which was marked as law enforcement sensitive, but not classified – were released in a series of slides to an activist, Drew Hendricks, in response to freedom of information requests, and then passed to reporters at the New York Times.

Officials were instructed to take elaborate steps to ensure the secrecy of the Hemisphere program, a task described as a “formidable challenge” in the slide deck, which detailed the steps agencies had taken to “try and keep the program under the radar”.

The NYT‘s national security reporter, Scott Shane joined Democracy Now!‘s Amy Goodman to discuss the Hemisphere Project and it’s impact.



The transcript for this segment was not available at this time.

NSA: Oversight or Coverup?

Cross posted from The Stars Hollow Gazette

NSA Spying: The Three Pillars of Government Trust Have Fallen

by Cindy Cohn and Mark Jaycox, Electronic Frontier Foundation

With each recent revelation about the NSA’s spying programs government officials have tried to reassure the American people that all three branches of government-the Executive branch, the Judiciary branch, and the Congress-knowingly approved these programs and exercised rigorous oversight over them. President Obama recited this talking point just last week, saying: “as President, I’ve taken steps to make sure they have strong oversight by all three branches of government and clear safeguards to prevent abuse and protect the rights of the American people.”  With these three pillars of oversight in place, the argument goes, how could the activities possibly be illegal or invasive of our privacy?

Today, the Washington Post confirmed that two of those oversight pillars-the Executive branch and the court overseeing the spying, the Foreign Intelligence Surveillance Court (FISA court )- don’t really exist. The third pillar came down slowly over the last few weeks, with Congressional revelations about the limitations on its oversight, including what Representative Sensennbrenner called “rope a dope” classified briefings. With this, the house of government trust has fallen, and it’s time to act.

Latest Leak: NSA Abused Rules To Spy On Americans ‘Thousands Of Times Each Year

by Mike Masnick, TechDirt

(T)he latest report from the Washington Post based on leaked documents shows that an audit of the NSA’s activities shows it broke privacy rules, mostly to spy on Americans, thousands of times per year:

   The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents.

   Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by law and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls.

The audit info comes from Ed Snowden’s leaks, so it seems rather incredible that President Obama, Keith Alexander and Mike Rogers didn’t seem to realize that this audit would eventually come to light, showing that they were flat out 100% lying to the American public.

That’s Not Oversight: Head Of FISC Admits He Relies On NSA’s Statements To Make Sure They’re Obeying The Law

by Mike Masnick, TechDirt

The chief judge of FISC, Reggie Walton, who has reacted angrily in the past to the claims of FISC being a “rubber stamp”, has now admitted that the FISC really can’t check on what the NSA is doing and relies on what they tell him to make sure that they’re not breaking the law.

   “The FISC is forced to rely upon the accuracy of the information that is provided to the Court,” its chief, U.S. District Judge Reggie Walton, said in a written statement to The Washington Post. “The FISC does not have the capacity to investigate issues of noncompliance, and in that respect the FISC is in the same position as any other court when it comes to enforcing [government] compliance with its orders.”

That’s not quite true. You see, with “any other court” when it comes to “enforcing compliance” things aren’t all hidden away from everyone, so there is scrutiny to make sure that there’s compliance. Not here.

Either way, this again shows just how laughable President Obama’s claims are about the FISC’s oversight abilities:

   “We also have federal judges that we’ve put in place who are not subject to political pressure,” Obama said at a news conference in June. “They’ve got lifetime tenure as federal judges, and they’re empowered to look over our shoulder at the executive branch to make sure that these programs aren’t being abused.”

Not quite. Now we know that they rely on the NSA to tell the judges what they might see if they were looking over their shoulders… and the NSA isn’t entirely truthful to FISC about that.

The latest revelation that the House Intelligence Committee withheld surveillance information from Congress before a critical vote to renew the Patriot Act has resulted in pressure from both side of the aisle and government watch dogs on committee chair Mike Rogers (R-MI). The demand is for an explanation of why a document that prepared by the justice department and intelligence community was not shared by the panel’s leadership. From Spencer Ackerman at The Guardian:

The accusations broaden the focus of the surveillance controversy from the National Security Agency to one of the congressional committees charged with exercising oversight of it – and the panel’s closeness to the NSA it is supposed to oversee.

(Michigan Republican Justin) Amash told the Guardian on Monday that he had confirmed with the House intelligence committee that the committee did not make non-committee members aware of the classified overview from 2011 of the bulk phone records collection program first revealed by the Guardian thanks to whistleblower Edward Snowden. The document was expressly designed to be shared with legislators who did not serve on the panel; it appears that a corresponding document for the Senate in 2011 was made available to all senators.

“Nobody I’ve spoken to in my legislative class remembers seeing any such document,” Amash said.

Amash speculated that the House intelligence committee withheld the document in order to ensure the Patriot Act would win congressional reauthorization, as it ultimately did.

On Monday, a former senate staffer Jennifer Hoelzer, who was deputy chief of staff for Sen. Ron Wyden (D-OR), spoke with Amy Goodman of Democracy Now! on President Barack Obama’s proposed changes to reform the government’s surveillance policies and programs.



Full transcript can be read here

“Unfortunately Edward Snowden was the only means by which we have been able to have this debate,” Hoelzer says. “We, working for Senator Wyden, did everything to try to encourage the administration to bring these facts to light. We’re not talking about sources and methods, we’re not talking about sensitive materials, we’re talking about what they believed the law allows them to do.”

As Spencer Ackerman points out in his article, both Chairman Rogers and his ranking Democratic counterpart, Dutch Ruppersberger of Maryland, are “staunch advocates of the NSA bulk surveillance programs.”

This is the government’s definition of “oversight.”

Encrypted E-Mail , FISA and Our Privacy Rights

Cross posted from The Stars Hollow Gazette

Last week, Lavabit, the privacy-conscious email service, suspended operations by its owner Ladar Levison while he fights the US government over Constitutional rights in the 4th Circuit Court of Appeals. In his letter to his customers, Mr. Levison wrote

My Fellow Users,

I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what’s going on–the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise. As things currently stand, I cannot share my experiences over the last six weeks, even though I have twice made the appropriate requests.

What’s going to happen now? We’ve already started preparing the paperwork needed to continue to fight for the Constitution in the Fourth Circuit Court of Appeals. A favorable decision would allow me resurrect Lavabit as an American company.

This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.

Sincerely,

Ladar Levison

Owner and Operator, Lavabit LLC

(emphasis mine)

Lavabit allows its customers send highly encrypted emails that even if intercepted by a third party could not be opened without a password. Based in the US, it is the e-mail service that was allegedly used by whistleblower Edward Snowden.

In an exclusive interview with Amy Goodman on Tuesday’s Democracy Now!, Lavabit owner Ladar Levison and his lawyer, Jesse Binnall discuss why the decision was made to shut down rather than comply with a government order



Transcript can be read here

“I think if the American public knew what our government was doing, they wouldn’t be allowed to do it anymore.

“I mean, there’s information that I can’t even share with my lawyer, let alone with the American public. So if we’re talking about secrecy, you know, it’s really been taken to the extreme.

“And I think it’s really being used by the current administration to cover up tactics that they may be ashamed of.”

~Ladar Levison~

Another encrypted service, Silent Circle has also announced it has shut down. Although it had not yet received any government requests for data, Silent Circle told Tech Crunch that it knew the government would come after them because of the high-profile nature of its users.

Despite the Promise, Still No Tranparency on Surveillance

Cross posted from The Stars Hollow Gazette

During his press conference on Friday, President Barack Obama admitted, without giving him credit, that the reason the conversation on the NSA is now taking place is thanks to Edward Snowden.

“The leaks triggered a much more rapid and passionate response than would have been the case if I had simply appointed this review board,” Obama said, while adding, “I actually think we would have gotten to the same place-and we would have done so without putting at risk our national security.”

With public opinion rapidly eroding over the surveillance, the president still refused to concede that the program was abused:

“America is not interested in spying on ordinary people,” Obama said. The surveillance programs, he said, were valuable and “should be preserved.” The flaw, if there was one, he said, lay in his assumption that the public would trust that the “checks and balances” in place between the administration, Congress, and the courts was enough to secure personal freedom. Instead, he said, after Snowden’s revelations, “I think people have questions about this program.”

While Obama promised a to create an an independent advisory group made up of “outside experts” who will review controversial surveillance programs, it’s pretty clear that [the group won’t exactly be completely independent of the NSA, as Marcy Wheeler reports:

In the memo Obama just released (pdf) ordering James Clapper to form such a committee, those words “outside” and “independent” disappear entirely.

   I believe it is important to take stock of how these technological advances alter the environment in which we conduct our intelligence mission. To this end, by the authority vested in me as President by the Constitution and the laws of the United States of America, I am directing you to establish a Review Group on Intelligence and Communications Technologies (Review Group).

   The Review Group will assess whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust. Within 60 days of its establishment, the Review Group will brief their interim findings to me through the Director of National Intelligence (DNI), and the Review Group will provide a final report and recommendations to me through the DNI no later than December 15, 2013. [my emphasis]

And neither Obama nor the Intelligence Committees get to hear from this Group themselves. It all goes through James Clapper.

And the other group members

President Obama and Director Clapper may solicit advice from notable figures in the technology industry; the president reportedly met with several leaders last Thursday, including Apple CEO Tim Cook and Google VP Vint Cerf. But with both Apple and Google implicated in some level of cooperation with the government under PRISM, the government may need to solicit input from a broader coalition of stakeholders.

So, Obama is putting the liar in charge, asking advice from those who willingly aided and abetted the spying and isn’t going to make the report public but expects this will win over public opinion. Yeah, right. If the public falls for this malarkey, I have a bridge to sell, too.

The Greatest Lies Ever Told

Cross posted from The Stars Hollow Gazette

Someone suggested that latest lie told by President Barack Obama on the Jay Leno Show that other night stating, “There is no spying on Americans. We don’t have a domestic spying program,” was up there with the 10 greatest lies ever told. That fallacy of the president’s declaration was made very obvious in a New York Times article by Charlie Savage on the latest and greatest NSA domestic surveillance program. The NSA has been copying virtually all overseas messages that Americans send or receive, scanning them to see if they contain any references to people or subjects the agency thinks might have a link to terrorists.

Hints of the surveillance appeared in a set of rules, leaked by Mr. Snowden, for how the N.S.A. may carry out the 2008 FISA law. One paragraph mentions that the agency “seeks to acquire communications about the target that are not to or from the target.” The pages were posted online by the newspaper The Guardian on June 20, but the telltale paragraph, the only rule marked “Top Secret” amid 18 pages of restrictions, went largely overlooked amid other disclosures.

In an opinion by the New York Times Editorial Board, these messages could be very private and no connection to terrorists or terrorist activity:

That could very well include innocent communications between family members expressing fears of a terror attack. Or messages between an editor and a reporter who is covering international security issues. Or the privileged conversation between a lawyer and a client who is being investigated.

Data collection on this scale goes far beyond what Congress authorized, and it clearly shreds a common-sense understanding of the Fourth Amendment. It’s as if the government were telling its citizens not to even talk about security issues in private messages or else they will come to the attention of the nation’s spies.

At the Electronic Frontier Foundation, Mark Rumold explains what it means to be an NSA target:

When “Target” Means Searching a Specific Person’s Communications

First, at least this much is clear: a “target” under the FA (FISA Amendments Act ) must be (a) a non-US person and (b) not physically located within the United States. A “person,” for purposes of the FAA, includes individuals as well as “any group, entity, association, corporation, or foreign power.”  Under the FAA, the government can thus “target” a single individual (e.g., Vladimir Putin), a small group of people (e.g., Pussy Riot), or a formal corporation or entity (e.g., Gazprom).

So, when the NSA decides to “target” someone (or something), it turns its specific surveillance vacuum at them. [..]

When “Target” Means Searching Everyone’s Communications

Once a target is established, the NSA believes it can expand the sweep of its interception far more broadly than the communhttp://www.guardian.co.uk/world/interactive/2013/jun/20/exhibit-a-procedures-nsa-documentications of the particular, identified target. Notably, the NSA’s procedures state (emphasis added):

   [I]n those cases where NSA seeks to acquire communications about the target that are not to or from the target, NSA will either employ an Internet Protocol filter to ensure that the person from whom it seeks to obtain foreign intelligence information is located overseas, or it will target Internet links that terminate in a foreign country.

In plain English: the NSA believes it not only can (1) intercept the communications of the target, but also (2) intercept communications about a target, even if the target isn’t a party to the communication. The most likely way to assess if a communication is “about” a target is to conduct a content analysis of communications, probably based on specific search terms or selectors.

And that, folks, is what we call a content dragnet.

Importantly, under the NSA’s rules, when the agency intercepts communications about a target, the author or speaker of those communications does not, thereby, become a target: the target remains the original, non-US person. But, because the target remains a non-US person, the most robust protection for Americans’ communications under the FISA Amendments Act (and, indeed, the primary reassurance the government has given about the surveillance) flies out the window. If you communicate about a target of NSA surveillance, your citizenship is irrelevant: the only thing standing between you and NSA surveillance is your IP address or the fiber optic path through which your communications flow.

Jameel Jaffer, American Civil Liberties Union deputy legal director, made the following comments about the latest revelations:

“The program described by the New York Times involves a breathtaking invasion of millions of people’s privacy.  The NSA has cast a massive dragnet over Americans’ international communications, collecting and monitoring all of them, and retaining some untold number of them in government databases.  This is precisely the kind of generalized spying that the Fourth Amendment was intended to prohibit.

“The government’s scrutiny of virtually every international email sent by Americans will have extraordinary consequences for free expression. Americans will inevitably hesitate to discuss controversial topics, visit politically sensitive websites, or interact with foreigners with dissenting views. By injecting the NSA into virtually every cross-border interaction, the U.S. government will forever alter what has always been an open exchange of ideas.

“There is no spying on Americans. We don’t have a domestic spying program,” is right up there with “I am not a crook” and “I did not have sex with that woman.”

NSA Handing Information to DEA and DOJ

Cross posted from The Stars Hollow Gazette

The National Security Agency isn’t just looking to “keep us safe” from terrorists by collecting metadata, the NSA is sharing its information with the secretive Special Operations Division of the U.S. Drug Enforcement Administration (DEA) which is then passing that information to local authorities, covering up the NSA source.

U.S. directs agents to cover up program used to investigate Americans

by John Shiffman and Kristina Cooke, Reuters

A secretive US Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.

It isn’t just the DEA that is doing this, the Justice Department is also receiving information about non-terrorist related criminal activity.

NSA handing over non-terror intelligence

by Stewart M. Powell, SFGate

The National Security Agency is handing the Justice Department information, derived from its secret electronic eavesdropping programs, about suspected criminal activity unrelated to terrorism.

This little-known byproduct of counterterrorism surveillance continues amid controversy over the NSA’s wide-ranging collection of domestic communications intelligence, including Americans’ telephone calling records and Internet use.

It is unclear whether the referrals have been built upon the content of telephone calls and emails. Administration officials have previously assured Congress that NSA surveillance focuses on so-called metadata and in the main does not delve into the content of individual calls or email messages.

Also, some in the legal community question the constitutionality of criminal prosecutions stemming from intelligence-agency eavesdropping.

Other Agencies Clamor for Data N.S.A. Compiles

by Eric Lichtblau and Michael S. Schmidt, The New York Times

The National Security Agency’s dominant role as the nation’s spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.

Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

Intelligence officials say they have been careful to limit the use of the security agency’s troves of data and eavesdropping spyware for fear they could be misused in ways that violate Americans’ privacy rights.

The recent disclosures of agency activities by its former contractor Edward J. Snowden have led to widespread criticism that its surveillance operations go too far and have prompted lawmakers in Washington to talk of reining them in. But out of public view, the intelligence community has been agitated in recent years for the opposite reason: frustrated officials outside the security agency say the spy tools are not used widely enough.

At emptywheel, bmaz points out this is nothing in the Reuter’s article on the SOD wasn’t already known, just no one has been paying attention:

First, the headline is misleading. The caption is:

   Exclusive: U.S. directs agents to cover up program used to investigate Americans

Well, not really (and, in fairness, the actual body of the article is about a practice that is a result of the SOD). DEA’s Special Ops Division is neither new nor secret in the least, and there is no way to “cover it up”. Google it; I got “About 289,000 results (0.29 seconds)” as a return. You will get something similar. The revelation that SOD was used in the Viktor Bout case is also not new, here is a Time story detailing it from 2011.

In fact, any criminal defense attorney who did cocaine hub conspiracy cases in the 90′s could have told you most of the Reuter’s article in their sleep. That was exactly the scene that DEA-SOD was born from. As the war on drugs went nuclear, the DEA devised what they termed the “Kingpin Strategy” (pdf):

   In 1992, the DEA instituted the Kingpin Strategy that focused investigative and enforcement efforts on specific drug trafficking organizations. The DEA planned to dis- able major organizations by attacking their most vulnerable areas-the chemicals needed to process the drugs, their finances, communications, transportation, and leadership structure.

   The Kingpin Strategy held that the greatest impact on the drug trade took place when major drug organizations were dis- rupted, weakened, and destroyed. This strategy focused enforcement efforts and resources against the highest-level traffickers and their organizations, and provided a systematic way of attacking the various vulnerabilities of the organiza- tions. By systematically attacking each of these vulnerabilities, the strategy aimed to destroy the entire organization, and with it, the organization’s capacity to finance, produce, and distrib- ute massive amounts of illegal drugs. Each blow weakened the organization and improved the prospects for arresting and prosecuting the leaders and managers of the organizations.

   The Kingpin Strategy evolved from the DEA’s domestic and overseas intelligence gathering and investigations.

And from Kingpin sprung the Special Operations Division:

   Under the original Kingpin Strategy, DEA headquarters often dictated the selection of Kingpin targets. In response to the SACs’ concerns, Administrator Constantine agreed to allow them more latitude in target selection. In conjuction with this decision, he established the Special Operations Division at Newington, Virginia, in 1994 to coordinate multi-jurisdictional investigations against major drug trafficking organizations responsible for the flow of drugs into the United States.

On this morning’s Democracy Now!, Guardian journalist Glenn Greenwald responded to a report by Reuters.



Transcript can be read here.

“It’s a full-frontal assault on the Fourth, Fifth and Sixth Amendments and on the integrity of the judicial process, because they’re deceiving everyone involved in criminal prosecutions about how this information has been obtained,” Greenwald says.

Load more