Homeless in Arizona

Edward Snowden NSA Freedom Fighter???

Ed Edward Snowden - freedom fighter - Booz Allen employee who leaked information about the secret NSA surveillance programs which read our email and listen to our phone calls - former undercover CIA employee
 

Members of Congress vow to rein in NSA

Yea, sure!!!! The crooks in Congress usually try to convince both sides that they voted to support each side 100 percent!!!!

If the House or Senate votes on a single bill several times many members will first vote for the bill, then a second time vote against the same bill. No our Congressmen and Senators are not confused, dyslexic idiots who can't make up their minds. This is very intentional because they want to be able to tell supporters of the bill they voted for the bill, and be able to tell opponents of the bill they voted against the bill.

How they vote on the final bill is usually an indication of which special interest groups gave them the most money.

It's all part of the game plan to get reelected. And to keep us in the dark.

Source

Members of Congress vow to rein in NSA

By Pete Yost Associated Press Wed Jul 17, 2013 10:27 PM

WASHINGTON — In a heated confrontation over domestic spying, members of Congress said Wednesday that they never intended to allow the National Security Agency to build a database of every phone call in America. [If that is true why did they vote for the bill in the first place???] And they threatened to curtail the government’s surveillance authority.

Top Obama administration officials countered that the once-secret program was legal and necessary to keep America safe. And they left open the possibility that they could build similar databases of people’s credit-card transactions, hotel records and Internet searches.

The clash on Capitol Hill undercut President Barack Obama’s assurances that Congress had fully understood the dramatic expansion of government power it authorized repeatedly over the past decade.

The House Judiciary Committee hearing also represented perhaps the most public, substantive congressional debate on surveillance powers since the Sept. 11 terrorist attacks. Previous debates have been largely theoretical and legalistic, with officials in the Bush and Obama administrations keeping the details hidden behind the cloak of classified information.

That changed last month when former government contractor Edward Snowden leaked documents to the Guardian newspaper revealing that the NSA collects every American’s phone records, knowing that the overwhelming majority of people have no ties to terrorism. [Edward Snowden is a patriot and freedom fighter for exposing the lies of Congress, the President and the government] Civil-rights groups have warned for years that the government would use the USA Patriot Act to conduct such wholesale data collection. The government denied it.

The Obama administration says it needs a library of everyone’s phone records so that when it finds a suspected terrorist, it can search its archives for the suspect’s calling habits. The administration says the database was authorized under a provision in the Patriot Act that Congress hurriedly passed after 9/11 and reauthorized in 2005 and 2010. [Well if you ask me the database is NOT allowed by the Fourth Amendment and that should be the final authority on the matter]

The sponsor of that bill, Rep. James Sensenbrenner, R-Wis., said Wednesday that Congress meant only to allow seizures directly relevant to national-security investigations. No one expected the government to obtain every phone record and store them in a huge database to search later. [Bullsh*t, the members of Congress voted for the bill to turn American into a police state, which is what the special interest groups who gave them campaign contributions wanted the bill to do.]

As Deputy Attorney General James Cole explained why that was necessary, Sensenbrenner cut him off and reminded him that his surveillance authority expires in 2015.

“And unless you realize you’ve got a problem,” Sensenbrenner said, “that is not going to be renewed.”

He was followed by Rep. Jerrold Nadler, D-N.Y., who picked up where his colleague left off. The problem, he said, is that the administration considers “everything in the world” relevant to fighting terrorism. [Yea, and so does the House and Senate]

Later, Rep. Blake Farenthold, R-Texas, asked whether the NSA could build similar databases of everyone’s Internet searches, hotel records and credit-card transactions.

Robert S. Litt, general counsel in the office of the Director of National Intelligence, didn’t directly answer, saying it would depend on whether the government believed those records — like phone records — to be relevant to terrorism investigations.

After the phone surveillance became public, Obama assured Americans that Congress was well aware of what was going on. [I suspect Congress was well aware of what was going on, but didn't care, because it served the interests of the special interest groups that give them money]

“When it comes to telephone calls, every member of Congress has been briefed on this program,” he said.

Whether lawmakers willingly kept themselves in the dark or were misled, it was apparent Wednesday that one of the key oversight bodies in Congress remained unclear about the scope of surveillance, more than a decade after it was authorized. [Willingly or not willingly they voted to turn Amerika into a police state and should be booted out of office for that.]

The Judiciary Committee’s senior Democrat, Rep. John Conyers of Michigan, noted that the panel had “primary jurisdiction” over the surveillance laws that were the foundation for the NSA programs. Yet one lawmaker, Rep. Ted Poe, R-Texas, said some members of Congress wouldn’t have known about the NSA surveillance without the sensational leaks: “Snowden, I don’t like him at all, but we would never have known what happened if he hadn’t told us.” [Again bullsh*t. That's like saying a drunk drive didn't know he was drunk because nobody told him he was weaving all over the road]

The NSA says it looks at numbers only as part of narrow terrorism investigations, but that doesn’t tell the whole story. [Narrow terrorism investigations??? What rubbish. I think NSA has been collecting phone call data on 100+ million people or roughly a third of the American population.]

For the first time, NSA Deputy Director John C. Inglis disclosed Wednesday that the agency sometimes conducts what’s known as three-hop analysis. That means the government can look at the phone data of a terrorism suspect, plus the data of all of his contacts, then all of those people’s contacts, and finally, all of those people’s contacts.

If the average person calls 40 unique people, three-hop analysis could allow the government to mine the records of 2.5 million Americans when investigating one terrorism suspect. [Well I guess using that definition NSA's spying on 100+ million people's phone records it is a narrow investigation]

Rep. Randy Forbes, R-Va., said such a huge database was ripe for government abuse. When Inglis said there was no evidence of that, Forbes interrupted:

“I said I wasn’t going to yell at you and I’m going to try not to. That’s exactly what the American people are worried about,” he said. “That’s what’s infuriating the American people. They’re understanding that if you collect that amount of data, people can get access to it in ways that can harm them.”

The government says it stores everybody’s phone records for five years. Cole explained that because the phone companies don’t keep records that long, the NSA had to build its own database. [Since when is it the job of the phone companies to spy on people for NSA???]

Rep. Steve King, R-Iowa, asked why the government didn’t simply ask the phone companies to keep their data longer. [I guess if Rep. Steve King has his way he will pass a law making it the phone companies job to spy on people for Congress!!!] That way, the government could ask for specific information, rather than collecting information on millions of innocent people.

Inglis said it would be challenging, but the government was looking into it.

Near the end of the hearing, Litt struck a compromising tone. He said national-security officials had tried to balance privacy and security. [Bullsh*t!!!!]

“If the people in Congress decide that we’ve struck that balance in the wrong place, that’s a discussion we need to have,” he said. [Well Congress is the gang of criminals that decided to flush the Bill of Rights down the toilet by passing the Patriot Act]

Obama, too, has said he welcomes the debate over surveillance. But his administration never wanted the debate to be quite so specific. [Obama would prefer that we don't know that he is spying on us]

That was obvious when Rep. Bob Goodlatte, R-Va., asked Litt whether he really believed the government could keep such a vast surveillance program a secret forever.

“Well,” Litt replied, “we tried.” [And thanks to patriot and freedom fighter Edward Snowden the American public found out]


ACLU: Nearly all drivers tracked by police

I certainly agree with the police and our government masters that if the police spy on us 24/7 it will make it easier for the cops to catch nasty, evil criminals.

Of course I think most Americans including my self think it is a waste of our tax dollars to have the government spy on millions of honest, law abiding Americans just to catch a few criminals.

I certainly don't want to pay hundreds or thousands of dollars a year in taxes to allow pay some cop to spy on me 24/7 and build up a huge dossier to be used against me, just in case the police suspect that I committed a crime.

I also think it is an invasion of my privacy for some jackbooted police thug to spy on me 24/7, just in case I turn out to be a criminal.

Last but not least I also think it is a violation of my 4th and 5th Amendment rights for the government to have the cops following me around 24/7 spying on me, just in case I turn out to be a terrorist.

And I suspect the Founders agree with me, and that is probably what they passed the Bill of Rights to limit the power of the police and government.

Source

ACLU: Nearly all drivers tracked by police

By Anne Flaherty and Calvin Woodward Associated Press Wed Jul 17, 2013 10:28 PM

WASHINGTON — You can drive, but you can’t hide.

A rapidly growing network of police cameras is capturing, storing and sharing data on license plates, making it possible to stitch together people’s movements, whether they are stuck in a commute, making tracks to the beach or up to no good.

For the first time, the number of license-tag captures has reached the millions, according to a study published Wednesday by the American Civil Liberties Union based on information from hundreds of law-enforcement agencies. Departments keep the records for weeks or years, sometimes indefinitely, saying they can be crucial in tracking suspicious cars, aiding drug busts, finding abducted children and more.

Attached to police cars, bridges or buildings — and sometimes merely as an app on a police officer’s smartphone — scanners capture images of passing or parked vehicles and pinpoint their locations, uploading that information into police databases.

Over time, it’s unlikely many vehicles in a covered area escape notice. And with some of the information going into regional databases encompassing multiple jurisdictions, it’s becoming easier to build a record of where someone has been, and when, over a large area.

Law-enforcement agencies in the Valley have used the scanners for years and typically tout them as a way to identify stolen vehicles.

Mesa was the first agency to buy in to the technology, with a $25,000 system the agency purchased in 2005. Police in communities including Peoria, Chandler and Phoenix, as well as the Arizona Department of Public Safety, followed.

Between September 2005 and February 2008, Mesa police used the technology to recover more than $2 million in stolen vehicles. [I guess that is typical police propaganda. Giving us dollar value of vehicles recovered instead of an actual number to make things sound better. If the cops assume a new car costs $50,000 that means the cops only recovered a lousy 40 cars. On the other hand cops tend to over inflate their numbers so maybe they used a value of $100,000 per car recovered meaning they only recovered a stinking 20 cars. When I was a kid and the cops busted somebody with a kilo of marijuana that cost $100, they would inflate the value to $1,600 by saying that kilo could be split into 40 ounce bags which sold for $10 each, giving the kilo a value of $400. Then they would say each ounce bag of weed could be rolled into 40 marijuana cigarettes which could be sold for $1 each inflating a $10 bag of weed to be worth $40, and inflating the value of the $100 kilo to $1,600. I suspect the cops play the same silly games to inflate the value of the stolen vehicles recovered to make themselves look like superhuman heroes.]

The ACLU filed requests with Phoenix, Chandler and the Pinal County Sheriff’s Office, according to documents available on the group’s site.

Chandler police responded to the ACLU’s request about access to the license-plate records with a statement that read, in part, “Members of the auto theft unit are currently the only departmental members who have access to the database.” [Yea, sure!!!! But I suspect the members of the auto theft unit with share their information with any other cop who claims he needs it for any reason to catch bad guys]

Phoenix police retain information on the scanned plates for three years and investigators must go through the auto-theft detail to access the records. There are about 1.9 million plate reads in the system, which include partial plates and duplicates, according to a police spokesman.

Unauthorized access to the records could lead to discipline for a violation of office policy or to criminal charges. [Give me a break. Sure on paper this COULD happen, but I doubt if any cop ever gets punished for breaking the rules. And if they get punished it is rarely more then a slap on the wrist]

While the Supreme Court ruled in 2012 that a judge’s approval is needed to use GPS to track a car, networks of plate scanners allow police effectively to track a driver’s location, sometimes several times every day, with few legal restrictions. The ACLU says the scanners are assembling a “single, high-resolution image of our lives.”

“There’s just a fundamental question of whether we’re going to live in a society where these dragnet surveillance systems become routine,” said Catherine Crump, a staff attorney with the organization. The group is proposing that police departments immediately delete records of cars not linked to any crime. [An even better idea would be to not allow the cops to collect this data!!!!]

Although less thorough than GPS tracking, plate readers can produce some of the same information, the group says, revealing whether someone is frequenting a bar, joining a protest, getting medical or mental help, being unfaithful to a spouse and much more.

In Minneapolis, for example, eight mobile and two fixed cameras captured data on 4.9 million license plates from January to August 2012, the Star Tribune reported. Among those whose movements were recorded: Mayor R.T. Rybak, whose city-owned cars were tracked at 41 locations in a year.

A Star Tribune reporter’s vehicle was tracked seven times in a year, placing him at a friend’s house three times late at night, other times going to and from work — forming a picture of the dates, times and coordinates of his daily routine. Until the city temporarily classified such data late last year, anyone could ask police for a list of when and where a car had been spotted.

As the technology becomes cheaper and more widespread, even small police agencies deploy more sophisticated systems. The federal government has been a willing partner, offering grants to help equip departments, in part as a tool against terrorism.

Law-enforcement officials say the scanners are strikingly efficient. The state of Maryland told the ACLU that troopers could “maintain a normal patrol stance” while capturing up to 7,000 license plate images in a single eight-hour shift.

“At a time of fiscal and budget constraints, we need better assistance for law enforcement,” said Harvey Eisenberg, assistant U.S. attorney in Maryland. [Well if they want to save money, they could stop these surveillance programs which are just jobs programs for cops]

Law-enforcement officials say the technology automates a practice that’s been around for years. The ACLU found that only five states have laws governing license-plate readers. New Hampshire, for example, bans the technology except in narrow circumstances, while Maine and Arkansas limit how long plate information can be stored.

“There’s no expectation of privacy” for a vehicle driving on a public road or parked in a public place, said Lt. Bill Hedgpeth, a spokesman for the Mesquite Police Department in Texas. The department has records stretching back to 2008, although the city plans next month to begin deleting files older than two years.

In Yonkers, N.Y., just north of New York City’s Bronx, police said retaining the information indefinitely will help detectives solve future crimes. In a statement, the department said it uses license-plate readers as a “reactive investigative tool” that is accessed only if detectives are looking for a particular vehicle in connection with a crime. [Translation - if we think you are a criminal we will use any and all of the data we collect against you]

“These plate readers are not intended nor used to follow the movements of members of the public,” the department said. [What bullsh*t!!! That's the whole purpose of the data - spying on the entire public to find a small number of criminals]

Even so, the records add up quickly. In Jersey City, N.J., for example, the population is 250,000, but the city collected more than 2 million plate images in a year. Because the city keeps records for five years, the ACLU estimates that it has 10 million on file, making it possible for police to plot the movements of most residents, depending upon the number and location of the scanners.

The ACLU study, based on 26,000 pages of responses from 293 police departments and state agencies across the country, found that license-plate scanners produced a small fraction of “hits,” or alerts to police that a suspicious vehicle had been found.

In Maryland, for example, the state reported reading about 29 million plates between January and May of last year. Of that number, about 60,000 — or roughly 1 in every 500 license plates — were suspicious. The main offenses: a suspended or revoked registration, or a violation of the state’s emissions- inspection program, altogether accounting for 97 percent of alerts. [Sounds like most of those are TAX violations - the government wants to spy on us 24/7 to make it easier to shake us down for vehicle registration taxes]

Even so, Eisenberg, the assistant U.S. attorney, said the program has helped authorities track 132 wanted suspects and can make a critical difference in keeping an area safe.

Also, he said, Maryland has rules in place restricting access. Most records are retained for one year, and the state’s privacy policies are reviewed by an independent board, Eisenberg said.

At least in Maryland, “there are checks, and there are balances,” he said.

Republic reporter JJ Hensley contributed to this article.


N.J. court: Warrants needed for cellphone tracking

N.J. court: Warrants needed for cellphone tracking

“No one buys a cell phone to share detailed information about their whereabouts with the police. That was true in 2006 and is equally true today. Citizens have a legitimate privacy interest in such information.”

Source

N.J. court: Warrants needed for cellphone tracking

By David Porter Associated Press Fri Jul 19, 2013 6:19 AM

NEWARK, N.J. — Police in New Jersey will soon have to get warrants if they want to track suspects using cellphone data, the state’s Supreme Court ruled in a decision that affords citizens here more privacy protections than they enjoy under federal law.

In a unanimous ruling Thursday stemming from the arrest of a burglary suspect in 2006, the court directed that beginning in 30 days, all law enforcement officers must get a search warrant based on probable cause if they want to get access to cellphone locating data. Since 2010, police have had to satisfy a lower standard of demonstrating there are “reasonable grounds” to believe the information would be relevant to an investigation.

“No one buys a cell phone to share detailed information about their whereabouts with the police,” Chief Justice Stuart Rabner wrote. “That was true in 2006 and is equally true today. Citizens have a legitimate privacy interest in such information.”

Rabner noted that federal courts have been divided over the issue of cellphone tracking by law enforcement. In some other areas, he wrote, New Jersey’s constitution goes farther than the Fourth Amendment in protecting citizens from unreasonable search and seizure — particularly in previous cases involving Internet usage, bank records and hotel telephone records.

“When people make disclosures to phone companies and other providers to use their services, they are not promoting the release of personal information to others. Instead, they can reasonably expect that their personal information will remain private,” Rabner wrote. “For those reasons, we have departed from federal case law that takes a different approach.”

Rubin Sinins, an attorney who argued on behalf of the American Civil Liberties Union of New Jersey and a state criminal defense lawyers association, called Thursday’s decision “vitally important.”

“I’m not surprised it was unanimous because the basic premise of the opinion is quite logical and consistent with citizens’ reasonable expectation of privacy in their cellphone usage,” he said.

In the 2006 case, police tracked Robert Earls to a motel on Route 9 in Howell using information provided by T-Mobile about the location of a cellphone believed to be in his possession. When he opened the door to his room, police saw items they believed had been stolen and arrested him. He eventually pleaded guilty to burglary and theft.

It wasn’t immediately clear how Earls’ case would be affected by the ruling since a lower court will now have to consider whether police were justified in using the cellphone data without a warrant under an exception for emergency circumstances. Police said they believed Earls’ girlfriend was in danger because she had cooperated with them.

The new warrant rule applies only to Earls’ case and future cases. The state attorney general’s office has trained county law enforcement personnel to obtain warrants for GPS-based location data since 2006, and warrants were obtained in about 85 percent of 600 cases involving cellphone location data for a six-month period last year, according to Thursday’s ruling.

“As a practical matter, this ruling only affects future cases, and police in New Jersey already have been routinely seeking probable-cause based warrants before seeking cellphone location information,” attorney general’s office spokesman Peter Aseltine said in an email. “We will implement training for New Jersey law enforcement to ensure compliance with this ruling.”


NSA director wants private companies to spy on us for the government????

NSA director wants private companies to spy on us for the government????

Source

NSA director suggests phone companies, not government, could store calling records

By Robert O’Harrow Jr., Published: July 18 E-mail the writer

ASPEN, Colo. — The director of the National Security Agency said Thursday that he is open to the idea of allowing telephone companies, rather than the NSA, to store vast pools of calling records that could be used in counterterrorism cases.

Speaking at a security conference, Gen. Keith Alexander strongly defended the spy agency’s surveillance efforts, which rely on the information known as calling “metadata” to identify and track terrorists and their plots.

But he said that keeping that data in private hands might help quell fears that the agency is intruding into individuals’ lives. [And more important it could provide the government with a way to get around the pesky Constitution by letting private companies spy on us for the government]

“I think it’s something we should consider,” Alexander said.

Alexander’s remarks came during the Aspen Institute’s annual security forum, a retreat that includes current and former intelligence officials, Pentagon leaders, contractors, and the national news media.

The conference this year is heavily focused on cybersecurity and the NSA’s surveillance programs, which burst into public view after leaks by Edward Snowden, a contractor employee who worked at NSA facilities in Hawaii.

In response to questions from NBC correspondent Pete Williams, Alexander acknowledged that internal cybersecurity shortcomings enabled Snowden to download and leak top-secret material about wide-ranging surveillance programs.

Alexander said the agency has launched efforts to tighten security, including locking doors to server rooms and limiting the use of flash drives and other devices for downloading data. He also described how analysts would now have to use a buddy system when seeking access to certain records, another security measure.

“We’re taking the actions to fix this,” Alexander said. “We will fix this.”

Earlier in the day, Deputy Defense Secretary Ashton B. Carter described the Snowden thefts as essentially a hack from an insider. He said that was possible because NSA no longer compartmentalizes information as it did in the past. It also gave many employees, Snowden included, too much latitude to access records.

“It’s no outsider hacking in. It is an insider,” he said. “There was an enormous amount of information concentrated in one place. That’s a mistake.”

“We’re acting to reverse both of those things,” Carter said.

The surveillance programs and cybersecurity and warfare have become the central themes of Alexander’s eight-year tenure at the NSA. In addition to being director of the NSA, Alexander is commander of the U.S. Cyber Command.

Under his leadership, the agency is dramatically expanding of the number of cyber­warriors, from about 900 to 4,900. By the fall of 2015, the command intends to create 13 teams of hackers with offensive capabilities, meaning they will be trained to break into other networks and collect information or disrupt or destroy the systems.

The agency also created some of the most far-reaching surveillance programs as part of the war on terror, as shown by the documents Snowden leaked to Britain’s Guardian newspaper and The Washington Post.

One program collected “metadata” about millions of phone calls from American telecom companies.

In one document, a classified report prepared in 2009 by the NSA inspector general, Alexander is described as saying “if the relationships with these companies were ever terminated, the U.S. “SIGINT” (signals intelligence) system would be irrevocably damaged, because NSA would have sacrificed America’s home field advantage as the primary hub for worldwide telecommunications.”

Another top-secret program, called PRISM, collected e-mail, documents, photographs and other records from Microsoft, Apple and at least seven other Internet companies.

In an hour-long conversation with Williams, Alexander strongly defended the NSA’s surveillance programs, saying they have prevented attacks or disrupted terrorist groups dozens of times.

At the same time, he said, the surveillance programs are tightly focused on stopping terrorism or helping the FBI, not on communication by regular Americans. He said the program receives more oversight than any other similar programs in the world.

“I don’t think we could ask for anything better,” Alexander said. “From my perspective, this is the best approach.”

When Williams pressed Alexander about whether the NSA really needed to collect “metadata” about hundreds of millions of phone calls, Alexander said: “What does it take to stop a terrorist attack?”

Alexander described Snowden as a low-level “systems administrator.” He said Snowden needed to be able to download information as part of his job to support the analysts in Hawaii, where he worked. He blamed the leaks on a “huge breach of trust” by Snowden.

Alexander said he has “concrete proof” that terrorist groups have changed their communications as a result of the Snowden disclosures.

“What we’re doing is telling the enemy our playbook,” Alexander said, without providing any details.

Throughout his talk, Alexander involved the Sept. 11, 2001, terrorist attacks, saying that the country needed then the kinds of surveillance programs and tools the NSA is using now to prevent attacks.


Intelligence official defends mass gathering of phone data

The Founders created the 4th & 5th Amendments to protect us from tyrants like Robert S. Litt

Source

Intelligence official defends mass gathering of phone data

By David G. Savage

July 19, 2013, 9:51 p.m.

WASHINGTON — A top Obama administration lawyer defended the government's once-secret policy of sweeping up phone records in the U.S., arguing Friday that this mass data collection violates no one's right to privacy and can help intelligence agents track suspected terrorists.

"Although we collect large volumes of metadata under this program, we only look at a tiny fraction of it," [Yea, sure. If you believe that I have some land I would like to sell you in Florida.] Robert S. Litt, general counsel for the director of national intelligence, said in a speech at the Brookings Institution. And agents check the records "only for a carefully circumscribed purpose — to help us find links between foreign terrorists and people in the United States," he said. [Again, Yea, sure. If you believe that I have some land I would like to sell you in Florida.]

Litt and other Obama administration officials have stepped forward this week in an organized campaign to try to explain and defend a secret data collection policy that was revealed early June by Edward Snowden, a former government contractor.

In another departure from past practice, the director of national intelligence announced Friday that the secret surveillance court order, which expired Friday, had been renewed by the court.

"The government filed an application with the Foreign Intelligence Surveillance Court seeking renewal of the authority to collect telephony metadata in bulk, and that the court renewed that authority," the director of national intelligence said in a statement.

The National Security Agency had been gathering the dialing records from major telephone companies under orders approved by the secret foreign intelligence court. It had done so under part of the Patriot Act that authorized the government to obtain records that were "relevant to an authorized investigation." [And just who ordered the authorized investigation of the 100 million plus Americans the NSA has been monitoring the phone calls of????]

In most crime cases, investigators find a suspect and then go looking for phone or travel records that could confirm guilt. [But now we are all assumed to be guilty until proven innocent, so Uncle Sam spies on everybody????]

But a collect-first, search-later policy makes sense for intelligence work, Litt said Friday. [Yea, and it makes sense in a police state too. Something which Amerika has turned into!]

"Rather than attempting to solve crimes that have happened already, we are trying to find out what is going to happen before it happens," he said. [So now we have psychic cops????]

Litt acknowledged that many lawyers had questioned how collecting all the phone records for months at a time could fit under the Patriot Act's authorization for records that are "relevant to an authorized investigation."

Earlier this week, Republicans and Democrats on the House Judiciary Committee sharply disputed the legality of the mass data collection. Several insisted that the law as they wrote it did not authorize an open-ended collection of records. [Translation - they will say anything to get reelected!!!! - They wrote the law. They voted for the law. They should have know that it more or less flushed the Bill of Rights down the toilet. And now they should be booted out of office]

Litt argued that the word "relevant" sometimes can have an "extremely broad" meaning. He cited instances in which grand juries or civil discovery orders authorized the search of a huge volume of documents, even though only a few of them might prove relevant and useful. [I am sure the folks that wrote the Bill of Rights has a much narrower definition of "relevant"]

Litt said the "bulk data set" of phone records "can help identify links between terrorists overseas and their potential confederates in the United States." [So can flushing the Bill of Rights down the toilet! That doesn't mean the cops and Congress should have done it]

"Many will recall that one of the criticisms made by the 9/11 Commission was that we were unable to find the connection between a hijacker who was in California and an Al Qaeda safe house in Yemen. Although the NSA had collected the conversations from the Yemen safe house, they had no way to determine that the person at the other end was in the United States. This collection program is designed to help us find those connections."

He said telephone companies do not keep the records for long. If the government did not collect the data, it would be destroyed, he said. [Sounds like a lame excuse to me. The telephone companies are not violating the 4th Amendment so that means NSA should????]

Litt also said Americans do not have a constitutional right to privacy in records that are held by banks or phone companies. [But they certainly should!!!!] In 1979, the Supreme Court ruled that although phone conversations are protected as private under the 4th Amendment, dialing records are not. [I think the Supreme Court got it wrong on that!!!]

"We do not get the content of any conversation. We do not get the identity of any party to the conversation, and we do not get any cell site or GPS locational information," he said. [Well jerk, you lied to us when you said you didn't collect this data, before Snowden told us. How do we know you are not lying about collecting cell site data or GPS data???]

Although U.S. officials have admitted only to gathering phone records, their legal theory would also appear to permit the routine collection of bank records or travel records, both of which could prove relevant at some point in a terrorism investigation.

david.savage@latimes.com


$85 bribe will get you thru TSA lines faster???

OK, they call it an $85 "enrollment fee", I call it an $85 "bribe". Ain't much difference, the bottom line is if you grease the palms of our government masters you can get things done much quicker.

According to the TSA, these "bribes" or "enrollment fees" as the TSA goons call them will bring in $255 million in revenue for the TSA.

Think of the TSA "enrollments fees" as kind of like the bribes which our US Senators and Congressmen accept, except again they use the words "campaign contribution" instead of "bribe".

Source

TSA expands faster screening to more travelers

Associated Press Fri Jul 19, 2013 4:29 PM

WASHINGTON — The government is expanding the ways airline passengers can enroll in an expedited screening program that allows travelers to leave on their shoes, light outerwear and belts and keep laptop computers in cases at security checkpoints.

Under the Transportation Security Administration’s Precheck program, only travelers who were members of the frequent flyer programs of some air carriers were eligible for expedited screening. On Friday, TSA Administrator John Pistole said beginning later this year U.S. citizens will be able to enroll online or visit an enrollment site to provide identification, fingerprints and an $85 enrollment fee.

About 12 million people are currently enrolled in the program. Pistole said he expects about another 3 million people to enroll before the end of the year. [Which will bring in $255 million in TSA bribes, or enrollments fees as the our government masters call them. Who says our royal rulers in the Federal government can't be bought]


U.S. military drone surveillance is expanding to hot spots beyond declared combat zones

Think of it as a jobs program for Generals and welfare program for corporations in the military industrial complex!!

And of course the "war on drugs" is part of this jobs program for generals and government welfare program for corporations in the military industrial complex.

Source

U.S. military drone surveillance is expanding to hot spots beyond declared combat zones

By Craig Whitlock, Published: July 20 E-mail the writer

The steel-gray U.S. Air Force Predator drone plunged from the sky, shattering on mountainous terrain near the Iraq-Turkey border. For Kurdish guerrillas hiding nearby, it was an unexpected gift from the propaganda gods.

Fighters from the Kurdistan Workers’ Party, or PKK, filmed the charred wreckage on Sept. 18 and posted a video on YouTube. A narrator bragged unconvincingly that the group had shot down the drone. But for anyone who might doubt that the flying robot was really American, the video zoomed in on mangled parts stamped in English and bearing the label of the manufacturer, San Diego-based General Atomics.

For a brief moment, the crash drew back the curtain on Operation Nomad Shadow, a secretive U.S. military surveillance program. Since November 2011, the U.S. Air Force has been flying unarmed drones from Incirlik Air Base in Turkey in an attempt to suppress a long-simmering regional conflict. The camera-equipped Predators hover above the rugged border with Iraq and beam high-resolution imagery to the Turkish armed forces, helping them pursue PKK rebels as they slip back and forth across the mountains.

As the Obama administration dials back the number of drone attacks in Afghanistan, Pakistan and Yemen, the U.S. military is shifting its huge fleet of unmanned aircraft to other hot spots around the world. This next phase of drone warfare is focused more on spying than killing and will extend the Pentagon’s robust surveillance networks far beyond traditional, declared combat zones.

Over the past decade, the Pentagon has amassed more than 400 Predators, Reapers, Hunters, Gray Eagles and other high-altitude drones that have revolutionized counterterrorism operations. Some of the unmanned aircraft will return home with U.S. troops when they leave Afghanistan. But many of the drones will redeploy to fresh frontiers, where they will spy on a melange of armed groups, drug runners, pirates and other targets that worry U.S. officials.

Elsewhere in the Middle East, the U.S. Air Force has drone hubs in Qatar and the United Arab Emirates to conduct reconnaissance over the Persian Gulf. Twice since November, Iran has scrambled fighter jets to approach or fire on U.S. Predator drones that edged close to Iranian airspace.

In Africa, the U.S. Air Force began flying unarmed drones over the Sahara five months ago to track al-Qaeda fighters and rebels in northern Mali. The Pentagon has also set up drone bases in Ethiopia, Djibouti and Seychelles. Even so, the commander of U.S. forces in Africa told Congress in February that he needed a 15-fold increase in surveillance, reconnaissance and intelligence-gathering on the continent.

In an April speech, Deputy Defense Secretary Ashton B. Carter said the Pentagon is planning for the first time to send Reaper drones — a bigger, faster version of the Predator — to parts of Asia other than Afghanistan. He did not give details. A Defense Department spokeswoman said the military “hasn’t made any final decisions yet” but is “committed to increasing” its surveillance in Asia and the Pacific.

In South and Central America, U.S. military commanders have long pined for drones to aid counternarcotics operations. “Surveillance drones could really help us out and really take the heat and wear and tear off of some of our manned aviation assets,” Marine Gen. John F. Kelly, chief of the U.S. Southern Command, said in March.

One possible destination for more U.S. drones is Colombia. Last year, Colombian armed forces killed 32 “high-value narco-terrorists” after the U.S. military helped pinpoint the targets’ whereabouts with manned surveillance aircraft and other equipment, according to Jose A. Ruiz, a Southern Command spokesman.

The U.S. military has occasionally operated small drones — four-foot-long ScanEagles, which are launched by a catapult — in Colombia. But with larger drones such as Predators and Reapers, U.S. forces could greatly expand the range and duration of their airborne searches for drug smugglers.

An invitation from Turkey

In the fall of 2011, four disassembled Predator drones arrived in crates at Incirlik Air Base in southern Anatolia, a joint U.S.-Turkish military installation.

The drones came from Iraq, where for the previous four years they had been devoted to surveilling that country’s northern mountains. Along with manned U.S. aircraft, the Predators tracked the movements of PKK fighters, sharing video feeds and other intelligence with the Turkish armed forces.

The Kurdish group has long fought to create an autonomous enclave in Turkey, launching cross-border attacks from its hideouts in northern Iraq. Turkey has responded with airstrikes and artillery attacks but has also sent ground troops into Iraq, further destabilizing an already volatile area. The Turkish and U.S. governments both classify the PKK as a terrorist group.

Turkey’s leaders had feared that U.S. cooperation against the PKK would wither after the Americans left Iraq. So they invited them to re-base the drones on Turkish soil and continue the spying mission from there.

Neither side has been eager to publicize the arrangement. The Obama administration has imposed a broad cone of silence on its drone programs worldwide. Pentagon officials declined interview requests about Operation Nomad Shadow.

The Turkish government has acknowledged the presence of Predators on its territory, but the robotic planes are a sensitive subject. A global survey released Thursday by the Pew Research Center found that 82 percent of Turks disapprove of the Obama administration’s international campaign of drone attacks against extremists.

Officials with the Turkish Embassy in Washington declined to comment for this report.

Pilots 6,000 miles away

The drones occupy a relatively tiny corner of the sprawling base at Incirlik, according to interviews with other officials and public documents that shed light on Nomad Shadow.

The operation is staffed by about three dozen personnel from the U.S. Air Force’s 414th Expeditionary Reconnaissance Squadron and private contractor Battlespace Flight Services.

The drones, which began flying in November 2011, are sheltered in an unobtrusive hangar converted from an abandoned “hush house,” a jet-engine testing facility outfitted with noise suppression equipment.

“It was tight, but we could fit four aircraft inside the hangar and close the doors,” said a former Air Force official involved in Nomad Shadow who spoke on the condition of anonymity because of the sensitivity of the operation.

For most of their time aloft, the remote-control Predators are flown via satellite link by pilots and sensor operators stationed about 6,000 miles away, at Whiteman Air Force Base in Missouri.

While in Turkish airspace, the drones cannot spy and must turn off their high-tech cameras and sensors, according to rules set by the Turkish government. It takes the sluggish Predators, with a maximum air speed of 135 mph, about five hours to reach the Iraqi border.

The Iraqi government permits the overflights. Once in Iraq, the Predators usually fly a rectangular route known as “the box” for up to 12 hours each mission as they beam video and other intelligence to Missouri.

U.S. analysts view and evaluate the footage before transmitting it to a joint U.S.-Turkish intelligence “fusion cell” in Ankara, the capital. There’s usually a built-in delay of at least 15 to 20 minutes. That would give a drone enough time to leave the vicinity if Turkish authorities decided to launch artillery rounds or airstrikes against detected PKK targets, the former Air Force official said.

From the outset, some U.S. officials have worried about the potential for botched incidents.

In December 2011, Turkish jets bombed a caravan of suspected PKK fighters crossing from Iraq into Turkey, killing 34 people. The victims were smugglers, however, not terrorists — a blunder that ignited protests across Turkey.

The Wall Street Journal reported last year that American drone operators had alerted the Turkish military after a Predator spotted the suspicious caravan. Rather than ask for a closer look, Turkish officials waved off the drone and launched the attack soon after, the paper said. Turkey’s leaders denied the report, saying they decided to attack based on their own intelligence.

The incident exacerbated simmering frustrations among officials in Ankara and Washington.

The Turkish government has long pressed the Obama administration to devote more flight hours to the operation and to sell Turkey a fleet of armed Reaper drones. But U.S. officials and lawmakers have resisted both requests.

The Pentagon has expressed concern that the Turkish military wants the fruits of the drone surveillance but has been unwilling to consult with Americans on the best ways to exploit it. “There have been a lot of U.S. attempts to help the Turks get better at fusing the intelligence with an operation,” said a former U.S. defense official who spoke on the condition of anonymity to give a candid assessment.

At the same time, the former U.S. official called Nomad Shadow an overall success. The constant stream of surveillance footage has prevented PKK attacks, he said, and has enabled the Turkish military to carry out more-limited, precise counterterrorism operations instead of sending large numbers of troops into northern Iraq.

“It’s been extremely effective in preventing cross-border operations by the Turks,” the former official said.

Clues in the crash report

On Sept. 17, 2012, Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, visited Ankara to see Gen. Necdet Özel, chief of the general staff of the Turkish armed forces.

As other Turkish officials had done in previous talks, Özel pressed Dempsey for more help against the PKK, including more drone flights, according to Turkish media accounts of the meeting.

The next day, in a fit of unlucky timing, a Predator on a routine patrol experienced a sudden and complete loss of power. Drone operators at Whiteman Air Force Base could not communicate with or control the aircraft.

The drone nose-dived, dropping 11,000 feet in about four minutes before crashing into an uninhabited region, according to a U.S. Air Force accident investigation report obtained by The Washington Post under the Freedom of Information Act.

Before releasing the report, the Air Force redacted all geographic references to the location of the crash or where the drone was based. But parts of the report contain clues that make clear that the drone was on a Nomad Shadow mission in northern Iraq.

Transcripts of interviews with the drone’s ground crew mention that they were deployed to Incirlik with the 414th Expeditionary Reconnaissance Squadron. Another document identified the lost aircraft as NOMAD 01.

But the strongest evidence can be found in an appendix to the report with photographs of the accident site.

The images are outtakes from the propaganda video that the PKK posted on YouTube the day after the crash. The photos show several damaged Predator pieces. U.S. military censors carefully blocked out the faces of guerrillas posing with the wreckage.


U.S. Rep. Kyrsten Sinema is both for and against Obamacare???

Well if your against Obamacare, U.S. Rep. Kyrsten Sinema seems to want you to think she is also against Obamacare. Although based on her voting record Kyrsten Sinema is probably a big time socialist who is for Obamacare.

And if you are for Obamacare, U.S. Rep. Kyrsten Sinema also seems to want you to think she is also for Obamacare. This is probably U.S. Rep. Kyrsten Sinema true position.

Frequently the same bill will be voted on several times in the US House or US Senate and our double talking Congressmen and Senators will routinely vote against a bill on the first vote and then flip flop and vote for the same bill the second time around.

No our Congressmen and Senators are not confused idiots who don't know which way to vote. They do this very intentionally to mislead people so they can claim to be FOR the bill when they talk to people who are FOR the bill, and so they can claim to be AGAINST the bill when they talk to people who are AGAINST the bill.

That's probably why U.S. Rep. Kyrsten Sinema voted against Obamacare which she almost certainly supports. So she can trick people who are against Obamacare into voting for her.

Source

Politics spurs some Ariz. Dems to join Republicans on health care

By Rebekah L. Sanders The Republic | azcentral.com Sat Jul 20, 2013 7:47 PM

US Congressman, Congresswoman, Congressperson Kyrsten Sinema is the government tyrant that proposed a 300 percent tax on medical marijuana when she was a member of the Arizona Legislator U.S. Rep. Kyrsten Sinema once toured Arizona on behalf of the White House, touting the benefits of health-care reform. Last week, the freshman Democrat voted with the GOP to delay the law’s requirement that individuals and businesses buy insurance by 2014.

Sinema said she still supports the law because it helps students and people with pre-existing conditions obtain coverage.

“However, the law isn’t perfect. ...,” Sinema said in a statement after the vote. “Arizona’s hard-working families and businesses need transparency and certainty about this health care law and its implementation. A one-year delay will ensure that Arizonans get that certainty.” [And she will trick a few people into thinking that she is against Obamacare and get their votes]

Sinema also had a political motivation for the vote. Her congressional district, which stretches from Phoenix to Mesa, is considered a toss-up seat, where enough conservative-leaning voters concerned by the health-care law could boot her out of office in the mid-term elections. [Which is why she would love to trick a number of people into thinking she is against Obamacare so she can get their votes.]

That’s what happened in 2010, when voters turned out in droves to unseat Democrats in an uproar over passage of the president’s health-care law. [And of course Kyrsten Sinema doesn't want to be booted out of office because she is a big time socialist that supports Obamacare]

The GOP is hoping to capitalize again on opposition to the overhaul in the midterm elections, just as more consumers begin to feel the effects of reform as requirements for most individuals to obtain insurance kick in.

“Folks like Sinema have reason to be concerned because they are still champions of a law that is not popular in their districts,” said Constantin Querard, a Valley Republican strategist. “When you see someone who’s as much of a vocal supporter of ‘Obamacare’ as Sinema is voting against it, you know it’s going to be an issue” in the 2014 campaigns. [And even though Kyrsten Sinema loves Obamacare, if you hate Obamacare Kyrsten Sinema probably wants to trick you into thinking she hates Obamacare to get your vote]

Arizona’s two other Democrats who represent swing districts, Reps. Ron Barber and Ann Kirkpatrick, voted for the delays as well. [Again probably for the same reason Kyrsten Sinema voted for it. To trick their opponents into thinking they are against Obamacare]

House Speaker John Boehner scheduled the votes, calling for fairness for individuals and to “delay and dismantle Obamacare,” after President Barack Obama announced fines would be postponed until 2015 for midsize businesses that fail to provide employee health insurance.

The House bills — long shots in the Senate and guaranteed to be vetoed by the president — affirmed the business delay and added that individuals should get a one-year reprieve. Just 35 House Democrats supported the business delay and 22 backed it for individuals.

Next year’s races are expected to ramp up around the time consumers notice major changes to health care because of the Affordable Care Act.

In the fall, states will open online marketplaces for uninsured individuals and businesses to buy private coverage. A few months later, Arizona is scheduled to expand Medicaid coverage to thousands of low-income families.

Democrats are hoping voters who are uninsured will give the party credit once they receive coverage. But Republicans predict voters will react negatively once fines and higher premiums kick in.

Highlighting the political fight that still rages around the 2-year-old law, Obama held an event last week with a few of the more than 8.5 million Americans he said will receive rebates this summer from their insurance companies because of the law’s provision requiring insurers to spend at least 80 percent of premiums on health care. The president also touted early indications that insurance costs will be lower in several states under the law.

“Health-care implementation could take center stage (in 2014) if there are massive problems. And if there are, it will likely haunt Democrats no matter what Republicans vote on,” said David Wasserman, an editor at the nonpartisan Cook Political Report based in Washington, D.C.

He said Democrats like Sinema are likely to continue to frame the issue as “keep the bill and fix it,” while Republicans will continue to advocate repealing the law.


NSA growth fueled by need to target terrorists

The article wants to say that evil terrorists have caused the NSA to grow like crazy.

But that is rubbish. The main cause for growth of the NSA is the American foreign policy which has been at war with Muslims and Arabs for years. In fact the American foreign policy has created most of these so called terrorists who are really "freedom fighters".

The so called Arab "terrorist" problem was started when America booted the Arabs from their land in the process of creating the state of Israel. These Arabs who had their land stolen from them by the American foreign policy and given to the people of Israel are almost certainly going to continue fighting to get their land back until they die.

Last even if these so called "terrorists" are as bad as the article makes them out that in no way justifies the NSA tapping the phones of millions of Americans or reading the email of millions of Americans.

Source

NSA growth fueled by need to target terrorists

By Dana Priest, Published: July 21 E-mail the writer

Twelve years later, the cranes and earthmovers around the National Security Agency are still at work, tearing up pavement and uprooting trees to make room for a larger workforce and more powerful computers. Already bigger than the Pentagon in square footage, the NSA’s footprint will grow by an additional 50 percent when construction is complete in a decade.

And that’s just at its headquarters at Fort Meade, Md.

The nation’s technical spying agency has enlarged all its major domestic sites — in Colorado, Georgia, Hawaii, Texas and Utah — as well as those in Australia and Britain.

Since the attacks of Sept. 11, 2001, its civilian and military workforce has grown by one-third, to about 33,000, according to the NSA. Its budget has roughly doubled, and the number of private companies it depends on has more than tripled, from 150 to close to 500, according to a 2010 Washington Post count.

The hiring, construction and contracting boom is symbolic of the hidden fact that in the years after the Sept. 11 attacks, the NSA became the single most important intelligence agency in finding al-Qaeda and other enemies overseas, according to current and former counterterrorism officials and experts. “We Track ’Em, You Whack ’Em” became a motto for one NSA unit, a former senior agency official said.

The story of the NSA’s growth, obscured by the agency’s extreme secrecy, is directly tied to the insatiable demand for its work product by the rest of the U.S. intelligence community, military units and the FBI.

The NSA’s broad reach in servicing that demand is at the heart of the controversy swirling around the agency these days. Both Congress and the public have been roiled by the disclosure of top-secret documents detailing the collection of U.S. phone records and the monitoring of e-mails, ­social-media posts and other Web traffic of foreign terrorism suspects and their enablers.

Lacking a strong informant network to provide details about al-Qaeda, U.S. intelligence and the military turned to the NSA’s technology to fill the void. The demand for information also favored the agency’s many surveillance techniques, which try to divine the intent of people by vacuuming up and analyzing their communications.

“There was nothing that gave you more insight into the inner workings of these organizations as the NSA,” said Michael Leiter, former director of the National Counter­terrorism Center. “I can’t think of any terrorist investigation where the NSA was not a pre­eminent or central player.”

One top-secret document recently disclosed by former intelligence contractor Edward Snow­den, who is on the run from U.S. authorities, revealed that 60 percent of the president’s daily intelligence briefing came from the NSA in 2000, even before the surge in the agency’s capabilities began.

“The foreign signals that NSA collects are invaluable to national security,” the agency said in a statement released Friday to The Post. “This information helps the agency determine where adversaries are located, what they’re planning, when they’re planning to carry it out, with whom they’re working, and the kinds of weapons they’re using.”

The NSA’s ability to capture, store and analyze an ever greater amount of people’s communications has never been accompanied by public explanations of new legal authorities, programs or privacy safeguards. Only the unauthorized disclosure of these secrets has forced officials to explain them in broad terms, reassure the public and complain about the damage from their public airing.

“I wish that I were here in happier times for the intelligence community,” said Robert S. Litt, general counsel for the Office of the Director of National Intelligence, speaking at the Brookings Institution on Friday. “These disclosures threaten to cause long-lasting and irreversible harm to our ability to identify and respond to the many threats facing our nation.”

Battlefield support

The story of the NSA’s post-Sept. 11 history could begin in many places, including the parking lot of the CIA. There, in late 2001, a burly Navy SEAL paced inside a trailer with a telephone to his ear. The trailer had been hastily converted from a day-care facility to an operations center for the CIA’s covert armed drone program, which was about to kill one of its first al-Qaeda targets, 8,000 miles away in Afghanistan.

On the line with the SEAL was the drone operator and a “collector,” an NSA employee at the agency’s gigantic base at Fort Gordon in Augusta, Ga. The collector was controlling electronic surveillance equipment in the airspace over the part of Afghanistan where the CIA had zeroed in on one particular person. The SEAL pleaded with the collector to locate the cellphone in Afghanistan that matched the phone number that the SEAL had just given him, according to someone with knowledge of the incident who spoke on the condition of anonymity because of the sensitivity of the issue.

The collector had never before done such a thing. Before even intercepting a cellphone conversation, he was accustomed to first confirming that the user was the person he had been directed to spy on. The conversation would then be translated, analyzed, distilled and, weeks later, if deemed to be interesting, sent around the U.S. intelligence community and the White House.

On that day, though, the minutes mattered.

“We just want you to find the phone!” the SEAL urged. No one cared about the conversation it might be transmitting.

The CIA wanted the phone as a targeting beacon to kill its owner.

The NSA collector in Georgia took what was then considered a gigantic leap — from using the nation’s most sophisticated spy technology to record the words of presidents, kings and dictators to using it to kill a single man in a terrorist group.

The revolutionary significance of that and other similar operations was quickly grasped by intelligence officials. With analysts and technicians from the National Geospatial-Intelligence Agency, the NSA subsequently assembled a team in the basement of its headquarters called the Geolocation Cell, or Geo Cell. Its purpose was to track people, geographically, in real time.

The cell opened up chat rooms with military and CIA officers in Afghanistan — and, eventually, Iraq — who were directing operations there. Together they aimed the NSA’s many sensors toward individual targets while tactical units aimed their weaponry against them.

A motto quickly caught on at Geo Cell: “We Track ’Em, You Whack ’Em.”

With the 2003 invasion of Iraq, and the surprisingly quick disintegration of postwar conditions there, the NSA began sending collectors with surveillance equipment to embed with Army brigades and Marine regimental combat teams to target insurgents and terrorists. The units were called tactical cryptologic support teams. The military commanders often had no prior understanding of what the NSA did. But they quickly demanded more of the agency once they learned what it could do.

At the same time, the NSA supported a parallel effort by CIA paramilitary units and clandestine Joint Special Operations Command (JSOC) teams tasked with capturing or killing al-Qaeda leaders, deemed “high-value targets.” NSA analysts and collectors moved into the JSOC commander’s new and growing operational headquarters in Balad, Iraq, which also serviced Afghanistan.

By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off. JSOC troops called this “The Find,” and it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq, according to members of the unit.

At the same time, the NSA developed a new computer linkup called the Real Time Regional Gateway into which the military and intelligence officers could feed every bit of data or seized documents and get back a phone number or list of potential targets. It also allowed commanders to see, on a screen, every type of surveillance available in a given territory.

Air Force Gen. Michael V. Hayden, former director of the NSA, said in an interview last week that he would tell people, “If we could do this half well, this will be the golden age of sigint,” or signals intelligence.

A growing reach

The battlefield technology overseas was matched by a demand back in the United States for larger amounts of data to mine using the NSA’s increasingly sophisticated computers. Financial and biometric data, the movement of money overseas, and pattern and link analysis became standard NSA tools. Another example, recently revealed by Snowden, is the bulk collection of telephone metadata — information about numbers dialed and the duration of the calls.

The NSA’s burgeoning secret activities splashed into public view in 2005 when the New York Times reported on the warrantless surveillance of U.S. communications, and subsequent statements by former NSA employees contended that the agency was collecting Americans’ e-mails and phone calls. Some suspected that NSA capabilities were limitless when it came to counterterrorism investigations.

Although the NSA tries hard to maintain a low profile, the physical manifestation of its growing importance has been quietly evident to the communities that surround its major foreign and domestic bases.

Within the past couple of years, bulldozers have plowed through the earth near Bluffdale, Utah, to ready a million-square-foot facility housing a center that will store oceans of bulk data.

In 2007, ground was broken for a $1 billion facility on 120 acres at Fort Gordon, where an NSA workforce of 4,000 collects and processes signals intelligence from the Middle East, according to the agency.

In Hawaii, the NSA outgrew its Schofield Barracks Army site years ago and opened a 250,000-square-foot, $358 million work space adjacent to it last year. The Wahiawa Annex is the last place that Snowden, then a contractor for Booz Allen Hamilton, worked before leaving with thousands of top-secret documents. The main job of the NSA’s Hawaii facility is to process signals intelligence from around the Pacific Rim.

Officials fear that Snowden gained access to sensitive files that outline espionage operations against Chinese leaders and other critical targets.

In Texas, the agency has added facilities to its San Antonio-based operations. Its main site, at Lackland Air Force Base, processes signals intelligence from Central and South America. In Colorado, the NSA’s expanding facilities on Buckley Air Force Base in Aurora collect and process information about weapons systems around the globe.

Overseas, the NSA’s station at RAF Menwith Hill on the moors of Yorkshire is planned to grow by one-third, to an estimated 2,500 employees, according to studies undertaken by local activists. Although hidden from the main road, up close it is hard to miss the 33 bright-white radar domes that sprout on the deep green landscape. They are thought to collect signals intelligence from parts of Europe, the Middle East and North Africa.

The NSA’s Pine Gap site in Australia has added hundreds of new employees and several new facilities in recent years. Over the years, Pine Gap has played a role in many U.S. and NATO military operations, including intercepting communications about possible nuclear testing by the Soviet Union during the Cold War and an analysis of the technical characteristics of Iraq’s GPS jamming systems during the 2003 invasion, according to a book by David Rosenberg, a former NSA analyst at Pine Gap. It also processes signals intelligence from parts of Asia.

The upgrades to the cryptologic centers were done “to make the agency’s global enterprise even more seamless as we confronted increasingly networked adversaries,” according to the NSA statement to The Post. “However, we always adjust our efforts to exploit the foreign communications of adversaries and defend vital U.S. networks in accordance with national priorities and in full accordance with U.S. law.”

It added: “The notion of constant, unchecked, or senseless growth is a myth.”

Julie Tate contributed to this report.


NSA revelations reframe digital life for some

The 4th Amendment should prevent the government from listening to your phone calls or reading your mail. But the government has more or less flushed the Bill of Rights down the toilet when it passed the Patriot Act. So if you want any privacy don't communicate thru any medium that the government has access to.

Source

NSA revelations reframe digital life for some

By Oskar Garcia Associated Press Mon Jul 22, 2013 9:53 AM

In Louisiana, the wife of a former soldier is scaling back on Facebook posts and considering unfriending old acquaintances, worried an innocuous joke or long-lost associate might one day land her in a government probe. In California, a college student encrypts chats and emails, saying he’s not planning anything sinister but shouldn’t have to sweat snoopers. And in Canada, a lawyer is rethinking the data products he uses to ensure his clients’ privacy.

As the attorney, Chris Bushong, put it: “Who wants to feel like they’re being watched?”

News of the U.S. government’s secret surveillance programs that targeted phone records but also information transmitted on the Internet has done more than spark a debate about privacy. Some are reviewing and changing their online habits as they reconsider some basic questions about today’s interconnected world. Among them: How much should I share and how should I share it?

Some say they want to take preventative measures in case such programs are expanded. Others are looking to send a message — not just to the U.S. government but to the Internet companies that collect so much personal information.

“We all think that nobody’s interested in us, we’re all simple folk,” said Doan Moran of Alexandria, La. “But you start looking at the numbers and the phone records … it makes you really hesitate.”

Last month former government contractor Edward Snowden leaked documents revealing that the National Security Agency, as part of its anti-terrorism efforts, had collected the phone records of millions of Americans. A second NSA program called PRISM forces major Internet firms to turn over the detailed contents of communications such as emails, video chats, pictures and more.

Moran’s husband, an ex-Army man, already was guarded about using social media. Now she is looking through her Facebook “friends” to consider whom to delete, because she can’t know what someone in her network might do in the future. Moran said she’s uneasy because she feels unclear about what the NSA is keeping and how deep the agency’s interests might go.

In Toronto, attorney Bushong let a free trial of Google’s business applications expire after learning about PRISM, under which the NSA seized data from Google, Microsoft, Apple, Facebook and AOL. Bushong is moving to San Diego in August to launch a tax planning firm and said he wants to be able to promise confidentiality and respond sufficiently should clients question his firm’s data security. He switched to a Canadian Internet service provider for email and is considering installing his own document servers.

“I’d like to be able to say that I’ve taken all reasonable steps to ensure that they’re not giving up any freedoms unnecessarily,” he said.

Across the Internet, computer users are talking about changes small and large — from strengthening passwords and considering encryption to ditching cellphones and using cash over credit cards. The conversations play out daily on Reddit, Twitter and other networks, and have spread to offline life with so-called “Cryptoparty” gatherings in cities including Dallas, Atlanta and Oakland, Calif.

Information technology professional Josh Scott hosts a monthly Cryptoparty in Dallas to show people how to operate online more privately.

“You have to decide how extreme you want to be,” Scott said.

Christopher Shoup, a college student from Victorville, Calif., has been encouraging friends to converse on Cryptocat, a private messaging program that promises users they can chat “without revealing messages to a third party.” Shoup isn’t worried that his own behavior could draw scrutiny, but said the mere idea that the government could retrieve his personal communications “bothers me as an American.”

“I don’t think I should have to worry,” he said.

Cryptocat said it nearly doubled its number of users in two days after Snowden revealed himself as the source of leaks about the NSA’s programs. Two search engine companies billed as alternatives to Google, Bing and Yahoo are also reporting significant surges in use.

DuckDuckGo and Ixquick both promise they don’t collect data from users or filter results based on previous history. DuckDuckGo went from 1.8 million searches per day to more than 3 million per day the week after the NSA revelations came to light. Ixquick and sister site Startpage have gone from 2.8 million searches per day to more than 4 million.

Gabriel Weinberg, chief executive of DuckDuckGo, said the NSA programs reminded people to consider privacy but that government snooping may the least of an everyday computer user’s concerns. DuckDuckGo’s website warns of the pitfalls of Internet search engines, including third-party advertisements built around a user’s searches or the potential for a hacker or rogue employee to gain access to personal information.

Potential harm is “becoming more tangible over time,” said Weinberg, who is posting fewer family photos, dropping a popular cloud service that stores files and checking his settings on devices at home to ensure they are as private as possible.

At Ixquick, more than 45,000 people have asked to be beta testers for a new email service featuring accounts that not even the company can get into without user codes, spokeswoman Katherine Albrecht said. The company will levy a small charge for the accounts, betting that people are willing to pay for privacy. As computer users grow more savvy, they better understand that Internet companies build their businesses around data collection, Albrecht said.

“These companies are not search engines,” she said. “They are brilliant market research companies. … And you are the product.”

Representatives for Google, Yahoo and PalTalk, companies named in a classified PowerPoint presentation leaked by Snowden, declined comment. Microsoft, Apple and AOL officials did not return messages. Previously, the companies issued statements emphasizing that they aren’t voluntarily handing over user data to the government. They also rejected newspaper reports indicating that PRISM had opened a door for the agency to tap directly into companies’ data centers whenever the government pleases.

“Press reports that suggest that Google is providing open-ended access to our users’ data are false, period,” Google CEO Larry Page said in a blog post.

It’s not clear whether big Internet companies have seen changes in how their products are used. An analysis released this month by comScore Inc. said Google sites accounted for two-thirds of Internet searches in June — about 427 million queries per day.

In Tokyo, American expat Peng Zhong responded to the spying news by swapping everything from his default search engine and web browser to his computer’s operating system. Zhong, an interface designer, then built a website to help others switch, too. Called prism-break.org, the site got more than 200,000 hits in less than a week after Zhong announced it on social networks.

Since then, Zhong said he’s seen numerous people talking online about their own experiences in changing their computing habits.

“It’s a start,” he said.


License plate cameras used to falsely arrest Phoenix City Council Candidate????

Source

Phoenix City Council candidate mistakenly detained

Christina Leonard is the Phoenix community editor.

By Eugene Scott PHX Beat Tue Jul 23, 2013 9:51 PM

Phoenix police briefly detained a Phoenix City Council candidate Tuesday afternoon after an officer’s computer incorrectly indicated a warrant out for the candidate’s arrest.

Police let Jeffrey Brown go when it became apparent they had the wrong person.

“They took my tie off and belt off and arrested me, saying I owed 600 and something dollars for a parking ticket,” said Brown. “Do they normally do that?”

Brown, who works as a mental-health advocate, appeared a little shaken after police handcuffed him. And he’s not completely in the clear. He’ll have to clean up some other infractions, but at least he wouldn’t have to spend Tuesday night in jail.

The police detained Brown, who is running for City Council in District 4, as he was leaving the Republic Media building in downtown Phoenix. Brown had just attended an Arizona Republic editorial board meeting with other candidates in the central Phoenix district.

Officer Arnie Cuellar said his police vehicle has an automatic license plate reader, which hit on Brown’s Mitsubishi Spider.

Cuellar said he called to verify Brown’s information, and he discovered the warrant was for a different Jeffrey Brown.

Cuellar said a mistake in the system caused the confusion.

“I apologized again (to Brown). That really ticks me off. We’re just trying to do our job,” he said.

But it doesn’t mean Brown is completely off the hook.

The search revealed Brown does have about $70 in unpaid parking tickets on his Mitsubishi, Cuellar said.

(Police records also showed Brown owes $675 in unpaid parking tickets on a GMC Yukon. Brown said he sold the Yukon at least a year ago, but it appears the new owner has not changed the vehicle registration.)

Police also wouldn’t let Brown drive away, saying his driver’s license was suspended following a June implied-consent DUI arrest.

“Implied consent tells me he refused some tests,” Cuellar said. According to Arizona’s implied consent law, refusing to provide a blood sample subjects a DUI suspect to an automatic driver's-license suspension.

Not allowed to drive his car, Brown walked to the Arizona Department of Transportation’s downtown Phoenix offices to work out the details.

Phoenix municipal court records show several cases against a Jeffrey Brown with the same birth month and year, including a recent DUI case.

Cuellar said Brown told him he was going to court Wednesday to address the DUI.

In an e-mail, Brown said Tuesday's incident wasn't the first time authorities had confused him with someone else.

"I should not have been arrested and detained and I would think the courts and Phoenix PD could do a better job of communicating before arresting or deatining someone," he wrote. Brown noted that the incident happened with "cameras rolling," adding "I think I might need an attorney."


Senate pushes sanctions on nations aiding Snowden

Source

Senate pushes sanctions on nations aiding Snowden

Associated PressBy BRADLEY KLAPPER | Associated Press

WASHINGTON (AP) — U.S. sanctions against any country offering asylum to Edward Snowden advanced in Congress on Wednesday as the 30-year-old National Security Agency leaker remained in a Moscow airport while Russia weighed a request for him to stay permanently.

The measure introduced by Sen. Lindsey Graham, R-S.C., demands the State Department coordinate with lawmakers on setting penalties against nations that seek to help Snowden avoid extradition to the United States, where authorities want him prosecuted for revealing details of the government's massive surveillance system. The Senate Appropriations Committee approved the proposal unanimously by voice vote as an amendment to next year's $50.6 billion diplomacy and international aid bill.

"I don't know if he's getting a change of clothes. I don't know if he's going to stay in Russia forever. I don't know where he's going to go," Graham said. "But I know this: That the right thing to do is to send him back home so he can face charges for the crimes he's allegedly committed."

Venezuela, Bolivia and Nicaragua have offered Snowden asylum since his arrival at Moscow's Sheremetyevo airport a month ago, shortly after identifying himself as the source of a series of news reports outlining the NSA's program to monitor Internet and telephone communications. It was believed he would then fly to Cuba. The U.S. then canceled his passport, stranding him, with Russia yet to authorize his request for temporary asylum or allow him to fly on to another destination.

Snowden wants permission to stay in Russia, his lawyer said Wednesday after delivering fresh clothes to his client. It's unclear how long the Kremlin will take to decide on the asylum request.

Graham said Snowden's revelations have had "incredibly disturbing" implications for national security.

The Obama administration says the surveillance has foiled a number of terrorist plots against the United States. It says the public outing of its programs are helping terrorist groups change their tactics.

The case also has sparked tension between Moscow and Washington at a sensitive time, less than two months before President Barack Obama's planned talks with Russian President Vladimir Putin in Moscow and again at a G-20 summit in St. Petersburg.

White House press secretary Jay Carney said Wednesday the U.S. was "seeking clarity" about Snowden's status. The head of the Senate Foreign Relations Committee, Sen. Robert Menendez of New Jersey, warned that "providing any refuge to Edward Snowden will be harmful to U.S.-Russia relations."

The relationship is already strained by a Russian crackdown on opposition groups, American missile-defense plans in Europe and the former Cold War foes' opposing views of the civil war between Syrian President Bashar Assad's regime and rebels.


Government snooping is going too far

Source

Government snooping is going too far

By Editorial board The Republic | azcentral.com Fri Jul 19, 2013 5:43 PM

The conflicting interests of national security and public safety on the one hand and individual liberty on the other both have sound arguments that can trump one another.

But these are fast-changing times where these interests are concerned, and a couple of the arguments on the security side are losing credibility.

Such as: If you haven’t done anything wrong, you have nothing to worry about.

Or: The program is extremely limited in scope and narrowly tailored.

Ever since former National Security Agency contractor Edward Snowden began releasing his cache of stolen state secrets, questions about the extent of spying by federal agencies have multiplied. The more we learn about what the feds have learned about us, the more this story is turning against federal snooping.

Last week, top NSA officials testified before the House Judiciary Committee on the hot-button program dedicated to collecting “metadata” from every telephone call made in the United States — a program far more extensive than previously understood.

If the Obama administration has its way, it could grow to include government databases of credit-card purchases, hotel records and Internet use. The committee was not impressed.

“You’ve already violated the law as far as I am concerned,” John Conyers, the panel’s ranking Democrat, told the NSA officials.

Conyers’ provocative declaration was seconded by Republicans, many arriving at the same conclusion: Government snooping agencies are going too far.

Metadata collection is not the exclusive preserve of federal agencies, nor is it restricted to records of telephone calls. As technologies such as image capturing become more sophisticated and cheaper, local police agencies are buying systems that allow them to record and store vast data files on vehicles, including their license plates and their locations at given times.

Since 2005, police agencies in Arizona have purchased such surveillance systems, including Mesa, Peoria, Chandler and Phoenix, as well as the Arizona Department of Public Safety.

Calculated strictly in terms of return on investment, the purchases can turn a healthy “profit.” Mesa bought a system in 2005 for $25,000. Since then, the city has used its image-capturing system to recover more than $2 million worth of stolen vehicles.

Does that justify a program that gives the government knowledge of your every coming and going?

We have reached an age in which an incident not captured on video is seen as the exception, not the norm. You mean with all those people around, no one had a phone camera running?

This “self-surveillance” culture, which has evolved naturally as technology advances, has proved invaluable at times. The images and video produced in the wake of the Boston Marathon bombing come to mind.

The distinction between government databases and information held in private hands was raised at Wednesday’s Judiciary hearing. Why not ask phone companies to retain their own metadata longer, asked Rep. Peter King, R-N.Y. The NSA fellows said they would think about that.

Think about it they should. Americans have a right to expect their government to act to keep them safe from foreign-sponsored harm. That federal duty is enshrined in the Constitution.

Also enshrined in the Constitution is the right to the pursuit of liberty.

There is a tipping point between the two contrasting interests. The intersection of technology and the insatiable desire of governments to exert control tells us we are teetering toward the side of the government simply knowing too damned much.


Low-level staff have access to ‘invasive’ surveillance

Greenwald: Low-level staff have access to ‘invasive’ surveillance

Yea, sure - You have nothing to worry about unless you are a criminal. Your emails and phone calls are safe from the prying eyes of government bureaucrats - honest!!!!

Source

Greenwald: Low-level staff have access to ‘invasive’ surveillance

By Aaron Blake, Published: July 28 at 10:57

Glenn Greenwald, the journalist who has worked with Edward Snowden to reveal sensitive national security information, said Sunday that low-level National Security Agency staff and contractors have access to a powerful and invasive tool that can provide them the e-mails and phone calls of basically anybody — up to and including the president.

“The NSA has trillions of telephone calls and e-mails in their databases that they’ve collected over the last several years,” Greenwald said on ABC’s “This Week.”

He then detailed the program, which he said only require an e-mail or an IP address to return data on Americans.“It searches that database and lets them listen to the calls or read the e-mails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered, and it also alerts them to any further activity that people connected to that e-mail address or that IP address do in the future,” Greenwald said.

Greenwald, who is set to testify on Capitol Hill on Wednesday, suggested intelligence officials are lying when they say low-level staff have no such access to that information. He said he “defies” intelligence officials to deny the program’s existence.

“It’s an incredibly powerful and invasive tool — exactly of the type that Mr. Snowden described,” Greenwald said.

Appearing on the same show, Senate Intelligence Committee Ranking Member Saxby Chambliss (R-Ga.) cast doubt on Greenwald’s reporting.

“I was back out at NSA just last week, spent a couple hours out there with high-level and low-level NSA officials, and what I have been assured of is there is no capability … at NSA, for anyone without a court order to listen to any telephone conversation or to monitor any e-mail,” Chambliss said.

Chambliss also said any access that low-level staff had to such personal information would be accidental.

“In fact, we don’t monitor e-mails. That’s what kind of assures me is that the reporting is not correct. Because no emails are monitored now,” Chambliss said. “They used to be, but that stopped two or three years ago. So I feel confident that there may have been some abuse, but if it was it was purely accidental.”


Revealers of government secrets share how their lives have changed

After the whistle: Revealers of government secrets share how their lives have changed

Government of the people, by the elected officials and appointed bureaucrats, for the elected officials, appointed bureaucrats, government employees and special interest groups that helped get them into power.

Sorry Mr. Lincoln, that's how your speech should have been written. The way government really works, is while our rulers are elected by the people, they end up serving the government bureaucrats that work for them, along with the special interest group that helped them get into power.

Source

After the whistle: Revealers of government secrets share how their lives have changed

By Emily Wax, Published: July 28 E-mail the writer

The former high-ranking National Security Agency analyst now sells iPhones. The top intelligence officer at the CIA lives in a motor home outside Yellowstone National Park and spends his days fly-fishing for trout. The FBI translator fled Washington for the West Coast.

This is what life looks like for some after revealing government secrets. Blowing the whistle on wrongdoing, according to those who did it. Jeopardizing national security, according to the government.

Who is Edward Snowden?: A 30-year-old government contractor has been charged with espionage for recent leaks of classified intelligence. He has vaulted from obscurity to international notoriety, joining the ranks of high-profile leakers such as Daniel Ellsberg of Pentagon Papers fame.

Heroes. Scofflaws. They’re all people who had to get on with their lives.

As Edward Snowden eventually will. The former NSA contractor who leaked classified documents on U.S. surveillance programs is now in Russia, with his fate in limbo. The Justice Department announced last week that it won’t seek the death penalty in prosecuting him, but he is still charged with theft and espionage.

Say he makes it out of there. What next, beyond the pending charges? What happens to people who make public things that the government wanted to keep secret?

A look at the lives of a handful of those who did just that shows that they often wind up far from the stable government jobs they held. They can even wind up in the aisles of a craft store.

Peter Van Buren, a veteran Foreign Service officer who blew the whistle on waste and mismanagement of the Iraq reconstruction program, most recently found himself working at a local arts and crafts store and learned a lot about “glitter and the American art of scrapbooking.”

“What happens when you are thrown out of the government and blacklisted is that you lose your security clearance and it’s very difficult to find a grown-up job in Washington,” said Van Buren, who lives in Falls Church and wrote the book “We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People.” “Then, you have to step down a few levels to find a place where they don’t care enough about your background to even look into why you washed up there.”

The Apple Store employee

“Let’s sit in the back,” Thomas Drake says when choosing a booth at Parker’s Classic American Restaurant in downtown Bethesda during his lunch break from Apple. “I have a lot to say. I was a public servant. That’s a very high honor. It’s supposed to mean something.”

Drake was prosecuted under the World War I-era Espionage Act for mishandling national defense information.

His alleged crime: voicing concernsto superiors after the Sept. 11, 2001, attacks about violations of Americans’ privacy by the nation’s largest intelligence organization (the NSA) and later, in frustration, speaking to a reporter about waste and fraud in the NSA intelligence program. (He says he revealed no classified information.)

He lost his $155,000-a-year job and pension, even though in 2011 the criminal case against him fell apart. The former top spokesman for the Justice Department, Matthew Miller, later said the case against Drake may have been an “ill-considered choice for prosecution.”

Drake, now 56, is tall and lanky and dresses as though he’s ready, at any moment, to go on a gentle hike. He is the type of person who likes consistency. He went to work at Apple the day after the charges against him were dropped, surprising his co-workers who thought he would at least take a day off. In 2010, he got an adjunct professor job at Strayer University but was fired soon after, he says, while he was under government investigation.

“I was just blacklisted,” he said, adding that he started his own company but has only had minor work. “People were afraid to deal with a federal government whistleblower.”

Drake long planned to be a career public servant. He enlisted in the Air Force in 1979 and flew on spy planes and once was a CIA analyst and an expert in electronic intelligence missions. On Sept. 11, 2001, he reported for his first day of work as a senior executive at the NSA’s Fort Meade campus, and shortly thereafter, he voiced “the gravest of concerns” regarding a secret domestic surveillance program that, he says, was launched shortly after the attacks.

Who is Edward Snowden?: A 30-year-old government contractor has been charged with espionage for recent leaks of classified intelligence. He has vaulted from obscurity to international notoriety, joining the ranks of high-profile leakers such as Daniel Ellsberg of Pentagon Papers fame.

In 2006, he was reassigned from the NSA to be a professor at the National Defense University, but he was forced to leave in 2007 when his security clearance was suspended.

Ironically, he was teaching a class called “The Secret Side of U.S. History.”

Now working at the Apple Store and living in Howard County, he is extremely grateful for his hourly wage retail job. He has no choice. He has massive legal debts and a son ready to go to college.

Last year, he was working when he spotted an unlikely customer: Attorney General Eric H. Holder Jr., who came in to check out iPhones.

Drake introduced himself and asked: “Do you know why they have come after me?”

“Yes, I do,” Holder said.

“But do you know the rest of the story?,” he asked.

Holder quickly left with his security detail, Drake said.

“It’s not every day you get to talk to the chief law enforcement officer of the land about your case,” Drake said, “or at least try.”

The author in Oregon

Sometimes Washington is just the last place you can stand to be.

Sibel Edmonds was once described by the American Civil Liberties Union as “the most gagged person in the history of the United States.” And she was a regular on Washington’s protest circuit.

She was fired from her work as a translator at the FBI for trying to expose security breaches and cover-ups that she thought presented a danger to U.S. security. Her allegations were supported and confirmed by the Justice Department’s inspector general office and bipartisan congressional investigations, but she was not offered her job back.

She also published a memoir, “Classified Woman — The Sibel Edmonds Story.”

Then last summer, Edmonds, 43, decamped with her 5-year-old daughter and husband to Bend, Ore., which is known as the sunny side of the state. The July weather is 77 degrees without humidity, and there are 33 independently owned coffee shops and nine microbreweries.

“I am touring every single one. Plus, we don’t even have air conditioning here,” she said. “We open the windows and feel the breeze.”

For years before she left, Edmonds found Washington’s atmosphere suffocating. Many of her neighbors in Alexandria were lobbyists and contractors, who she says stopped talking to her after her name appeared in the newspaper.

Luckily, her husband of 21 years is a retail consultant and can live anywhere. She says that most whistleblowers have spouses who work in the same agencies, which typically puts pressure on their marriages.

She is still dedicated, she says, to the cause of exposing injustice and making information free. She spends hours running “Boiling Frog Post: Home of the Irate Minority,” a podcast and Web site that covers whistleblowing and tries to create broader exposure for revelations. She is also founder and director of the National Security Whistleblowers Coalition.

“I think in the current climate, Congress and Washington is a last resort,” she said. “We are going directly to the people and focused on releasing information. And I don’t have to do that from Washington.”

Who is Edward Snowden?: A 30-year-old government contractor has been charged with espionage for recent leaks of classified intelligence. He has vaulted from obscurity to international notoriety, joining the ranks of high-profile leakers such as Daniel Ellsberg of Pentagon Papers fame.

The alienated fly fisherman

“The connection is really bad, it must be the NSA surveillance program,” Richard Barlow says jokingly when speaking to a reporter on his cellphone from his motor home outside Yellowstone National Park.

“I’m out here with the grizzly bears,” he says. “But this is where I’m comfortable. I’m a 58-year-old seriously damaged, burned-out intelligence officer.”

Barlow says he suffers from chronic PTSD, which makes it hard for him to deal with stress and sometimes other people. He finds comfort in his three dogs: Sassy, Prairie and Spirit.

His supporters say that shouldn’t be surprising considering what he went through.

Barlow started his career as a rising star tasked with organizing efforts to target Pakistan’s clandestine networks for acquiring nuclear materiel. He won the CIA’s Exceptional Accomplishment Award in 1988 for work that led to arrests, including that of Pakistani nuclear scientist A.Q. Khan.

He testified before Congress under direct orders from his CIA superiors, but he says he later became the target of criticism from some people in the CIA who were supporting the mujahideen (including Osama bin Laden at the time) in efforts to push the Soviets out of Afghanistan.

He says he chose to leave the CIA, and in early 1989, he went to work as the first weapons-of-mass-destruction intelligence officer in the administration of President George H.W. Bush. Barlow continued to write assessments of Pakistan’s nuclear weapons program for then-Defense Secretary Dick Cheney. He concluded that Pakistan already possessed nuclear weapons, had modified its F-16s to deliver these weapons and had continued to violate U.S. laws.

The intelligence would have legally precluded a sale of $1.4 billion worth of additional F-16s to Pakistan.

But in August 1989, Barlow learned that the Defense Department had asserted that the F-16s were not capable of delivering Pakistan’s nuclear weapons. Barlow said that Congress was being lied to, and he objected internally.

Days later, he was fired.

“Back then I was disgustingly patriotic and I thought the government is allowing Pakistan to develop and spread nuclear weapons and I got destroyed for trying to stop it,” he said.

He was 35 at the time. His marriage to his 29-year-old wife, who also worked at the CIA, was shattered.

After a 1993 probe, the inspector general at the State Department and the CIA concluded that Barlow had been fired as a reprisal. The Defense Department maintained that the Pentagon was within its rights to fire Barlow. A 1997 GAO report largely vindicated Barlow, and his security clearances were restored. But, he says, he was unable to get rehired permanently by the government because his record was smeared.

He eventually found some work as a consultant, helping to start and run the FBI’s counterproliferation program out of Sandia National Laboratories.

Meanwhile, he has been trying for years to collect the $89,500 annual pension and health insurance that he thinks he is owed.

Who is Edward Snowden?: A 30-year-old government contractor has been charged with espionage for recent leaks of classified intelligence. He has vaulted from obscurity to international notoriety, joining the ranks of high-profile leakers such as Daniel Ellsberg of Pentagon Papers fame.

Much of what he tried to report about Pakistan’s nuclear program is common knowledge today, and several national security bestsellers have included his story, including George Crile III’s 2003 book “Charlie Wilson’s War: The Extraordinary Story of the Largest Covert Operation in History,” which describes Barlow as a “brilliant young analyst who gave devastating testimony.”

Today, the consulting work has dried up. He has run out of money and thinks he is about a month from being homeless.

“I served my country for 23 years. I could go get a job for $10 at Wal-Mart,” he said. “But that’s not the issue, the issue is where’s my money?”

Despite efforts by senators and various legislative committees to get him compensated for his loss, the issue has never been resolved, for political and bureaucratic reasons.

He thinks part of the problem is that there’s no structure to compensate whistleblowers in the intelligence field. He also says that the Obama administration has criminalized whistleblowing on levels he’s never seen before.

Today, he spends his days in the wilderness, fly-fishing and bird hunting with his dogs.

The advocate

It’s 8 a.m. on the 11th floor of a K Street office building, and Jesselyn Radack, 42, is trying to tame her curly blond hair with a straightening iron.

“Our PR people said, ‘Straight hair is serious hair,’ ” she said, laughing. “But it is like 100 degrees outside.”

Radack is an attorney and former ethics adviser for the Justice Department. Her supervisor told her to find another job after she disclosed after Sept. 11 that the FBI interrogated John Walker Lindh, known as the “American Taliban,” without an attorney present. Her case was closed in 2003, and prosecutors never identified a potential charge against her.

Today, Radack is a mother of three and director of national security and human rights at the Government Accountability Project, a whistleblowing advocacy organization.

That means she’s an advocate, attorney and, it turns out, therapist of sorts for whistleblowers who come to her “bankrupt, blacklisted and broken,” she says.

“Once you are labeled that way, you are just radioactive,” she said.

And she can certainly empathize.

Before she decided to make her disclosure, she says she suffered from horrible insomnia. She also has long suffered from multiple sclerosis, and the stress caused flare-ups of her disease.

“I had this knowledge and had to do something,” she said on a recent afternoon at her brick home in Tenleytown. “After law school, I thought the government wears the white hat and is on the right side of the law. I never expected to be a whistleblower.”

But the Yale Law School graduate saw something she thought was wrong and felt compelled to report it.

After her case went public, she noticed a chill in how she and her family were treated. She took her children to the “tot shabbat,” or sabbath celebration for young children, at Temple Sinai in Northwest Washington and noticed that no one would sit near her and her family. It turns out that some of the people she blew the whistle on also attended her temple. The situation got so bad, she said, she had to talk to the rabbi about it.

“We’re inside the Beltway, and it’s a small city,” Radack says. “It’s like high school. They just freeze you out.”


Secret surveillance court overhaul is urged

Personally I suspect the program has ALWAYS been unconstitutional and never should have been created. But even if the program is constitution, which I doubt, this article points out some flaws.

the Justice Department submitted 1,789 requests to "conduct electronic surveillance." One was later withdrawn, and each of the rest was approved by a judge

Blumenthal has described the court as "broken. It is unaccountable, secretive and one-sided."

Source

Secret surveillance court overhaul is urged

By David G. Savage

July 29, 2013, 5:00 a.m.

WASHINGTON — When the Foreign Intelligence Surveillance Court began in 1978, it was seen as a smart compromise aimed at protecting both national security and civil liberties.

Before, the FBI under Director J. Edgar Hoover or the U.S. attorney general could use secret wiretaps to compile damaging dossiers on perceived enemies, including politicians and activists. Under the new law, the FBI or the CIA had to go before a judge of the special court if it wanted to wiretap an "agent of a foreign power" in this country, such as a Soviet spy.

These days, the Foreign Intelligence Surveillance Court is more often seen as a good idea gone sour.

As the U.S. government has shifted away from tracking spies or known terrorists to detecting potential plots linked to terrorism, the judges on the court have been called upon to make momentous decisions, such as approving the mass collection of records and data.

Critics say the judicial process has gone awry. The judges, who once served as a check on the government, now serve as a secret and secure rubber stamp for wide-ranging surveillance policies, they say.

"This court has evolved to serve a very different role than when it began," said Jennifer Granick, a lawyer at the Stanford Center for Internet and Society. "It is now making secret interpretations of the law, and no judge, and no court, should play that role."

She was referring to leaks last month that revealed how the government's surveillance has expanded in the last decade. One document released by intelligence analyst Edward Snowden showed that a judge on the secret court had approved an order that required a unit of Verizon to turn over all its phone records for a three-month period.

This revelation surprised many, but not those inside the government. Since 2001, Congress has authorized federal agents investigating "international terrorism" to obtain business records that are "relevant to an authorized investigation."

This read as though it referred to records involving known terrorists or at least suspicious people with links to terrorists.

Instead, the Justice Department under President George W. Bush and now President Obama decided this meant the National Security Agency could collect and store all the dialing records of phone calls made in this country because they might prove relevant to a future terrorism investigation.

The mass collection policy was approved by a judge of the Foreign Intelligence Surveillance Court in a secret hearing with only the government's lawyers present.

This has prompted calls in Congress and elsewhere for changes in the court. Some cite a need for a better mix of judges than those currently serving, who are almost all Republican appointees. Others want to include an advocate who takes the other side and argues for privacy and civil liberties.

"This process needs an adversary," retired Judge James Robertson, who served on the special court, told an oversight board hearing this month. "A judge needs to hear both sides of a case."

By law, the court is made up of 11 U.S. district judges, all of whom are appointed by Chief Justice John G. Roberts Jr. They rarely meet as a group. Instead, a judge comes to Washington and serves for a week at a time at the federal courthouse to review and act on the government's requests for surveillance.

Last year, the Justice Department submitted 1,789 requests to "conduct electronic surveillance." One was later withdrawn, and each of the rest was approved by a judge, according to a report sent to Congress.

In addition, the government sought 212 orders for "certain business records." The special court "did not deny, in whole or in part, any such application" last year, the Justice Department said, but there were "modifications" to 200 of those orders.

Rep. Adam B. Schiff (D-Burbank) and Sen. Richard Blumenthal (D-Conn.) are proposing measures to change how the judges are named and to require the court to issue unclassified versions of its opinions.

"I think these judges take their jobs very seriously, but we need a more effective set of checks and balances," Schiff said. "Right now, 10 of 11 were appointed by Republican presidents." [Yea, and President Obama, a Democrat, is more or less a carbon copy clone of Republican President George W. Bush.]

Schiff proposes that the judges be nominated by the president specifically for the court and confirmed by the Senate. "If they came before the Senate, we would get a better understanding of how they view the 4th Amendment" and its protection against unreasonable searches, he said. [Yea, like the Senate gives a rats *ss about the Fourth Amendment]

Blumenthal has described the court as "broken. It is unaccountable, secretive and one-sided."

In recent week, lawyers for the Bush and Obama administrations have come to the defense of the special court and its judges. The judges bring a "healthy skepticism" to requests for surveillance, said Steven Bradbury, a top Justice Department lawyer under Bush.

"I want to correct the erroneous claim that the FISA court is a rubber stamp," Robert Litt, counsel for Obama's director of national intelligence, said in a speech at the Brookings Institution. He said the judges made sure each request for surveillance "complies with the law." [Yea, so approving 1,789 of the 1,789 requests to "conduct electronic surveillance" isn't a rubber stamp???]

But University of Virginia law professor Christopher Sprigman, like Granick, says the problem goes beyond how the judges are appointed or how they handle specific requests for wiretapping. He says the major decisions on the nation's surveillance policies should not be made behind closed doors in a one-sided proceeding.

The leaked court orders reveal a mass collection policy that "has no limits," he said. It could include all credit card records or all travel records, he said.

"We need a public debate if we are going to switch to a mass surveillance policy," Sprigman said. "Congress needs to decide — in public — whether it is worth surveilling everyone. This shouldn't be decided in a secret court." [Congress doesn't need a public debate on the best way to side step the Constitution, it needs to start obeying the Constitution!!!]

david.savage@latimes.com


The NSA hears and sees everything you do!!!!!

 
The NSA hears and sees everything you do!!!!! Hear no evil, See no evil, I hear and see everything, 
               The Congress, The Administration, The People
 


Eugene Robinson: Snowden deserves our thanks, not our derision

Source

Eugene Robinson: Snowden deserves our thanks, not our derision

Updated: 29 July 2013 11:44 PM

Edward Snowden’s renegade decision to reveal the jaw-dropping scope of the National Security Agency’s electronic surveillance is being vindicated, even as Snowden himself is being vilified.

Intelligence officials in the Obama administration and their allies on Capitol Hill paint the fugitive analyst as nothing but a traitor who wants to harm the United States. Many of those same officials grudgingly acknowledge, however, that public debate about the NSA’s domestic snooping is now unavoidable.

This would be impossible if Snowden, or someone like him, hadn’t spilled the beans. We wouldn’t know that the NSA is keeping a database of all our phone calls. We wouldn’t know that the government gets the authority to keep track of our private communications — even if we are not suspected of terrorist activity or associations — from secret judicial orders issued by a secret court based on secret interpretations of the law.

Snowden, of course, is hardly receiving the thanks of a grateful nation. He has spent the last five weeks trapped in the transit zone of Sheremetyevo Airport outside Moscow. Russian officials, who won’t send him home for prosecution, wish he would move along. But he fears that if he takes off for one of the South American countries that have offered asylum, he would risk being intercepted en route and extradited. It’s a tough situation, and time is not on his side.

You can cheer Snowden’s predicament or you can bemoan it. But even some of the NSA’s fiercest defenders have admitted, if not in so many words, that Snowden performed a valuable public service.

Less than two weeks ago, the office of Director of National Intelligence James Clapper issued a public statement to announce that the secret Federal Intelligence Surveillance Court has renewed the government’s authority to collect metadata about our phone calls. This was being disclosed “in light of the significant and continuing public interest in the … collection program.”

Isn’t that rich? If the spooks had their way, there would be no “continuing public interest” in the program. We wouldn’t know it exists.

The new position espoused by President Barack Obama and those who kept the NSA’s domestic surveillance a deep, dark secret is that of course we should have a wide-ranging national debate about balancing the imperatives of privacy and security. But they don’t mean it.

I know this because when an actual debate erupted in Congress last week, the intelligence cognoscenti freaked out.

An attempt to cut off funding for the NSA’s collection of phone data, sponsored by an unlikely pair of allies in the House — Justin Amash, a conservative Republican, and John Conyers, a liberal Democrat, both from Michigan — suffered a surprisingly narrow defeat, 217-205.

The Amash-Conyers amendment was in no danger of becoming law — the Senate would have killed it, and if all else failed, Obama would have vetoed it. But it put the intelligence establishment on notice: The spooks don’t decide how far is too far. We do.

At the heart of the Fourth Amendment is the concept that a search must be justified by suspicion. Yet how many of those whose phone call information is being logged are suspected of being terrorists? One in a million?

Equally antithetical to the idea of a free society, in my view, is the government’s position that we are not even permitted to know how the secret intelligence court interprets our laws and the Constitution. The order that Snowden leaked — compelling a Verizon unit to cough up data on the phone calls it handled — was one of only a few to come to light in the court’s three decades of existence. Now there are voices calling for all the court’s rulings to be released.

We’re talking about these issues. You can wish Edward Snowden well or wish him a lifetime in prison. Either way, you should thank him.

Washington Post columnist Eugene Robinson may be contacted at eugenerobinson@washpost.com.

Enjoying that wonderful feeling of security in America

 
Enjoying that wonderful feeling of security in America - 
                        NSA - Home Sweet Home - The American Police State brought 
                        to you by Barack Obama and George W. Bush
  or "probable cause"]


Government Tyrants 1 - Freedom Fighters 0

Bradley Manning convicted of some charges

Source

Bradley Manning acquitted of most serious charge, convicted of others

By Richard A. Serrano

July 30, 2013, 8:51 p.m.

FT. MEADE, Md. — Army Pfc. Bradley Manning was convicted Tuesday of violating the Espionage Act and faces up to 136 years in prison, but his acquittal on the even more serious charge of aiding the enemy was hailed as a victory for the press and the Internet against the government's crackdown on leaks of classified information.

Manning's leak of more than 700,000 State Department cables, terrorism detainee assessments, combat logs and videos was the largest breach of classified secrets in U.S. history. Among the information was a now-infamous 2007 video of an Apache combat helicopter attack in Iraq in which U.S. soldiers fired on civilians and killed 12, including two Reuters journalists.

Manning becomes one of only two people ever convicted under the Espionage Act for making classified data available to the public; the other, Samuel L. Morison, a government security analyst convicted in 1985, was pardoned by President Clinton on his final day in office.

"We won the battle, now we need to go win the war," said chief defense lawyer David Coombs, who was greeted by applause and thanks from Manning supporters when he left the courtroom. "Today is a good day, but Bradley is by no means out of the fire."

Under the aiding the enemy charge, Manning, 25, could have been sent to prison for life with no parole. The military judge, Army Col. Denise Lind, heard the case without a jury and did not explain her verdicts. She appeared to have accepted defense arguments that Manning did not understand that releasing the material could allow Al Qaeda and other foreign terrorist organizations to use the information to harm the United States.

The government's theory — that even if Manning did not directly convey information to an enemy, he could be charged with that crime because information released to the public could be obtained by U.S. adversaries — had serious implications for whistle-blowers and those who provide information about classified programs to journalists.

Prosecutors "pushed a theory that making information available on the Internet — whether through WikiLeaks, in a personal blog posting, or on the website of the New York Times — can amount to 'aiding the enemy,'" said Widney Brown, senior director for international law and policy at Amnesty International. That, Brown said, "is ludicrous."

A conviction for aiding the enemy would have "severely crippled the operation of a free press," said Thomas Fiedler, dean of the College of Communication at Boston University.

At Tuesday's hearing, Manning wore a blue dress uniform, wire rim glasses and a prison pallor after three years in pretrial confinement. He stood at ramrod attention and listened without emotion as the judge read the guilty and not-guilty verdicts on about two dozen charges.

A sentencing hearing is scheduled to begin Wednesday, with each side expected to present about 10 witnesses. Manning's lawyers may put him on the stand.

If so, it would be the second time he has addressed the court. In February, Manning pleaded guilty to 10 lesser charges of mishandling classified data. He said then that after collecting intelligence on the wars in Iraq and Afghanistan, "I began to become depressed with the situation we had become mired in year after year."

After the sentencing, Maj. Gen. Jeffrey S. Buchanan, commander of joint forces in the capital region, has the authority to toss out some or all of the guilty verdicts and, theoretically, release Manning. On Friday, Manning supporters rallied outside the gate of Ft. McNair in Washington, where Buchanan is stationed. They carried balloons and a 20-foot banner that read, "Maj. Gen. Buchanan, Do the Right Thing. Free Bradley Manning."

Manning was arrested in spring 2010 after the documents he took from government computer databases began appearing in sensational posts on the WikiLeaks website. For months he was held incommunicado, and his lawyers complained he was kept naked and tortured emotionally before his trial began in June.

Manning elected to allow Judge Lind to hear the case without a jury, probably worried that a panel of fellow soldiers weighing his fate would not be pleased that some of the material he gave to WikiLeaks was found in Osama bin Laden's compound in Pakistan after the Al Qaeda leader was killed by Navy SEALs in May 2011.

Military prosecutors presented evidence that Manning underwent extensive training about safeguarding classified data before becoming an Army intelligence analyst in Iraq, and that he instructed other soldiers in security procedures.

"He was a traitor, a traitor who understood the value of compromised information in the hands of the enemy and took deliberate steps to ensure that they, along with the world, received it," Maj. Ashden Fein, the chief prosecutor, told the judge.

The defense, however, portrayed Manning as a small-town youth from Oklahoma who joined the Army with good intentions, only to become deeply bothered when he discovered what he believed to be government misconduct. Coombs said Manning was a whistle-blower, a "young, naive, good-intentioned soldier."

The soldier has spawned a worldwide group of sympathizers who have rallied in his defense, urged his release and floated his name for the Nobel Peace Prize.

On Tuesday morning, hours before Manning learned his fate, two dozen supporters, many wearing black "TRUTH" T-shirts, hoisted signs and waved at workers arriving at Ft. Meade, where the court-martial has been held, and which also houses the highly secretive National Security Agency and the Defense Information Systems Agency.

Julian Assange, the founder of WikiLeaks, was asked before the verdicts whether a long prison sentence would be worth it to Manning.

"That's something Bradley Manning has to weigh up," Assange told CNN. "He was willing to take that risk because he believes apparently that the result is so important."

richard.serrano@latimes.com


3 hops - A lame excuse to nullify the 4th Amendment

Source

With 3 ‘hops,’ NSA gets millions of phone records

Associated Press Wed Jul 31, 2013 2:26 PM

WASHINGTON — President Barack Obama’s national security team acknowledged for the first time Wednesday that, when investigating one suspected terrorist, it can read and store the phone records of millions of Americans.

Since it was revealed recently that the National Security Agency puts the phone records of every American into a database, the Obama administration has assured the nation that such records are rarely searched and, when they are, officials target only suspected international terrorists. [Yea, sure!!!!]

But testimony before Congress on Wednesday showed how easy it is for Americans with no connection to terrorism to unwittingly have their calling patterns analyzed by the government.

It hinges on what’s known as “hop” or “chain” analysis. When the NSA identifies a suspect, it can look not just at his phone records, but also the records of everyone he calls, everyone who calls those people and everyone who calls those people.

If the average person called 40 unique people, three-hop analysis would allow the government to mine the records of 2.5 million Americans when investigating one suspected terrorist. [Give me a break. It would be IMPOSSIBLE for a small team of FBI cop to investigate 2.5 million Americans for every person they suspect is a terrorist. This 3 hop double talk is just a lame excuse to justify spying on millions of Americans]

The NSA has said it conducted 300 searches of its telephone database last year. Left unsaid until Wednesday was that three-hop analysis off those searches could mean scrutinizing the phone records of tens or even hundreds of millions of people.

“So what has been described as a discrete program, to go after people who would cause us harm, when you look at the reach of this program, it envelopes a substantial number of Americans,” said Sen. Dick Durbin, the No. 2 Democrat in the Senate.

John Inglis, the NSA’s deputy director, conceded the point but said NSA officials “try to be judicious” about conducting hop analysis.

“And so while, theoretically, 40 times 40 times 40 gets you to a large number, that’s not typically what takes place,” he said. “We have to compare the theory to the practice.” [So in reality the FBI doesn't investigate 2.5 million Americans for every suspected terrorists. But the FBI does want to use that lame 3 hop theory to give it an excuse to wire tape the phones of the 300+ millions Americans]

Such reassurances have done little to quell the sharp criticism from both parties over the once-secret program. Last week saw a close vote in the House on a measure that aimed to kill the phone surveillance program. [Yea, and they DIDN'T kill the program!!!]

On Wednesday, the administration acknowledged some limitations to its sweeping surveillance powers are inevitable.

“We are open to re-evaluating this program in ways that can perhaps provide greater confidence and public trust that this is in fact a program that achieves both privacy protections and national security,” Robert Litt, counsel to the Office of the Director of National Intelligence, told skeptical members of the Senate Judiciary Committee.

This newest privacy-vs.-security debate was touched off when former government contract systems analyst Edward Snowden leaked classified documents exposing National Security Agency programs that store years of phone records on every American. That revelation prompted the most significant reconsideration yet of the vast surveillance powers Congress granted the president after the Sept. 11, 2001, attacks.

The administration intended to keep the telephone program a secret, and for more than a decade few in Congress showed any interest in limiting the surveillance. Snowden’s leaks abruptly changed the calculus on Capitol Hill. [Snowden should be a national hero for exposing our corrupt government masters in the US House and Senate who have flushed the 4th Amendment down the toilet]

“We have a lot of good information out there that helps the American public understand these programs, but it all came out late,” Sen. Sheldon Whitehouse, D-Rhode Island, said in a rebuke of government secrecy. “It all came out in response to a leaker. There was no organized plan for how we rationally declassify this so that the American people can participate in the debate.” [Translation - we got caught flushing the Fourth Amendment down the toilet and I am trying to justify it with this double talk]

The telephone program is authorized under a provision of the USA Patriot Act, which Congress hurriedly passed after the Sept. 11,2001 attacks against the U.S. President George W. Bush’s administration said then what Obama’s administration says now: that in order to connect the dots, it needs to collect lots of dots. [Yea, using the unconstitutional Patriot Act which pretty much flushes the Bill of Rights down the toilet] Sen. Patrick Leahy was skeptical.

“There’s always going to be dots to collect, analyze and try to connect,” he said. “Government is already collecting data on millions of innocent Americans on a daily basis based on a secret legal interpretation of a statute that does not on its face appear to authorize this kind of bulk collection. So what’s going to be next? When is enough enough?” [The Patriot Act was enough. Congress should have repealed it, because it is unconstitutional. The courts should have struck it down because it is unconstitutional. I suspect the only way for it to end is an armed revolt by the people.]

Several Democrats promised bills that would provide tighter controls or more transparency. Proposals include eliminating the FBI’s ability to seize data without a court order, changing the way judges are appointed to the surveillance court and appointing an attorney to argue against the government in secret proceedings before that court. Another measure would force the government to reveal how many Americans have had their information swept up in surveillance. [All which is double talk and BS to justify the unconstitutional Patriot Act. The solution is simple - Repeal the Patriot Act!!!!]

Inglis said the NSA was willing to reconsider whether it needed to keep phone data for five years. And Deputy Attorney General James Cole said the Justice Department was considering whether and how to allow an outside attorney into the secret court to argue against the government. [Again the solution is simple - Repeal the unconstitutional Patriot Act!!!!]


Leaked docs give new insight into NSA’s searches

Source

Leaked docs give new insight into NSA’s searches

Associated Press Wed Jul 31, 2013 1:35 PM

LONDON — Documents published by the Guardian newspaper are providing new insight into the National Security Agency’s surveillance of world data, giving an over-the-shoulder look at the programs and techniques U.S. intelligence analysts use to exploit the hundreds of billions of records they gather each year.

Dozens of training slides published Wednesday divulge details about XKeyscore, one of a family of NSA programs that leaker Edward Snowden says has given America the ability to spy on “the vast majority of human communications.”

Some of the slides appear to carry screenshots showing what analysts would see as they trawled the intercepted conversations, including sample search queries such as “Show me all encrypted word documents from Iran” or “Show me all the word documents that reference Osama Bin Laden.”

In an indication of the program’s scope, one slide says that XKeyscore has led to the capture of more than 300 terrorists. In a statement, the NSA said that figure only included captures up to the year 2008, and pushed back against any suggestion of illegal or arbitrary collection of data.

“These types of programs allow us to collect the information that enables us to perform our missions successfully — to defend the nation and to protect U.S. and allied troops abroad,” the statement said.

How and from where the program draws its data isn’t completely clear, but one slide said XKeyscore was supported by 700 servers and 150 sites across the globe. Another slide seemed to show the program drawing data from a body codenamed SSO — an apparent reference to the NSA’s Special Source Operations, which previous Guardian articles have described as capturing large numbers of communications between the United States and other countries.

The volume of data available to analysts through XKeyscore appears to be vast. The Guardian quoted one slide as saying that nearly 42 billion records had been captured by the system during a one-month period in 2012 — a rate of half a trillion records every year. So much content was being collected, the newspaper said, that it could only be stored for short periods of time — generally just a few days.

“At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours,” the Guardian quoted one document as saying.

In a message forwarded to The Associated Press by Guardian spokesman Gennady Kolker, journalist Glenn Greenwald said the article about XKeyscore drew on half a dozen documents supplied to him by Snowden in Hong Kong. One of them — a 32-page overview of the program — was published in its entirety, albeit with several pages redacted.

The documents are the first to have been published in the Guardian since Snowden, who remains stuck at a Moscow airport, applied for temporary asylum in Russia on July 16.

Russian President Vladimir Putin said he’d be inclined to accept on condition that Snowden agreed not to hurt U.S. interests — implying that the American would have to stop leaking secrets. But Snowden’s Russian lawyer, Anatoly Kucherena, said Wednesday that the material for the article was provided long before Snowden promised to stop leaking.

“He warned me that he had already sent to the press an array of revealing information and secret documents and, unfortunately, could not stop its publication,” Kucherena was quoted as saying by the Interfax news agency.


Give Snowden his due: He made a surveillance debate possible

Source

Give Snowden his due: He made a surveillance debate possible

By Michael McGough

July 31, 2013, 12:42 p.m.

They call it the “Snowden effect.” Whatever you think of fugitive former National Security Agency consultant Edward J. Snowden -- hero, traitor, something in between -- his revelations about electronic surveillance programs have inspired a debate about broad questions of policy that was impossible because of the secrecy that enshrouded the programs themselves and their legal rationale. And that debate in turn has prompted defenders of the program to acknowledge that it can be reformed.

In Wednesday’s Washington Post, Sen. Dianne Feinstein, the chairwoman of the Intelligence Committee and a dogged defender of the NSA programs, says that she intends “to work with members of the Senate intelligence and judiciary committees to consider changes to the NSA call-records program in an effort to increase transparency and improve privacy protections.” That is the program under which the government collects so-called metadata -- information about the source, destination and duration of telephone calls.

Among other changes, Feinstein would have the government make public on an annual basis the number of Americans’ phone numbers “submitted as queries of the NSA database,” as well as the number of warrants obtained by the FBI to examine the actual content of phone calls. She also would reduce from five to two or three years the length of time phone records would be retained.

The improvements Feinstein proposes fall short of abolishing the bulk collection of telephone metadata unrelated to a specific terrorism investigation. But would even these refinements be on the table if Snowden hadn’t released information about the metadata program? Would President Obama be inviting congressional critics of the program (along with supporters) to the White House? According to Politico, the president will host a powwow on the surveillance program Thursday.

And without Snowden’s revelations, which continued Wednesday with a report in the Guardian about a versatile search program called XKeyscore, would the Senate Judiciary Committee be discussing changes in the way the secret Foreign Intelligence Surveillance Court operates and in how its judges are selected? Would the administration have released key documents about the metadata program, as it did Wednesday?

As they say in England, not bloody likely.

Even Obama, in the aftermath of the first Snowden leaks, said that he welcomed a debate over surveillance policy and whether it infringed on civil liberties. Without Snowden, that debate wouldn’t exist.

For that reason, some of Snowden’s supporters argue that he should be spared prosecution or even be given a presidential pardon. (Talk about “not bloody likely.”)

That doesn’t necessarily follow, for several reasons. Even if you don’t accept the notion that those who engage in civil disobedience should be willing to accept punishment, there is the question of whether some of Snowden’s leaks went beyond blowing the whistle on surveillance of Americans to compromise purely foreign intelligence.

But the “Snowden effect” is real, and salutary.


Too much information is being kept secret

'Classified' is government code for 'don't embarrass us'

I don't have a secret clearance and never have had one. But many times I have worked in secret engineering or manufacturing rooms, where I had to be baby sat by somebody with a secret clearance.

All of the secret stuff I saw was down right ridiculous. A list of 50 resistors in a printed circuit board was classified. One board had an IC, that was secret before it was mounted on the printed circuit board, but once soldered on the printed circuit board was no longer secret.

When we moved a PC into a secret engineering room it literally took us 6 months to get an approval to do that from some secret bureaucrats in Washington D.C.

article

'Classified' is government code for 'don't embarrass us'

Our View: Too much information is being kept secret

By Editorial board The Republic | azcentral.com Wed Jul 31, 2013 5:49 PM

Army Pfc. Bradley Manning’s conviction is really the sideshow.

What deserves the spotlight is the creeping secrecy of government. Our government. The government that’s supposed to be a beacon of light and liberty.

More than 5 million government employees and contractors have security clearances. That’s a lot of secrets. A lot of secret-keepers. Too many.

The Government Accountability Office is looking at whether too many things are being classified and how the decisions are made to release information to the public.

Rep. Duncan Hunter requested the study. He told Foreign Policy that “classification inflation” limits public access to information that should be available.

In requesting the GAO study, Hunter pointed out another problem: “With access to classified information contingent on the issuance of security clearances, overclassification stands to dangerously expand access to material that should ordinarily be limited.”

Manning and Edward Snowden show the dangers of having too many secret-keepers.

It’s easy to find examples of overzealous classification.

One of the pieces of information Manning made public was a video of a 2007 U.S. helicopter attack in Iraq in which U.S. airmen laugh and call the targets “dead bastards.”

That attack killed civilians, including a Reuters news photographer and his driver. A subsequent military investigation showed the happy-go-lucky troops misidentified camera equipment for weapons before killing people they so callously denigrated.

The only reason for classifying that video is to protect the military from embarrassment — cover your backside.

What’s more, mixing in fake secrets with real ones increases the pressure to blow the whistle.

Manning says his motivation was to expose the military’s “bloodlust” and U.S. diplomatic deception. He dodged conviction on the most serious charge of aiding the enemy, but was convicted on 22 espionage, theft and other charges in the release of secrets to WikiLeaks.

As a soldier, he broke trust. But he did the public a favor. Whistle-blowing is a time-honored way to keep government accountable.

That’s especially true when the government is showing an adolescentlike fetish for hiding things that don’t need to be hidden.

Another example from very close to home:

The Department of Homeland Security refuses to make public what it knows about how many undocumented migrants get away, how many are caught multiple times or what percentage successfully enter the U.S. It’s classified.

The Arizona Republic sought the information. Now, Republican and Democratic members of Arizona’s delegation are asking for it, too. The lack of data makes it impossible to accurately assess the effectiveness of individual DHS border strategies.

If there’s a good national- security reason to hide information on border crossings, we haven’t heard it.

Snowden’s leaks about National Security Agency spying got him a one-way ticket to no man’s land. But it also put a light on the kind of government snooping that makes a lot of Americans queasy.

This nation is under threat from terrorists, and there are good reasons for keeping some information classified.

But Manning, Snowden and the DHS raise big concerns about what’s being withheld from the American people and why. That’s an issue that deserves the spotlight.


Russia grants NSA leaker Snowden asylum

Of course you have to remember that Russia is a police state just like the USA, and the Russian government is almost certainly doing this for political reasons. But even still Edward Snowden is a freedom fighter for exposing the corruption and law breaking by the US government.

article

Russia grants NSA leaker Snowden asylum; he leaves airport

By Vladimir Isachenkov Associated Press Thu Aug 1, 2013 7:24 AM

MOSCOW — National Security Agency leaker Edward Snowden left the transit zone of a Moscow airport and entered Russia after authorities granted him asylum for one year, his lawyer said Thursday.

Anatoly Kucherena said that Snowden’s whereabouts will be kept secret for security reasons. The former NSA systems analyst was stuck at Moscow’s Sheremetyevo airport since his arrival from Hong Kong on June 23.

“He now is one of the most sought after men in the world,” Kucherena told reporters at the airport. “The issue of security is very important for him.”

The U.S. has demanded that Russia send Snowden home to face prosecution for espionage, but President Vladimir Putin dismissed the request.

Putin had said that Snowden could receive asylum in Russia on condition he stops leaking U.S. secrets. Kucherena has said Snowden accepted the condition.

The Guardian newspaper on Wednesday published a new report on U.S. intelligence-gathering based on information from Snowden, but Kucherena said the material was provided before Snowden promised to stop leaking.

Snowden, who revealed details of a U.S. intelligence program to monitor Internet activity, has received offers of asylum from Venezuela, Nicaragua and Bolivia and said he would like to visit those countries. However, the logistics of reaching any of those countries are complicated because his U.S. passport has been revoked.

Snowden’s father said in remarks broadcast Wednesday on Russian television that he would like to visit his son. Kucherena said he is arranging the trip.

The lawyer has said earlier that the temporary asylum would allow Snowden to travel freely around Russia, but wouldn’t allow him to leave the country. The one-year asylum can be extended.

WikiLeaks, a group which has adopted Snowden’s cause, said its legal adviser Sarah Harrison is now with him. The group also praised Russia for providing him shelter.

“We would like to thank the Russian people and all those others who have helped to protect Mr. Snowden,” WikiLeaks said on Twitter. “We have won the battle — now the war.”

Kucherena said that Snowden spent little time packing and left the airport in a taxi. The lawyer said the fugitive had friends in Russia, including some Americans, who could help ensure his security, but wouldn’t elaborate.

Snowden’s case has further strained U.S.-Russian ties already tense amid differences over Syria, U.S. criticism of Russia’s human rights record and other issues.

Putin’s foreign affairs aide, Yuri Ushakov, sought Thursday to downplay the impact this will have on the relations between the two countries.

“This issue isn’t significant enough to have an impact on political relations,” he said in remarks carried by Russian news agencies.

He said that the Kremlin hasn’t heard any signal from Washington that Obama could cancel his visit to Moscow ahead of next month’s G-20 summit in St.Petersburg.


Don't Google "pressure cooker" unless you love cops

Don't Google "pressure cooker" unless you love Homeland Security goons in your living room!!!

For those of you who have not used pressure cookers they are fantastic machines that cook much faster then a microwave oven.

You put a little water in them, which when heated turns to a gas which pressure cooks the food.

After you put the food in the pressure cooker you seal it up and put it on the stove.

If you only cook small stuff like I do the pressure cooker will get up to full pressure in one or two minutes.

If you slice up your veggies many things will be cooked in 1 or 2 minutes after the cooker is fully pressurized. You can cook fish in 4 or 5 minutes.

You can also cook things like roasts in them much quicker then in a conventional oven, but I have never done that. A beef brisket will cook in 50 to 70 minutes.

And I didn't know this until those nut jobs in Boston used them to kill people but pressure cookers also make great bombs.

Source

Google Pressure Cookers and Backpacks, Get a Visit from the Feds

The Atlantic Wire

Philip Bump

Michele Catalano was looking for information online about pressure cookers. Her husband, in the same time frame, was Googling backpacks. Wednesday morning, six men from a joint terrorism task force showed up at their house to see if they were terrorists. Which begs the question: How'd the government know what they were Googling?

Catalano (who is a professional writer) describes the tension of that visit.

[T]hey were peppering my husband with questions. Where is he from? Where are his parents from? They asked about me, where was I, where do I work, where do my parents live. Do you have any bombs, they asked. Do you own a pressure cooker? My husband said no, but we have a rice cooker. Can you make a bomb with that? My husband said no, my wife uses it to make quinoa. What the hell is quinoa, they asked. ...

Have you ever looked up how to make a pressure cooker bomb? My husband, ever the oppositional kind, asked them if they themselves weren’t curious as to how a pressure cooker bomb works, if they ever looked it up. Two of them admitted they did.

The men identified themselves as members of the "joint terrorism task force." The composition of such task forces depend on the region of the country, but, as we outlined after the Boston bombings, include a variety of federal agencies. Among them: the FBI and Homeland Security.

Ever since details of the NSA's surveillance infrastructure were leaked by Edward Snowden, the agency has been insistent on the boundaries of the information it collects. It is not, by law, allowed to spy on Americans — although there are exceptions of which it takes advantage. Its PRISM program, under which it collects internet content, does not include information from Americans unless those Americans are connected to terror suspects by no more than two other people. It collects metadata on phone calls made by Americans, but reportedly stopped collecting metadata on Americans' internet use in 2011. So how, then, would the government know what Catalano and her husband were searching for?

It's possible that one of the two of them is tangentially linked to a foreign terror suspect, allowing the government to review their internet activity. After all, that "no more than two other people" ends up covering millions of people. Or perhaps the NSA, as part of its routine collection of as much internet traffic as it can, automatically flags things like Google searches for "pressure cooker" and "backpack" and passes on anything it finds to the FBI.

Or maybe it was something else. On Wednesday, The Guardian reported on XKeyscore, a program eerily similar to Facebook search that could clearly allow an analyst to run a search that picked out people who'd done searches for those items from the same location. How those searches got into the government's database is a question worth asking; how the information got back out seems apparent.

It is also possible that there were other factors that prompted the government's interest in Catalano and her husband. He travels to Asia, she notes in her article. Who knows. Which is largely Catalano's point.

They mentioned that they do this about 100 times a week. And that 99 of those visits turn out to be nothing. I don’t know what happens on the other 1% of visits and I’m not sure I want to know what my neighbors are up to.

One hundred times a week, groups of six armed men drive to houses in three black SUVs, conducting consented-if-casual searches of the property perhaps in part because of things people looked up online.

But the NSA doesn't collect data on Americans, so this certainly won't happen


U.S. issues worldwide travel alert amid terrorism fears

I suspect this is another one of the things that H. L. Mencken is talking about when he says:
"The whole aim of practical politics is to keep the populace alarmed (and hence clamorous to be led to safety) by menacing it with an endless series of hobgoblins, all of them imaginary."
On the other hand the American government has murdered thousands and probably hundreds of thousands of innocent people in Afghanistan, Iraq and other Muslim countries with our unconstitutional wars so I can understand the Arab world attacking Americans to get even.

Source

U.S. issues worldwide travel alert amid terrorism fears

By Billy Kenber, Updated: Friday, August 2, 9:20 AM E-mail the writer

The State Department issued a worldwide travel alert Friday, warning of potential terrorist attacks by al-Qaeda and its affiliates in the Middle East and North Africa that could target tourists on trains, flights or other forms of public transportation.

The alert follows the decision to close 21 U.S. embassies across the Muslim world on Sunday in response to the same security threat, according to State Department officials.

“Current information suggests that al-Qaeda and affiliated organizations continue to plan terrorist attacks both in the region and beyond, and that they may focus efforts to conduct attacks in the period between now and the end of August,” the State Department said in a statement Friday. It said the potential for attacks was particularly high in the Middle East and North Africa and that it could come from or occur on the Arabian Peninsula.

U.S. citizens traveling abroad were urged to take precautions. The alert warned that “terrorists may elect to use a variety of means and weapons and target both official and private interests,” notably public transportation systems including “subway and rail systems, as well as aviation and maritime services.”

Speaking at a news briefing Thursday, State Department spokeswoman Marie Harf said a number of embassies were instructed to close on Sunday because of “security considerations.” Sunday is a normal working day in most Muslim countries, and embassies there would typically be open for business.

Harf stressed that officials were acting “out of an abundance of caution and care for our employees and others who may be visiting our installations.” She did not provide details of the security threat but said that embassies could remain closed into next week.

The last time the department issued a similar warning was on last year’s anniversary of the Sept. 11, 2001, attacks. The U.S. ambassador to Libya and three other Americans were killed Sept. 11 and 12, 2012, when militants assaulted two U.S. compounds in Benghazi.

Rep. Edward R. Royce (R-Calif.), chairman of the House Foreign Affairs Committee, told CNN’s “New Day” program: “It’s my understanding that it is al-Qaeda-linked, all right.”

Among the affected embassies are those in Afghanistan, Iraq, Kuwait, Saudi Arabia and Libya. Three consulates will also close — two in Saudi Arabia and one in the United Arab Emirates.


A Cheap Spying Tool With a High Creepy Factor

Low tech internet spying - NSA tools for the homeless???

Source

A Cheap Spying Tool With a High Creepy Factor

By SOMINI SENGUPTA

With a handful of plastic boxes and over-the-counter sensors, including Wi-Fi adapters and a USB hub, Brendan O’Connor, a security researcher, was able to monitor all the wireless traffic emitted by nearby wireless devices.Brendan O’Connor With a handful of plastic boxes and over-the-counter sensors, including Wi-Fi adapters and a USB hub, Brendan O’Connor, a security researcher, was able to monitor all the wireless traffic emitted by nearby wireless devices.

Brendan O’Connor is a security researcher. How easy would it be, he recently wondered, to monitor the movement of everyone on the street – not by a government intelligence agency, but by a private citizen with a few hundred dollars to spare?

Mr. O’Connor, 27, bought some plastic boxes and stuffed them with a $25, credit-card size Raspberry Pi Model A computer and a few over-the-counter sensors, including Wi-Fi adapters. He connected each of those boxes to a command and control system, and he built a data visualization system to monitor what the sensors picked up: all the wireless traffic emitted by every nearby wireless device, including smartphones.

Each box cost $57. He produced 10 of them, and then he turned them on – to spy on himself. He could pick up the Web sites he browsed when he connected to a public Wi-Fi – say at a cafe – and he scooped up the unique identifier connected to his phone and iPad. Gobs of information traveled over the Internet in the clear, meaning they were entirely unencrypted and simple to scoop up.

Even when he didn’t connect to a Wi-Fi network, his sensors could track his location through Wi-Fi “pings.” His iPhone pinged the iMessage server to check for new messages. When he logged on to an unsecured Wi-Fi, it revealed what operating system he was using on what kind of device, and whether he was using Dropbox or went on a dating site or browsed for shoes on an e-commerce site. One site might leak his e-mail address, another his photo.

“Actually it’s not hard,” he concluded. “It’s terrifyingly easy.”

Also creepy – which is why he called his contraption “creepyDOL.”

“It could be used for anything depending on how creepy you want to be,” he said.

You could spy on your ex-lover, by placing the sensor boxes near the places the person frequents, or your teenage child, or the residents of a particular neighborhood. You could keep tabs on people who gather at a certain house of worship or take part in a protest demonstration in a town square. Their phones and tablets, Mr. O’Connor argued, would surely leak some information about them – and certainly if they then connected to an unsecured Wi-Fi. The boxes are small enough to be tucked under a cafe table or dropped from a hobby drone. They can be scattered around a city and go unnoticed.

Mr. O’Connor says he did none of that – and for a reason. In addition to being a security researcher and founder of a consulting firm called Malice Afterthought, he is also a law student at the University of Wisconsin at Madison. He says he stuck to snooping on himself – and did not, deliberately, seek to scoop up anyone else’s data – because of a federal law called the Computer Fraud and Abuse Act.

Some of his fellow security researchers have been prosecuted under that law. One of them, Andrew Auernheimer, whose hacker alias is Weev, was sentenced to 41 months in prison for exploiting a security hole in the computer system of AT&T, which made e-mail addresses accessible for over 100,000 iPad owners; Mr. Aurnheimer is appealing the case.

“I haven’t done a full deployment of this because the United States government has made a practice of prosecuting security researchers,” he contends. “Everyone is terrified.”

He is presenting his findings at two security conferences in Las Vegas this week, including at a session for young people. It is a window into how cheap and easy it is to erect a surveillance apparatus.

“It eliminates the idea of ‘blending into a crowd,’” is how he put it. “If you have a wireless device (phone, iPad, etc.), even if you’re not connected to a network, CreepyDOL will see you, track your movements, and report home.”

Can individual consumers guard against such a prospect? Not really, he concluded. Applications leak more information than they should. And those who care about security and use things like VPN have to connect to their tunneling software after connecting to a Wi-Fi hub, meaning that at least for a few seconds, their Web traffic is known to anyone who cares to know, and VPN does nothing to mask your device identifier.

In addition, every Wi-Fi network that your cellphone has connected to in the past is also stored in the device, meaning that as you wander by every other network, you share details of the Wi-Fi networks you’ve connected to in the past. “These are fundamental design flaws in the way pretty much everything works,” he said.


Postal Service takes photos of all mail

Homeland Security, the FBI and the NSA aren't the only government agencies spying on you. The US Post Office snaps a photograph of every thing you mail.

Source

Postal Service takes photos of all mail

By ASSOCIATED PRESS | 8/2/13 10:25 AM EDT

WASHINGTON — The Postal Service takes pictures of every piece of mail processed in the United States — 160 billion last year — and keeps them on hand for up to a month.

In an interview with The Associated Press, Postmaster General Patrick Donahoe said the photos of the exterior of mail pieces are used primarily for the sorting process, but they are available for law enforcement, if requested.

The photos have been used "a couple of times" to trace letters in criminal cases, Donahoe told the AP on Thursday, most recently involving ricin-laced letters sent to President Barack Obama and New York Mayor Michael Bloomberg.

"We don't snoop on customers," said Donahoe, adding that there's no big database of the images because they are kept on nearly 200 machines at processing facilities across the country. Each machine retains only the images of the mail it processes.

"It's done by machine, so there's no central area where any of this information would be," he said. "It's extremely expensive to keep pictures of billions of pieces of mail. So there's no need for us to do that."

The images are generally stored for between a week and 30 days and then disposed of, he said. Keeping the images for those periods may be necessary to ensure delivery accuracy, for forwarding mail or making sure that the proper postage was paid, he said.

"Law enforcement has requested a couple of times if there's any way we could figure out where something came from," he said. "And we've done a little bit of that in the ricin attacks."

The automated mail tracking program was created after the deadly anthrax attacks in 2001 so the Postal Service could more easily track hazardous substances and keep people safe, Donahoe said.

"We've got a process in place that pretty much outlines, in any specific facility, the path that mail goes through," he said. "So if anything ever happens, God forbid, we would be able very quickly to track back to see what building it was in, what machines it was on, that type of thing. That's the intent of the whole program."

Processing machines take photographs so software can read the images to create a barcode that is stamped on the mail to show where and when it was processed, and where it will be delivered, Donahoe said.

The Mail Isolation Control and Tracking program was cited by the FBI on June 7 in an affidavit that was part of the investigation into who was behind threatening, ricin-tainted letters sent to Obama and Bloomberg. The program "photographs and captures an image of every piece of mail that is processed," the affidavit by an FBI agent said.

Mail from the same mailbox tends to get clumped together in the same batch, so that can help investigators track where a particular item was mailed from to possibly identify the sender.

"We've used (the Mail Isolation Control and Tracking program) to sort the mail for years," Donahoe said, "and when law enforcement asked us, 'Hey, is there any way you can figure out where this came from?' we were able to use that imaging."


Russia protects Snowden from the USA

 
Great one snooping government protecting me from another snooping government - Russia, USA, U.S.A., US, U.S., Edward Snowden - American eagle, Russian Bear
 


Search Warrants required for drone overflights???

If you ask me the 4th Amendment is pretty clear and we don't need a bunch of silly new laws forbidding government spying on us.
"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized"
The problem is our government masters have made thousands of lame excuses on WHY they don't have to honor the 4th Amendment. As in this case the cops use the lame excuse that flying an airplane over your home to spy on you isn't really spying on you and thus not a violation of the 4th Amendment.

What rubbish. If the government is peeking into your home, property or belonging for any reason looking for reasons to arrest you, that is a search and the government should be required to get a search warrant before doing it. Period!!!!!

Source

Drone Regulations: Spying Concerns Prompt States To Consider Legislation

By LISA CORNWELL 08/04/13 10:16 AM ET EDT AP

CINCINNATI -- Thousands of civilian drones are expected in U.S. skies within a few years and concerns they could be used to spy on Americans are fueling legislative efforts in several states to regulate the unmanned aircraft.

Varied legislation involving drones was introduced this year in more than 40 states, including Ohio. Many of those bills seek to regulate law enforcement's use of information-gathering drones by requiring search warrants. Some bills have stalled or are still pending, but at least six states now require warrants, and Virginia has put a two-year moratorium on drone use by law enforcement to provide more time to develop guidelines.

Domestic drones often resemble the small radio-controlled model airplanes and helicopters flown by hobbyists and can help monitor floods and other emergencies, survey crops and assist search-and-rescue operations. But privacy advocates are worried because the aircraft can also carry cameras and other equipment to capture images of people and property.

"Right now police can't come into your house without a search warrant," said Ohio Rep. Rex Damschroder, who has proposed drone regulations. "But with drones, they can come right over your backyard and take pictures."

Since 2006, the Federal Aviation Administration has approved more than 1,400 requests for drone use from government agencies and public universities wanting to operate the unmanned aircraft for purposes including research and public safety. Since 2008, approval had been granted to at least 80 law enforcement agencies.

But the FAA estimates that as many as 7,500 small commercial unmanned aircraft could be operating domestically within the next few years. A federal law enacted last year requires the FAA to develop a plan for safely integrating the aircraft into U.S. airspace by September 2015.

Damschroder's proposed bill would prohibit law enforcement agencies from using drones to get evidence or other information without a search warrant. Exceptions would include credible risks of terrorist attacks or the need for swift action to prevent imminent harm to life or property or to prevent suspects from escaping or destroying evidence.

The Republican said he isn't against drones but worries they could threaten constitutional protections against unreasonable searches and seizures.

"I don't want the government just going up and down every street snooping," Damschroder said.

The Ohio House speaker's office says it's too soon to comment on the chances for passage. But similar legislation has been enacted in Florida, Tennessee, Idaho, Montana, Texas and Oregon.

The sponsor of Tennessee's bill said the law was necessary to ensure that residents can maintain their right to privacy.

"Abuses of privacy rights that we have been seeing from law enforcement recently show a need for this legislation," said Republican Sen. Mae Beavers.

Beavers and Damschroder modeled their bills after one signed into law this year by Florida Gov. Rick Scott, who said then that "we shouldn't have unwarranted surveillance."

But the industry's professional association says regulating law enforcement's use of unmanned aircraft is unnecessary and shortsighted. It wants guidelines covering manned aircraft applied to unmanned aircraft.

"We don't support rewriting existing search warrant requirements under the guise of privacy," said Mario Mairena, government relations manager for the Arlington, Va.-based Association for Unmanned Vehicle Systems International.

The association predicts unmanned aircraft systems will generate billions of dollars in economic impact in the next few years and says privacy concerns are unwarranted.

In Maine, Gov. Paul LePage vetoed the state's drone-regulating legislation, saying "this bill steps too far" and would lead to lawsuits and harm Maine's opportunities for new aerospace jobs. He plans to establish guidelines allowing legitimate uses while protecting privacy.

The American Civil Liberties Union supports legislation to regulate drone use and require search warrants, but it would also like weapons banned from domestic drones and limits on how long drone-collected data could be kept, said Melissa Bilancini, an ACLU of Ohio staff attorney.

In North Dakota, Rep. Rick Becker's bill to ban weapons from drones and require search warrants failed, but the Republican says he plans to try again because "we must address these privacy concerns."

Democratic Rep. Ed Gruchalla, formerly in law enforcement, opposed Becker's bill out of concern it would restrict police from effectively using drones.

"We are familiar with drones in North Dakota, and I don't know of any abuses or complaints," he said.

Drones can be as small as a bird or have a wingspan as large as a Boeing 737, but a program manager with the International Association of Chiefs of Police says most law enforcement agencies considering unmanned aircraft are looking at ones weighing around 2 pounds that only fly for about 15 minutes.

"They can be carried in the back of a car and put up quickly for an aerial view of a situation without putting humans at risk," Mike Fergus said, adding that they aren't suited for surveillance.

Medina County Sheriff Tom Miller in northeast Ohio says his office's 2-pound drone is intended primarily for search-and-rescue operations and wouldn't be used to collect evidence without a warrant.

Cincinnati resident Dwan Stone, 50, doesn't have a problem with some limits.

"But I don't oppose drones if there is a good reason for using them," she said.

Chase Jeffries, 19, also of Cincinnati, opposes them.

"I don't want the government being able to use drones to spy on people," he said.


NSA is giving your phone records to the DEA.

Over 50 percent of the arrests for Patriot Act crimes are for victimless drug war crimes. Less then 1 percent of the arrests are for "terrorist" crimes.

The same is true about arrests made by the TSA when they search airline passengers for contraband. Again over 50 percent of the arrests are made for victimless drug war crimes, with less then 1 percent of the arrests for "terrorist" crimes.

I suspect the data the NSA has been collecting on us when it taps our phones and reads our emails is used mostly to make arrests for victimless drug war crimes, and that very little of the arrests are for the "terrorists" crimes we are told the NSA is protecting us from.

Source

The NSA is giving your phone records to the DEA. And the DEA is covering it up.

By Brian Fung, Published: August 5 at 10:06

A day after we learned of a draining turf battle between the NSA and other law enforcement agencies over bulk surveillance data, it now appears that those same agencies are working together to cover up when that data gets shared.

The Drug Enforcement Administration has been the recipient of multiple tips from the NSA. DEA officials in a highly secret office called the Special Operations Division are assigned to handle these incoming tips, according to Reuters. The information shared includes “intelligence intercepts, wiretaps, informants and a massive database of telephone records,” and it’s problematic because it appears to break down the barrier between foreign counter-terrorism investigations and ordinary domestic criminal investigations.

Because the SOD’s work is classified, DEA cases that began as NSA leads can’t be seen to have originated from a NSA source.

So what does the DEA do? It makes up the story of how the agency really came to the case in a process known as “parallel construction.” Reuters explains:

Some defense lawyers and former prosecutors said that using “parallel construction” may be legal to establish probable cause for an arrest. But they said employing the practice as a means of disguising how an investigation began may violate pretrial discovery rules by burying evidence that could prove useful to criminal defendants.

The report makes no explicit connection between the DEA and the earlier NSA bulk phone surveillance uncovered by former Booz Allen Hamilton contractor Edward Snowden. In other words, we don’t know for sure if the DEA’s Special Operations Division is getting its tips from the same database that’s been the subject of multiple congressional hearings in recent months. We just know that the NSA sometimes grants DEA access to Section 702 phone records, and also, separately, that a special outfit within DEA sometimes gets tips from the NSA.

There’s another reason the DEA would rather not admit the involvement of NSA data in its investigations: It might lead to a constitutional challenge to the very law that gave rise to the evidence.

Earlier this year, a federal court said that if law enforcement agencies wanted to use Section 702 phone records in court, they had to say so beforehand and give the defendant a chance to contest the legality of the surveillance. Lawyers for Adel Daoud, who was arrested in a federal sting operation and charged with trying to blow up a bomb, suspect that Daoud was identified using Section 702 records but was never told.

Surveys show most people support the NSA’s bulk surveillance program strongly when the words “terrorism” or “courts” are included in the question. When pollsters draw no connection with terrorism, support tends to wane. What’ll happen when the question makes clear that the intelligence not only isn’t being used for terrorism investigations against foreign agents, but is actively being applied to criminal investigations against Americans?


Supreme Court may need to decide how private a cellphone is

Will the Supremes continue to say "technology" makes the Bill of Rights null and void???

Give me a break there is no clause in the "Bill of Rights" that says it is null and void for anything other then horse and buggy technology.

Source

Supreme Court may need to decide how private a cellphone is

By Robert Barnes, Sunday, August 4, 2:39 PM

Chief Justice John G. Roberts Jr. didn’t hesitate last fall when a questioner asked him about the biggest constitutional challenge the Supreme Court faced.

Roberts told the audience at Rice University in Houston that the court must identify “the fundamental principle underlying what constitutional protection is and apply it to new issues and new technology. I think that is going to be the real challenge for the next 50 years.”

The court has started the process, of course. In the recently completed term, a majority said technological advances in how quickly warrants may be obtained means that in most cases police officers must obtain one before forcing a suspected drunken driver to take a blood test.

And, over a sharply worded dissent from Justice Antonin Scalia, the court went a long way toward endorsing DNA testing as the modern-day equivalent of fingerprinting. It approved of Maryland’s law that allows police to take DNA swabs at the time someone is arrested for — not convicted of — a major violent crime.

Now, amid a national debate over how much government should be able to find out about the private activities of its citizens in the name of combating terrorism, the next issue seems teed up for Supreme Court review:

Cellphones.

More than 85 percent of Americans carry one and they provide authorities with more than just a vast record of a person’s travels and phone calls. Modern smartphones have a memory capacity equal to that of a typical home computer in 2004, capable of storing millions of pages of documents.

“That information is, by and large, of a highly personal nature: photographs, videos, written and audio messages (text, email and voicemail), contacts, calendar appointments, web search and browsing history, purchases and financial and medical records,” Judge Norman H. Stahl of the U.S. Court of Appeals for the 1st Circuit wrote recently. “It is the kind of information one would previously have stored in one’s home.”

Stahl wrote for the majority in a 2 to 1 decision that applied the Fourth Amendment to the search of a cellphone found on a man arrested for selling drugs. The amendment protects “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.”

In most cases, a warrant is required. But the Supreme Court has said there are numerous exceptions to that general rule. In particular, in what courts refer to as “search incident to arrest,” a warrantless search is justified when officers are protecting themselves by looking for weapons or securing evidence that might be destroyed.

And justices in the past have been lenient about allowing searches of items found on a person who has been legally arrested.

But Stahl and fellow Judge Kermit V. Lipez disagreed with the government’s contention that a cellphone is “indistinguishable from other kinds of personal possessions, like a cigarette package, wallet, pager or address book, that fall within the search incident to arrest exception” approved by the Supreme Court.

Stahl and Lipez endorsed a “bright-line” rule that warrantless cellphone data searches are “categorically unlawful” given the “government’s failure to demonstrate that they are ever necessary to promote officer safety or prevent the destruction of evidence.”

Dissenting Judge Jeffrey R. Howard said his colleagues had no need to make such a broad ruling. “The constitutionality of a search cannot turn solely on whether the information is written in ink or displayed electronically,” he wrote.

The decision creates a split among courts that have examined the issue. The Florida Supreme Court, for instance, has ruled that police generally may not search an arrestee’s cellphone data, and some states have taken action legislatively.

But more importantly for the Supreme Court, every other federal appeals court that has looked at the issue is at odds with the 1st Circuit’s decision in U.S. v. Wurie.

When the government asked for an enbanc review of the panel’s ruling, 1st Circuit Chief Judge Sandra Lynch said there would not be much point in that.

“I think the preferable course is to speed this case to the Supreme Court,” she wrote. Only the justices can settle the “confusing and often contradictory guidance to law enforcement” supplied by lower courts.

Once they’ve taken care of that, the justices might want to decide whether the government needs a warrant to obtain cellphone location data from telecommunications carriers. A panel of the U.S. Court of Appeals for the 5th Circuit in New Orleans ruled last month that a warrant was unneeded.

That contrasts with a unanimous decision from the New Jersey Supreme Court, based on the state constitution, that it is required. Other federal appeals courts are reviewing similar cases.

Tracking a person’s whereabouts via a cellphone and searching it for information after an arrest raise different Fourth Amendment questions. But the justices know that a rapidly changing technology landscape complicates their work.

In a case last year concerning GPS tracking of a suspect, Justice Sonia Sotomayor worried about a digital age “in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks.”

Justice Samuel A. Alito Jr. said “dramatic technological change may lead to periods in which popular expectations are in flux and may ultimately produce significant changes in popular attitudes.”

In his Houston speech, Roberts said the coming decisions will test how “prescient” the framers were in developing a document that can deal with a world they could not have foreseen.

Roberts likes to be self-deprecating in public appearances, so he added that maybe he worried too much. “Maybe it’s just the fact that technology is outpacing me rather than the Constitution,” he said.


Bradley Manning’s mother: My son is ‘Superman’

Your right Susan Manning you son is Superman, in addition to being a freedom fighter and patriot. The government's claim that he is a traitor and a terrorist is rubbish.

Source

Bradley Manning’s mother: My son is ‘Superman’

Associated Press Sun Aug 4, 2013 10:00 AM

LONDON — In a rare interview, the British mother of U.S. soldier Bradley Manning has urged her son not to give up hope, even as he faces up to 136 years in prison for disclosing hundreds of thousands of secret U.S. documents.

In comments published by the Mail on Sunday, Susan Manning said he should know she considered him her “Superman.”

“Never give up hope, son,” she was quoted as saying. “I know I may never see you again, but I know you will be free one day. I pray it is soon.”

Susan Manning, a 59-year-old from Wales, had not given an interview in years.

She is divorced from her son’s father, Brian, and the Mail said she suffered from unspecified health problems. Manning’s parents have largely stayed out of the spotlight since transparency group WikiLeaks began publishing the documents leaked to it by the 25-year-old Army private.

The soldier was convicted last month on a slew of charges, including Espionage Act violations, but was acquitted of the most serious charge, aiding the enemy. Sentencing hearings in his case are expected to resume Monday.


More articles Freedom Fighter Edward Snowden

Check out some previous articles on Freedom Fighter Edward Snowden.

More articles on Freedom Fighter Edward Snowden.

 
Homeless in Arizona

stinking title