What's new
Fantasy Football - Footballguys Forums

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Verizon required to give ALL call data to NSA (1 Viewer)

We've been over this a million times haven't we? Do we need anyone else to state the obvious. With the way technology has advanced in the last decade, this sort of approach is pointless/useless on top of being an invasion of our privacy.
Agree with all of that,just posting another study that confirmed our beliefs.

With that said,I have zero doubts what Obama comes out with in the next few days will do very little to curtail these programs.

 
Question to everyone else....does anyone really think Snowden would believe our government if they go through the charade of granting him amnesty??
I have no idea how paranoid he is. But he should believe it, if indeed its offered.
I love how The Commish asked a question specifically to you, and then posted another question to everyone else, and you in turn answer the question to everyone else and ignore the question asked specifically to you. :lmao:
SSDD. I predict that he'll say it was offensive or some such and he ignored it. As to the question to everyone else, I'm sorta surprised at the responses. If I were him, knowing what he knows, I'd have to believe there is about a 0.00000000000000001% chance that I'd believe them ESPECIALLY after all the traitor, treason, spy :hophead: when he first left.
I wouldn't either. But I also don't think his request is about him returning to live here. As long as our governent does not forgive him, he is at risk where ever he is living in the world. To me it's a "I'll shut up if you leave me alone from now on" move. Just based on what he has revealed so far, I'm questioning if I want to continue living here myself.

 
Question to everyone else....does anyone really think Snowden would believe our government if they go through the charade of granting him amnesty??
I have no idea how paranoid he is. But he should believe it, if indeed its offered.
I love how The Commish asked a question specifically to you, and then posted another question to everyone else, and you in turn answer the question to everyone else and ignore the question asked specifically to you. :lmao:
SSDD. I predict that he'll say it was offensive or some such and he ignored it. As to the question to everyone else, I'm sorta surprised at the responses. If I were him, knowing what he knows, I'd have to believe there is about a 0.00000000000000001% chance that I'd believe them ESPECIALLY after all the traitor, treason, spy :hophead: when he first left.
I wouldn't either. But I also don't think his request is about him returning to live here. As long as our governent does not forgive him, he is at risk where ever he is living in the world. To me it's a "I'll shut up if you leave me alone from now on" move. Just based on what he has revealed so far, I'm questioning if I want to continue living here myself.
Not a chance in hell I'd step foot back in this country, ever.

 
Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.

The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama’s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later.

The decision to provide additional privacy protections for non-American citizens or residents, for instance, largely codifies existing practices but will be followed by a 180-day study by the director of national intelligence about whether to go further. Likewise, instead of taking the storage of bulk data out of government hands, as recommended by a review panel he appointed, Mr. Obama will leave it in place for now and ask lawmakers to weigh in.
:lmao:

 
Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.

The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama’s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later.

The decision to provide additional privacy protections for non-American citizens or residents, for instance, largely codifies existing practices but will be followed by a 180-day study by the director of national intelligence about whether to go further. Likewise, instead of taking the storage of bulk data out of government hands, as recommended by a review panel he appointed, Mr. Obama will leave it in place for now and ask lawmakers to weigh in.
:lmao:
I understand why you are laughing. But I've seen too much of this to laugh at it anymore.

 
Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.

The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama’s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later.

The decision to provide additional privacy protections for non-American citizens or residents, for instance, largely codifies existing practices but will be followed by a 180-day study by the director of national intelligence about whether to go further. Likewise, instead of taking the storage of bulk data out of government hands, as recommended by a review panel he appointed, Mr. Obama will leave it in place for now and ask lawmakers to weigh in.
:lmao:
I understand why you are laughing. But I've seen too much of this to laugh at it anymore.
Agreed...there is a handful of "special" people who believe any of this anymore. It's pathetic.

 
Obama's NSA Reforms Are Going to Tick Off Everyone
The intelligence community won't like what Obama's doing. Neither will reform groups and tech companies.

—By Dana Liebelson

| Thu Jan. 16, 2014 6:32 AM GMT
On Friday, President Barack Obama is expected to unveil changes to the National Security Agency's sweeping surveillance programs. The announcement comes weeks after a post-Snowden advisory panel appointed by the president issued a whopping 300-plus pages of pro-transparency recommendations that, if taken up, would radically alter how the NSA does business. But according to early reports, Obama will only be implementing small reforms. He will punt the bigger decisions to Congress—with the hope of partially appeasing lawmakers, voters, privacy advocates, and the national security community. From the looks of it, pretty much everyone is going to be mad at him.

If Obama Lets the NSA Continue Sweeping Up Vast Information on Americans' Phone Calls...

Right now, the NSA collects Americans' phone metadata in bulk. (Metadata, which includes call dates and phone numbers, is revealing, but it doesn't include the contents of the actual conversations.) For privacy advocates, ceasing the practice is a top priority. "Ending bulk collection is essential to effective reform," says Greg Nojeim, senior counsel at the Center for Democracy & Technology​ Center. "I can’t imagine anyone who’s concerned about these programs is going to be satisfied by a bunch of cosmetic tweaks that leave bulk collection in place," adds Julian Sanchez, a research fellow at the libertarian Cato Institute. The conservative activist group FreedomWorks will also be mad if Obama doesn't repeal bulk surveillance. "The NSA’s unconstitutional surveillance must be stopped to safeguard our civil liberties," the group writes. Julie Borowski, policy analyst for FreedomWorks, said in a press call on Thursday that the group supports the USA Freedom Act, which would end bulk collection of phone data.

Obama's advisory panel recommended the government accede to privacy activists' demands and terminate the NSA's expansive collection and storage of phone metadata. The panel proposed that a party other than the government, such as a phone company, hold on to Americans' phone records, and it suggested that the NSA should have to seek a court order to access that data. (The NSA currently doesn't need a judge's permission each time it dips into this data.) But civil liberties advocates should prepare to be disappointed. The New York Times reported that Obama will not end this bulk collection of phone metadata. Nor is Obama likely to accept the panel's recommendation that phone companies become the guardians of this trove of data. It appears he will leave the big decisions regarding phone metadata to a polarized Congress, which is currently fighting over two bills. One introduced by Sen. Patrick Leahy (D-Vt.) and Rep. James Sensenbrenner Jr. (R-Wis.) would end bulk collection, and another, from Sen. Dianne Feinstein (D-Calif.), would codify the practice.

If Obama Imposes Modest Limits on the NSA's Telephone Metadata Collection Program...

  • Who Gets Mad? The NSA, Feinstein, and other members of Congress
The NSA will be happy if, as expected, Obama okays its continued collection of bulk phone metadata. However, he may well make some modest changes to this program, according to the New York Times, such as cutting back the number of people whose phone records the NSA can look at and limiting the time the NSA can hold on to the records. Even such slight reforms will upset folks in the intelligence community. According to the Times, "Some [intelligence] officials complained that [Obama's] changes will add layers of cumbersome procedure that will hinder the hunt for potential terrorists." Some members of Congress also oppose modest limits to the NSA's collection powers.

If Obama Allows the NSA to Continue Hacking Internet Encryption...

  • Who Gets Mad? Tech geeks, Lavabit, Google engineers, and journalists
The NSA will be delighted if Obama eschews his panel's recommendation that the agency cease undermining the encryption and security of tech companies, as leaked documents have revealed. It's not clear yet what Obama Administration will do regarding this recommendation. But if doesn't restrain the NSA on this front, tech geeks everywhere will be angry. When the news broke in October that the NSA had hacked into Google, a security engineer for the company wrote, "#### these guys." (Google and other tech companies have since bulked up their encryption to keep out the NSA.) Many journalists and lawyers also rely on the promise of secure encryption to do their jobs. They're hoping that the president sides with civil libertarians and members of the tech industry who want to make sure that the NSA does not have the authority to defeat all forms of encryption.

If Obama Reforms the Top-Secret Spy Court...

  • Who Gets Mad? The top-secret spy court and the NSA
Some judges will no doubt be outraged if Obama makes any changes to the Foreign Intelligence Surveillance Act Court, the top-secret spy court that approves or denies many of the government's surveillance requests. Obama is expected to appoint a privacy advocate to advise the court on civil liberties issues. But on January 13, US district Judge John Bates, the former presiding judge of the FISA court, wrote in a public letter that "a privacy advocate is unnecessary." Bates also decried the presidential panel's recommendation that the government require judicial approval for all National Security Letters—secret requests the FBI and other government agencies use to force businesses to hand over records. According to Bates, subjecting these requests to the FISA court's scrutiny would be a "detriment to [the court's] current responsibilities." (If the FISA court emerges untouched by Obama's reforms, privacy advocates will be irate.)

Obama faces a tricky challenge. He clearly believes some NSA reform is necessary, yet, for good or bad, he doesn't want to alienate the intelligence community. This might lead him to a position that does not produce sufficient change to allay the concerns of techies, civil libertarians, and Americans who worry the surveillance state has gone too far—but still manages to tick off the intelligence officials he counts on to defend the nation; and the national security hawks on and off Capitol Hill who are always ready to assail the president. Obama has often talked about the need to balance national security and civil liberties. His effort to deal with the Snowden-prompted NSA scandal shows how tough a political task that is for him.

http://www.motherjones.com/politics/2014/01/obama-nsa-reforms-spying-telephone-mad-privacy
 
Last edited by a moderator:
The Commish said:
Politician Spock said:
Slapdash said:
Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.

The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama’s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later.

The decision to provide additional privacy protections for non-American citizens or residents, for instance, largely codifies existing practices but will be followed by a 180-day study by the director of national intelligence about whether to go further. Likewise, instead of taking the storage of bulk data out of government hands, as recommended by a review panel he appointed, Mr. Obama will leave it in place for now and ask lawmakers to weigh in.
:lmao:
I understand why you are laughing. But I've seen too much of this to laugh at it anymore.
Agreed...there is a handful of "special" people who believe any of this anymore. It's pathetic.
There is much more than a handful that buy into this.

 
The Commish said:
Politician Spock said:
Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.

The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama’s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later.

The decision to provide additional privacy protections for non-American citizens or residents, for instance, largely codifies existing practices but will be followed by a 180-day study by the director of national intelligence about whether to go further. Likewise, instead of taking the storage of bulk data out of government hands, as recommended by a review panel he appointed, Mr. Obama will leave it in place for now and ask lawmakers to weigh in.
:lmao:
I understand why you are laughing. But I've seen too much of this to laugh at it anymore.
Agreed...there is a handful of "special" people who believe any of this anymore. It's pathetic.
There is much more than a handful that buy into this.
Exactly. Seems like a career ending move for many to not buy into this.

 
Some tidbits so far from Obama

Trying to tamp down concerns over U.S. surveillance powers, President Obama announced Friday he would end the National Security Agency’s ability to store phone data collected from millions of Americans.

The president will also require intelligence agencies to obtain approval from a FISA court – a secret U.S. court that governs surveillance of terrorist and foreign espionage targets - before accessing the records.

While the president did not say the program would end, he did say the information collected would no longer be held by the NSA. He did not offer his own plan for where the phone records should be moved and will instead call on the attorney general and members of the intelligence community to recommend a transfer point by March 28 – which is when the collection program comes up for reauthorization.

As part of his directive, the president also announced tighter restrictions on spying on international leaders.

He also said the government could no longer request data beyond two people from the terrorist target.

He also said that ‘dozens’ of foreign leaders would be safe from NSA surveillance techniques but did not offer that protection to their advisors.

Obama also said the U.S. doesn't indiscriminately snoop on people who pose no threat and doesn't use NSA records as a tool to suppress dissent or provide advantage for certain U.S. companies.
 
Obama and the N.S.A.: Why He Can’t Be TrustedPosted by John Cassidy

Courtesy of reports in the Times and elsewhere, we already pretty much know what restrictions on the surveillance state President Obama is going to announce in a speech planned for Friday: very few. Far from taking the National Security Agency to task for the flagrant breaches of individual privacy that Edward Snowden has revealed, Obama is set to reject some of the main recommendations contained in a report by his own Review Group on Intelligence and Communications Technologies, which was itself hardly a radical document.

The news reports say that Obama has rejected the Review Group’s main recommendation, which was to end the N.S.A.’s bulk collection of metadata, such as the phone records of hundreds of millions of Americans. The panel, which issued a long report in December, said the N.S.A. should continue to have access to these records under the auspices of the secretive Foreign Intelligence Surveillance Court, but it said that the data should be held by the phone companies, or by a third party. Having thrown out this suggestion, Obama is set to leave the current system in place and hand its ultimate fate over to Congress, which is tantamount to doing nothing.

Assuming the reports are right, Obama won’t dismantle a single N.S.A. program, not even those that have been involved in spying on the leaders of America’s allies and hacking into the databases of companies like Google and Facebook without any court approval. He won’t end the practice by which the N.S.A and other government agencies, such as the Federal Bureau of Investigation, can obtain access to Americans’ data records simply by issuing a so-called National Security Letter, which doesn’t require the rubber stamp of the FISA court.

“If the speech is anything like what is being reported,” Anthony D. Romero, the executive director of the American Civil Liberties Union, told the Times, “the President will go down in history for having retained and defended George W. Bush’s surveillance programs rather than reformed them.” Evidently, the President’s only concessions to privacy concerns will be the establishment of a public advocate in the FISA court, the introduction of new rules modestly restricting the number of metadata records that the N.S.A. can look at, and the recognition that overseas citizens have some limited privacy rights.

It is frequently reported that Obama, a former lecturer in constitutional law, has been shocked to learn that so many Americans don’t trust him on this issue. A front-page piece in today’s Times, by Peter Baker, repeats this suggestion, quoting his advisers. But isn’t the public’s skepticism perfectly justified? Having run for President in 2008 as a strident critic of the Bush Administration’s intelligence ambitions, and not hesitating to label some of its domestic spying programs illegal, the President has emerged as the most prominent enabler and defender of the current system.

Opinion polls show that almost two-thirds of Americans don’t like the federal government collecting data about online communications and Internet-browsing histories. The President says it’s necessary to protect the national interest. Technology companies express outrage about the N.S.A. breaking into their data centers and collecting information at will. The President does nothing to stop it. Civil-liberties advocates say that, at the very least, intelligence and law-enforcement agencies should have to seek court approval before they can order telephone and Internet companies to hand over personal information. Obama, according to the Times, has “decided not to require court approval in every case, but might still require it in some cases.”

In his speech on Friday, the President will probably follow his usual tack and seek to portray himself as a reasonable man hewing to the middle ground between opposing views. In this instance, though, such a depiction doesn’t withstand inspection.

Justice Sonia Sotomayor, whom Obama appointed to the Supreme Court, is a moderate. She has questioned the official line that phone and Internet logs, as business records, aren’t covered by the Fourth Amendment right to privacy. In a 2012 case, she wrote, “I would ask whether people reasonably expect that their movements will be recorded and aggregated in a manner that enables the Government to ascertain, more or less at will, their political and religious beliefs, sexual habits, and so on.” Patrick Leahy, the Democratic Senator from Vermont, is a moderate. He has co-sponsored a bill that would end the N.S.A.’s bulk collection of metadata. Anne-Marie Slaughter, the former director of policy planning at the State Department, is a moderate. She has called Snowden a “whistle-blower.”

It would be a bit of a stretch to describe all five members of the president’s Review Group as moderates on this issue: one of them, Michael J. Morell, is a former acting director of the C.I.A. I noted last month, when the Review Group’s report was published, that it didn’t go far enough in many areas, such as restricting the N.S.A.’s hacking, and preventing it from spying on aid agencies and other harmless international groups. But it did confront the central issue of whether the government should routinely requisition the personal communications records of virtually every American. And it acknowledged the obvious: “some of the authorities that were expanded or created in the aftermath of September 11th unduly sacrifice fundamental interests in individual liberty, personal privacy, and democratic governance.”

Obama used to make this argument all the time. But when Snowden presented him with the chance to do something about it, he didn’t do very much. Why not? One possibility is that he was always more sympathetic to the Bush Administration’s policies than he let on, and he was just using the civil-liberties argument to gee up his liberal base. Perhaps, as Baker suggests, sitting in the Oval Office and having access to daily intelligence reports changed his views. Or maybe he fears being second-guessed if he makes substantial reforms and there’s another terrorist attack.

The second and third explanations sound the most plausible. In this area, as in others, the President is adopting a safety-first attitude. From his perspective, that’s understandable. Some, though not I, would say it’s justifiable. But please, let’s not hear any more about how we can trust him to protect our privacy.

http://www.newyorker.com/online/blogs/johncassidy/2014/01/obama-and-the-nsa-why-he-cant-be-trusted.html
 
Entire speech

At the dawn of our Republic, a small, secret surveillance committee borne out of the “The Sons of Liberty” was established in Boston. The group’s members included Paul Revere, and at night they would patrol the streets, reporting back any signs that the British were preparing raids against America’s early Patriots.

Throughout American history, intelligence has helped secure our country and our freedoms. In the Civil War, Union balloon reconnaissance tracked the size of Confederate armies by counting the number of camp fires. In World War II, code-breaking gave us insight into Japanese war plans, and when Patton marched across Europe, intercepted communications helped save the lives of his troops. After the war, the rise of the Iron Curtain and nuclear weapons only increased the need for sustained intelligence-gathering. And so, in the early days of the Cold War, President Truman created the National Security Agency to give us insight into the Soviet bloc, and provide our leaders with information they needed to confront aggression and avert catastrophe.

Throughout this evolution, we benefited from both our Constitution and traditions of limited government. U.S. intelligence agencies were anchored in our system of checks and balances – with oversight from elected leaders, and protections for ordinary citizens. Meanwhile, totalitarian states like East Germany offered a cautionary tale of what could happen when vast, unchecked surveillance turned citizens into informers, and persecuted people for what they said in the privacy of their own homes.

In fact even the United States proved not to be immune to the abuse of surveillance. In the 1960s, government spied on civil rights leaders and critics of the Vietnam War. Partly in response to these revelations, additional laws were established in the 1970s to ensure that our intelligence capabilities could not be misused against our citizens. In the long, twilight struggle against Communism, we had been reminded that the very liberties that we sought to preserve could not be sacrificed at the altar of national security.

If the fall of the Soviet Union left America without a competing superpower, emerging threats from terrorist groups, and the proliferation of weapons of mass destruction placed new – and, in some ways more complicated – demands on our intelligence agencies. Globalization and the Internet made these threats more acute, as technology erased borders and empowered individuals to project great violence, as well as great good. Moreover, these new threats raised new legal and policy questions. For while few doubted the legitimacy of spying on hostile states, our framework of laws was not fully adapted to prevent terrorist attacks by individuals acting on their own, or acting in small, ideologically driven groups rather than on behalf of a foreign power.

The horror of September 11th brought these issues to the fore. Across the political spectrum, Americans recognized that we had to adapt to a world in which a bomb could be built in a basement, and our electric grid could be shut down by operators an ocean away. We were shaken by the signs we had missed leading up to the attacks – how the hijackers had made phone calls to known extremists, and travelled to suspicious places. So we demanded that our intelligence community improve its capabilities, and that law enforcement change practices to focus more on preventing attacks before they happen than prosecuting terrorists after an attack.

It is hard to overstate the transformation America’s intelligence community had to go through after 9/11. Our agencies suddenly needed to do far more than the traditional mission of monitoring hostile powers and gathering information for policymakers – instead, they were asked to identify and target plotters in some of the most remote parts of the world, and to anticipate the actions of networks that, by their very nature, cannot be easily penetrated with spies or informants.

And it is a testimony to the hard work and dedication of the men and women in our intelligence community that over the past decade, we made enormous strides in fulfilling this mission. Today, new capabilities allow intelligence agencies to track who a terrorist is in contact with, and follow the trail of his travel or funding. New laws allow information to be collected and shared more quickly between federal agencies, and state and local law enforcement. Relationships with foreign intelligence services have expanded, and our capacity to repel cyber-attacks has been strengthened. Taken together, these efforts have prevented multiple attacks and saved innocent lives – not just here in the United States, but around the globe as well.

And yet, in our rush to respond to very real and novel threats, the risks of government overreach – the possibility that we lose some of our core liberties in pursuit of security – became more pronounced. We saw, in the immediate aftermath of 9/11, our government engaged in enhanced interrogation techniques that contradicted our values. As a Senator, I was critical of several practices, such as warrantless wiretaps. And all too often new authorities were instituted without adequate public debate.

Through a combination of action by the courts, increased congressional oversight, and adjustments by the previous Administration, some of the worst excesses that emerged after 9/11 were curbed by the time I took office. But a variety of factors have continued to complicate America’s efforts to both defend our nation and uphold our civil liberties.

First, the same technological advances that allow U.S. intelligence agencies to pin-point an al Qaeda cell in Yemen or an email between two terrorists in the Sahel, also mean that many routine communications around the world are within our reach. At a time when more and more of our lives are digital, that prospect is disquieting for all of us.

Second, the combination of increased digital information and powerful supercomputers offers intelligence agencies the possibility of sifting through massive amounts of bulk data to identify patterns or pursue leads that may thwart impending threats. But the government collection and storage of such bulk data also creates a potential for abuse.
Third, the legal safeguards that restrict surveillance against U.S. persons without a warrant do not apply to foreign persons overseas. This is not unique to America; few, if any, spy agencies around the world constrain their activities beyond their own borders. And the whole point of intelligence is to obtain information that is not publicly available. But America’s capabilities are unique. And the power of new technologies means that there are fewer and fewer technical constraints on what we can do. That places a special obligation on us to ask tough questions about what we should do.

Finally, intelligence agencies cannot function without secrecy, which makes their work less subject to public debate. Yet there is an inevitable bias not only within the intelligence community, but among all who are responsible for national security, to collect more information about the world, not less. So in the absence of institutional requirements for regular debate – and oversight that is public, as well as private – the danger of government overreach becomes more acute. This is particularly true when surveillance technology and our reliance on digital information is evolving much faster than our laws.

For all these reasons, I maintained a healthy skepticism toward our surveillance programs after I became President. I ordered that our programs be reviewed by my national security team and our lawyers, and in some cases I ordered changes in how we did business. We increased oversight and auditing, including new structures aimed at compliance. Improved rules were proposed by the government and approved by the Foreign Intelligence Surveillance Court. And we sought to keep Congress continually updated on these activities.

What I did not do is stop these programs wholesale – not only because I felt that they made us more secure; but also because nothing in that initial review, and nothing that I have learned since, indicated that our intelligence community has sought to violate the law or is cavalier about the civil liberties of their fellow citizens.

To the contrary, in an extraordinarily difficult job, one in which actions are second-guessed, success is unreported, and failure can be catastrophic, the men and women of the intelligence community, including the NSA, consistently follow protocols designed to protect the privacy of ordinary people. They are not abusing authorities in order to listen to your private phone calls, or read your emails. When mistakes are made – which is inevitable in any large and complicated human enterprise – they correct those mistakes. Laboring in obscurity, often unable to discuss their work even with family and friends, they know that if another 9/11 or massive cyber-attack occurs, they will be asked, by Congress and the media, why they failed to connect the dots. What sustains those who work at NSA through all these pressures is the knowledge that their professionalism and dedication play a central role in the defense of our nation.


To say that our intelligence community follows the law, and is staffed by patriots, is not to suggest that I, or others in my Administration, felt complacent about the potential impact of these programs. Those of us who hold office in America have a responsibility to our Constitution, and while I was confident in the integrity of those in our intelligence community, it was clear to me in observing our intelligence operations on a regular basis that changes in our technological capabilities were raising new questions about the privacy safeguards currently in place. Moreover, after an extended review of our use of drones in the fight against terrorist networks, I believed a fresh examination of our surveillance programs was a necessary next step in our effort to get off the open ended war-footing that we have maintained since 9/11. For these reasons, I indicated in a speech at the National Defense University last May that we needed a more robust public discussion about the balance between security and liberty. What I did not know at the time is that within weeks of my speech, an avalanche of unauthorized disclosures would spark controversies at home and abroad that have continued to this day.

Given the fact of an open investigation, I’m not going to dwell on Mr. Snowden’s actions or motivations. I will say that our nation’s defense depends in part on the fidelity of those entrusted with our nation’s secrets. If any individual who objects to government policy can take it in their own hands to publicly disclose classified information, then we will never be able to keep our people safe, or conduct foreign policy. Moreover, the sensational way in which these disclosures have come out has often shed more heat than light, while revealing methods to our adversaries that could impact our operations in ways that we may not fully understand for years to come.

Regardless of how we got here, though, the task before us now is greater than simply repairing the damage done to our operations; or preventing more disclosures from taking place in the future. Instead, we have to make some important decisions about how to protect ourselves and sustain our leadership in the world, while upholding the civil liberties and privacy protections that our ideals – and our Constitution – require. We need to do so not only because it is right, but because the challenges posed by threats like terrorism, proliferation, and cyber-attacks are not going away any time soon, and for our intelligence community to be effective over the long haul, we must maintain the trust of the American people, and people around the world.

This effort will not be completed overnight, and given the pace of technological change, we shouldn’t expect this to be the last time America has this debate. But I want the American people to know that the work has begun. Over the last six months, I created an outside Review Group on Intelligence and Communications Technologies to make recommendations for reform. I’ve consulted with the Privacy and Civil Liberties Oversight Board. I’ve listened to foreign partners, privacy advocates, and industry leaders. My Administration has spent countless hours considering how to approach intelligence in this era of diffuse threats and technological revolution. And before outlining specific changes that I have ordered, let me make a few broad observations that have emerged from this process.

First, everyone who has looked at these problems, including skeptics of existing programs, recognizes that we have real enemies and threats, and that intelligence serves a vital role in confronting them. We cannot prevent terrorist attacks or cyber-threats without some capability to penetrate digital communications – whether it’s to unravel a terrorist plot; to intercept malware that targets a stock exchange; to make sure air traffic control systems are not compromised; or to ensure that hackers do not empty your bank accounts.

Moreover, we cannot unilaterally disarm our intelligence agencies. There is a reason why blackberries and I-Phones are not allowed in the White House Situation Room. We know that the intelligence services of other countries – including some who feign surprise over the Snowden disclosures – are constantly probing our government and private sector networks, and accelerating programs to listen to our conversations, intercept our emails, or compromise our systems. Meanwhile, a number of countries, including some who have loudly criticized the NSA, privately acknowledge that America has special responsibilities as the world’s only superpower; that our intelligence capabilities are critical to meeting these responsibilities; and that they themselves have relied on the information we obtain to protect their own people.

Second, just as ardent civil libertarians recognize the need for robust intelligence capabilities, those with responsibilities for our national security readily acknowledge the potential for abuse as intelligence capabilities advance, and more and more private information is digitized. After all, the folks at NSA and other intelligence agencies are our neighbors and our friends. They have electronic bank and medical records like everyone else. They have kids on Facebook and Instagram, and they know, more than most of us, the vulnerabilities to privacy that exist in a world where transactions are recorded; emails and text messages are stored; and even our movements can be tracked through the GPS on our phones.

Third, there was a recognition by all who participated in these reviews that the challenges to our privacy do not come from government alone. Corporations of all shapes and sizes track what you buy, store and analyze our data, and use it for commercial purposes; that’s how those targeted ads pop up on your computer or smartphone. But all of us understand that the standards for government surveillance must be higher. Given the unique power of the state, it is not enough for leaders to say: trust us, we won’t abuse the data we collect. For history has too many examples when that trust has been breached. Our system of government is built on the premise that our liberty cannot depend on the good intentions of those in power; it depends upon the law to constrain those in power.

I make these observations to underscore that the basic values of most Americans when it comes to questions of surveillance and privacy converge far more than the crude characterizations that have emerged over the last several months. Those who are troubled by our existing programs are not interested in a repeat of 9/11, and those who defend these programs are not dismissive of civil liberties. The challenge is getting the details right, and that’s not simple. Indeed, during the course of our review, I have often reminded myself that I would not be where I am today were it not for the courage of dissidents, like Dr. King, who were spied on by their own government; as a President who looks at intelligence every morning, I also can’t help but be reminded that America must be vigilant in the face of threats.

Fortunately, by focusing on facts and specifics rather than speculation and hypotheticals, this review process has given me – and hopefully the American people – some clear direction for change. And today, I can announce a series of concrete and substantial reforms that my Administration intends to adopt administratively or will seek to codify with Congress.

First, I have approved a new presidential directive for our signals intelligence activities, at home and abroad. This guidance will strengthen executive branch oversight of our intelligence activities. It will ensure that we take into account our security requirements, but also our alliances; our trade and investment relationships, including the concerns of America’s companies; and our commitment to privacy and basic liberties. And we will review decisions about intelligence priorities and sensitive targets on an annual basis, so that our actions are regularly scrutinized by my senior national security team.



Second, we will reform programs and procedures in place to provide greater transparency to our surveillance activities, and fortify the safeguards that protect the privacy of U.S. persons. Since we began this review, including information being released today, we have declassified over 40 opinions and orders of the Foreign Intelligence Surveillance Court, which provides judicial review of some of our most sensitive intelligence activities – including the Section 702 program targeting foreign individuals overseas and the Section 215 telephone metadata program. Going forward, I am directing the Director of National Intelligence, in consultation with the Attorney General, to annually review – for the purpose of declassification – any future opinions of the Court with broad privacy implications, and to report to me and Congress on these efforts. To ensure that the Court hears a broader range of privacy perspectives, I am calling on Congress to authorize the establishment of a panel of advocates from outside government to provide an independent voice in significant cases before the Foreign Intelligence Surveillance Court.



Third, we will provide additional protections for activities conducted under Section 702, which allows the government to intercept the communications of foreign targets overseas who have information that’s important for our national security. Specifically, I am asking the Attorney General and DNI to institute reforms that place additional restrictions on government’s ability to retain, search, and use in criminal cases, communications between Americans and foreign citizens incidentally collected under Section 702.



Fourth, in investigating threats, the FBI also relies on National Security Letters, which can require companies to provide specific and limited information to the government without disclosing the orders to the subject of the investigation. These are cases in which it is important that the subject of the investigation, such as a possible terrorist or spy, isn’t tipped off. But we can – and should – be more transparent in how government uses this authority. I have therefore directed the Attorney General to amend how we use National Security Letters so this secrecy will not be indefinite, and will terminate within a fixed time unless the government demonstrates a real need for further secrecy. We will also enable communications providers to make public more information than ever before about the orders they have received to provide data to the government.

This brings me to program that has generated the most controversy these past few months – the bulk collection of telephone records under Section 215. Let me repeat what I said when this story first broke – this program does not involve the content of phone calls, or the names of people making calls. Instead, it provides a record of phone numbers and the times and lengths of calls – meta-data that can be queried if and when we have a reasonable suspicion that a particular number is linked to a terrorist organization.

Why is this necessary? The program grew out of a desire to address a gap identified after 9/11. One of the 9/11 hijackers – Khalid al-Mihdhar – made a phone call from San Diego to a known al Qaeda safe-house in Yemen. NSA saw that call, but could not see that it was coming from an individual already in the United States. The telephone metadata program under Section 215 was designed to map the communications of terrorists, so we can see who they may be in contact with as quickly as possible. This capability could also prove valuable in a crisis. For example, if a bomb goes off in one of our cities and law enforcement is racing to determine whether a network is poised to conduct additional attacks, time is of the essence. Being able to quickly review telephone connections to assess whether a network exists is critical to that effort.

In sum, the program does not involve the NSA examining the phone records of ordinary Americans. Rather, it consolidates these records into a database that the government can query if it has a specific lead – phone records that the companies already retain for business purposes. The Review Group turned up no indication that this database has been intentionally abused. And I believe it is important that the capability that this program is designed to meet is preserved.

Having said that, I believe critics are right to point out that without proper safeguards, this type of program could be used to yield more information about our private lives, and open the door to more intrusive, bulk collection programs. They also rightly point out that although the telephone bulk collection program was subject to oversight by the Foreign Intelligence Surveillance Court and has been reauthorized repeatedly by Congress, it has never been subject to vigorous public debate.

For all these reasons, I believe we need a new approach. I am therefore ordering a transition that will end the Section 215 bulk metadata program as it currently exists, and establish a mechanism that preserves the capabilities we need without the government holding this bulk meta-data.

This will not be simple. The Review Group recommended that our current approach be replaced by one in which the providers or a third party retain the bulk records, with the government accessing information as needed. Both of these options pose difficult problems. Relying solely on the records of multiple providers, for example, could require companies to alter their procedures in ways that raise new privacy concerns. On the other hand, any third party maintaining a single, consolidated data-base would be carrying out what is essentially a government function with more expense, more legal ambiguity, and a doubtful impact on public confidence that their privacy is being protected.

During the review process, some suggested that we may also be able to preserve the capabilities we need through a combination of existing authorities, better information sharing, and recent technological advances. But more work needs to be done to determine exactly how this system might work.

Because of the challenges involved, I’ve ordered that the transition away from the existing program will proceed in two steps. Effective immediately, we will only pursue phone calls that are two steps removed from a number associated with a terrorist organization instead of three. And I have directed the Attorney General to work with the Foreign Intelligence Surveillance Court so that during this transition period, the database can be queried only after a judicial finding, or in a true emergency.

Next, I have instructed the intelligence community and Attorney General to use this transition period to develop options for a new approach that can match the capabilities and fill the gaps that the Section 215 program was designed to address without the government holding this meta-data. They will report back to me with options for alternative approaches before the program comes up for reauthorization on March 28. During this period, I will consult with the relevant committees in Congress to seek their views, and then seek congressional authorization for the new program as needed.

The reforms I’m proposing today should give the American people greater confidence that their rights are being protected, even as our intelligence and law enforcement agencies maintain the tools they need to keep us safe. I recognize that there are additional issues that require further debate. For example, some who participated in our review, as well as some in Congress, would like to see more sweeping reforms to the use of National Security Letters, so that we have to go to a judge before issuing these requests. Here, I have concerns that we should not set a standard for terrorism investigations that is higher than those involved in investigating an ordinary crime. But I agree that greater oversight on the use of these letters may be appropriate, and am prepared to work with Congress on this issue. There are also those who would like to see different changes to the FISA court than the ones I have proposed. On all of these issues, I am open to working with Congress to ensure that we build a broad consensus for how to move forward, and am confident that we can shape an approach that meets our security needs while upholding the civil liberties of every American.

Let me now turn to the separate set of concerns that have been raised overseas, and focus on America’s approach to intelligence collection abroad. As I’ve indicated, the United States has unique responsibilities when it comes to intelligence collection. Our capabilities help protect not only our own nation, but our friends and allies as well. Our efforts will only be effective if ordinary citizens in other countries have confidence that the United States respects their privacy too. And the leaders of our close friends and allies deserve to know that if I want to learn what they think about an issue, I will pick up the phone and call them, rather than turning to surveillance. In other words, just as we balance security and privacy at home, our global leadership demands that we balance our security requirements against our need to maintain trust and cooperation among people and leaders around the world.

For that reason, the new presidential directive that I have issued today will clearly prescribe what we do, and do not do, when it comes to our overseas surveillance. To begin with, the directive makes clear that the United States only uses signals intelligence for legitimate national security purposes, and not for the purpose of indiscriminately reviewing the emails or phone calls of ordinary people. I have also made it clear that the United States does not collect intelligence to suppress criticism or dissent, nor do we collect intelligence to disadvantage people on the basis of their ethnicity, race, gender, sexual orientation, or religious beliefs. And we do not collect intelligence to provide a competitive advantage to U.S. companies, or U.S. commercial sectors.

In terms of our bulk collection of signals intelligence, U.S. intelligence agencies will only use such data to meet specific security requirements: counter-intelligence; counter-terrorism; counter-proliferation; cyber-security; force protection for our troops and allies; and combating transnational crime, including sanctions evasion. Moreover, I have directed that we take the unprecedented step of extending certain protections that we have for the American people to people overseas. I have directed the DNI, in consultation with the Attorney General, to develop these safeguards, which will limit the duration that we can hold personal information, while also restricting the use of this information.

The bottom line is that people around the world – regardless of their nationality – should know that the United States is not spying on ordinary people who don’t threaten our national security, and that we take their privacy concerns into account. This applies to foreign leaders as well. Given the understandable attention that this issue has received, I have made clear to the intelligence community that – unless there is a compelling national security purpose – we will not monitor the communications of heads of state and government of our close friends and allies. And I’ve instructed my national security team, as well as the intelligence community, to work with foreign counterparts to deepen our coordination and cooperation in ways that rebuild trust going forward.



Now let me be clear: our intelligence agencies will continue to gather information about the intentions of governments – as opposed to ordinary citizens – around the world, in the same way that the intelligence services of every other nation does. We will not apologize simply because our services may be more effective. But heads of state and government with whom we work closely, and on whose cooperation we depend, should feel confident that we are treating them as real partners. The changes I’ve ordered do just that.

Finally, to make sure that we follow through on these reforms, I am making some important changes to how our government is organized. The State Department will designate a senior officer to coordinate our diplomacy on issues related to technology and signals intelligence. We will appoint a senior official at the White House to implement the new privacy safeguards that I have announced today. I will devote the resources to centralize and improve the process we use to handle foreign requests for legal assistance, keeping our high standards for privacy while helping foreign partners fight crime and terrorism.

I have also asked my Counselor, John Podesta, to lead a comprehensive review of big data and privacy. This group will consist of government officials who—along with the President’s Council of Advisors on Science and Technology—will reach out to privacy experts, technologists and business leaders, and look at how the challenges inherent in big data are being confronted by both the public and private sectors; whether we can forge international norms on how to manage this data; and how we can continue to promote the free flow of information in ways that are consistent with both privacy and security.

For ultimately, what’s at stake in this debate goes far beyond a few months of headlines, or passing tensions in our foreign policy. When you cut through the noise, what’s really at stake is how we remain true to who we are in a world that is remaking itself at dizzying speed. Whether it’s the ability of individuals to communicate ideas; to access information that would have once filled every great library in every country in the world; or to forge bonds with people on other sides of the globe, technology is remaking what is possible for individuals, for institutions, and for the international order. So while the reforms that I have announced will point us in a new direction, I am mindful that more work will be needed in the future.

One thing I’m certain of: this debate will make us stronger. And I also know that in this time of change, the United States of America will have to lead. It may seem sometimes that America is being held to a different standard, and the readiness of some to assume the worst motives by our government can be frustrating. No one expects China to have an open debate about their surveillance programs, or Russia to take the privacy concerns of citizens into account. But let us remember that we are held to a different standard precisely because we have been at the forefront in defending personal privacy and human dignity.

As the nation that developed the Internet, the world expects us to ensure that the digital revolution works as a tool for individual empowerment rather than government control. Having faced down the totalitarian dangers of fascism and communism, the world expects us to stand up for the principle that every person has the right to think and write and form relationships freely – because individual freedom is the wellspring of human progress.

Those values make us who we are. And because of the strength of our own democracy, we should not shy away from high expectations. For more than two centuries, our Constitution has weathered every type of change because we have been willing to defend it, and because we have been willing to question the actions that have been taken in its defense. Today is no different. Together, let us chart a way forward that secures the life of our nation, while preserving the liberties that make our nation worth fighting for. Thank you.

http://www.weeklystandard.com/blogs/text-obamas-nsa-speech_774814.html?page=1
 
Last edited by a moderator:
The Commish said:
Politician Spock said:
Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.

The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama’s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later.

The decision to provide additional privacy protections for non-American citizens or residents, for instance, largely codifies existing practices but will be followed by a 180-day study by the director of national intelligence about whether to go further. Likewise, instead of taking the storage of bulk data out of government hands, as recommended by a review panel he appointed, Mr. Obama will leave it in place for now and ask lawmakers to weigh in.
:lmao:
I understand why you are laughing. But I've seen too much of this to laugh at it anymore.
Agreed...there is a handful of "special" people who believe any of this anymore. It's pathetic.
There is much more than a handful that buy into this.
I have pretty big hands?? :oldunsure:

 
Best quotes so far regarding his speech.

"It's like putting lipstick on a pig"

"If you like your privacy,you can keep your privacy"

 
Not sure if anyone caught MTP this morning but it was a classic.

Intelligence chair: NSA leaker Edward Snowden may have had Russian help
Russia may have helped the former National Security Agency contractor Edward Snowden to reveal details of surveillance programmes and escape US authorities last year, the chairman of the House intelligence committee claimed on Sunday.

Mike Rogers, a Republican representative from Michigan, interviewed by NBC’s Meet the Press, said Snowden was “a thief whom we believe had some help”, and added that there was an “ongoing” investigation into whether Russia had aided Snowden.

“I believe there's questions to be answered there,” Rogers said. “I don't think it was a gee-whiz luck event that he ended up in Moscow under the handling of the [Russian intelligence service] FSB.”

Rogers added: “Let me just say this. I believe there’s a reason he ended up in the hands, the loving arms, of an FSB agent in Moscow. I don’t think that’s a coincidence.

“We have questions that we have to answer but as someone who used to do investigations some of [the] things we are finding we would call clues that certainly would indicate to me that he had some help and he stole things that had nothing to do with privacy,” said Rogers.

The Democratic chair of the Senate intelligence committee, Dianne Feinstein, a staunch defender of the NSA’s programmes, also spoke to Meet the Press. She said Snowden had joined the NSA “with the intent to take as much material down as he possibly could”.

Asked if he was aided by the Russians, Feinstein said: “He may well have. We don’t know at this stage. But I think to glorify this act is to set a new level of dishonour.”

Rogers' comments were backed by Michael McCaul, chairman of the House committee on homeland security. Speaking from Moscow, the Texas Republican told ABC’s This Week: “I believe he [snowden] was cultivated by a foreign power to do what he did.”

McCaul said he could not “definitively” say it was Russia that helped Snowden. “Hey, listen, I don't think … Mr Snowden woke up one day and had the wherewithal to do this all by himself. I think he was helped by others. Again, I can't give a definitive statement on that … but I've been given all the evidence, I know Mike Rogers has access to, you know, that I've seen that I don't think he was acting alone.”

Snowden was granted temporary asylum in Russia last August, after travelling to Moscow from Hong Kong. Last year, in an interview with the New York Times, Snowden said he did not take any of the documents he obtained to Russia, “because it wouldn’t serve the public interest”.

Snowden said there was “zero-percent chance” that Russia had received any documents and that he had handed all his NSA data to journalists from media outlets including the Guardian, before leaving Hong Kong. “What would be the unique value of personally carrying another copy of the materials onward?” he said.

Snowden has consistently denied any involvement with foreign spying agencies and said he leaked the documents because he believed the NSA programmes were against the best interests of the US people.

“I don't want to live in a society that does these sort of things,” he told the Guardian last year.

Rogers did not give any supporting evidence for his claims, but suggested Snowden “used methods beyond his technical capabilities" and had help with his travel arrangements.

“He was stealing information that had to do with how we operate overseas to collect information to keep Americans safe … and some of the things he did were beyond his technical capabilities,” Rogers said.

Rogers' comments came after President Barack Obama outlined possible reforms to surveillance practices and a review of the NSA’s programmes on Friday. The speech met with a mixed reaction from privacy advocates and tech and telecoms companies, all of whom said there was too little detail and little clarity on how or if the system was being reformed.

Some Democrats have also been critical. Senator Patrick Leahy, chairman of the Senate judiciary committee, told Fox News Sunday that further checks and balances were needed. “There’s a concern that we have gone too much into Americans’ privacy,” he said. “There’s still going to be legislation on this.”'

Rogers was also critical of Obama. Also on Sunday, he told CNN’s State of the Union that Friday’s speech had created more uncertainty in the intelligence community and was potentially dangerous.

“We really did need a decision on Friday and what we got was lots of uncertainty,” he said. “And just in my conversations over the weekend with intelligence officials, that level of uncertainty is already having a bit of an impact on our ability to protect Americans by finding terrorists trying to reach into the United States.”

He added: “I just don’t think we want to go to pre-9/11 just because we haven’t had an attack.”

http://www.theguardian.com/world/2014/jan/19/edward-snowden-nsa-mike-rogers-russia
 
Last edited by a moderator:


“I believe there's questions to be answered there,” Rogers said. “I don't think it was a gee-whiz luck event that he ended up in Moscow under the handling of the [Russian intelligence service] FSB.”

Well, DUH!

It's also not a gee-whiz luck event that he went through Hong Kong either.

China and Russia are the two most influencial nations in the BRICS alliance, and regardless of what anyone believes regarding the level or degree of risk from the BRICS threat to the Petro Dollar system, and/or the US Dollar's world reserve currency status, it is well within US national interests to spy on everything BRICS is doing, given it is well known that their intent is to dethrone the US dollar from international trade.

 
Snowden Calls Russian-Spy Story “Absurd” in Exclusive InterviewEdward J. Snowden, the former National Security Agency contractor turned whistle-blower, strongly denies allegations made by members of Congress that he was acting as a spy, perhaps for a foreign power, when he took hundreds of thousands of classified U.S. government documents. Speaking from Moscow, where he is a fugitive from American justice, Snowden told The New Yorker, “This ‘Russian spy’ push is absurd.”

On NBC’s “Meet the Press,” Mike Rogers, a Republican congressman from Michigan who is the chairman of the House Intelligence Committee, described Snowden as a “thief, who we believe had some help.” The show’s host, David Gregory, interjected, “You think the Russians helped Ed Snowden?” Rogers replied that he believed it was neither “coincidence” nor “a gee-whiz luck event that he ended up in Moscow under the handling of the F.S.B.”

Snowden, in a rare interview that he conducted by encrypted means from Moscow, denied the allegations outright, stressing that he “clearly and unambiguously acted alone, with no assistance from anyone, much less a government.” He added, “It won’t stick…. Because it’s clearly false, and the American people are smarter than politicians think they are.”

If he were a Russian spy, Snowden asked, “Why Hong Kong?” And why, then, was he “stuck in the airport forever” when he reached Moscow? (He spent forty days in the transit zone of Sheremetyevo International Airport.) “Spies get treated better than that.”

In the nine months since Snowden first surfaced, there has been intense speculation about his motives and methods. But “a senior F.B.I. official said on Sunday that it was still the bureau’s conclusion that Mr. Snowden acted alone,” the New York Times reported this weekend, adding that the agency has not publicly revealed any evidence that he was working in conjunction with any foreign intelligence agency or government. The issue is key to shaping the public’s perceptions of Snowden. Representative Rogers, on “Meet the Press,” went on to allege that “some of the things he did were beyond his technical capabilities. Raises more questions. How he arranged travel before he left. How he was ready to go—he had a ‘go bag,’ if you will.” Gregory then asked Senator Dianne Feinstein, a Democrat from California who chairs the Senate Intelligence Committee, and who was also a guest on the show, whether she agreed that Snowden may have had help from the Russians. She did not dismiss the notion. “He may well have,” she said. “We don’t know at this stage.” On CBS’s “Face the Nation,” Rogers made similar allegations, saying, “This wasn’t a random smash and grab, run down the road, end up in China, the bastion of Internet freedom, and then Russia, of course, the bastion of Internet freedom.”

Asked today to elaborate on his reasons for alleging that Snowden “had help,” Rogers, through a press aide, declined to comment.

An aide to Feinstein, meanwhile, stressed that she did no more than ask questions. “Senator Feinstein said, ‘We don’t know at this stage.’ In light of the comments from Chairman Rogers, it is reasonable for Senator Feinstein to say that we should find out.”

Some observers, looking at the possibility that Snowden was in league with the Russian government before taking asylum there, have pointed to a report in a Russian newspaper, Kommersant, that before leaving Hong Kong last June Snowden stayed at the Russian Consulate. Snowden’s legal adviser, Ben Wizner, a lawyer with the American Civil Liberties Union, denied that report, however, saying, “Every news organization in the world has been trying to confirm that story. They haven’t been able to, because it’s false.”

Snowden told me that having a go bag packed—something that Rogers described as highly suspicious—reflected his work deployed overseas for the C.I.A. He’d had “a go bag packed since 2007. It’s not an exotic practice for people who have lived undercover on government orders,” Snowden said.

“It’s not the smears that mystify me,” Snowden told me. “It’s that outlets report statements that the speakers themselves admit are sheer speculation.” Snowden went on to poke fun at the range of allegations that have been made against him in the media without intelligence officials providing some kind of factual basis: “ ‘We don’t know if he had help from aliens.’ ‘You know, I have serious questions about whether he really exists.’ ”

Snowden went on, “It’s just amazing that these massive media institutions don’t have any sort of editorial position on this. I mean, these are pretty serious allegations, you know?” He continued, “The media has a major role to play in American society, and they’re really abdicating their responsibility to hold power to account.”

Asked about this, George Stephanopoulos, the host of ABC’s “This Week,” defended the coverage. Stephanopoulos pointed out that when the congressman Michael McCaul, a Texas Republican and the chairman of the House Homeland Security Committee, alleged that Snowden was “cultivated by a foreign power” and “helped by others,” Stephanopoulos pressed him for details, twice. “I did two follow-ups,” Stephanopoulos said, “and got as much as the congressman was going to give up.”

From Moscow, Snowden explained that “Russia was never intended” to be his place of asylum, but he “was stopped en route.” He said, “I was only transiting through Russia. I was ticketed for onward travel via Havana—a planeload of reporters documented the seat I was supposed to be in—but the State Department decided they wanted me in Moscow, and cancelled my passport.”

As for why he remains there, he said, “When we were talking about possibilities for asylum in Latin America, the United States forced down the Bolivian President’s plane.” If he could travel without U.S. interference, “I would of course do so.”

Snowden was adamant that he wants to help, not hurt, the United States. “Due to extraordinary planning involved, in nine months no one has credibly shown any harm to national security” from the revelations, he said, “nor any ill intent.” Moreover, he pointed out that “the President himself admitted both that changes are necessary and that he is certain the debate my actions started will make us stronger.”

“If any individual who objects to government policy can take it into their own hands to publicly disclose classified information, then we will not be able to keep our people safe, or conduct foreign policy,” Obama said on Friday. “Moreover, the sensational way in which these disclosures have come out has often shed more heat than light, while revealing methods to our adversaries that could impact our operations in ways that we may not fully understand for years to come.” And Obama told David Remnick, in an interview for The New Yorker, that the leaks “put people at risk” and that, in his view, the benefit of the debate Snowden generated “was not worth the damage done, because there was another way of doing it.”

In the end, Snowden said that he “knew what he was getting into” when he became a whistle-blower. “At least the American public has a seat at the table now,” he said. “It may sound trite,” but if “I end up disgraced in a ditch somewhere, but it helps the country, it will still be worth it.”

http://www.newyorker.com/online/blogs/newsdesk/2014/01/snowden-calls-russian-spy-story-absurd.html
 
I may have to move to Tennessee.

From: http://benswann.com/breaking-tennessee-files-historic-legislation-throws-nsa-facility-out-of-state/

BREAKING: Tennessee files historic legislation; Takes aim at state’s NSA facility 12 hours ago | Politics, US | Posted by Michael Lotfi

  • January 22, 2014

NASHVILLE, January 22, 2014– As eight states have introduced legislation to keep the NSA out of their borders, Tennessee’s newly introduced legislation packs the strongest punch yet.

The bill is known as the “Tennessee Fourth Amendment Protection Act”. State Senator Stacey Campfield ® and State Representative Andy Holt ® are the Senate and House sponsors. The bill was drafted and lobbied for by the Tenth Amendment Center, a national think-tank, which seeks to impede unconstitutional federal laws, regulations and entities on the state level.

“We have an out of control federal agency spying on pretty much everybody in the world. I don’t think the state of Tennessee should be helping the NSA violate the Constitution and the basic privacy rights of its citizens – and we don’t have to,” Campfield said. “This bill may not stop the NSA, but it will darn sure stop Tennessee from participating in unjustified and illegal activities.”

Campfield’s comments hold strong warrant. The NSA has been operating directly underneath the nose of many Tennesseans without them ever knowing. A long-standing secretive NSA computing facility calls Oak Ridge, Tennessee home. According to NSA researcher James Bamford, the NSA runs most data it gathers “from code breaking to word captures,” through computers at it’s facility in Oak Ridge.

The Tennessee Fourth Amendment Protection Act (Senate Bill 1849) will impede the NSA by “refusing material support, participation, or assistance, to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize the collection of electronic data or metadata of any person pursuant to any action not based on a warrant that particularly describes the person, place and thing to be searched and seized.

From a practical standpoint, the legislation covers four major areas.

• Prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. Includes barring government-owned utilities from providing water and electricity.

• Makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court.

• Blocks public universities from serving as NSA research facilities or recruiting grounds.

• Disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.

Tenth Amendment Center national communications director Mike Maharrey provided the following statement:

“When Sen. Ward in Arizona announced a few weeks back that she planned to introduce the Fourth Amendment Protection Act, it was a novelty. People had this attitude like, ‘Oh, that’s cute. But it will never amount to anything.’ Today Tennessee makes the eighth state considering action to refuse cooperation with the NSA, including two states with physical facilities within their borders. And mark my words – more are coming. Big ones,” said Maharrey.

“James Madison said several states refusing to cooperate with officers of the union would create obstructions the federal government would not be willing to encounter. As more states get involved in this campaign, it it will create obstructions. This is not symbolic. We intend to make the NSA stop violating the Constitution.”

The Multiprogram Research Facility (MRF) sits discreetly on the East Campus of the Oak Ridge National Laboratory. Inside this top secret facility, NSA researchers work to build High Productivity Computers. The goal: make machines fast enough to crack encryption.

Numerous sources report the MRF will work in tandem with the data storage center in Bluffdale, Utah. The super-fast computers in Oak Ridge could conceivably break the encryption on reams of data stored in Utah, making its contents accessible to the NSA. This includes data of Americans vacuumed up by the spy agency.

A partnership between the University of Tennessee and Battelle runs the Oak Ridge National Laboratory. UT-Battelle’s contract ends in 2015, but the DOE has already declared its intent and started the process to extend it. That process will take some time and the proposed legislation could stop it.

Many possible co-sponsors of the Act have come forward to show their interest including State Rep. Courtney Rodgers ®, Rep. Tilman Goins ® and Rep. Jeremy Fasion ®.

State Rep. Joe Carr ® signed on as a co-sponsor to the Act this morning. Carr is Tea Party candidate currently running a campaign to unseat US Senator Lamar Alexander ®.
 
I don't think Tennesee has the right to disobey the federal government here anymore than they had the right to disobey desegregation. I suspect this law is for show and will be shot down in the courts.

 
I don't think Tennesee has the right to disobey the federal government here anymore than they had the right to disobey desegregation. I suspect this law is for show and will be shot down in the courts.
Is there federal law that says a state has to cooperate with the NSA? The more interesting thing to me is how many GOPers are stepping up...national security not one of their goals any longer??

 
Last edited by a moderator:
I don't think Tennesee has the right to disobey the federal government here anymore than they had the right to disobey desegregation. I suspect this law is for show and will be shot down in the courts.
Is there federal law that says a state has to cooperate with the NSA? The more interesting thing to me is how many GOPers are heading this up...national security not one of their goals any longer??
Agreed, what the heck is going on. Libertarians aligning with progressives, cats and dogs, what next.

You would also think we could all say there should be a benefit to having a liberal in office it's that your civil liberties are secure. But no not really. OTOH in that case conservatives would probably be going nuts that Obama was capitulating to the terrorists.

 
I don't think Tennesee has the right to disobey the federal government here anymore than they had the right to disobey desegregation. I suspect this law is for show and will be shot down in the courts.
Is there federal law that says a state has to cooperate with the NSA?
I don't know. I bet there is though- just like the FBI, the EPA, wtc.
you'll have to explain how this isn't apples and oranges (I assume when you're talking about the FBI, you're talking about the ranking orders, jurisdictions etc when it comes to crime)

 
Independent Congressional Board has now reported that the bulk collection done by the NSA is not only illegal and should stop, but that it has been totally worthless as well.

http://arstechnica.com/tech-policy/2014/01/surveillance-watchdog-concludes-metadata-program-is-illegal-should-end/
Was trying to tell Timmy that the data is worthless after just a few days and there was no real reason to keep the data if it was actually being used for the things the NSA was claiming, but shockingly...he didn't buy it.

 
I'm sure all of this is being done to keep us safe, and none of this will be abused in any way by any level of government, either officially or unofficially. I know this because government told me so.

 
Snowden did an interview for a German reporter a few days ago and here is the video of it that is rather interesting.About 30 minutes long but worth your time and also of note you won't find this on youtube anywhere because they have been deleting them as soon as they go up.

http://vimeo.com/85155619

 
Five surveillance myths stalling NSA reform, debunked


The Day We Fight Back deserves truth amidst the administration’s half-truths and trolling. From thwarted attacks (zero) to President Obama’s new rules (not good enough), this is what you need to know to make real reform happen


As you cruise the internet, check Facebook or shoot out a few tweets today, you might notice something strange: a massive digital protest aimed at stopping the NSA surveillance machine. Over 6,000 organizations, companies and websites have pledged their support to roll back the surveillance state by inundating members of Congress with calls, emails, tweets and Facebook posts in support of the USA Freedom Act, a bill with nearly 150 bipartisan cosponsors that would end the bulk collection of Americans’ sensitive records. Today is The Day We Fight Back.

But to fight back effectively, Americans need to know where the facts stand right now, more than eight months since the Edward Snowden leaks began.

Within minutes after the Guardian published that first leak on the NSA’s activities, pro-surveillance forces starting making bold claims about how necessary broad spying is to our very security. And almost every justification for indiscriminate spying on Americans and people abroad has been methodically refuted ever since. It turns out that assertions made by the administration, members of Congress and security commentators were little more than myths. So enough with the misleading statements and half-truths designed to distort reality. Here’s a quick rundown and rebuttal of the surveillance falsehoods that still need refuting to this day.

Myth No 1: NSA surveillance programs have thwarted terror attacks here at home.

At early congressional hearings, administration representatives insisted that spying programs, including the now infamous collection of phone records in bulk, had stopped 54 terror incidents. As members pushed for more detail, the administration said around 10 of those were based in the US. Weeks later, the number shrank to four - and then ultimately a single case in Southern California, where a San Diego cab driver was convicted of sending $8,500 to a Somali terrorist group.

In fact, there were no attacks in America thwarted by domestic spying. This led both the independent Privacy and Civil Liberties Oversight Board and the president’s hand-picked Surveillance Review Group to find that the phone records program added no unique value to the many surveillance programs already underway.

Myth No 2: NSA data-crunching programs only work if you collect all information on everyone.

Pro-surveillance advocates immediately took up this banner once it was reported that essentially all phone calls in the US were collected under provisions of the Patriot Act. Of course, this argument fell apart once no cases could be found supporting the need for bulk collection. The claim was also dealt a serious blow by the conclusion of the Privacy and Civil Liberties Oversight Board that bulk collection has not provided the NSA any information that it could not have acquired using targeted surveillance.

The Washington Post and Wall Street Journal are now reporting that the collection rate of phone records is somewhere between 20 and 30% and is largely targeted at landlines. If this is true, the “collect-it-all” argument has no leg to stand on.

Myth No 3: All relevant decision-makers were briefed on the programs and approved them.

Some members of Congress were briefed on the telephone record program, but by and large they were not. In fact, the House Intelligence Committee is still denying members of the House access to information about NSA surveillance to this very day.

The rest of the newly revealed programs - such as a decade-long program to track email communications, overseas hacking and broad searches of internet records - have not been addressed by the administration in any detail. Most members of Congress are unaware of how these and even broader programs affect people here and abroad.

Myth No 4: There’s simply no other less-intrusive way to achieve the same ends.

It’s not clear what the “ends” are since they don’t seem to be tied to actually stopping terrorist attacks. But if the NSA’s goal is to collect phone and other records to advance investigations, the government has many tools already at its disposal that operate with some sort of specificity or suspicion, including emergency authorities that allow them to seize records and follow process later if life or limb is at risk. Both the Privacy and Civil Liberties Oversight Board and the president’s Review Group confirmed this in their respective reports.

Myth No 5: President Obama’s changes sufficiently address the privacy violations revealed in the last eight months.

The president’s apparent decision to stop the NSA from amassing Americans’ phone records without suspicion is a good first step but addresses only the tip of the iceberg. Notably absent from the president’s recent speech on surveillance was a commitment to end other forms of bulk collection. Congress needs to finish the job by rewriting the laws to ensure that no records or communications can be collected in a mass, suspicion-free fashion and that the government’s tools be targeted only at those suspected of wrongdoing.

Moreover, Congress needs to address the significant way in which international and foreign surveillance affects the rights of not just US citizens and residents, but of foreigners, whose right to privacy the president recently recognized. Part of the solution will undoubtedly involve clarifying and adding appropriate limitations on vague surveillance laws and executive orders.

Now that you know where the truth stands, the administration and its supporters are left only with claims that trolling through our data provides “peace of mind” and that someday in the future these massive databases will somehow thwart a terrorist attack. Those are inadequate justifications for widespread spying on everyday people, particularly in a democracy. That’s why the ACLU and over 6,000 other organizations, companies and websites are taking action. Today we tell our members of Congress that the time has come to take our privacy back and rein in the NSA by passing the USA Freedom Act.

Join us, and tell Congress that indiscriminate mass surveillance is un-American.

http://www.theguardian.com/commentisfree/2014/feb/11/surveillance-myths-nsa-reform-freedom-act
 
Last edited by a moderator:
NSA Weighs Retaining Data for Suits Rule That Evidence Can't Be Destroyed Would Lead to Expansion of Controversial Phone Program
WASHINGTON—The government is considering enlarging the National Security Agency's controversial collection of Americans' phone records—an unintended consequence of lawsuits seeking to stop the surveillance program, according to officials.

A number of government lawyers involved in lawsuits over the NSA phone-records program believe federal-court rules on preserving evidence related to lawsuits require the agency to stop routinely destroying older phone records, according to people familiar with the discussions. As a result, the government would expand the database beyond its original intent, at least while the lawsuits are active.

No final decision has been made to preserve the data, officials said, and one official said that even if a decision is made to retain the information, it would be held only for the purpose of litigation and not be subject to searches. The government currently collects phone records on millions of Americans in a vast database that it can mine for links to terror suspects. The database includes records of who called whom, when they called and for how long.

President Barack Obama has ordered senior officials to end the government storage of such data and find another place to store the records—possibly with the phone companies who log the calls. Under the goals outlined by Mr. Obama last month, the government would still be able to search the call logs with a court order, but would no longer possess and control them.

National Security Agency Director Keith Alexander has said the program, if it had existed in 2001, would have uncovered the Sept. 11 plot. Critics of the program, including the American Civil Liberties Union and the Electronic Frontier Foundation, have sued the government, saying the program violates the Constitution's Fourth Amendment protections against unreasonable searches.

Patrick Toomey, an ACLU lawyer, said no one in the government has raised with his group the possibility the lawsuits may actually expand the database they call unconstitutional. "It's difficult to understand why the government would consider taking this position, when the relief we've requested in the lawsuit is a purge of our data,'' he said.

Cindy Cohn, legal director at the Electronic Frontier Foundation, which also is suing over the program, said the government should save the phone records, as long as they aren't still searchable under the program. "If they're destroying evidence, that would be a crime," she said.

Ms. Cohn also questioned why the government was only now considering this move, even though the EFF filed a lawsuit over NSA data collection in 2008.

In that case, a judge ordered evidence preserved related to claims brought by AT&T Inc. T +0.09% customers. What the government is considering now is far broader.

"I think they're looking for any way to throw rocks at the litigation," added Ms. Cohn. "To the extent this is a serious concern, we should have had this discussion in 2008."

Another person who has filed a class-action suit over the program is Sen. Rand Paul (R., Ky.). Mr. Paul's lawyer, former Virginia Attorney General Ken Cuccinelli, called the approach under consideration "just silly.'' He said he was sure his clients would be happy to agree to the destruction of their phone records held by the government, without demanding those records in pretrial discovery.

Federal courts have ruled that defendants in lawsuits cannot destroy relevant evidence that could be useful to the other side. Generally, those involved in lawsuits are expected to preserve records, including electronic records, that could reasonably be considered relevant or likely to be requested as part of pretrial discovery.

As the NSA program currently works, the database holds about five years of data, according to officials and some declassified court opinions. About twice a year, any call record more than five years old is purged from the system, officials said.

A particular concern, according to one official, is that the older records may give certain parties legal standing to pursue their cases, and that deleting the data could erase evidence that the phone records of those individuals or groups were swept up in the data dragnet.

The phone records program is overseen by the Foreign Intelligence Surveillance Court, and any move to keep data past the five-year period may require the blessing of that court.

If the records are retained, they may remain in government computers for some time, because it could take years to resolve the spate of litigation over the programs. A federal judge in New York has ruled the program is legal, while a Washington, D.C., judge has ruled it almost certainly isn't. There are several other pending cases, and other lawsuits could yet be filed.

Government retention of old records has long been a major concern for civil-liberties groups. The ACLU, in particular, has argued the longer the government holds data about citizens, the deeper investigators can delve into the private lives of individuals, and errors or abuses become more likely.

http://online.wsj.com/news/articles/SB10001424052702303636404579393413176249186
 
Yahoo webcam images from millions of users intercepted by GCHQ

Thursday 27 February 2014 11.16 EST

Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.

GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.

In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.

Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy".

GCHQ does not have the technical means to make sure no images of UK or US citizens are collected and stored by the system, and there are no restrictions under UK law to prevent Americans' images being accessed by British analysts without an individual warrant.

The documents also chronicle GCHQ's sustained struggle to keep the large store of sexually explicit imagery collected by Optic Nerve away from the eyes of its staff, though there is little discussion about the privacy implications of storing this material in the first place.

NSA ragout 4

Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.

The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs.

Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.

One document even likened the program's "bulk access to Yahoo webcam images/events" to a massive digital police mugbook of previously arrested individuals.

"Face detection has the potential to aid selection of useful images for 'mugshots' or even for face recognition by assessing the angle of the face," it reads. "The best images are ones where the person is facing the camera with their face upright."

The agency did make efforts to limit analysts' ability to see webcam images, restricting bulk searches to metadata only.

However, analysts were shown the faces of people with similar usernames to surveillance targets, potentially dragging in large numbers of innocent people. One document tells agency staff they were allowed to display "webcam images associated with similar Yahoo identifiers to your known target".

Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.

Bulk surveillance on Yahoo users was begun, the documents said, because "Yahoo webcam is known to be used by GCHQ targets".

NSA ragout 3

Programs like Optic Nerve, which collect information in bulk from largely anonymous user IDs, are unable to filter out information from UK or US citizens. Unlike the NSA, GCHQ is not required by UK law to "minimize", or remove, domestic citizens' information from its databases. However, additional legal authorisations are required before analysts can search for the data of individuals likely to be in the British Isles at the time of the search.

There are no such legal safeguards for searches on people believed to be in the US or the other allied "Five Eyes" nations – Australia, New Zealand and Canada.

GCHQ insists all of its activities are necessary, proportionate, and in accordance with UK law.

The documents also show that GCHQ trialled automatic searches based on facial recognition technology, for people resembling existing GCHQ targets: "f you search for similar IDs to your target, you will be able to request automatic comparison of the face in the similar IDs to those in your target's ID".

The undated document, from GCHQ's internal wiki information site, noted this capability was "now closed … but shortly to return!"

The privacy risks of mass collection from video sources have long been known to the NSA and GCHQ, as a research document from the mid-2000s noted: "One of the greatest hindrances to exploiting video data is the fact that the vast majority of videos received have no intelligence value whatsoever, such as pornography, commercials, movie clips and family home movies."

Sexually explicit webcam material proved to be a particular problem for GCHQ, as one document delicately put it: "Unfortunately … it would appear that a surprising number of people use webcam conversations to show intimate parts of their body to the other person. Also, the fact that the Yahoo software allows more than one person to view a webcam stream without necessarily sending a reciprocal stream means that it appears sometimes to be used for broadcasting pornography."

The document estimates that between 3% and 11% of the Yahoo webcam imagery harvested by GCHQ contains "undesirable nudity". Discussing efforts to make the interface "safer to use", it noted that current "naïve" pornography detectors assessed the amount of flesh in any given shot, and so attracted lots of false positives by incorrectly tagging shots of people's faces as pornography.

NSA ragout 1

GCHQ did not make any specific attempts to prevent the collection or storage of explicit images, the documents suggest, but did eventually compromise by excluding images in which software had not detected any faces from search results – a bid to prevent many of the lewd shots being seen by analysts.

The system was not perfect at stopping those images reaching the eyes of GCHQ staff, though. An internal guide cautioned prospective Optic Nerve users that "there is no perfect ability to censor material which may be offensive. Users who may feel uncomfortable about such material are advised not to open them".

It further notes that "under GCHQ's offensive material policy, the dissemination of offensive material is a disciplinary offence".

NSA ragout 2

Once collected, the metadata associated with the videos can be as valuable to the intelligence agencies as the images themselves.

It is not fully clear from the documents how much access the NSA has to the Yahoo webcam trove itself, though all of the policy documents were available to NSA analysts through their routine information-sharing. A previously revealed NSA metadata repository, codenamed Marina, has what the documents describe as a protocol class for webcam information.

In its statement to the Guardian, Yahoo strongly condemned the Optic Nerve program, and said it had no awareness of or involvement with the GCHQ collection.

"We were not aware of, nor would we condone, this reported activity," said a spokeswoman. "This report, if true, represents a whole new level of violation of our users' privacy that is completely unacceptable, and we strongly call on the world's governments to reform surveillance law consistent with the principles we outlined in December.

"We are committed to preserving our users' trust and security and continue our efforts to expand encryption across all of our services."

Yahoo has been one of the most outspoken technology companies objecting to the NSA's bulk surveillance. It filed a transparency lawsuit with the secret US surveillance court to disclose a 2007 case in which it was compelled to provide customer data to the surveillance agency, and it railed against the NSA's reported interception of information in transit between its data centers.

The documents do not refer to any specific court orders permitting collection of Yahoo's webcam imagery, but GCHQ mass collection is governed by the UK's Regulation of Investigatory Powers Act, and requires certification by the foreign secretary, currently William Hague.

The Optic Nerve documentation shows legalities were being considered as new capabilities were being developed. Discussing adding automated facial matching, for example, analysts agreed to test a system before firming up its legal status for everyday use.

"It was agreed that the legalities of such a capability would be considered once it had been developed, but that the general principle applied would be that if the accuracy of the algorithm was such that it was useful to the analyst (ie, the number of spurious results was low, then it was likely to be proportionate)," the 2008 document reads.

The document continues: "This is allowed for research purposes but at the point where the results are shown to analysts for operational use, the proportionality and legality questions must be more carefully considered."

Optic Nerve was just one of a series of GCHQ efforts at biometric detection, whether for target recognition or general security.

While the documents do not detail efforts as widescale as those against Yahoo users, one presentation discusses with interest the potential and capabilities of the Xbox 360's Kinect camera, saying it generated "fairly normal webcam traffic" and was being evaluated as part of a wider program.

Documents previously revealed in the Guardian showed the NSA were exploring the video capabilities of game consoles for surveillance purposes.

Microsoft, the maker of Xbox, faced a privacy backlash last year when details emerged that the camera bundled with its new console, the Xbox One, would be always-on by default.

Beyond webcams and consoles, GCHQ and the NSA looked at building more detailed and accurate facial recognition tools, such as iris recognition cameras – "think Tom Cruise in Minority Report", one presentation noted.

The same presentation talks about the strange means the agencies used to try and test such systems, including whether they could be tricked. One way of testing this was to use contact lenses on detailed mannequins.

To this end, GCHQ has a dummy nicknamed "the Head", one document noted.

In a statement, a GCHQ spokesman said: "It is a longstanding policy that we do not comment on intelligence matters.

"Furthermore, all of GCHQ's work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the secretary of state, the interception and intelligence services commissioners and the Parliamentary Intelligence and Security Committee.

"All our operational processes rigorously support this position."

The NSA declined to respond to specific queries about its access to the Optic Nerve system, the presence of US citizens' data in such systems, or whether the NSA has similar bulk-collection programs.

However, NSA spokeswoman Vanee Vines said the agency did not ask foreign partners such as GCHQ to collect intelligence the agency could not legally collect itself.

"As we've said before, the National Security Agency does not ask its foreign partners to undertake any intelligence activity that the US government would be legally prohibited from undertaking itself," she said.

"The NSA works with a number of partners in meeting its foreign intelligence mission goals, and those operations comply with US law and with the applicable laws under which those partners operate.

"A key part of the protections that apply to both US persons and citizens of other countries is the mandate that information be in support of a valid foreign intelligence requirement, and comply with US Attorney General-approved procedures to protect privacy rights. Those procedures govern the acquisition, use, and retention of information about US persons."
http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo

Big brother is always watching

 

Users who are viewing this thread

Back
Top