Did John McCain illegally sneak into Syria???
I kind of doubt that Syria would let John McCain legally into to their country
if his mission is to rally the folks that are trying to overthrow them.
So I suspect that John McCain is a hypocrite who is against illegal immigration to the US, but thinks he is above the law and can do what he wants.
Of course personally I think that any crime that involves illegally crossing a border is a victimless crime which shouldn't be a crime.
Source
Sen. McCain makes trip to Syria to visit rebels
Associated Press Mon May 27, 2013 6:04 PM
WASHINGTON — Sen. John McCain, a proponent of arming Syrian rebels, quietly slipped into Syria for a meeting with anti-government fighters Monday.
Spokeswoman Rachael Dean confirms the Arizona Republican made the visit. She declined further comment about the trip.
The visit took place amid meetings in Paris involving efforts to secure participation of Syria’s fractured opposition in an international peace conference in Geneva.
And in Brussels, the European Union decided late Monday to lift the arms embargo on the Syrian opposition while maintaining all other sanctions against Bashar Assad’s regime after June 1, British Foreign Secretary William Hague said following the meeting.
Two years of violence in Syria has killed more than 70,000 people. President Barack Obama has demanded that Assad leave power, while Russia has stood by Syria, its closest ally in the Arab world.
McCain has been a fierce critic of Obama administration policy there while stopping short of backing U.S. ground troops in Syria, but he supports aggressive military steps against the Assad regime.
Gen. Salem Idris, chief of the Supreme Military Council of the Free Syrian Army, accompanied McCain across the Turkey-Syria border. McCain met with leaders of the Free Syrian Army from across the country, who asked him for increased U.S. support, including heavy weapons, a no-fly zone and airstrikes on Syrian government and Hezbollah forces, according to The Daily Beast, which first reported the senator’s unannounced visit.
The White House declined to comment late Monday.
A State Department official said the department was aware of McCain crossing into Syrian territory on Monday. Further questions were referred to McCain’s office.
Last Tuesday, the Senate Foreign Relations Committee voted to provide weapons to rebels in Syria, as well as military training to vetted rebel groups and sanctions against anyone who sells oil or transfers arms to the Assad regime. McCain is a member of the committee.
——
Associated Press writer Bradley Klapper in Paris contributed to this report.
Arizona Guard whistle-blowers get to speak at Capitol
Reminds me of the First Amendment. Mixing government and religion is forbidden both by the US and Arizona Constitutions, but our royal elected officials routinely break the law and mix government and religion.
Source
Arizona Guard whistle-blowers get to speak at Capitol
By Dennis Wagner The Republic | azcentral.com Tue May 28, 2013 10:55 PM
About a half-dozen National Guard whistle-blowers who spoke during a public forum Tuesday at the state Capitol said leadership shortcomings are to blame for a state military organization rife with corrupt conduct.
“We already have rules and regulations ... about how we’re supposed to conduct ourselves,” Lt. Col. Rob White said. “The problem is when officers don’t uphold those standards.”
“Soldiers and airmen are praying for justice to be restored to the Arizona National Guard,” added Seth Israel, a former staff sergeant who said he turned in all of his medals and retired because of retaliation he faced for reporting sexual harassment and other wrongdoing. “The leadership knew about these issues before they reached critical mass, but no one stood up.”
Those comments came during a discussion hosted by Rep. Debbie McCune Davis, D-Phoenix, and other House Democrats in the wake of last month’s independent investigation blasting the Guard’s culture.
The National Guard Bureau, a federal umbrella organization, launched its probe after The Arizona Republic documented systemic misconduct that included sexual abuse, cronyism, fraud, theft, drug dealing and reprisal against victims. The review team concluded that fraternization by Guard commanders established a “perception that the leadership lacked the moral high ground to take appropriate steps when disciplinary matters arose.”
Gov. Jan Brewer, who ordered the inquiry, subsequently instructed Maj. Gen. Hugo Salazar to prepare and execute reforms in the organization of about 8,000 soldiers, airmen and civilian personnel.
White and others who testified Tuesday said they lost faith in the Guard’s administration and turned to the media last year after failing to win reform through complaints to superior officers, inspectors general, the governor and members of Congress.
Paul Forshey, who retired as the Guard’s legal counsel, or JAG officer, said he decided to speak out last year after Salazar fired Brig. Gen. Michael Colangelo, then the Air Guard’s commander. Colangelo had terminated two subordinate officers for misconduct. His decision was sanctioned by Salazar, who nevertheless issued a letter of reprimand and later dismissed Colangelo.
“He gave him that letter knowing it to be false,” Forshey said.
Forshey noted that the independent investigation substantiated a corrupt culture, and said Brewer employed “a Jedi mind trick” when she declared that the Arizona Guard is “not broken.”
Brewer spokesman Matthew Benson said Tuesday’s hearing illustrates why the governor sought an independent review.
“That assessment has led to a corrective action plan, which will be implemented to lessen incidents of misconduct and make certain violations are addressed quickly and consistently,” he added.
Salazar, who has told Brewer he intends to retire before the end of the year, could not be reached for comment. However, Col. Steve Smith defended his boss at the forum, and complained that news coverage of the controversy has been inaccurate.
“I still believe we have a very strong organization,” said Smith, who was promoted to a new command this month. “We have great leadership. ... There is no other institution in this state of Arizona that is more trusted than the National Guard.”
Others maintained that the Guard has a toxic atmosphere, and questioned Salazar’s ability to create a new culture.
“This culture lacks integrity at the top,” said Cynthia Dowdall,the ex-wife of a retired Air Guard officer. “It’s a culture that destroys many military members and many military families.”
McCune Davis said she convened Tuesday’s informal session after GOP legislative leaders declined to hold formal hearings. A panel of six House Democrats listened to public comments.
“The Arizona Guard — and its reputation — is something we must protect,” McCune Davis said.
McCune Davis said she will submit a report to Brewer. She declined comment on whether Salazar should remain as Guard commander.
Father of Chechen killed in Florida says FBI murdered him
Source
Father of Chechen killed in Florida says FBI murdered him
By Will Englund, Thursday, May 30, 8:17 AM E-mail the writer
MOSCOW – After FBI agents questioned Ibragim Todashev for hours on end about one of the suspects in the Boston Marathon bombing, his father alleged Thursday, they murdered him to keep him from talking.
Abdulbaki Todashev, who applied Thursday for a U.S. visa so that he can pick up his son’s body in Orlando, where he died, said that he has heard nothing from U.S. officials about the May 22 shooting.
“I want justice, I want an investigation,” he said at a Moscow news conference. “They come to your house like bandits, and they shoot you.”
Ibragim Todashev, 27, was an acquaintance of Tamerlan Tsarnaev, the alleged organizer of the Boston bombing. Todashev had moved to Florida two years ago from Massachusetts, his father said. He said FBI officials questioned him on three separate occasions this spring.
The first time, they asked him about the bombing. The second time, his father said, they asked him about a triple murder in Waltham, Mass., that police suspect Tsarnaev may have carried out. The third interview, which took place at Todashev’s home and included Massachusetts state troopers, ended with his death, his father said.
Despite earlier accounts of the incident,two law enforcement officials told The Washington Post on Wednesday that Todashev was not armed. He was shot seven times. The FBI has said that he attacked an agent, just moments after confessing to his part in the Waltham slayings.
The elder Todashev displayed photographs of his son’s body — apparently the same pictures as those shown by the younger man’s widow at a Florida news conference Wednesday evening — that he said show six shots to the body and a “control” shot to the back of the head.
“This is proof of cold-blooded murder,” said Maxim Shevchenko, a journalist and member of the presidential human rights council who organized Thursday’s news conference.
It was an “extrajudicial execution,” said Zaurbek Sadakhanov, a Chechen lawyer who also was present. “Why was he interrogated three times without a lawyer? Why no recording? Why seven shots? And why should I believe their version? Why do American policemen believe they can do whatever they want?”
Todashev’s father said his son had been planning to return to Chechnya on May 24, though he had apparently canceled his tickets before he was killed on May 22. He suggested that the FBI didn’t want his son to return to Russia.
“Maybe my son knew some sort of information that the police didn’t want to get out,” he said. “They shut him up. That’s my opinion.”
Ibragim Todashev was the eldest of 12 children. His father said the family fled Chechnya after the wars of secession erupted, eventually finding a haven in the Volga River city of Saratov. Abdulbaki Todashev had once studied to be a veterinarian there, in the Soviet era.
Ibragim Todashev studied English for three years in Saratov, then, in 2008, returned with his family to by-then more stable Chechnya and completed his fourth year of higher education at Grozny University, his father said. The elder Todashev got a job with the city, and today he is the head of the administrative unit of the Grozny mayor’s office.
As soon as he left the university, Ibragim Todashev went to the United States on a program that enabled him to perfect his English, his father said. Three or four months later, when it was time to return, he called his father and said he wanted to stay on a while.
“I wasn’t against it,” the father said. Chechnya was still struggling, and life in the United States had to be more secure. Ibragim was living in Boston, and got to know Tsarnaev because they belonged to the same gym, his father said. They had each other’s phone numbers, “but they were never close friends,” he said.
Ibragim Todashev applied for a green card, which meant he had to stay in the United States. He stayed active in mixed martial arts, but a knee injury and surgery on his meniscus put an end to those dreams. Two months ago, his father said, he received the green card, and that’s when he started making plans to come back to Grozny for a visit, knowing he would be able to reenter the United States .
After the Boston bombing, the younger Todashev called his father and told him he was being watched. He said he didn’t believe Tsarnaev and his brother Dzhokhar were responsible for the bombing. “This is a set-up,” he told his father. And he told him about the first two rounds of questioning by the FBI.
Todashev said he learned of his son’s death when Khusen Taramov, a friend and fellow-Chechen, called him. Taramov had been at Todashev’s apartment the night of May 22. The FBI called and asked Ibragim Todashev to come by for more questioning, but he told them they could find him at home, his father said Thursday.
When they arrived, they took Taramov aside and interrogated him outdoors for several hours, the father said, then told him to go. A few hours later, the younger Todashev was shot.
Abdulbaki Todashev is convinced his son is innocent of the Waltham murders. “I raised him. I know what kind of person he is,” he said.
Shevchenko decried the “systematic persecution of Chechens” in the United States and criticized the Russian Foreign Ministry for not doing more to stand up for Chechens who are abroad.
The lawyer, Sadakhanov, said he had some advice for Taramov: Leave the country. “Nowadays it’s not safe to be a witness in the United States,” he said.
Some IED incidents I was involved in????
I suspect I would be still in prison if the folks at the Homeland Security
found out about these incidents which happened to me many years ago.
Sure nobody was hurt and no property was damaged but I suspect the police officers
at the Homeland Security wouldn't want to let that get into their way of
bragging that they are heroes who saved the country and the world from
phoney baloney alleged terrorists like me.
As H. L. Mencken said:
"The whole aim of practical politics is to keep the populace alarmed
(and hence clamorous to be led to safety) by menacing it with an endless
series of hobgoblins, all of them imaginary."
I am writing this after Christian Barnes an employee at Disneyland in Anaheim was arrested
and put in jail with a bond of $1 million dollars for a silly prank that didn't hurt anyone
and didn't cause any property damage.
His prank, if we can believe what the police said is putting some dry ice in a pop bottle and
letting the bottle pop when the dry ice turned to gas and forced the top off of the pop bottle.
Back in the old days when 16 ounce pop bottles were made out of glass I had bought a
16 ounce bottle of Coke on my trip to the grocery store.
When I got home I unloaded my groceries and took them inside, but I forgot about the
unopened 16 ounce bottle of soda pop and left it on the roof of my VW.
I heard a small explosion or pop while I was inside my house, but I didn't think anything of it.
It wasn't until later that I went outside and saw that the sun had heated up my pop bottle
causing it to explode.
I thought I was lucky, because if I had been out side when the bottle of Coke had exploded
I might have been injured by flying glass.
I cleaned up the glass and didn't think anything about it.
Of course I am lucky it happened 20 years ago and not now.
If it had happened now, I probably would be arrested for having an illegal explosive device
which would probably get me 20 years in prison. Yea, don't tell the goons at Homeland
Security that a 16 ounce bottle of Coke is not an IED because that might get in their
way of making themselves look like heroes by arresting me for being a terrorist who is endangering
the whole American way of life.
I probably would also be charged with a terrorist bombing attack and attempted murder of
everybody who lived on my street.
Of course don't try to use and logic and reason and tell the goons at Homeland Security that
this wasn't a bombing attack nor was it was an attempted mass murder. I just forgot to bring
my Coke inside and it blew up in the hot Arizona sun.
Of course they could care less about the facts if it gets in the way of arresting me and
pretending that they saved America from another terrorist attack and that they are heroes
for arresting some smuck who left his Coke in the Arizona sun.
Here is another incident that happened years ago and involved IED or Improvised Explosive
Devices as the cops and Homeland like to call them. I guess us normal people don't call
them IEDs or improvised explosive devices like the cops do, but bottles of soda pop.
Again I suspect that if the goons at Homeland Security had been around when this had
happened I would also h ave been arrested and put in prison for many years over this
incident which involved a bottle of soda pop.
I was at work and me and a co-worker were walking to Circle K to get some junk food.
My friend had a two liter bottle of soda pop and for some reason he tossed it up into
the air.
When the bottle hit the ground it burst open and took off like a rocket flying thru the air.
It was pretty cool. I suspect all the carbon dioxide gas it the soda pop provided the energy.
And we were both lucky that the 2 liter bottle of pop didn't hit either of us. It could have
caused some serious damage.
Again we didn't think anything of the incident, other then that the pop bottle looked pretty
cool when it took off like a rocket.
We told our other co-workers about the incident when we got back from our junk food run
to Circle K.
Of course if that had happened today we both probably would have been arrested and charged
with possession of explosive devices, IEDs or improvised explosives devices as the goons
at Homeland Security love to call them.
Of course that sounds so much more dangerous then calling the bottles of soda pop.
And of course the goons from Homeland Security would probably be laughed out of court
if they tried to tell the judge they were arresting us for possession of a soda pop bottle.
So that probably why they love to say IEDs instead of 2 liter bottles of soda pop.
Of course my friend, who thru the bottle of soda pop would have been arrested for attempted
murder. Attempted murder of me.
And since I was there I probably would have also been arrested on a charge of being an
accessory to attempted murder. Yea, the attempted murder of myself. How silly!!!!
But it's not silly to the cops who would be using this bogus incident in an attempt to
make themselves look like heroes that saved the world from a phoney baloney terrorists
like me and my friend.
Border technology remains flawed
Don't think of it as a billion dollar boondoggle.
Think of it as a government welfare program for the corporations in the military industrial complex. And a jobs program for cops or CBP officers as the article calls them (21,394 now, plus 3,500 to be hired).
The $106 billion spend in the article amounts to $350 for each of the 300 million men, women and children in the USA, or about $700 for every adult.
Remember the money is mainly being spend to keep Mexicans from entering the USA. If you look at it in those terms, the $106 billion spent amounts to $960 for each of the 110 million people in the Mexico, or about $1,900 for every adult in Mexico.
This is also pretty much proof that the American war on drugs is a dismal failure. Despite spending these billions of dollars any high school kid in America knows where to buy a bag of marijuana.
One thing that surprised me in the article was that the high tech drones the American government uses to murder people in Afghanistan and Iraq cost more to operate then the old fashioned planes flown by humans.
The second article says the P-3 AEW Orion Surveillance aircraft which are flown by humans cost less to operate then the Predator B drones which cost $3,234 an hour to operate.
Source
Border technology remains flawed
$106 billion has been spent on border security over the past 5 years
By Bob Ortega The Republic | azcentral.com Sun Jun 2, 2013 9:19 AM
TUCSON - A long, sharp, high-pitched beep sounds every 30 or 40 seconds at the Border Patrol’s windowless sector-control room.
Agents here monitor a vast array of video screens and sensors linked to cameras, radar and other surveillance equipment along 262 miles of the Arizona-Mexico border — including hundreds of ground sensors that beep loudly whenever one detects something.
That something might be a drug smuggler or a migrant — but far, far more often, it’s a cow, or the wind, or some other false alarm, which may be why the agents seem to pay these constant beeps little mind.
To complement the 651 miles of barriers along the U.S.-Mexican border, Customs and Border Protection deploys drones, tethered radar blimps, P-3 Orion surveillance aircraft, thermal-imaging devices, towers with day and night video cameras, ground surveillance radar and much more.
But, as the ceaseless beeping of the sensor alarms illustrates, many pieces of that technology are flawed: Some produce frequent false alarms, some suffer detection failures or leave gaps in coverage. Then, too, CBP — despite spending more than $106 billion over the past five years militarizing and securing the border — struggles to mesh these pieces smoothly together so it can make good use of the data they provide.
The flaws, the gaps and the challenges in analyzing the data have left CBP, of which the Border Patrol is a part, unable to answer such seemingly basic questions as how well all of this technology works and how many of the people and how much of the drugs coming across the border make it through.
Many border-security analysts see that lack of answers as problematic, given current plans in Congress.
The comprehensive immigration-reform bill being debated in the Senate would boost border-security spending by as much as $6.5 billion over the next five years. That would roughly quadruple the more than $2 billion in Customs and Border Protection’s existing budget plans for more technology and to fix what’s in place.
In a nutshell, the bill would require the Border Patrol to build more fencing, more stations and more remote “forward-operating bases” near the border; to increase surveillance to cover the entire border 24 hours a day, seven days a week; to deploy more planes, helicopters and drones; to increase horse patrols; and to improve radio equipment and communication with other federal, state and local law enforcement.
The bill also mandates hiring another 3,500 CBP officers (who work at ports of entry, versus Border Patrol agents, who work the rest of the border), a 16-percent increase, among other provisions. And it would require the Border Patrol to apprehend or turn back 90 percent of would-be border crossers.
Within Congress, tighter border security has been treated as a precondition for any reform of immigration policy, but many analysts and academics who study the border express doubts about the need for more fences, agents and surveillance.
The number of Border Patrol agents nearly doubled over the last seven fiscal years, to 21,394. But over that time period, the number of migrants heading north plunged — mostly because of the U.S. economic downturn, most analysts say, but also in part because of the increasing dangers of going north as more fences and surveillance pushed crossers into more remote areas. Border Patrol apprehensions fell 69 percent over those years, from nearly 1.2 million to fewer than 365,000.
In 2005, Border Patrol agents apprehended an average of 106 people a year apiece. Last year, each agent apprehended an average of 17 people, or about one person every three weeks. In the Tucson Sector, each agent averaged 28 apprehensions a year, or about one every 13 days. In Yuma, each agent averaged one every two months. In the El Paso Sector, the least busy, each agent averaged 3.5 apprehensions a year.
“On a lot of parts of the border, it’s gotten to the point that every person we put out there makes less and less of an additional difference,” said Eric Olson, associate director of the Latin American program at the Wilson Center, a nonpartisan Washington, D.C.-based think tank that seeks to connect academic research to public-policy discussion.
Complicating this picture is the fact that over the six months ending in March, Border Patrol apprehensions along the Southwest border climbed 13 percent from a year earlier, to just over 189,000. Most of that increase is happening in Texas’ Rio Grande Valley. Even with this rebound, apprehension numbers over that period are still the third lowest since 1972, above only last year and the year before.
Looking at the current state of border security, most analysts agree on some needs — such as improving radio communications — but some say CBP really should focus on what it has in hand.
“It’s not just putting a surveillance camera somewhere and you’re done; the challenge is integrating the data into Border Patrol operations. ... The Department of Homeland Security (which includes CBP) needs to step back ... and integrate the technology they have now before they get any new technology,” said James Lewis, director of the technology and public-policy program at the Center for Strategic and International Studies, a conservative D.C. foreign-policy think tank focused on political, economic and security issues.
Edward Alden, a senior fellow at the Council on Foreign Relations, said what is “really needed is a serious management effort to see what works and what doesn’t.” The lack of such an assessment “is at some level an irresponsible use of taxpayer dollars, given that we spend $18 billion a year on immigration enforcement,” added Alden, one of the authors of a recent study on the effectiveness of border enforcement.
U.S. Sen. Jeff Flake, one of the “Gang of Eight” promoting immigration reform in Washington along with Arizona’s other Republican senator, John McCain, said Saturday that the issues of added border security and technology snafus have been thoroughly discussed.
“We believe the situation clearly is better on the border than in times past; the frustration with all of us is with conflicting information out of DHS. Within the same report, they’ll use increased apprehensions to signal success, and decreased apprehensions to signal success,” Flake said.
“We haven’t had a comprehensive plan by the Border Patrol to reach certain metrics of effectiveness. We did come to the conclusion that more barriers in certain places, more manpower where they need it and more technology would help ... but in combination with employer enforcement, and a legal framework for people to come in.”
The Republic made several requests to interview Mark Borkowski, the CPB’s assistant commissioner in charge of technology and acquisition. DHS and CPB did not make him or other agency officials available.
Faulty ground sensors
The ground sensors offer one example of the challenge of making sure technology works properly. About 13,400 have been deployed piecemeal along the border over several decades. They are typically placed along known or suspected migrant or smuggler routes, and may detect vibrations (for foot traffic), metal (for vehicles) or have acoustic or infrared sensors. Sensors from the Vietnam War era remain in use.
A possible false alarm from a ground sensor, and faulty radio communications, may have contributed to the death of Border Patrol Agent Nicholas Ivie in a friendly-fire incident Oct. 2. As is often the case with sensor alarms, agents didn’t detect anyone but each other when they arrived. Ivie, responding separately, apparently mistook the other agents for smugglers and opened fire. One of the agents shot and killed him.
But false alarms are nothing new.
In 2005, Homeland Security’s inspector general reported that only 4 percent of the alarm signals detected migrants or smugglers (34 percent were confirmed false alarms, 62 percent couldn’t be determined). The sensors, which run on batteries, frequently fail because of corrosion or bugs eating through wires.
They were supposed to be replaced as part of the $1.1 billion Secure Border Initiative, a massive 2006 effort to boost security at the border. But most of the money was spent on a problematic network of high-tech towers, known as SBInet.
The towers, to be equipped with video and infrared cameras and radar, were to cover the whole border. By the time Homeland Security pulled the plug in 2010, after a host of problems, the contractor, Boeing, had completed only 15 towers covering a 72-mile stretch of Arizona’s border. Most of the old ground sensors — with their false-alarm problems — remained.
In January 2011, Homeland Security launched another initiative, the Arizona Border Surveillance Technology Plan.
That plan called for spending $1.5 billion over 10 years to integrate the SBInet towers, build new camera towers, buy trucks loaded with surveillance gear — and replace 525 ground sensors in Arizona with more sophisticated military models. The military sensors use a combination of technologies that can distinguish more accurately between, say, a four-legged coyote and the two-legged kind, and can even detect the direction of travel.
But CBP confirmed this past week that — eight years after the problems were identified — the sensors still had not been replaced.
However, under the new technology plan, Arizona agents have received:
Twenty-three hand-held thermal-imaging devices (like night-vision binoculars).
Two “scope trucks” – modified Ford 150 4x4 trucks with day and night cameras mounted on retractable poles.
Twelve “agent portable surveillance systems,” which include radar, video and infrared video sensors and can be carried in a box and set up on tripods.
Drone problems
Drones, too, have proven problematic. So far, CBP has acquired 10 drones, all versions of the Predator B made by General Atomics, for about $18 million apiece. CBP’s unarmed drones carry radar, video and infrared sensors.
Theoretically, the drones can fly for up to 20 hours at a time. But last year, according to CBP, the drones flew an average of 94 minutes a day. The main problem: CBP spent so much of its budget buying the drones that it hadn’t set aside enough to operate them.
“They’re on the ground most of the time for lack of funding,” said Adam Isacson, a regional security-policy analyst for the Washington Office on Latin America, a human-rights organization that studies the effects of U.S. policies on Latin America. “They cost $3,234 an hour to operate. They haven’t had the budget for maintenance or crews.”
Last year, Homeland Security’s inspector general found that, because of poor planning, CBP not only flew the drones less than one-third the number of planned hours in 2011, but also had to use $25 million from other budgets pay for the hours the drones did fly.
CBP also didn’t have enough operational support equipment at the airfields where the drones are based, and didn’t prioritize missions effectively, the inspector general found — all findings with which CBP concurred. Flight hours last year rose 30 percent from the year before, to 5,700, but were still well below half the target hours. Budget cuts this year because of the congressional sequester are likely to further limit flight hours, Isacson said.
The drones are sensitive to high winds and thunderstorms. They face Federal Aviation Administration flight restrictions because they are less able than manned aircraft to detect other aircraft and avoid collisions. And their use raises privacy concerns.
At a Senate hearing in March, Sen. Tom Coburn, R-Okla., cited reports that “DHS has customized its drone fleet to carry out domestic surveillance missions such as identifying civilians carrying guns ...” that fly in the face of civil liberties. “We must ask whether the trade-off in terms of border security is worth the privacy sacrifice.”
But CBP officials have said they believe FAA concerns and other issues can be addressed, and that drones can help increase surveillance wherever it’s most needed.
More coordination
In practice, every piece of technology at the border has limitations:
Eight aerostats, or tethered radar blimps, that CBP is taking over from the military, can’t be flown in high winds, and the line-of-sight radar makes them less effective in rugged, mountainous areas, which is much of the Tucson Sector. In May 2011, an aerostat crashed in a Sierra Vista neighborhood after coming loose in 50-mile-an-hour wind gusts.
CBP limits the use of its 16 Blackhawk helicopters because the high rate at which they guzzle fuel makes them very expensive to operate, according to pilots; and CBP budget documents confirm plans to temporarily ground nine of the 16 Blackhawks next year pending enough money for renovations.
The 16 workhorse P-3 Orion surveillance aircraft are, on average, 42 years old. Refurbishing costs $28 million apiece.
But the bigger issue is a lack of coordination in fitting all of the pieces together and making effective use of the data they provide, said Rick Van Schoik, director of the North American Center for Transborder Studies at Arizona State University in Phoenix. “It’s still hard for CBP to figure out what we get out of all these billions that have been spent,” he said, which hampers planning for the future.
Others argue that focus now should be on the ports of entry rather than on the vast spaces between them.
By some estimates, as many as 40 percent of undocumented migrants are people who entered legally through ports of entry and overstayed their visas, said Eric Olson, at the Wilson Center. And, according to CBP data, most hard drugs are smuggled through the ports.
“A strong case can be made now that the biggest risks are at the ports of entry,” Olson said.
Olson supports the bill’s call to add 3,500 more CBP officers, which he said also potentially “has a huge benefit, which is making the ports more efficient and reducing wait times for business and for legal travelers between the U.S. and Mexico.”
Outside analysts aren’t the only ones suggesting Congress reconsider its focus on more security.
A May 3 Congressional Research Service study invited members of Congress to consider that “certain additional investments at the border may be met with diminishing returns.” Some lawmakers, the report said, “may question the concrete benefits of deploying more sophisticated surveillance systems across ... vast regions in which too few personnel are deployed to respond to the occasional illegal entry that may be detected.”
For their part, Homeland Security, CBP and Border Patrol officials in recent months reiterated Secretary Janet Napolitano’s insistence that the border is more secure than ever before. And Assistant Commissioner Borkowski earlier this year made it clear CBP learned one lesson from its past struggles with technology: He said CBP won’t even consider buying technology unless it has been proven to work in the field.
But Rep. Raúl Grijalva, D-Ariz., sees the push for border security as political. “Without it, you don’t have a path to citizenship or any real compromise” in the immigration bill, he said.
“But if we’re going to put more resources on the border, we should modernize the ports of entry, to expedite trade and travel,” Grijalva said. More drones, towers and sensors “may have symbolic value. But it’s fighting a perception, rather than a reality.”
Source
Border technology tools: Pros, cons and cost
By Bob Ortega The Republic | azcentral.com Sat Jun 1, 2013 11:29 PM
U.S. Customs and Border Protection currently relies on a variety of technological tools to help secure the U.S.-Mexico border. In addition to nearly 651 miles of barriers, the agency deploys drones, tethered radar blimps, P-3 Orion surveillance aircraft, thermal-imaging devices, towers with day and night video cameras, ground surveillance radar and much more.
But many pieces of that technology are flawed: Some produce frequent false alarms, some suffer detection failures or leave gaps in coverage.
An immigration-reform bill being debated in the Senate would boost border-security spending by as much $6.5 billion over the next five years.
Here's a look at the current tech tools used by CBP, including pros, cons and cost of each.
Border technology tools
What: MQ9 Predator B and Guardian Drones
Pros: Has capacity to fly for 20 hours at a stretch.
Cons: High cost, lack of trained pilots and FAA regulations limit use; sensitive to strong winds; can’t detect and avoid other aircraft.
Cost: $24 million each, plus $3,234 per hour to fly each drone
Number: 10 deployed, CBP plans to have 17 by 2017
What: P-3 AEW Orion Surveillance aircraft (four-engine turboprop)
Pros: Cheaper to fly per hour than drones, has wide-range radar.
Cons: Aircraft are 42 years old on average
Cost: $28 million each to refurbish.
Number: 14 of 16 deployed are being refurbished.
What: MQ9 Predator B and Guardian Drones
Pros: Has capacity to fly for 20 hours at a stretch.
Cons: High cost, lack of trained pilots and FAA regulations limit use; sensitive to strong winds; can’t detect and avoid other aircraft.
Cost: $24 million each, plus $3,234 per hour to fly each drone
Number: 10 deployed, CBP plans to have 17 by 2017
What: P-3 AEW Orion Surveillance aircraft (four-engine turboprop)
Pros: Cheaper to fly per hour than drones, has wide-range radar.
Cons: Aircraft are 42 years old on average
Cost: $28 million each to refurbish.
Number: 14 of 16 deployed are being refurbished.
What: KA-350 CER Multi-Role Enforcement aircraft (twin-engine turboprop)
Pros: Wider field of view/radar search area than drone, can carry more gear.
Cons: Shorter range, flight time limited to 7 hours.
Cost: $21.5 million each
Number: 2 deployed, 2 more being acquired; plans call for 30 more
What: UH-60 Blackhawk helicopters
Pros: All-weather capability, large, powerful engines.
Cons: CBP planning temporary grounding of 9 of 16 Blackhawks because of high fuel consumption and operating costs. Noisy in flight, so smugglers can hear it coming.
Cost: $17.5 million each to convert, upgrade existing craft
Number: 16
What: Unattended ground sensors
Pros: Relatively inexpensive.
Cons: Deployed older units, some from Vietnam era, have high rate of false alarms (a DHS study found only 4 percent of alarms actually detected migrants or smugglers). New, more accurate units not yet deployed and integrated into sensor systems.
Cost: Base price for new units, also used by military, ranges from $5,000 to $7,000 for the basic sensor, to about $15,000 per unit fully deployed with relays, accessories.
Number: 12,800 (mostly older units)
What: Remote Video Surveillance Systems (day/night cameras mounted on 80 –foot pole)
Pros: Already in place, offer surveillance in remote areas.
Cons: Require frequent repair, hot or cold weather can cause cameras to get stuck; can’t automatically detect movement or activity; vulnerable to power outages; aren’t mobile.
Cost: $224 million contract planned.
Number: 337 currently deployed
What: SBInet Sensor Towers
Pros: Cameras and radar provide surveillance in remote areas
Cons: No mobility, line-of-sight gaps in coverage, proprietary software
Cost: $11 million per tower to erect, plus $1.2 million per tower per year to operate and maintain.
Number: 15 towers (plus 10 communications towers)
What: Integrated Fixed Towers
Pros: Using off-the-shelf technology making them more reliable, easier to integrate than SBInet towers
Cons: Purely theoretical at this point; contract expected to be issued by early 2014.
Cost: $1.1 billion contract planned
Number: 67 planned
What: Aerostats
Pros: Can stay aloft for days at a time.
Cons: Can’t be used in high winds (one crashed in Sierra Vista in May 2011 in 50 m.p.h. wind gusts); line-of-sight radar makes them less useful in mountainous areas, such as southeastern Arizona.
Cost: $4.7 million a year to maintain and operate
Number: 8
What: Aerostats
Pros: Can stay aloft for days at a time.
Cons: Can’t be used in high winds (one crashed in Sierra Vista in May 2011 in 50 m.p.h. wind gusts); line-of-sight radar makes them less useful in mountainous areas, such as southeastern Arizona.
Cost: $4.7 million a year to maintain and operate
Number: 8
Chicago terror case sparks debate about undercover stings
I have posted a number of articles about where the headlines said the Feds busted a major terrorist ring that was going to inflict mayhem on the American people.
Of course in all of them when you read the fine print the FBI created the terrorist plots themselves and then suckered young Muslim Americas into becoming participants in the terrorist plot.
NONE of these so called terrorist plots would have existed in FBI agents had not created them.
As I always do I say the FBI agents are creating jobs for themselves, by creating these imaginary terrorist plots and then suckering naive, patriotic Muslim kids into becoming participants in them.
And in all of the cases I can remember the young Muslim kids were not arrested until after they had been given dummy explosive devices by the FBI and tried to detonate them.
Last I should say these imagainary crimes which are created by the FBI are not
limited to terrorist cases.
They do it all the time with other things such as drug war crimes, money laundering,
gambling andguns.
Source
Chicago terror case sparks debate about undercover stings
By Annie Sweeney, Chicago Tribune reporter
June 1, 2013
To the federal government, Sami Samir Hassoun was a determined terrorist with dangerous plans for Chicago — explosive devices, biological attacks and sniper shootings on police. His family and defense team say he was nothing more than a shameless storyteller who did not possess the sophistication to execute his outlandish and violent ideas.
He was arrested in an undercover sting run by FBI agents, charged, convicted and, on Thursday, sentenced to 23 years in prison for planting what he thought was a bomb near Wrigley Field.
Undercover stings like the one that led to Hassoun's arrest have long been employed by law enforcement, but over the past five years, their use and the use of informants have become more established tools in terrorism investigations across the country. In Chicago, three such terror plots, including Hassoun's, have been interrupted in recent years, authorities said.
But the use of such sting operations, particularly on younger targets, does not come without controversy. Defense attorneys and other critics say the government almost promotes criminal behavior by keeping would-be terrorists engaged, and comes dangerously close to entrapment — when law enforcement authorities coax someone who has not shown a predisposition to commit a crime to follow through.
Prosecutors say the undercover stings are critical to their battle against terror plots, especially those that are homegrown.
Hanging in the balance, they say, is the frightening possibility that law enforcement will miss the chance to stop an attack like the one at this year's Boston Marathon, where two brothers allegedly planted explosives near the finish line of the nation's most famous running race, killing three people and injuring more than 260.
"You can't ignore the potential threat. You have to see how serious it is," said Chicago attorney Dan Collins, a former federal prosecutor who oversaw one of the city's most serious terror cases. "Whether you are a bragger or the shyest person on the planet, you do have the ability to present a threat."
In Hassoun's case, authorities learned of his plans from an informant. Undercover agents told Hassoun, who then was 22, that they were religious radicals and even paid him to carry out the bombing, later providing him with a phony explosive device.
Prosecutors said Hassoun was already committed to his plan when agents got involved.
In the two other local cases, the FBI also used covert operations to draw out targets; in those cases, the suspects were teenagers.
Abdella Ahmad Tounisi, of Aurora, was accused of going online at age 18 to join what he thought was a violent militant group with ties to al-Qaida in war-torn Syria. In reality, it was an FBI-run Internet site.
Tounisi's close friend Adel Daoud, also 18, came under the scrutiny of the FBI after posting messages online about killing Americans, authorities said. Undercover FBI analysts exchanged messages with him, ultimately arranging to meet.
As with Hassoun, they provided Daoud with a phony explosive device, this one a car he thought was rigged with a bomb, authorities said.
Tounisi and Daoud cut young and sympathetic figures in court that contrasted with the violent plans at the center of the charges against them. Their alleged exchanges with the government on the Internet also hint at their youth and immaturity, with Daoud using phrases like "LOL" and Tounisi allegedly wondering if his small stature would leave him ill-equipped for a fight. Both defendants have pleaded not guilty.
Daoud's attorney, Thomas Anthony Durkin, said last week that he is considering an entrapment defense.
"Adel Daoud was a very impressionable young kid, an immature 18-year-old who got involved in a school project on Osama bin Laden and al-Qaida," he said.
While the cases are unique in many ways, the ages of the people swept up in them is a cause for concern, said Karen Greenberg, director of the Center on National Security at Fordham University.
"The youth of these kids is very troubling," she said. "We need to begin to understand these young men who begin to show evidence of violence and willingness to break the law earlier in their lives … directing that, not in terms of law enforcement, but in other social services."
The stings are also a concern for Muslim-Americans. Dr. Zaher Sahloul, former chairman of the Council of Islamic Organizations of Greater Chicago, said the stings play on the vulnerabilities of disaffected, immature youths.
"I am very uncomfortable with these tactics," he said. "It touches on a very raw, open wound in the community."
FBI spokeswoman Joan Hyde said officials appreciate the desire of Muslim community leaders to intervene with youths who exhibit violent inclinations, and even encourage it. But she stressed the need for law enforcement to move quickly when a potential threat emerges.
"The challenge we are facing is that so much of this is going on online," Hyde said. "And the radicalization is occurring at a relatively fast rate."
At Hassoun's sentencing last week, his age and the prospect that he was entrapped by the government were key points of discussion. Hassoun's attorneys criticized the undercover agents for "moving the ball forward" in the plot, saying Hassoun would never have accomplished it without them.
Prosecutors devoted much of their argument to rebutting that notion, saying he had formulated concrete terror plans and was determined to see them through to fruition. He never wavered, the prosecutors said, and he ignored opportunities to back out. They said they were not giving Hassoun ideas but testing his commitment to his own notions.
"How is the FBI supposed to know that Mr. Hassoun might not engage in this kind of chatter with someone else, someone who can really build a bomb?" Assistant U.S. Attorney Tinos Diamantatos said in court.
U.S. District Judge Robert Gettleman, in sentencing Hassoun, acknowledged the tension in these cases. He noted Hassoun's troubled youth and said the FBI had "led" him during its undercover investigation. But the judge, who also mentioned the Boston Marathon bombings, took pains to say Hassoun never took advantage of the chances the agents gave him to abandon the plot. He gave the agents credit for thwarting Hassoun's plans.
"This is the type of law enforcement we should all applaud," he said.
asweeney@tribune.com
After vowing transparency, US silent on drone killing
Source
After vowing transparency, US silent on drone killing
WASHINGTON: A week after President Barack Obama cracked the lid of secrecy on his drone war, the United States refused Wednesday to confirm it had killed a top Pakistani Taliban leader in an airborne attack.
Pakistani security and intelligence sources said that Waliur Rehman, deputy leader of the Tehreek-e-Taliban Pakistan (TTP) had perished in an American drone strike, along with at least five other people, in North Waziristan.
But senior officials in Washington stuck to their normal practice of declining to provide details of US operations, and only hinted that Rehman, wanted for attacks on Americans and Pakistanis, had been killed.
The attack appeared to be the first known US drone strike since Obama's speech last week laying out new criteria for the covert use of unmanned aerial vehicles in strikes against terror suspects and militants.
“We are not in a position to confirm the reports of Waliur Rehman's death,” White House spokesman Jay Carney said.
“If those reports were true, or prove to be true, it's worth noting that his demise would deprive the TTP of its second-in-command and chief military strategist,” Carney said.
Rehman is also wanted in connection with attacks on US and Nato personnel across the Afghan border and for involvement in the attack on American citizens in Khost, Afghanistan on December 30, 2009.
That strike, though Carney did not describe it in detail, was a dark day in CIA history, when seven counter-terrorism agents and security contractors were killed in a suicide bombing inside a US base.
Carney would not confirm whether the attack on Rehman satisfied the new criteria for drone strikes established by Obama last week during a speech that aimed to recast the country's decade-long battle against terrorism.
In the speech, Obama said lethal force would only be used to “prevent or stop attacks against US persons,” when capture is not feasible and if a target poses a “continuing, imminent threat” to Americans.
Carney pointed to a clause in Obama's remarks in which he said that in the “Afghan war theater” Washington must support its troops until the Nato withdrawal is complete in 2014.
He appeared to be making a case that Rehman's killing may have satisfied the new guidelines because he may have posed a direct and imminent threat to US troops across the border in Afghanistan.
The president said in his speech that strikes would continue against “high value Al-Qaeda targets, but also against forces that are massing to support attacks on coalition forces.”A CIA spokesman also declined to confirm Rehman's death.
Carney dismissed the idea that keeping reporters in the dark about the reported attack conflicted with Obama's pledge for more transparency over the drone war. He said the speech at the National Defense University last week contained an “extraordinary amount of information.” “It does not mean that we are going to discuss specific counter-terror operations,” Carney said.
Security, tribal and intelligence officials told AFP in Pakistan that Rehman, who had a $5 million US government bounty on his head, was the target of the strike and was killed.
Pakistani security officials said the others killed in the attack were TTP cadres, including two local-level commanders. There were no initial reports of civilian casualties.
According to Britain's Bureau of Investigative Journalism, CIA drone attacks targeting suspected Al-Qaeda and Taliban militants in Pakistan have killed up to 3,587 people since 2004, including as many as 884 civilians.
The frequency of drone strikes in Pakistan has tailed off in recent months, with the previous one coming on April 17.
Source
After vowing transparency, US mum on drone killing
By AFP / Web Desk
Published: May 29, 2013
WASHINGTON: The United States on Wednesday refused to confirm that it killed the number two in the Pakistani Taliban, despite President Barack Obama’s promise of more transparency on the drone war.
The killing of Waliur Rehman, deputy leader of the Tehreek-e-Taliban Pakistan (TTP) was the first known US drone strike since Obama’s speech last week laying out new criteria for the covert use of unmanned aerial vehicles.
His death was the first test of whether US authorities would provide more transparency on drone operations by the CIA or the military after Obama’s pledge of greater accountability over the use of such attacks.
“We are not in a position to confirm the reports of Waliur Rehman’s death,” White House spokesperson Jay Carney said, following an attack in which the TTP number two and at least five others were killed.
“If those reports were true, or prove to be true, it’s worth noting that his demise would deprive the TTP of its second-in-command and chief military strategist.” Carney said.
Carney said Rehman was also wanted in connection with attacks on US and Nato personnel in Afghanistan and for involvement in the attack on American citizens in Khost, Afghanistan on December 30, 2009.
That strike, though Carney did not describe it in detail, was a dark day in CIA history, when seven counter-terrorism agents and security contractors were killed in a suicide bombing in a remote outpost.
Carney would not confirm whether the attack on Rehman satisfied the new criteria for drone strikes established by Obama last week during a speech that aimed to recast the country’s decade-long battle against terrorism.
In the speech, Obama said that lethal force would only be used to “prevent or stop attacks against US persons,” when capture is not feasible and if a target poses a “continuing, imminent threat” to Americans.
But Carney pointed out a clause in Obama’s speech in which he said that in the “Afghan war theater” Washington must support its troops until the Nato withdrawal is complete in 2014.
The president said that strikes would continue against “high value al Qaeda targets, but also against forces that are massing to support attacks on coalition forces.”
A CIA spokesperson also declined to confirm Rehman’s death.
Security, tribal and intelligence officials told AFP in Pakistan that Rehman, who had a $5 million US government bounty on his head, was the target of the strike in North Waziristan and was killed.
Pakistani government condemns drone strike
The Pakistani government “expressed serious concerns” over the US drone strike that killed Waliur Rehman on Wednesday, according to a press release from the Ministry of Foreign Affairs.
Pakistan has maintained its stance that US drone strikes are counter-productive, result in the loss of innocent lives and violate Pakistani sovereignty.
Obama signs bill on lying about military medals
What we really need is a bill making it illegal for elected officials like President Obama to lie to us.
Obama lied to us several times when he said he wouldn't send his DEA thugs to arrest medical marijuana users in California.
Obama also lied about supporting gay marriage.
And of course Obama has told us a whole slew of lies about ending the wars in Iraq and Afghanistan.
Yea, I know, the American Empire won both wars but if that is true why do we have tens of thousands of military troops in both countries. OK, most of them are not American military troops, but they are mercenaries hired by the American government to replace the military troops.
Source
Obama signs bill on lying about military medals
3:21 p.m. EDT June 3, 2013
WASHINGTON (AP) — The White House says President Obama has signed a bill making it a crime to lie about receiving a military medal.
The Stolen Valor Act cleared both chambers of Congress last month. The White House said Obama signed it Monday.
The measure revives a law struck down by the Supreme Court in 2006. The court said it may be disreputable to lie about receiving a medal, but it's protected under the First Amendment.
The new law is narrower, making it a crime to lie about being decorated with the intent to profit personally or financially. That could include those who claim medals in order to receive veterans benefits, land a government contract or get a job reserved for veterans.
Violators could face up to a year in prison.
Obama officials defend collecting phone records
Every since Emperor Obama got into office I have called him a clone of George W. Bush. Sadly he is also looking like a clone of Richard M. Nixon.
Source
Obama officials defend collecting phone records
Associated Press Thu Jun 6, 2013 7:17 AM
WASHINGTON — A British newspaper reported that the United States has been collecting the telephone records of millions of Americans under a top secret court order. The Obama administration on Thursday defended the government’s need to collect telephone records of American citizens, calling such information “a critical tool in protecting the nation from terrorist threats.”
While defending the practice, a senior Obama administration official did not confirm the report Wednesday in Britain’s Guardian newspaper.
The disclosure was likely to bring questions from both Republicans and Democrats of how far the Obama administration’s surveillance policies go, following the government’s tracking of Associated Press journalists’ phone records in a leak investigation.
The White House has been on the defensive against Republicans who claim the administration is too intrusive in Americans’ lives, citing the federal tax agency’s targeting of conservative groups for extra scrutiny as proof.
Republicans also claim Obama aides manipulated the government’s response to last year’s deadly attack on a U.S. consulate in Benghazi, Libya, to remove any links to terrorism in the heat of a presidential election, which the White House denies.
The controversies collectively could erode the American people’s trust in Obama and derail his second term agenda.
The court order to collect phone records was granted by the secret Foreign Intelligence Surveillance Court on April 25 and is good until July 19, the newspaper reported. The order requires Verizon, one of America’s largest telecommunications companies, on an “ongoing, daily basis” to give the National Security Agency information on all telephone calls in its systems, both within the U.S. and between the U.S. and other countries.
The newspaper said the document, a copy of which it had obtained, shows for the first time that under the Obama administration the communication records of millions of U.S. citizens were being collected indiscriminately and in bulk, regardless of whether they were suspected of any wrongdoing.
The Associated Press could not authenticate the order because documents from the court are classified.
The administration official spoke on condition of anonymity because the official was not authorized to publicly discuss classified matters.
Verizon spokesman Ed McFadden said Wednesday the company had no comment. The NSA had no immediate comment.
Verizon Communications Inc. listed 121 million customers in its first-quarter earnings report this April — 98.9 million wireless customers, 11.7 million residential phone lines and about 10 million commercial lines. The court order didn’t specify which type of phone customers’ records were being tracked.
Under the terms of the order, the phone numbers of both parties on a call are handed over, as are location data, call duration, unique identifiers, and the time and duration of all calls. The contents of the conversation itself are not covered, The Guardian said.
The administration official said, “On its face, the order reprinted in the article does not allow the government to listen in on anyone’s telephone calls.”
The broad, unlimited nature of the records being handed over to the NSA is unusual. FISA court orders typically direct the production of records pertaining to a specific named target suspected of being an agent of a terrorist group or foreign state, or a finite set of individually named targets. NSA warrantless wiretapping during the George W. Bush administration after the Sept. 11, 2001, attacks was very controversial.
The secret court order, signed by Judge Roger Vinson, compelled Verizon to provide the NSA with electronic copies of “all call detail records or telephony metadata created by Verizon for communications between the United States and abroad” or “wholly within the United States, including local telephone calls,” The Guardian said.
The law on which the order explicitly relies is the “business records” provision of the USA Patriot Act, which passed after Sept. 11, 2001.
The NSA tracking phone calls of millions of Verizon customers???
Source
Not just Verizon? Secret NSA effort to gather phone data is years old
By Richard A. Serrano and Kathleen Hennessey
June 6, 2013, 8:54 a.m.
WASHINGTON -- The massive National Security Agency collection of telephone records disclosed Wednesday was part of a continuing program that has been in effect nonstop since 2006, according to the two top leaders of the Senate Intelligence Committee.
“As far as I know, this is the exact three-month renewal of what has been in place for the past seven years," Sen. Dianne Feinstein (D-Calif.) told reporters Thursday. The surveillance “is lawful” and Congress has been fully briefed on the practice, she added.
Her Republican counterpart, Saxby Chambliss, concurred: "This is nothing new. This has been going on for seven years,” he said. “Every member of the United States Senate has been advised of this.
To my knowledge there has not been any citizen who has registered a complaint. It has proved meritorious because we have collected significant information on bad guys, but only on bad guys, over the years."
The statements by the two senators, whose committee positions give them wide access to classified data, appeared to rule out the possibility that the court order directing Verizon to turn over telephone records was related to the Boston Marathon bombings. The order was effective as of April 19, shortly after the bombings, which had sparked speculation about a link.
Instead, the surveillance, which was revealed Wednesday by Britain’s Guardian newspaper, appears to have been of far longer duration. Although the senators did not specify the scope of the surveillance, the fact that it has been in place since 2006 also suggests that it is not limited to any one phone carrier.
The Obama administration defended the program Thursday, saying the data collection “has been a critical tool in protecting the nation from terrorist threats to the United States.”
A senior administration official released a statement which did not confirm the existence of the court order authorizing the surveillance, which, according to the copy released by the Guardian, is marked "Top Secret." It was issued in late April by the Foreign Intelligence Surveillance Court, a secret court that meets in Washington, and allowed the government to collect the bulk data until July 19.
"The information acquired does not include the content of any communications or the name of any subscriber," the official said. "It relates exclusively to metadata, such as a telephone number or the length of a call.
The court order was authorized under a provision of the Foreign Intelligence Surveillance Act that allows the government to collect business records in bulk if its requests are approved by the court.
The official said telephone data allow "counterterrorism personnel to discover whether known or suspected terrorists have been in contact with other persons who may be engaged in terrorist activities, particularly people located inside the United States.”
The official requested anonymity to discuss the counterterrorism program.
In defending the data collection program, the administration official sought to spread responsibility, noting that “all three branches” of government were tasked with review and oversight of surveillance.
"There is a robust legal regime in place governing all activities conducted pursuant to the Foreign Intelligence Surveillance Act," the official said. He said that involves oversight by the Department of Justice, the Office of the Director of National Intelligence and the FISA court.
Separately, the Justice Department released a letter defending the administration’s handling of the FISA law that they had sent in 2011 to two senators who had objected to it.
“We do not believe the Executive Branch is operating pursuant to ‘secret law’ or ‘secret opinions of the Department of Justice,’ “ said the letter, signed by Assistant Atty. Gen. Ronald Weich. The “Intelligence Community is conducting court-authorized intelligence activities pursuant to a public statute, with the knowledge and oversight of Congress and the Intelligence Communities of both Houses.”
“Many other collection activities are classified,” Weich added, saying that “this is necessary because public disclosure of the activities they discuss would harm national security and impede the effectiveness of the intelligence tools that Congress has approved.”
Weich further defended the program by saying intelligence officials have “determined that public disclosure of the classified use” of the law “would expose sensitive sources and methods to our adversaries and therefore harm national security.”
He said collection of records, as now underway with Verizon phone logs, was different than material obtained through grand jury subpoenas. Grand jury subpoenas, he said, can be obtained by prosecutors without court approval. In contrast, he said, the intelligence collections can be done only with approval from a federal judge sitting on the Foreign Intelligence Surveillance Court.
Most importantly, he noted that FISA courts require a showing by officials that the records sought “are relevant to an authorized national security investigation.”
The Weich letter was sent to Sen. Ron Wyden (D-0re.).
Atty. Gen. Eric H. Holder Jr. is testifying Thursday morning before the Senate Appropriations Committee, and is expected to address the matter further.
Follow Politics Now on Twitter and Facebook
kathleen.hennessey@latimes.com
Rick.Serrano@latimes.com
Twitter: @khennessey
President Obama’s Dragnet
Is that Richard M Obama, or Barak M Nixon????
Source
President Obama’s Dragnet
By THE EDITORIAL BOARD
Published: June 6, 2013
Within hours of the disclosure that the federal authorities routinely collect data on phone calls Americans make, regardless of whether they have any bearing on a counterterrorism investigation, the Obama administration issued the same platitude it has offered every time President Obama has been caught overreaching in the use of his powers: Terrorists are a real menace and you should just trust us to deal with them because we have internal mechanisms (that we are not going to tell you about) to make sure we do not violate your rights.
Those reassurances have never been persuasive — whether on secret warrants to scoop up a news agency’s phone records or secret orders to kill an American suspected of terrorism — especially coming from a president who once promised transparency and accountability. The administration has now lost all credibility. Mr. Obama is proving the truism that the executive will use any power it is given and very likely abuse it. That is one reason we have long argued that the Patriot Act, enacted in the heat of fear after the 9/11 attacks by members of Congress who mostly had not even read it, was reckless in its assignment of unnecessary and overbroad surveillance powers.
Based on an article in The Guardian published Wednesday night, we now know the Federal Bureau of Investigation and the National Security Agency used the Patriot Act to obtain a secret warrant to compel Verizon’s business services division to turn over data on every single call that went through its system. We know that this particular order was a routine extension of surveillance that has been going on for years, and it seems very likely that it extends beyond Verizon’s business division. There is every reason to believe the federal government has been collecting every bit of information about every American’s phone calls except the words actually exchanged in those calls.
A senior administration official quoted in The Times offered the lame observation that the information does not include the name of any caller, as though there would be the slightest difficulty in matching numbers to names. He said the information “has been a critical tool in protecting the nation from terrorist threats,” because it allows the government “to discover whether known or suspected terrorists have been in contact with other persons who may be engaged in terrorist activities, particularly people located inside the United States.”
That is a vital goal, but how is it served by collecting everyone’s call data? The government can easily collect phone records (including the actual content of those calls) on “known or suspected terrorists” without logging every call made. In fact, the Foreign Intelligence Surveillance Act was expanded in 2008 for that very purpose. Essentially, the administration is saying that without any individual suspicion of wrongdoing, the government is allowed to know who Americans are calling every time they make a phone call, for how long they talk and from where.
This sort of tracking can reveal a lot of personal and intimate information about an individual. To casually permit this surveillance — with the American public having no idea that the executive branch is now exercising this power — fundamentally shifts power between the individual and the state, and repudiates constitutional principles governing search, seizure and privacy.
The defense of this practice offered by Senator Dianne Feinstein of California, who as chairman of the Senate Intelligence Committee is supposed to be preventing this sort of overreaching, was absurd. She said today that the authorities need this information in case someone might become a terrorist in the future. Senator Saxby Chambliss of Georgia, the vice chairman of the committee, said the surveillance has “proved meritorious, because we have gathered significant information on bad guys and only on bad guys over the years.”
But what assurance do we have of that, especially since Ms. Feinstein went on to say that she actually did not know how the data being collected was used?
The senior administration official quoted in The Times said the executive branch internally reviews surveillance programs to ensure that they “comply with the Constitution and laws of the United States and appropriately protect privacy and civil liberties.”
That’s no longer good enough. Mr. Obama clearly had no intention of revealing this eavesdropping, just as he would not have acknowledged the killing of Anwar al-Awlaki, an American citizen, had it not been reported in the press. Even then, it took him more than a year and a half to acknowledge the killing, and he is still keeping secret the protocol by which he makes such decisions.
We are not questioning the legality under the Patriot Act of the court order disclosed by The Guardian. But we strongly object to using that power in this manner. It is the very sort of thing against which Mr. Obama once railed, when he said in 2007 that the Bush administration’s surveillance policy “puts forward a false choice between the liberties we cherish and the security we provide.”
Two Democrats on the Senate Intelligence Committee, Senator Ron Wyden of Oregon and Senator Mark Udall of Colorado, have raised warnings about the government’s overbroad interpretation of its surveillance powers. “We believe most Americans would be stunned to learn the details of how these secret court opinions have interpreted Section 215 of the Patriot Act,” they wrote last year in a letter to Attorney General Eric Holder Jr. “As we see it, there is now a significant gap between what most Americans think the law allows and what the government secretly claims the law allows. This is a problem, because it is impossible to have an informed public debate about what the law should say when the public doesn’t know what its government thinks the law says.”
On Thursday, Representative Jim Sensenbrenner, Republican of Wisconsin, who introduced the Patriot Act in 2001, said that the National Security Agency overstepped its bounds by issuing a secret order to collect phone log records from millions of Americans. “As the author of the Patriot Act, I am extremely troubled by the F.B.I.’s interpretation of this legislation,” he said in a statement. “While I believe the Patriot Act appropriately balanced national security concerns and civil rights, I have always worried about potential abuses.” He added: “Seizing phone records of millions of innocent people is excessive and un-American.”
This stunning use of the act shows, once again, why it needs to be sharply curtailed if not repealed.
What You Should Know About NSA Phone Data Program
Source
What You Should Know About NSA Phone Data Program
By THE ASSOCIATED PRESS
Published: June 6, 2013 at 4:04 PM ET
WASHINGTON — The government knows who you're calling.
Every day. Every call.
Here's what you need to know about the secret program and how it works:
___
Q: What happened and why is it a big deal?
A: The Guardian newspaper published a highly classified April U.S. court order that allows the government access to all of Verizon's phone records on a daily basis, for both domestic and international calls. That doesn't mean the government is listening in, and the National Security Agency did not receive the names and addresses of customers. But it did receive all phone numbers with outgoing or incoming calls, as well as the unique electronic numbers that identify cellphones. That means the government knows which phones are being used, even if customers change their numbers.
This is the first tangible evidence of the scope of a domestic surveillance program that has existed for years but has been discussed only in generalities. It proves that, in the name of national security, the government sweeps up the call records of Americans who have no known ties to terrorists or criminals.
Q: How is this different from the NSA wiretapping that was going on under President George W. Bush?
A: In 2005, The New York Times revealed that Bush had signed a secret order allowing the NSA to eavesdrop on Americans without court approval, a seismic shift in policy for an agency that had previously been prohibited from spying domestically. The exact scope of that program has never been known, but it allowed the NSA to monitor phone calls and emails. After it became public, the Bush administration dubbed it the "Terrorist Surveillance Program" and said it was a critical tool in protecting the United States from attack.
"The NSA program is narrowly focused, aimed only at international calls and targeted at al-Qaida and related groups," the Justice Department said at the time.
But while wiretapping got all the attention, the government was also collecting call logs from American phone companies as part of that program, a U.S. official said Thursday. After the wiretapping controversy, the surveillance continued, albeit with court approval. That's what we're seeing in the newly released court document: a judge's authorization for something that began years ago with no court oversight.
Q: Why does the government even want my phone records?
A: They're not interested in your records, in all likelihood, but your calls make up the background noise of the global phone system.
Look at your monthly phone bill, and you'll see patterns: calls home as you leave work, food delivery orders on Friday nights, that once-a-week call to mom and dad.
It's like that, except on a monumentally bigger scale. Armed with the nation's phone records, the NSA's computers can identify what normal call behavior looks like. Abnormal call behavior begins to stand out.
When the computers spot something out of the ordinary, the government can identify what are known in intelligence circles as "communities of interest" — the networks of people who are in contact with targets or suspicious phone numbers.
Over time, the records also become a valuable archive. When officials discover a new phone number linked to a suspected terrorist, they can consult the records to see who called that number in the preceding months or years.
Once the government has narrowed its focus on phone numbers it believes are tied to terrorism or foreign governments, it can go back to the court with a wiretap request. That allows the government to monitor the calls in real time, record them and store them indefinitely.
___
Q: So a judge approved this. Does that mean someone had to show probable cause that a crime was being committed?
A: No. The seizure was authorized by the Foreign Intelligence Surveillance Court, which operates under very different rules from a typical court. Probable cause is not required.
The court was created by the Foreign Intelligence Surveillance Act of 1978 and is known in intelligence circles as the FISA court. Judges appointed by the president hear secret evidence and authorize wiretapping, search warrants and other clandestine efforts to monitor suspected or known spies and terrorists.
For decades, the court was located in a secure area at Justice Department headquarters. While prosecutors in criminal cases must come to court seeking subpoenas, the FISA judges came to the Justice Department. That changed in 2008 with the construction of a new FISA court inside the U.S. District Court in Washington. The courtroom is essentially a vault, designed to prevent anyone from eavesdropping on what goes on inside.
In this instance, Judge Roger Vinson authorized the NSA to seize the phone records under a provision in the USA Patriot Act, which passed shortly after the Sept. 11, 2001, attacks and vastly expanded the government's ability to collect information on Americans.
___
Q: If not probable cause, what standard did the government use in this case?
A: The judge relied on one of the most controversial aspects of the Patriot Act: Section 215, which became known colloquially as the "library records provision" because it allowed the government to seize a wide range of documents, including library records. Under that provision, the government must show that there are "reasonable grounds to believe" that the records are relevant to an investigation intended to "protect against international terrorism or clandestine intelligence activities."
Exactly what "relevant" meant has been unclear. With the release of the classified court order, the public can see for the first time that everyone's phone records are relevant.
The Justice Department has staunchly defended Section 215, saying it was narrowly written and has safeguarded liberties.
Some in Congress, however, have been sounding alarms about it for years. Though they are prohibited from revealing what they know about the surveillance programs, Democratic Sens. Ron Wyden of Oregon and Mark Udall or Colorado have said the government's interpretation of the law has gone far beyond what the public believes.
"We believe most Americans would be stunned to learn the details of how these secret court opinions have interpreted section 215 of the Patriot Act," the senators wrote in a letter to Attorney General Eric Holder last year.
___
Q: Why don't others in Congress seem that upset about all this?
A: Many members of Congress have known this was going on for years. While Americans might be surprised to see, in writing, an authorization to sweep up their phone records, that's old news to many in Congress.
"Everyone should just calm down and understand that this isn't anything that's brand new," Senate Majority Leader Harry Reid, D-Nev., said Thursday. "It's been going on for some seven years."
Senate Intelligence Committee Chairman Dianne Feinstein, D-Calif., and Vice Chairman Saxby Chambliss issued a similar statement:
"The executive branch's use of this authority has been briefed extensively to the Senate and House Intelligence and Judiciary Committees, and detailed information has been made available to all members of Congress."
___
Q: What does the Obama administration have to say about this?
A: So far, very little. Despite campaigning against Bush's counterterrorism efforts, President Barack Obama has continued many of the most controversial ones including, it is now clear, widespread monitoring of American phone records.
The NSA is particularly reluctant to discuss its programs. Even as it has secretly collected millions of phone records, it has tried to cultivate an image that it was not in the domestic surveillance business.
In March, for instance, NSA spokeswoman Vanee Vines, emailed an Associated Press reporter about a story that described the NSA as a monitor of worldwide internet data and phone calls.
"NSA collects, monitors, and analyzes a variety of (asterisk)(asterisk)(asterisk)FOREIGN(asterisk)(asterisk)(asterisk) signals and communications for indications of threats to the United States and for information of value to the U.S. government," she wrote. " (asterisk)(asterisk)(asterisk)FOREIGN(asterisk)(asterisk)(asterisk) is the operative word. NSA is not an indiscriminate vacuum, collecting anything and everything."
___
Q: Why hasn't anyone sued over this? Can I?
A: People have sued. But challenging the legality of secret wiretaps is difficult because, in order to sue, you have to know you've been wiretapped. In 2006, for instance, a federal judge in Detroit declared the NSA warrantless wiretapping program unconstitutional. But the ruling was overturned when an appeals court that said the plaintiffs — civil rights groups, lawyers and scholars — didn't have the authority to sue because they couldn't prove they were wiretapped.
Court challenges have also run up against the government's ability to torpedo lawsuits that could jeopardize state secrets.
The recent release of the classified court document is sure to trigger a new lawsuit in the name of Verizon customers whose records were seized. But now that the surveillance program is under the supervision of the FISA court and a warrant was issued, a court challenge is more difficult.
Suing Verizon would also be difficult. A lawsuit against AT&T failed because Congress granted telecommunications companies retroactive immunity for cooperating with warrantless surveillance. In this instance, Verizon was under a court order to provide the records to the government, making a lawsuit against the company challenging.
Uncle Sam reads your email and listens to your phone calls
Monumental phone, Internet monitoring laid bare in reports
At about the same time you receive this email a copy of it will have also been forwarded to a US government computer run by the American spy agency NSA or National Security Agency. There a computer will read it and search for key words and phrases like freedom, constitutional, government, Libertarian, guns, drugs, marijuana, cocaine, heroin, LSD, explosives, atheist, Muslim and Arab. If the software finds any of those key words this email will be saved in a file of emails from people the government considers suspected criminals. If the email contains any of those keywords it may be forwarded to a human FBI, Homeland Security, DEA, BATF, or ICE agent who will manually read it trying to find a lame excuse to throw the sender or recipient in prison.
Sure the jackbooted thugs in the FBI, Homeland Security, DEA, BATF, and ICE who created this program are the problem, but the real problem is the members of the US Congress and US Senate who passed the unconstitutional laws such as the Patriot Act and the Foreign Intelligence Surveillance Act which allow the police thugs in those government agencies to do this.
The article didn't mention this but in addition to monitoring our phone conversations and reading our emails the government at both the Federal, state, county and city levels routinely monitor our websites, chat rooms, Facebook, Tweeter and other internet activities.
Every day some of my web pages get a visit from an IP address in Shady Grove, Maryland, which I suspect is the home of some Federal police agency. On a map Shady Grove, Maryland looks like a suburb in the Washington, D.C. metro area and I suspect it is the home of one branch or another of the US Department of Homeland Security.
I have read a number of articles in the Arizona Republic about people who have been arrested by police from the cities of Tempe, Phoenix and the Arizona Department of Public Safety who troll the internet pretending to be horny underage girls who want to have sex with older men.
Source
Monumental phone, Internet monitoring laid bare in reports
Associated Press Fri Jun 7, 2013 7:42 AM
A leaked document has laid bare the monumental scope of the government's surveillance of Americans' phone records — hundreds of millions of calls — in the first hard evidence of a massive data collection program aimed at combating terrorism under powers granted by Congress after the 9/11 attacks.
At issue is a court order, first disclosed Wednesday by The Guardian newspaper in Britain, that requires the communications company Verizon to turn over on an "ongoing, daily basis" the records of all landline and mobile telephone calls of its customers, both within the U.S. and between the U.S. and other countries. Intelligence experts said the government, though not listening in on calls, would be looking for patterns that could lead to terrorists — and that there was every reason to believe similar orders were in place for other phone companies.
Some critics in Congress, as well as civil liberties advocates, declared that the sweeping nature of the National Security Agency program represented an unwarranted intrusion into Americans' private lives. But a number of lawmakers, including some Republicans who normally jump at the chance to criticize the Obama administration, lauded the program's effectiveness. Leaders of the House Intelligence Committee said the program had helped thwart at least one attempted terrorist attack in the United States, "possibly saving American lives."
Separately, The Washington Post and The Guardian reported Thursday the existence of another program used by the NSA and FBI that scours the nation's main Internet companies, extracting audio, video, photographs, emails, documents and connection logs to help analysts track a person's movements and contacts. It was not clear whether the program, called PRISM, targets known suspects or broadly collects data from other Americans.
The companies include Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. The Post said PalTalk has had numerous posts about the Arab Spring and the Syrian civil war. It also said Dropbox would soon be included.
Google, Facebook, Yahoo, Microsoft and Apple said in statements that they do not provide the government with direct access to their records.
"When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law," the company said.
The leaks about the programs brought a sharp response from James Clapper, the director of national intelligence. In an unusual statement late Thursday, Clapper called disclosure of the Internet surveillance program "reprehensible" and said the leak about the phone record collecting could cause long-lasting and irreversible harm to the nation's ability to respond to threats.
Clapper said news reports about the programs contained inaccuracies and omitted key information. He declassified some details about the authority used in the phone records program because he said Americans must know the program's limits. Those details included that a special national security court reviews the program every 90 days and that the court prohibits the government from indiscriminately sifting through phone data. Queries are only allowed when facts support reasonable suspicion, Clapper said.
Sen. Ron Wyden, D-Ore., said of the phone-records collecting: "When law-abiding Americans make phone calls, who they call, when they call and where they call is private information. As a result of the discussion that came to light today, now we're going to have a real debate."
But Republican Sen. Lindsey Graham of South Carolina said Americans have no cause for concern. "If you're not getting a call from a terrorist organization, you've got nothing to worry about," he said.
A senior administration official pointed out that the collection of communication cited in the Washington Post and Guardian articles involves "extensive procedures, specifically approved by the court
,
to ensure that only non-U.S. persons outside the U.S. are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about U.S. persons." The official, who was not authorized to discuss the matter publicly and requested anonymity, added that Congress had recently reauthorized the program.
Senate Intelligence Committee Chairwoman Dianne Feinstein, D-Calif., said the order was a three-month renewal of an ongoing practice that is supervised by federal judges who balance efforts to protect the country from terror attacks against the need to safeguard Americans' privacy. The surveillance powers are granted under the post-9/11 Patriot Act, which was renewed in 2006 and again in 2011.
While the scale of the program might not have been news to some congressional leaders, the disclosure offered a public glimpse into a program whose breadth is not widely understood. Sen. Mark Udall, a Colorado Democrat who serves on the Intelligence Committee, said it was the type of surveillance that "I have long said would shock the public if they knew about it."
The government has hardly been forthcoming.
Wyden released a video of himself pressing Director of National Intelligence James Clapper on the matter during a Senate hearing in March.
"Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Wyden asked.
"No, sir," Clapper answered.
"It does not?" Wyden pressed.
Clapper quickly softened his answer. "Not wittingly," he said. "There are cases where they could, inadvertently perhaps, collect — but not wittingly."
There was no immediate comment from Clapper's office Thursday on his testimony in March.
The public is now on notice that the government has been collecting data — even if not listening to the conversations — on every phone call every American makes, a program that has operated in the shadows for years, under President George W. Bush, and continued by President Barack Obama.
"It is very likely that business records orders like this exist for every major American telecommunication company, meaning that if you make calls in the United States the NSA has those records," wrote Cindy Cohn, general counsel of the nonprofit digital rights group Electronic Frontier Foundation, and staff attorney Mark Rumold, in a blog post.
Without confirming the authenticity of the court order, White House spokesman Josh Earnest said such surveillance powers are "a critical tool in protecting the nation from terror threats," by helping officials determine if people in the U.S. who may have been engaged in terrorist activities have been in touch with other known or suspected terrorists.
House Intelligence Committee Chairman Mike Rogers, R-Mich., stressed that phone records are collected under court orders that are approved by the Senate and House Intelligence committees and regularly reviewed.
And Senate Democratic leader Harry Reid of Nevada played down the significance of the revelation.
"Everyone should just calm down and understand that this isn't anything that's brand new," he said. "This is a program that's been in effect for seven years, as I recall. It's a program that has worked to prevent not all terrorism but certainly the vast, vast majority. Now is the program perfect? Of course not."
But privacy advocates said the scope of the program was indefensible.
"This confirms our worst fears," said Alexander Abdo, a staff attorney with the American Civil Liberties Union's National Security Project. "If the government can track who we call," he said, "the right to privacy has not just been compromised — it has been defeated."
Rep. Jim Sensenbrenner, R-Wis., who sponsored the USA Patriot Act that governs the collection, said he was "extremely troubled by the FBI's interpretation of this legislation."
Attorney General Eric Holder sidestepped questions about the issue during an appearance before a Senate subcommittee, offering instead to discuss it at a classified session that several senators said they would arrange.
House Speaker John Boehner called on Obama to explain why the program is necessary.
It would "be helpful if they'd come forward with the details here," he said.
The disclosure comes at a particularly inopportune time for the Obama administration. The president already faces questions over the Internal Revenue Service's improper targeting of conservative groups, the seizure of journalists' phone records in an investigation into who leaked information to the media, and the administration's handling of the terrorist attack in Libya that left four Americans dead.
At a minimum, it's all a distraction as the president tries to tackle big issues like immigration reform and taxes. And it could serve to erode trust in Obama as he tries to advance his second-term agenda and cement his presidential legacy.
The Verizon order, granted by the secret Foreign Intelligence Surveillance Court on April 25 and good until July 19, requires information on the phone numbers of both parties on a call, as well as call time and duration, and unique identifiers, according to The Guardian.
It does not authorize snooping into the content of phone calls. But with millions of phone records in hand, the NSA's computers can analyze them for patterns, spot unusual behavior and identify "communities of interest" — networks of people in contact with targets or suspicious phone numbers overseas.
Once the government has zeroed in on numbers that it believes are tied to terrorism or foreign governments, it can go back to the court with a wiretap request. That allows the government to monitor the calls in real time, record them and store them indefinitely.
Rogers said once the data has been collected, officials still must follow "a court-approved method and a series of checks and balances to even make the query on a particular number."
But Jim Harper, a communications and privacy expert at the libertarian-leaning Cato Institute, questioned the effectiveness of pattern analyses to intercept terrorism. He said that kind of analysis would produce many false positives and give the government access to intricate data about people's calling habits.
Verizon Executive Vice President and General Counsel Randy Milch, in a blog post, said the company isn't allowed to comment on any such court order.
"Verizon continually takes steps to safeguard its customers' privacy," he wrote. "Nevertheless, the law authorizes the federal courts to order a company to provide information in certain circumstances, and if Verizon were to receive such an order, we would be required to comply."
The company listed 121 million customers in its first-quarter earnings report this April — 98.9 million wireless customers, 11.7 million residential phone lines and about 10 million commercial lines.
The NSA had no immediate comment. The agency is sensitive to perceptions that it might be spying on Americans. It distributes a brochure that pledges the agency "is unwavering in its respect for U.S. laws and Americans' civil liberties — and its commitment to accountability."
Under Bush, the NSA built a highly classified wiretapping program to monitor emails and phone calls worldwide. The full details of that program remain unknown, but one aspect was to monitor massive numbers of incoming and outgoing U.S. calls to look for suspicious patterns, said an official familiar with the program. That official spoke on condition of anonymity because he was not authorized to discuss it publicly.
After The New York Times revealed the existence of that wiretapping program, the data collection continued under the Patriot Act, the official said. The official did not know if the program was continuous or whether it stopped and restarted at times.
The FISA court order, signed by Judge Roger Vinson, compelled Verizon to provide the NSA with electronic copies of "all call detail records or telephony metadata created by Verizon for communications between the United States and abroad" or "wholly within the United States, including local telephone calls," The Guardian said.
The law on which the order explicitly relies is the "business records" provision of the Patriot Act.
Seizing cellphone records abuses liberty
Source
Seizing cellphone records abuses liberty
Our View: Data mining is legal, useful - but not a blank check
By Editorial board The Republic | azcentral.com Fri Jun 7, 2013 7:44 AM
There is a rich vein of irony in Wednesday’s revelation by a London newspaper that the National Security Agency is collecting millions of telephone records from Verizon every day and has a court’s approval to do it.
This is the Obama administration’s NSA, after all. The administration that arrived in 2008 on a mission to repudiate and abandon all the “war on terror” transgressions of its predecessor.
And it is led by a president who just two weeks ago in a major national-security speech expressed concerns about the “expanded surveillance” brought about by the war on terror. He spoke of the need to re-establish balance “between our interests in security and our values of privacy.”
This current NSA “data mining” of millions of phone records is a practice indistinguishable from those conducted at the height of the Patriot Act-authorized war on terror — unchanged except in the scope of the surveillance, which appears far more sweeping than any snooping authority sought by the George W. Bush administration.
Not a lot of “balance” there.
Still, there needs to be some balance struck regarding the meaning of the NSA data-mining story itself. It is not the horrifying, new intrusion on privacy it appears to be.
First, the practice is legal and has been for a long time. The U.S. Supreme Court in 1979 concluded in Smith vs. Maryland that because phone records are held by phone companies, the data about those phone records (as opposed to the content of the phone calls) is not privileged information. The government’s right to access the data for national-security purposes is explicitly authorized under Section 215 of the Patriot Act.
Just as during the Bush administration’s post-9/11 pursuit of terror suspects, the Obama administration’s interest in acquiring the data is almost certainly an effort to prevent terrorist attacks.
We can say “almost certainly” with fair confidence. The court that approved the data mining was the secret Foreign Intelligence Surveillance Court, which was created in 1978 precisely for this purpose.
Further, the court orders, however sweeping, appear to have been witnessed by (and tacitly approved by) congressional Intelligence Committee members.
That hasn’t made the government’s habit of gathering the data any less controversial. For many civil libertarians and critics of the Bush administration, data mining of phone records was evidence of the unconstitutional, unchecked power of the “unitary executive.”
That concern continues today.
Two Democratic members of the Senate Intelligence Committee, Ron Wyden of Oregon and Mark Udall of Colorado, have been cryptically expressing grave concerns for years about what they saw as the administration’s overuse of its surveillance powers. This widespread phone-snooping story is at least part of what they were hinting at.
But it is especially troubling for this administration, given the recent revelations about its willingness to use — which is to say, abuse — the enormous powers of government against political enemies.
The Internal Revenue Service treatment of conservative non-profit organizations may not have been explicitly ordered by the administration. But there is ample evidence the IRS was enthusiastically encouraged by the president and his aides to single out “tea partyers” for special scrutiny.
And the Obama Justice Department’s grim labeling of a Fox News reporter as a suspected espionage co-conspirator underscores the view that the administration is not shy about using its power politically.
There most certainly is a necessary “balance” to be struck between national security and individual liberty. President Barack Obama has not found that balance. He needs to.
Obama defends phone data collection program
“It’s important to recognize that you can’t have 100 percent security and also then have 100 percent privacy and zero inconvenience.”
F*ck you Obama, I will take 100 percent privacy and zero inconvenience any day of the year over having your police thugs spy on me to protect me from enemies which YOUR foreign policies created!!!!
As H. L. Mencken said:
"The whole aim of practical politics is to keep the populace alarmed (and hence clamorous to be led to safety) by menacing it with an endless series of hobgoblins, all of them imaginary."