Homeless in Arizona

Edward Snowden NSA Freedom Fighter???

 

Sacrifice a politician????

 
No, the Gods didn't ask for the sacrifice of a politician, it just seemed like a really good idea
No, the Gods didn't ask for the sacrifice of a politician, it just seemed like a really good idea
 


NSA paying U.S. companies for access to communications networks

Cold hard cash is an easy way go get around the 4th Amendment????

NSA didn't hack into your personal ATT phone account, ATT voluntarily gave NSA all the data they have on you!!! Well after NSA gave them some cold hard cash!!!

Source

NSA paying U.S. companies for access to communications networks

By Craig Timberg and Barton Gellman, Published: August 29

The National Security Agency is paying hundreds of millions of dollars a year to U.S. companies for clandestine access to their communications networks, filtering vast traffic flows for foreign targets in a process that also sweeps in large volumes of American telephone calls, e-mails and instant messages.

The bulk of the spending, detailed in a multi-volume intelligence budget obtained by The Washington Post, goes to participants in a Corporate Partner Access Project for major U.S. telecommunications providers. The documents open an important window into surveillance operations on U.S. territory that have been the subject of debate since they were revealed by The Post and Britain’s Guardian newspaper in June.

New details of the corporate-partner project, which falls under the NSA’s Special Source Operations, confirm that the agency taps into “high volume circuit and packet-switched networks,” according to the spending blueprint for fiscal 2013. The program was expected to cost $278 million in the current fiscal year, down nearly one-third from its peak of $394 million in 2011.

Voluntary cooperation from the “backbone” providers of global communications dates to the 1970s under the cover name BLARNEY, according to documents provided by former NSA contractor Edward Snowden. These relationships long predate the PRISM program disclosed in June, under which American technology companies hand over customer data after receiving orders from the Foreign Intelligence Surveillance Court.

In briefing slides, the NSA described BLARNEY and three other corporate projects — OAKSTAR, FAIRVIEW and STORMBREW — under the heading of “passive” or “upstream” collection. They capture data as they move across fiber-optic cables and the gateways that direct global communications traffic.

The documents offer a rare view of a secret surveillance economy in which government officials set financial terms for programs capable of peering into the lives of almost anyone who uses a phone, computer or other device connected to the Internet.

Although the companies are required to comply with lawful surveillance orders, privacy advocates say the multimillion-dollar payments could create a profit motive to offer more than the required assistance.

“It turns surveillance into a revenue stream, and that’s not the way it’s supposed to work,” said Marc Rotenberg, executive director of the Electronic Privacy Information Center, a Washington-based research and advocacy group. “The fact that the government is paying money to telephone companies to turn over information that they are compelled to turn over is very troubling.”

Verizon, AT&T and other major telecommunications companies declined to comment for this article, although several industry officials noted that government surveillance laws explicitly call for companies to receive reasonable reimbursement for their costs.

Previous news reports have made clear that companies frequently seek such payments, but never before has their overall scale been disclosed.

The budget documents do not list individual companies, although they do break down spending among several NSA programs, listed by their code names.

There is no record in the documents obtained by The Post of money set aside to pay technology companies that provide information to the NSA’s PRISM program. That program is the source of 91 percent of the 250 million Internet communications collected through Section 702 of the FISA Amendments Act, which authorizes PRISM and the upstream programs, according to an 2011 opinion and order by the Foreign Intelligence Surveillance Court.

Several of the companies that provide information to PRISM, including Apple, Facebook and Google, say they take no payments from the government when they comply with national security requests. Others say they do take payments in some circumstances. The Guardian reported last week that the NSA had covered “millions of dollars” in costs that some technology companies incurred to comply with government demands for information.

Telecommunications companies generally do charge to comply with surveillance requests, which come from state, local and federal law enforcement officials as well as intelligence agencies.

Former telecommunications executive Paul Kouroupas, a security officer who worked at Global Crossing for 12 years, said that some companies welcome the revenue and enter into contracts in which the government makes higher payments than otherwise available to firms receiving re­imbursement for complying with surveillance orders.

These contractual payments, he said, could cover the cost of buying and installing new equipment, along with a reasonable profit. These voluntary agreements simplify the government’s access to surveillance, he said.

“It certainly lubricates the [surveillance] infrastructure,” Kouroupas said. He declined to say whether Global Crossing, which operated a fiber-optic network spanning several continents and was bought by Level 3 Communications in 2011, had such a contract. A spokesman for Level 3 Communications declined to comment.

In response to questions in 2012 from then-Rep. Edward J. Markey (D-Mass.), who was elected to the Senate in June, several telecommunications companies detailed their prices for surveillance services to law enforcement agencies under individual warrants and subpoenas. AT&T, for example, reported that it charges $325 to activate surveillance of an account and also a daily rate of $5 or $10, depending on the information gathered. For providing the numbers that have accessed cell towers, meanwhile, AT&T charged $75 per tower, the company said in a letter.

No payments have been previously disclosed for mass surveillance access to traffic flowing across a company’s infrastructure.

Lawyer Albert Gidari Jr., a partner at Perkins Coie who represents technology and telecommunications companies, said that surveillance efforts are expensive, requiring teams of attorneys to sift through requests and execute the ones deemed reasonable. Government agencies, meanwhile, sometimes balk at paying the full costs incurred by companies

“They lose a ton of money,” Gidari said. “And yet the government is still unsatisfied with it.”

The budget documents obtained by The Post list $65.96 million for BLARNEY, $94.74 million for FAIRVIEW, $46.04 million for STORMBREW and $9.41 million for OAKSTAR. It is unclear why the total of these four programs amounts to less than the overall budget of $278 million.

Among the possible costs covered by these amounts are “network and circuit leases, equipment hardware and software maintenance, secure network connectivity, and covert site leases,” the documents say. They also list in a separate line item $56.6 million in payments for “Foreign Partner Access,” although it is not clear whether these are for foreign companies, foreign governments or other foreign entities.

Some privacy advocates favor payments to companies when they comply with surveillance efforts because the costs can be a brake on overly broad requests by government officials. Invoices also can provide a paper trail to help expose the extent of spying.

But if the payments are too high, they may persuade companies to go beyond legal requirements in providing information, said Chris Soghoian, a technology expert with the American Civil Liberties Union who has studied government payments related to surveillance requests.

“I’m worried that the checks might grease the wheels a little bit,” he said.


Napolitano wants to create jobs program for cyber cops????

As H. L. Mencken said:
"The whole aim of practical politics is to keep the populace alarmed (and hence clamorous to be led to safety) by menacing it with an endless series of hobgoblins, all of them imaginary."
If you ask me the best way to prevent a cyber attack is to disconnect your computers or your computer network from the internet. Something that isn't very hard to do.

Source

Napolitano urges successor to prepare for cyber attack

By Erin Kelly Gannett Washington Bureau Tue Aug 27, 2013 11:22 AM

WASHINGTON - Outgoing Homeland Security Secretary Janet Napolitano said Tuesday that her successor must act quickly to prepare for a major cyber attack.

"Our country will, at some point, face a major cyber event that will have a serious effect on our lives, our economy, and the everyday functioning of our society," Napolitano warned during her farewell address at the National Press Club.

"While we have built systems, protections and a framework to identify attacks and intrusions, share information with the private sector and across government, and develop plans and capabilities to mitigate the damage, more must be done, and quickly," she said.

Napolitano, who was Arizona's governor before serving as homeland security secretary for the last four and a half years, is leaving to become head of the University of California system.

She said her successor, who has not yet been chosen, also may face more natural disasters. The Department of Homeland Security includes the Federal Emergency Management Agency, which brings aid to communities when there are hurricanes, earthquakes, floods and other major disasters.

"You also will have to prepare for the increasing likelihood of more weather-related events of a more severe nature as a result of climate change, and continue to build the capacity to respond to potential disasters in far flung regions of the country occurring at the same time," Napolitano said in what she called "an open letter" to the next secretary.

She said her replacement will have to continue to lead the massive department through tough fiscal times, including the impact of the automatic budget cuts imposed on federal agencies by Congress.

The department, created a decade ago in the aftermath of the 9/11 terrorist attacks, includes FEMA, the U.S. Coast Guard, the Secret Service, the Transportation Security Administration, U.S. Customs and Border Protection and the Office of Cybersecurity and Communications.

Napolitano said the job is stressful and she advised the next secretary that, "You will need a large bottle of Advil." But she also said the job is one of the most rewarding in Washington.

"What you do here matters to the lives of people all across our great nation, and your decisions affect them in direct, tangible ways," she said. "You make sure their families are safe from terrorist threats, that their local first responders have equipment and training and funding, and that when disaster strikes, people who have lost everything are given food, shelter, and hope."

She credited the department's 240,000 employees with helping her lead the agency through the swine flu pandemic, the Deepwater Horizon Oil Spill, drug cartel violence along the Southwest border, and numerous terrorist plots and threats including the terrorist attack on the Boston Marathon in April.

During Napolitano's tenure, the agency managed 325 federally declared disasters, including Hurricance Sandy, the second-costliest hurricane in U.S. history.

"Looking back over the past four and a half years, I can say that if there is one take-away, one object lesson and core operating principle that I've learned and embraced as secretary, it is this: in a world of evolving threats, the key to our success is the ability to be flexible and agile, and adapt to changing circumstances on the ground -- whether that is across the globe, or here at home," Napolitano said.

Among her unfinished business is immigration reform.

Napolitano touted her department's efforts to strengthen border security and her policy to focus efforts on catching and deporting undocumented immigrants with criminal records. She also defended a controversial program that stopped the deportation of undocumented immigrants brought here as children. That program, the Deferred Action for Childhood Arrivals, gives young immigrants who meet certain criteria a two-year provisional legal status to remain in the United States.

"In just its first year, over half-a-million individuals have requested deferred action, and after a thorough review of each of those cases, including a background check, 430,000 requests have already been approved, allowing these young people to continue to contribute to the country they call home," Napolitano said.

But she said a more permanent solution is needed for them and for all of the estimated 11 million undocumented immigrants living in the United States.

"DACA, of course, is no substitute for comprehensive immigration reform, which is the only way to face the longstanding problems with our immigration system," she said.

Contact Erin Kelly at ekelly@gannett.com


Praise MLK, then bomb Syria

 
President Obama - So let us embrace the nonviolent legacy of Dr. King!!! Thank you and God bless!!! - Next bombing Syria
 


Drug agents secretly getting nearly instant access to AT&T files

F*ck the 4th Amendment against the government searching you, your property, your home and your stuff illegally., it's NULL and void!!!!

According to this article DEA thugs pretty much have access to ALL the phone calls you have made.

Last but not least the "war on terrorism" really never has been used to fight terrorism, but rather as an excuse to flush the Bill of Rights down the toilet in the government's insane and unconstitutional "war on drugs"

Source

Drug agents secretly getting nearly instant access to AT&T files

By Gene Johnson and Eileen Sullivan Associated Press Tue Sep 3, 2013 9:23 AM

SEATTLE — For at least six years, federal drug and other agents have had near-immediate access to billions of phone-call records dating back decades in a collaboration with AT&T that officials have taken pains to keep secret, newly released documents show.

The program, called the Hemisphere Project, is paid for by the U.S. Drug Enforcement Administration and the Office of National Drug Control Policy. It allows investigators armed with subpoenas to quickly mine the company’s vast database to help track down drug traffickers or other suspects who switch cellphones to avoid detection.

Details of the Hemisphere Project come amid a national debate about the federal government’s access to phone records, particularly the bulk collection of phone records for national-security purposes.

Hemisphere, however, takes a different approach from that of the National Security Agency, which maintains a database of call records handed over by phone companies as authorized by the USA Patriot Act.

“Subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations,” Justice Department spokesman Brian Fallon said in an e-mail.

“The records are maintained at all times by the phone company, not the government. This program simply streamlines the process of serving the subpoena to the phone company so law enforcement can quickly keep up with drug dealers when they switch phone numbers to try to avoid detection.”

The Associated Press independently obtained a series of slides detailing Hemisphere. They show the database includes not just records of AT&T customers, but of any call that passes through an AT&T switch.

The federal government pays the salaries of four AT&T employees who work in three federal anti-drug offices around the country to expedite subpoena requests, an Obama administration official told the AP on Monday.

The official spoke on the condition of anonymity because he or she was not authorized to discuss the program, and said that two of the AT&T employees are based at the High Intensity Drug Trafficking Area office in Atlanta, one at the HIDTA office in Houston, and one at the office in Los Angeles.

The Hemisphere database includes records that date back to 1987, the official said, but typical narcotics investigations focus on records no older than 18 months.

To keep the program secret, investigators who request searches of the database are instructed to “never refer to Hemisphere in any official document,” one of the slides noted.

Agents are told that when they obtain information through a Hemisphere program subpoena, they should “wall off” the program by filing a duplicative subpoena directly to the target’s phone company or by simply writing that the information was obtained through an AT&T subpoena.

It wasn’t immediately clear what percentage of U.S. calls are routed through AT&T switches and thus have records captured in Hemisphere. One slide says the program includes records “for a tremendous amount of international numbers that place calls through or roam on the AT&T network.”

“While we cannot comment on any particular matter, we, like all other companies, must respond to valid subpoenas issued by law enforcement,” AT&T spokesman Mark Siegel said in an e-mail.

According to the slides, the program is useful for investigators trying to track down drug traffickers or other criminals who frequently change phones or use multiple phones. If agents become aware of a phone number previously used by a suspect, they can write an administrative subpoena, with no judicial oversight required, for records about that number.

Hemisphere analysts can track the number’s call history or other characteristics and compare it to the history and characteristics of phones still in use — thus winnowing down a list of possible current phone numbers for the suspect, along with their location.

“Hemisphere results can be returned via email within an hour of the subpoenaed request and include (call detail records) that are less than one hour old at the time of the search,” one slide said.

Marc Rotenberg, executive director of the Electronic Privacy Information Center, said the program raises several privacy concerns, including that if a query returns call records that are similar to, but not, those of the suspect, agents could be reviewing call records of people who haven’t done anything wrong.

“One of the points that occurred to me immediately is the very strong suspicion that there’s been very little judicial oversight of this program,” Rotenberg said. “The obvious question is: Who is determining whether these authorities have been properly used?”

Washington state peace activist Drew Hendricks provided the slides to the AP on Monday. He said he obtained them in response to a series of public-records requests he filed with West Coast police agencies, initially seeking information about a law-enforcement conference that had been held in Spokane, Wash.

In the Northwest, the DEA and Department of Homeland Security make most of the Hemisphere requests through administrative subpoenas, one slide noted. Since late last year, AT&T has also accepted requests by court orders from local police agencies in Washington state.

As of June, Hemisphere had processed 679 requests from the Northwest High Intensity Drug Trafficking Area. And since 2007, the Los Angeles Hemisphere program had processed more than 4,400 requests.

In connection with the controversy over the NSA’s sweeping up of call records, some lawmakers have suggested that phone companies store the records instead, and allow federal agents or analysts to request specific data when necessary.

“This way each query would require a specific government warrant before the FISA Court, and Americans would have more confidence that their privacy is being protected, while achieving the same national security results,” Rep. Adam Schiff, D-Calif., said in a July 31 statement.


U.S. documents detail al-Qaeda’s efforts to fight back against drones

Let's hope these al-Qaeda freedom fighters share the knowledge they learn on destroying drones with American freedom fighters.

I suspect that the next major use of drones by the American government will be against American citizens in the government's unconstitutional, immoral and illegal "war on drugs". The "war on drugs" is also a "war on the Bill of Rights" and a "war on the American people".

The folks in al-Qaeda may be having some success in this war. If you remember a while ago Iran used bogus GPS signals to hijack an American drone and force it to land in Iran.

Source

U.S. documents detail al-Qaeda’s efforts to fight back against drones

By Craig Whitlock and Barton Gellman, Published: September 3 E-mail the writers

Al-Qaeda’s leadership has assigned cells of engineers to find ways to shoot down, jam or remotely hijack U.S. drones, hoping to exploit the technological vulnerabilities of a weapons system that has inflicted huge losses upon the terrorist network, according to top-secret U.S. intelligence documents.

Although there is no evidence that al-Qaeda has forced a drone crash or interfered with flight operations, U.S. intelligence officials have closely tracked the group’s persistent efforts to develop a counterdrone strategy since 2010, the documents show.

Al-Qaeda commanders are hoping a technological breakthrough can curb the U.S. drone campaign, which has killed an estimated 3,000 people over the past decade. The airstrikes have forced ­al-Qaeda operatives and other militants to take extreme measures to limit their movements in Pakistan, Afghanistan, Yemen, Somalia and other places. But the drone attacks have also taken a heavy toll on civilians, generating a bitter popular backlash against U.S. policies toward those countries.

Details of al-Qaeda’s attempts to fight back against the drone campaign are contained in a classified intelligence report provided to The Washington Post by Edward Snowden, the fugitive former National Security Agency contractor. The top-secret report, titled “Threats to Unmanned Aerial Vehicles,” is a summary of dozens of intelligence assessments posted by U.S. spy agencies since 2006.

U.S. intelligence analysts noted in their assessments that information about drone operational systems is available in the public realm. But The Post is withholding some detailed portions of the classified material that could shed light on specific weaknesses of certain aircraft.

Under President Obama and his predecessor, George W. Bush, drones have revolutionized warfare and become a pillar of the U.S. government’s counterterrorism strategy, enabling the CIA and the military to track down enemies in some of the remotest parts of the planet. Drone strikes have left al-Qaeda’s core leadership in Pakistan scrambling to survive.

U.S. spy agencies have concluded that al-Qaeda faces “substantial” challenges in devising an effective way to attack drones, according to the top-secret report disclosed by Snowden. Still, U.S. officials and aviation experts acknowledge that unmanned aircraft have a weak spot: the satellite links and remote controls that enable pilots to fly them from thousands of miles away.

In July 2010, a U.S. spy agency intercepted electronic communications indicating that senior al-Qaeda leaders had distributed a “strategy guide” to operatives around the world advising them how “to anticipate and defeat” unmanned aircraft. The Defense Intelligence Agency (DIA) reported that al-Qaeda was sponsoring simultaneous research projects to develop jammers to interfere with GPS signals and infrared tags that drone operators rely on to pinpoint missile targets.

Other projects in the works included the development of observation balloons and small radio-controlled aircraft, or hobby planes, which insurgents apparently saw as having potential for monitoring the flight patterns of U.S. drones, according to the report.

Al-Qaeda cell leaders in the tribal areas of northwestern Pakistan were “determining the practical application of technologies being developed for battlefield applications,” analysts from the DIA wrote. The analysts added that they believed al-Qaeda “cell leadership is tracking the progress of each project and can redirect components from one project to another.”

The technological vulnerabilities of drones are no secret. The U.S. Air Force Scientific Advisory Board issued an unclassified report two years ago warning that “increasingly capable adversaries” in countries such as Afghanistan could threaten drone operations by inventing inexpensive countermeasures.

The board said insurgents might try to use “lasers and dazzlers” to render a drone ineffective by blinding its cameras and sensors. It also predicted that insurgents might use rudimentary acoustic receivers to detect drones and “simple jammer techniques” to interfere with navigation and communications.

Researchers have since proved that the threat is not just theoretical. Last year, a research team from the University of Texas at Austin demonstrated to the Department of Homeland Security that it was possible to commandeer a small civilian drone by “spoofing” its GPS signal with a ground transmitter and charting a different navigational course.

Trained engineers

Al-Qaeda has a long history of attracting trained engineers and others with a scientific background. Khalid Sheik Mohammed, the self-proclaimed architect of the Sept. 11, 2001, attacks, holds a mechanical-engineering degree and is such an inveterate tinkerer that the CIA allowed him to fiddle around with new designs for a vacuum cleaner after he was captured a decade ago.

In 2010, the CIA noted in a secret report that al-Qaeda was placing special emphasis on the recruitment of technicians and that “the skills most in demand” included expertise in drones and missile technology. In July of that year, Atiyah Abd al-Rahman, an al-Qaeda operations chief, told a jihadist Web site that the network did not need “ordinary fighters” and that it was looking instead for “specialist staff” to join the organization.

That same year, authorities in Turkey said they arrested an al-Qaeda member who was developing plans to shoot down small NATO surveillance drones in Afghanistan. The suspect, a 23-year-old mathematics student, was using software to conduct ballistics research for drone attacks, according to Turkish officials.

Al-Qaeda leaders have become increasingly open about their ­anti-drone efforts. In March, a new English-language online jihadist magazine called Azan published a story titled “The Drone Chain.” The article derided drone armaments as “evil missiles designed by the devils of the world” but reassured readers that jihadists had been working on “various technologies” to hack, manipulate and destroy unmanned aircraft.

At the same time, the magazine indicated that those efforts needed a boost, and it issued an emergency plea for scientific help: “Any opinions, thoughts, ideas and practical implementations to defeat this drone technology must be communicated to us as early as possible because these would aid greatly . . . against the crusader- zionist enemy.”

In the absence of a high-tech silver bullet, al-Qaeda affiliates around the world have taken to sharing hard-earned lessons about the importance of basic defensive measures.

Islamist extremists in North Africa this year distributed a photocopied tipsheet with 22 recommendations for avoiding drone strikes. Among the suggestions are several ideas for camouflage as well as dubious advice on using radio or microwave transmitters to “confuse the frequencies used to control the drone.”

The Associated Press in February found a copy of the tipsheet in Mali, left behind by Islamist fighters fleeing the city of Timbuktu. It was written by a jihadist in Yemen two years earlier and has circulated among al-Qaeda franchises since then.

‘GPS jamming capability’

In January 2011, U.S. intelligence agencies detected an unusual electronic signal emanating from near Miran Shah, a jihadist haven in North Waziristan, Pakistan. The DIA called the signal “the first observed test of a new terrorist GPS jamming capability.”

The test apparently did not pose a threat to military GPS frequencies or encrypted communications links. In addition, whoever was beaming the mysterious signal mistakenly thought that jamming ground-based GPS receivers would interfere with drones’ ability to aim missiles or munitions at fixed targets, according to the DIA report.

Despite such missteps, ­al-Qaeda has been undeterred. In a separate 2011 report, the DIA stated that affiliates in Miran Shah and the Pakistani city of Karachi were pursuing other “R&D projects,” including one effort to shoot down drones with portable shoulder-fired missiles, known as manpads.

Army intelligence analysts uncovered similar projects, including attempts to develop laser detectors that could give warning whenever a U.S. Predator drone was about to fire a laser-guided Hellfire missile, according to a summary of a classified Army report.

In 2011, the DIA concluded that an “al-Qaeda-affiliated research and development cell currently lacks the technical knowledge to successfully integrate and deploy a counterdrone strike system.” DIA analysts added, however, that if al-Qaeda engineers were to “overcome these substantial design challenges, we believe such a system probably would be highly disruptive for U.S. operations in Afghanistan and Pakistan.”

The Air Force and CIA rely heavily on Predator and Reaper drones to hunt for al-Qaeda targets and other insurgents in several countries. Both aircraft can stay aloft for more than 20 hours to conduct surveillance missions and can be armed with Hellfire missiles.

The drones are flown by remote control via satellite data links, usually by pilots and sensor operators stationed thousands of miles away at bases in the United States. Those satellite links are encrypted, which makes the connections extremely difficult to hack.

It is only slightly less of a challenge for al-Qaeda fighters to spot a high-flying drone with the naked eye. Predators and Reapers loiter at altitudes above 20,000 feet, and their powerful cameras focus on objects several miles over the horizon, so their presence is hard to detect.

The satellite links, however, are the Achilles’ heel of drone operations. “Lost link” incidents — triggered when a satellite moves out of range or a drone drops a signal — are relatively common. The connections are usually reestablished within seconds or minutes. The aircraft are programmed to fly in a loop pattern or return to their launching spot during prolonged disruptions.

On several occasions, however, lost links have led to crashes. In September, an Air Force Predator slammed into mountainous terrain along the Iraq-Turkey border after the satellite data links were lost and the drone crew could no longer communicate with the aircraft.

In December 2011, a stealth U.S. spy drone operated by the CIA crashed in Iranian territory. Iran said it downed the advanced RQ-170 drone in an “electronic ambush.” U.S. officials said they did not believe that the drone had been hacked or jammed. They said a technical malfunction was probably to blame.

Although the navigational satellite links are encrypted, other drone transmissions are sometimes left unprotected.

In 2009, the U.S. military discovered that Iraqi insurgents had hacked into video feeds from Predator and Shadow drones using off-the-shelf software. The drones had been transmitting full-motion video to U.S. troops on the ground, but the Air Force had not encrypted those data links, leaving them vulnerable.

Air Force officials acknowledged the flaw and said they would work to encrypt all video feeds from its fleet of Predator drones by 2014. In their classified assessments, U.S. intelligence agencies sought to play down the insurgents’ hacking handiwork. Although analysts were concerned about the interceptions of the video feeds, they said there was no sign that insurgents had been able to seize control of the drone itself.

“While the ability of insurgent forces to view unencrypted or to break into encrypted data streams has been a concern for some time, indications to date are that insurgents have not been able to wrest [drone] control from its mission control ground station,” a 2010 report concluded.

The report went on to suggest that allowing insurgents to intercept video feeds might actually have “a deterrent effect” by demonstrating the extent to which U.S. forces were able to watch their movements.

Growing unease

Still, summaries of the classified reports indicate a growing unease among U.S. agencies about al-Qaeda’s determination to find a way to neutralize drones.

“Al-Qaida Engineers in Pakistan Continue Development of Laser-Warning Systems in Effort To Counter UAV Strikes,” read the headline of one report in 2011, using the military acronym for unmanned aerial vehicles.

Beyond the threat that ­al-Qaeda might figure out how to hack or shoot down a drone, however, U.S. spy agencies worried that their drone campaign was becoming increasingly vulnerable to public opposition.

Intelligence analysts took careful note of al-Qaeda’s efforts to portray drone strikes as cowardly or immoral, beginning in January 2011 with a report titled “Al-Qa’ida Explores Manipulating Public Opinion to Curb CT Pressure.”

Analysts also questioned whether they were losing the rhetorical battle in the media, the courts and even among “citizens with legitimate social agendas.” One 2010 report predicted that drone operations “could be brought under increased scrutiny, perceived to be illegitimate, openly resisted or undermined.”

In response, intelligence agencies floated their own ideas to influence public perceptions. One unclassified report said the phrase “drone strike” should never be uttered, calling it “a loaded term.”

“Drones connote mindless automatons with no capability for independent thought or action,” the report said. “Strikes connote a first attack, which leaves the victim unable to respond. Other phrases employed to evoke an emotional response include ‘Kill List,’ ‘Hit Squads,’ ‘Robot Warfare,’ or ‘Aerial Assassins.’ ”

Instead, the report advised referring to “lethal UAV operations.” It also suggested “elevating the conversation” to more-abstract issues, such as the “Inherent Right of Self-Defense” and “Pre-emptive and Preventive Military Action.”

Greg Miller contributed to this report.


45 Enemies of Freedom

Sheriff Joe is #3 on Reason's list of "Enemies of Freedom"

Arizona's John McCain came 27th.

I was looking for Congresswoman Kyrsten Sinema on this list but couldn't find her. I suspect that is because she hasn't got a long established record of government tyranny.

Kyrsten Sinema is the tyrant who attempted to flush Arizona's medical marijuana law, Prop 203, by introducing a bill that would have slapped a 300 percent tax on medical marijuana.

Kyrsten Sinema seems to be a clone of Emperor Obama, Michael Bloomberg, Dianne Feinstein and Hillary Clinton who all think they THEY know know to run your life better then YOU do.

Source

45 ENEMIES OF FREEDOM

People who have been trying to control your life since reason was founded in 1968

From the August/September 2013 issue

In 2003, to celebrate 35 years of publishing a monthly magazine dedicated to Free Minds and Free Markets, reason named “35 Heroes of Freedom”—innovators, economists, singers, anti-communists, pornographers, professional athletes, and even the occasional politician who contributed to making the world a freer place since 1968.

These weren’t necessarily the 35 best human beings to span the globe. Richard Nixon, for example, was selected for encouraging “cynicism about government” through his rampant abuses of power. And, well, let’s say Dennis Rodman hasn’t aged particularly well. But the list reflected the happy, unpredictable cacophony that has helped liberate the world one novel or deregulation or electric guitar at a time.

Our 45th anniversary has come along at a darker time. The post-9/11 lurch toward unchecked law enforcement power has now become a permanent feature of our bipartisan consensus, with a Democratic president now ordering assassinations of American teenagers and with millions of Americans unaware that the feds are combing through their telecommunications. Keynesians in Washington responded to the financial crisis of 2008 by ushering in a lost decade of government spending, sluggish growth, and the worst employment numbers since Jimmy Carter was president. And after an initially promising Arab Spring, whole swaths of the Middle East seem poised for a long, sectarian, transnational war.

So it’s fitting that this time around we’re anointing reason’s 45 Enemies of Freedom. Again, these aren’t the worst human beings who bestrode the planet since 1968 (though Pol Pot and Osama bin Laden rank right down there). Some, like John McCain, are even genuine American heroes. What unites them is their active effort to control individuals rather than allow them free choice, to wield power recklessly rather than act on the recognition that the stuff inherently corrupts, and to popularize lies in a world that's desperate for truth.

You’ll see some familiar names there (we can’t quit you, Tricky Dick!) and some others that deserve to be more notorious. But in our otherwise alphabetical list we’ll start with the man who nearly everyone on our staff nominated, a figure who embodies so much that is wrong with public policy and the political conversation in these United States.

1. Michael Bloomberg

Here is how New York Mayor Michael Bloomberg explained the importance of his widely derided 16-ounce limit on servings of sugar-sweetened beverages after a state judge overturned it last March: “We have a responsibility as human beings to do something, to save each other, to save the lives of ourselves, our families, our friends, and all of the rest of the people that live on God’s planet.” Bloomberg literally thinks he is saving the world one slightly smaller serving of soda at a time.

As grandiose as that may seem, it is consistent with Bloomberg’s view of government. A few years ago in a speech at the United Nations, he declared that “to halt the worldwide epidemic of non-communicable diseases, governments at all levels must make healthy solutions the default social option,” which he described as “government’s highest duty.” On Bloomberg’s to-do list for government, apparently, defending us against our own unhealthy habits ranks above defending us against foreign invaders or marauding criminals.

Public health is not the only area where Bloomberg’s authoritarian tendencies are apparent. There is his enthusiasm for gun control, his illegal crackdown on pot smokers, and his unflagging defense of the New York Police Department’s stop-and-frisk program, which portrays the Fourth Amendment as a gratuitous barrier to effective policing. But his determination to halt “epidemics” of risky behavior shows him at his most arrogantly ambitious.

Bloomberg has pursued that goal not only by meddling with people’s drink orders but by banning trans fats, pressuring food companies to reduce the salt content of their products, imposing heavy cigarette taxes, severely restricting the locations where people are allowed to smoke (even outdoors), mandating anti-smoking posters in stores that sell cigarettes (a policy that, like his big beverage ban, was rejected by the courts), and proposing a rule that would require merchants to hide tobacco products from people who might want to buy them.

The attitude driving Bloomberg’s crusade to “make healthy solutions the default social option” is reflected in another comment he made after his pint-sized pop prescription ran into legal trouble. “It was not a setback for me,” said the billionaire with degrees from Johns Hopkins and Harvard. “In case you hadn’t noticed, I watch my diet. This is not for me.” No, indeed. It is for those poor, benighted souls who think it is acceptable to drink a 20-ounce soda.

2. Idi Amin

The bombastic Ugandan dictator and self-appointed Conqueror of the British Empire lived in luxury during his 1970s rule while overseeing a unique brand of sadism that included mass killings, forced deportations, and torture.

3. Sheriff Joe Arpaio

Maricopa County, Arizona’s chief law enforcement officer is famous mostly for publicly degrading inmates: forcing them to live in a tent city, work on chain gangs, wear pink underwear. Meanwhile, his more serious transgressions receive far less attention. Arpaio has created citizen posses to track down and arrest illegal immigrants, overseen a jail staff that has violently abused inmates (resulting in the death of three prisoners and the paralysis of a fourth), and used law enforcement resources to harass and intimidate his political opponents.

4. Osama bin Laden

His desire to impose an Islamic caliphate marks the late terrorist as decidedly anti-liberty. But Osama bin Laden’s real crime against freedom was masterminding the murderous 9/11 terror attacks, which not only slaughtered nearly 3,000 people, but also inspired the U.S. government to react with overseas wars, the PATRIOT Act, the Department of Homeland Security, and the Transportation Security Administration. It is thanks in no small part to bin Laden that the United States is far less free.

5. Leonid Brezhnev

Give Brezhnev credit for this much: He made it a lot harder to imagine that communism would be exciting. If Stalin was the supervillain who made the Soviet Union an empire and Khrushchev was the Cold War confrontationist, Brezhnev was the bland figure who enforced a deadly conformity. An adept at bureaucratic warfare, Brezhnev consolidated his power over the course of the ’60s and ’70s as he spread his mixture of economic stagnation and banal totalitarianism throughout the eastern bloc.

6. Fidel Castro

His iron grip over Cuba lasted for more than 50 years of individual, physical, and social ruin. Though Castro formally stepped down as leader in 2008, he passed the reins of the police state to his brother and still serves as an elder statesman of the least free country in the Western Hemisphere.

7. Dick Cheney

Dick Cheney makes the list instead of George W. Bush or Barack Obama because the former vice president provided the intellectual and legal template that both presidents followed to curtail our freedoms. In the wake of 9/11, Cheney, a lifelong defender of executive branch power, pushed the Bush administration to increase secrecy, surveillance, and war. It’s the most lasting legacy in a four-decade career that includes intimate involvement in both Iraq wars, plus the conflicts in Afghanistan, Panama, and Somalia.

8. Hillary Clinton

“It takes a village,” Hillary Clinton famously wrote, and we’ve learned since that her meaning encompassed villages in Iraq and Afghanistan to house American troops, villages of taxpayers to fund her favored programs, and villages of snoops to staff a national security state. Those villages must be prudish, too, given Clinton’s longstanding fear of video-game sex. To Hillary’s credit, she does advocate Internet freedom for villages overseas. Too bad she doesn’t promote the same idea at home.

9. Paul Ehrlich

In 1968’s dystopian bestseller The Population Bomb, this biologist predicted that “hundreds of millions” would die in massive famines in the 1970s. Erlich lamented that it was technically and politically impossible to sterilize people through the water and food supplies, the antidote for which would be rationed by the government. Meanwhile, on a mostly voluntary basis, the global fertility rate has fallen by more than half since the 1960s. Freedom, and the economic growth it generates, turn out to be the best contraceptive.

10. Dianne Feinstein

Say Feinstein’s name in front of anybody who takes the Second Amendment to the U.S. Constitution seriously and watch that person’s face curdle. The California senator’s federal assault weapons ban, which passed in 1994 and expired in 2004, failed to have any noticeable impact on crime rates. She didn’t allow such facts to keep her from using the Sandy Hook Elementary School shooting in 2012 to unsuccessfully attempt to reinstate the ban. Like the National Rifle Association, she also blames youth violence on video games and has threatened new regulations on that industry as well.

11. Daryl Gates

Inventor of the SWAT team and four-star general in America’s war on drugs, Gates is as responsible as any other law enforcement officer for the blunt, pseudo- military instrument our police forces have become. Thanks to significant incidences of wrong-door raids and dangerous prank calls that send SWAT teams to innocent families’ homes, Americans don’t even have to be doing drugs or breaking any laws to witness the fruits of Gates’ labor.

12. Newt Gingrich

Gingrich rose to fame as a politician, but he’s more like an annoying dinner-party guest: He’ll say anything to get attention. During the 2012 campaign, the former speaker of the House called fellow Republican Paul Ryan’s budget proposal a “radical” form of “right-wing social engineering”—but later said he’d vote for it. In 2005, he declared his support for an individual mandate to purchase health insurance, even going so far as to predict that it could be done in a way to “make most libertarians relatively happy.” By 2012, he was saying the mandate was “fundamentally wrong” and “unconstitutional.” Gingrich never truly stands for anything except himself.

13. Steven Hayne

For 20 years, Mississippi prosecutors looking for a way to put a friendly thumb on the scales of justice turned to Dr. Steven Hayne. A graduate of Brown Medical School, Hayne performed roughly 1,500 autopsies per year at the behest of prosecutors—1,175 more per year than is permitted by the National Association of Medical Examiners. The result? A lot of bad evidence and a lot of faulty convictions. Thanks to Radley Balko’s investigatory work in reason and elsewhere, Hayne is no longer performing autopsies in Mississippi. Sadly, the number of false convictions he contributed to is suspected to be in the hundreds.

14. Eric Hobsbawm

Until his death last year at the age of 95, British historian Eric Hobsbawm enjoyed the dubious honor of being perhaps the world’s most prominent academic apologist for communism. Asked in 1994 if the murder of “15, 20 million people might have been justified” if the result was the establishment of a Marxist society, the lifelong Communist Party member replied, “yes.”

15. J. Edgar Hoover

The FBI’s investigations into militias during the 1990s and Muslims in the 2000s trace their roots to the tenure of James Edgar Hoover. The agency’s longest-serving director, Hoover was famous for investigating groups that challenged the American government and its empire. He spied on and entrapped leftists, and he smeared and undermined civil rights leaders.

16. Jeffrey Immelt

In fairness, anyone who ran General Electric would probably make this list. Not because the blue-chip energy/media/whatever company is particularly evil, but because it’s particularly big, and as such it’s a natural poster boy for modern-day crony capitalism. GE has spent more than $200 million on lobbying already this young century. Immelt, head of President Obama’s Council on Jobs and Competitiveness, reacted to the 2008 financial crisis by claiming, “The interaction between government and business will change forever.…The government will be a regulator; and also an industry policy champion, a financier, and a key partner.” That’s exactly the problem.

17. Michael Jacobson

The most zealous of the foodie nanny-staters, Michael Jacobson is the guy who makes Mayor Bloomberg seem like a reasonable moderate. The Ralph Nader protégé co-founded the Center for Science in the Public Interest in 1971 to fight for fat taxes, ominous warning labels, and laws requiring that broadcasters give a minute advertising time to broccoli for each minute of Froot Loops. His group, he once said, “is proud about finding something wrong with practically everything.”

18. Ed Jagels

During the 1980s, Kern County (California) District Attorney Ed Jagels led the nation in prosecuting bogus Satanic child molestation cases. Without any physical evidence, Jagels, his prosecutors, and local police coached and cajoled children into accusing their parents and neighbors of sexual abuse that never actually happened. Years later, when witnesses recanted, Jagels called them liars. Eventually, 25 of his 26 Satanic molestation convictions were overturned.

19. Leon Kass

As the propounder of the idea of “the wisdom of repugnance,” philosopher Leon Kass holds that viscera trump reason. Kass opposed in vitro fertilization on the grounds that it was dehumanizing, but the more than 5 million IVF babies born since then have been quite human. As head of George W. Bush’s Council on Bioethics, Kass sought to ban research on potentially lifesaving technologies such as human embryonic stem cells and cloning. He argues against using human ingenuity to liberate ourselves from the natural horrors of disease, disability, and death.

20. Ruhollah Khomeini

Leader of the Iranian revolution that overthrew the Shah, the ayatollah created the modern blueprint for an atavistic, Islamic revolution. As Iran’s supreme leader, Khomeini ordered the murder of his political opponents, waged a deadly war with Iraq, supported the sacking of the U.S. embassy in Tehran, and offered a bounty on the head of Salman Rushdie.

21. Henry Kissinger

As secretary of state and national security advisor under presidents Nixon and Ford, Kissinger embodied a ruthless, amoral vision of America’s place in the world. From the “secret” bombing of Cambodia to the “Christmas” bombing of North Vietnam, from his complicity in the coup that installed a repressive dictatorship in Chile to his green light for Indonesia’s bloody occupation of East Timor, Kissinger may not be the only answer to the question “Why do they hate us?”—but he’s a far larger part of the answer than any one man should be.

22. Naomi Klein

Before her 2007 book Shock Doctrine slandered all of modern libertarian thought as a scam dreamed up by the dictator-loving rich to screw over the poor, Klein had a noisy and altogether self-defeating career as an anti-branding activist. Her “No Logo” campaign and 2000 book, designed to ride the wave of anti-globalization to lead a revolt against advertising, instead became a go-to manual for marketers seeking to exploit the yearning for authenticity. Meanwhile, the anti-globalization movement died a richly deserved death.

23. Paul Krugman

The Nobel-winning economist and New York Times columnist is a reliable advocate of economic intervention and deficit spending, arguing that the problem with failed government stimulus programs to fight the recession of the ’00s was that they didn’t go far enough. Krugman’s low point in 2012 was recommending (only mostly in jest) that it would be a good thing if the government wasted huge sums of taxpayer money preparing for an alien invasion. Keep this man’s hands away from any rocks—he might try to break nearby windows to “stimulate” the economy.

24. Loki

The sneering (fictional) baddie in the 2012 superhero blockbuster, The Avengers, sticks to a familiar supervillain playbook: His aim is world domination, and he’s got a cosmic doohicky and an army of alien invaders to make it happen. But the justification he offers for his global power grab sounds more like a terrestrial dictator: “It’s the unspoken truth of humanity,” he tells a cowering crowd, “that you crave subjugation. The bright lure of freedom diminishes your life’s joy in a mad scramble for power, for identity. You were made to be ruled.” Fortunately, like all supervillains, he was made to be defeated.

25. Jeffrey Loria

A successful New York art dealer (unlike you, he owns an original Picasso), Loria spent years pleading poverty to the taxpayers of Miami-Dade County so that they would pay for a fancy new stadium to house his professional baseball franchise, the Marlins. Locals finally agreed to cover what’s projected to be $2.4 billion in costs, only to discover that Loria had actually been turning large profits while fielding a mediocre, underpaid team. With his stadium safely finished, Loria promptly dismantled his club, which is now the worst in Major League Baseball.

26. Mao Tse-Tung

As the founder and leader of the People’s Republic of China, this Communist despot’s cruelly stupid collectivist policies killed at least 35 million Chinese citizens. He kept the hundreds of millions who managed to survive in impoverished bondage until his death in 1976.

27. John McCain

It is possible to be both an enemy of freedom and a genuine American hero. John McCain endured unbearable punishments and greatly boosted camp morale during his five-year Viet Cong prison stint, for which he deserves our gratitude. He has also been among the most consistently interventionist politicians in the United States Senate, agitating for never-ending “rogue-state rollback” while focusing his war at home on political speech and the healthy American trait he derides as “cynicism.” It’s fitting McCain would close out his career barking sporadic insults (like “wacko bird”) at a new generation of more libertarian legislators.

28. Jenny McCarthy

A second-string actress who has managed to stay in the limelight by promoting the bogus theory that vaccines cause autism, McCarthy traffics in pseudoscience and fear. Partly as a result of her widely publicized yet scientifically ignorant pronouncements, hundreds of thousands of fearful parents have needlessly endangered the health and lives of their children.

29. Robert McNamara

Did anyone fuse the roles of technocrat and destroyer more completely than Robert Strange McNamara? He was a functionary from Ford Motor Company when John F. Kennedy brought him in to run the Pentagon, and in that role he systematically escalated the Vietnam War as though the conflict were an assembly line. When he took over the World Bank in 1968, he continued to couple technocratic planning with mass destruction, sponsoring vast “development projects” whose most notable effect was to evict peasants from their land. Robert McNamara: the Organization Man as monster.

30. Newton Minow

The godfather of boob-tube nannying, Minow was chairman of the Federal Communications Commission from 1961 to 1963. There he was a key advocate for the regulation of television. In a 1961 speech to the National Association of Broadcasters, he famously described the era’s television programming as a “vast wasteland,” railed against the medium’s “mayhem, violence, sadism, murder,” and proposed that TV content should be strictly regulated in the name of the “public interest.”

31. Robert Moses

The most authoritarian city planner in New York history, Moses wielded eminent domain and many other government powers, unleashing his bulldozers and wrecking balls on the homes, businesses, and churches of as many as half a million powerless citizens, many of them black, brown, or poor.

32. Robert Mugabe

The racist, homophobic, and corrupt president of Zimbabwe has overseen record levels of inflation, destroying the purchasing power of citizens in a previously much more prosperous country. Forbidden from exiting the country with any assets, Zimbabweans have had to live under Mugabe’s brutal misrule for decades.

33. Richard Nixon

This American president launched the modern drug war, imposed wage and price controls, kept a pointless war going in Vietnam long after he knew it was hopeless, and imposed massive new bureaucracies on the American economy. Nixon’s vision of government in general had no clear limits, and his view of executive power helped him commit and collude in crimes that he thought were not crimes because he did them. Richard Nixon should be a cautionary tale for all future presidents, but all too often he serves as an example.

34. Henry Paulson

When the nation’s financial markets collapsed in the fall of 2008, Hank Paulson, secretary of the treasury for President George W. Bush, came in with guns blazing. In September of 2008, he proposed the Troubled Assets Relief Program (TARP), a scheme he falsely advertised as a way to remove “illiquid assets that are weighing down our financial institutions and threatening our economy.” Instead it became a justification for an endless series of bailouts, including of non-banks like General Motors. Even TARP’s biggest proponents acknowledge that the economy has underperformed the past five years.

35. Sean Penn

When not chewing the scenery in overrated Oscar-winning films, the multimillionaire brother of Christopher Penn spends much of his time acting as an apologist for authoritarians like the late Hugo Chavez and the still-breathing Fidel Castro. When Chavez died, Penn said: “the people of the United States lost a friend it never knew it had. And poor people around the world lost a champion.” That’s one way of putting it.

36. Pol Pot

A French school flunkie turned peasant revolutionary, Pol Pot might have been the most efficient murderer in communism’s grisly history. It took the dictator and his Khmer Rouge less than four years to kill and centrally plan to death up to 3 million people—20 percent of the Cambodian population.

37. Vladimir Putin

While many were optimistic that Russia would manage to modernize after almost a century of Marxist misery, the former KGB agent and Russian president has vindicated skeptics of liberal progress while clamping down on free speech, mucking about in Russia’s “near abroad,” and supporting horrid governments such as the Assad regime in Syria.

38. Bruce Ratner

A real estate tycoon and serial beneficiary of eminent domain abuse, Ratner partnered with New York officials in 2001 to forcibly evict some 55 midtown businesses standing in the way of a new headquarters for the New York Times Company. A few years later in Brooklyn, Ratner and his government allies seized and razed dozens of homes and businesses in order to build a basketball arena for a team then owned by Ratner himself.

39. Diane Ravitch

A school reformer turned union flack, this New York University professor did an about-face after four decades as one of the nation’s most prominent charter advocates. Part of the right-wing think tank braintrust that hatched the initial policy proposals for vouchers, she now says “Vouchers are a con, intended to destroy public education.” She has been welcomed with open arms by defenders of the status quo.

40. John Rawls

The philosophical father of 20th century liberalism, Rawls’ seminal Theory of Justice (1971) has dominated moral and political philosophy for decades. His framing of “justice as fairness” and his notion that societies should be arranged to improve the lot of the least advantaged subtly underpin nearly all of our national policy debates, lending a justification to multitudinous extensions of state power. His longtime rival, the libertarian thinker Robert Nozick, offered an alternative based in property rights and personal liberty. Sadly, Rawls has been more influential.

If (bad) conservative screenwriters set out to create a smugly liberal, lens-hungry New York senator, they’d come up with Charles Schumer—and they’d be criticized for creating a strawman. But Schumer is, somehow, real. He crusades sneeringly against guns, drugs, breakfast cereal, cybercurrencies, and caffeinated powders while supporting security-state legislation and cozying up with crony capitalists on Wall Street.

42. Steven Seagal

Starring in 20 of the worst action flicks ever made, all with titles like Above the Law and Executive Decision, Seagal also produced several ludicrous environmental message-movies, including one that ends with his character giving a four-minute speech about how “the internal combustion engine has been obsolete for 50 years.” He has made two truly awful records and been serially accused of sexual harassment, but what separates Seagal from most Hollywood scumbags is that he has also actively participated in gross law enforcement abuse, including a raid in Arizona that damaged a man’s house and killed his puppy.

43. Lamar Smith

The Internet threatened to shut down in protest last year when Rep. Lamar Smith (R-Texas) introduced the Stop Online Piracy Act (SOPA), a bill that sought to grant movie studios and record labels unprecedented power to police copyright. Under SOPA, studios and labels would’ve had the power to block offending sites from showing up in Google search results, and the authority to tell service providers which sites their customers couldn’t visit. In an Orwellian twist, SOPA also would have empowered “content creators” to prevent Internet users from discussing—on Facebook and other social media sites—how to circumvent SOPA.

44. Aaron Sorkin

A virtual assembly line for fictional authority-worship, Sorkin is the dramatist of choice for progressive technocrats. In the worlds detailed in West Wing and The Newsroom, all of America’s problems could be solved if those dumb, undereducated conservatives and independents would listen to their incorruptible Ivy League betters. Sorkin longs for an imaginary golden age of American government that never existed. Bonus points for being just as misogynist as any of the archconservatives he loathes.

45. Elizabeth Warren

One of the left’s foremost academic activists, Warren, a Massachusetts Democrat recently elected to the Senate, is a Harvard professor with a history of using shoddy scholarship to promote dubious public policies. She has exaggerated the prevalence of medical bankruptcy, argued that student loan rates should be set equal to bank loan rates, and pushed for controls on everything from credit cards to home loans. Warren’s life project amounts to an argument that most people are too stupid to know what to do with their money unless the government steps in to help.


Files show NSA cracks, weakens Internet encryption

I have lots of questions about this!!!!
1) I have always suspected that the NSA can use it's supercomputers to crack PGP and other public key encrypted messages. But I suspected it took some effort to decrypt the messages. Is that still true??? Or it is now a trivial inexpensive task for NSA to read messages that are encrypted with PGP and other public key??

2) Just what are these "secret portals" or "hooks" that the NSA has created??? I suspect they are hooks that tell the encryption software used by HTTPS encryption to create encrypted data that is easily decrypted by NSA and other government agencies.

3) This shows that it is really not safe to put ANYTHING that you would like to keep secret from anybody, especially the government on the internet. Same goes for putting the data on telephone lines, radio waves or any public communication method.

Source

Files show NSA cracks, weakens Internet encryption

By Michael Winter USA Today Thu Sep 5, 2013 4:51 PM

U.S. and British intelligence agencies have cracked the encryption designed to provide online privacy and security, documents leaked by Edward Snowden show.

In their clandestine, decade-long effort to defeat digital scrambling, the National Security Agency, along with its British counterpart, the Government Communications Headquarters (GCHQ), have used supercomputers to crack encryption codes and have inserted secret portals into software with the help of technology companies, the Guardian, the New York Times and ProPublica reported Thursday.

The NSA has also maintained control over international encryption standards.

As the Times points out, encryption "guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world."

The NSA calls its decryption efforts the "price of admission for the U.S. to maintain unrestricted access to and use of cyberspace."

A 2010 memo describing an NSA briefing to British agents about the secret hacking said, "For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies. Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable."

The GCHQ is working to penetrate encrypted traffic on what it called the "big four" service providers ---Hotmail, Google, Yahoo and Facebook, the Guardian said.


Who needs back up files when you have the NSA????

Who needs backup files when the goons at the NSA, the FBI, Homeland Security, the TSA, the BATF, and DEA backing up all our files and emails for us for free.

Don't think of it as the government flushing the Bill of Rights down the toilet!!!

Think of it as a free file backup service run by government goons!!!!

Who needs back up files when you have the NSA, Homeland Security, CIA, FBI, DEA, BATF, Bush, Obama reading our email and spying on our internet use
Who needs back up files when you have the NSA, Homeland Security, CIA, FBI, DEA, BATF, Bush, Obama reading our email and spying on our internet use
Who needs back up files when you have the NSA, Homeland Security, CIA, FBI, DEA, BATF, Bush, Obama reading our email and spying on our internet use


N.S.A. Able to Foil Basic Safeguards of Privacy on Web

Here is the full article from the New York Times on what the NSA or National Security Agency and their English buddies the GCHQ or the Government Communications Headquarters have been doing to read your encrypted emails and listen to your encrypted phone calls.

The article says the NSA has been getting makers of ICs or integrated circuits to put back doors into their products so the NSA can read or listen to your data before the chip encrypts it.

The article says the NSA is also working with software vendors like Microsoft getting them to put back doors in their software products, again so the NSA can grab the data before the software encrypts it.


Google encrypts data amid backlash against NSA spying

Is Google really doing this. Or is Google secretly helping the NSA and saying this to lull us into a false sense of security that our emails are safe from NSA spying with Gmail???

Remember the bottom line is if you don't want cops reading your emails don't put them on the internet. If you don't want cops listening to your conversations don't have them on a telephone that is connect to any public networks, or any network that broadcasts the call on radio waves.

Sure that's an inconvenience and hard to do, but it's a lot easier then spending 5 or 10 years in prison for committing a victimless drug war crime.

Source

Google encrypts data amid backlash against NSA spying

By Craig Timberg, Published: September 6 E-mail the writers

Google is racing to encrypt the torrents of information that flow among its data centers around the world in a bid to thwart snooping by the NSA and the intelligence agencies of foreign governments, company officials said Friday.

The move by Google is among the most concrete signs yet that recent revelations about the National Security Agency’s sweeping surveillance efforts have provoked significant backlash within an American technology industry that U.S. government officials long courted as a potential partner in spying programs.

Google’s encryption initiative, initially approved last year, was accelerated in June as the tech giant struggled to guard its reputation as a reliable steward of user information amid controversy about the NSA’s PRISM program, first reported in The Washington Post and the Guardian that month. PRISM obtains data from American technology companies, including Google, under various legal authorities.

Encrypting information flowing among data centers will not make it impossible for intelligence agencies to snoop on individual users of Google services, nor will it have any effect on legal requirements that the company comply with court orders or valid national security requests for data. But company officials and independent security experts said that increasingly widespread use of encryption technology makes mass surveillance more difficult — whether conducted by governments or other sophisticated hackers.

“It’s an arms race,” said Eric Grosse, vice president for security engineering at Google, based in Mountain View, Calif. “We see these government agencies as among the most skilled players in this game.”

Experts say that, aside from the U.S. government, sophisticated government hacking efforts emanate from China, Russia, Britain and Israel.

The NSA seeks to defeat encryption through a variety of means, including by obtaining encryption “keys” to decode communications, by using super-computers to break codes, and by influencing encryption standards to make them more vulnerable to outside attack, according to reports Thursday by the New York Times, the Guardian and ProPublica, based on documents provided by former NSA contractor Edward Snowden.

But those reports made clear that encryption — essentially converting data into what appears to be gibberish when intercepted by outsiders — complicates government surveillance efforts, requiring that resources be devoted to decoding or otherwise defeating the systems. [Unless their is a backdoor that allows the government to quickly decrypt your messages I suspect this is true. So the question is "Is there a backdoor"] Among the most common tactics, experts say, is to hack into individual computers or other devices used by people targeted for surveillance, making what amounts to an end run around coded communications.

Security experts say the time and energy required to defeat encryption forces surveillance efforts to be targeted more narrowly on the highest-priority targets — such as terrorism suspects — and limits the ability of governments to simply cast a net into the huge rivers of data flowing across the Internet.

“If the NSA wants to get into your system, they are going to get in . . . . Most of the people in my community are realistic about that,” said Christopher Soghoian, a computer security expert at the American Civil Liberties Union. “This is all about making dragnet surveillance impossible.”

The NSA declined to comment for this article. The Office of the Director of National Intelligence issued a statement Thursday saying: “Throughout history, nations have used encryption to protect their secrets, and today terrorists, cybercriminals, human traffickers and others also use code to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that.”

The U.S. intelligence community has been reeling since news reports based on Snowden’s documents began revealing remarkable new detail about how the government collects, analyzes and disseminates information — including, in some circumstances, the e-mails, video chats and phone communications of American citizens.

Many of the documents portray U.S. companies as pliant “Corporate Partners” or “Providers” of information. While telecommunications companies have generally declined to comment on their relationships with government surveillance, some technology companies have reacted with outrage at the depictions in the NSA documents released by Snowden. They have joined civil liberties groups in demanding more transparency and insisting that information is turned over to the government only when required by law, often in the form of a court order.

In June, Google and Microsoft asked the Foreign Intelligence Surveillance Court to allow them greater latitude in reporting how much information they must turn over to the government. On Friday, Yahoo issued its first “government transparency report,” saying it had received 12,444 requests for data from the U.S. government this year, covering the accounts of 40,322 users.

Google has long been more aggressive than its peers within the U.S. technology industry in deploying encryption technology. It turned on encryption in its popular Gmail service in 2010, and since then has added similar protections for Google searches for most users.

Yet even as it encrypted much of the data flowing between Google and its users, the information traveling between its data centers offered rare points of vulnerability to potential intruders, especially government surveillance agencies, security officials said. User information — including copies of e-mails, search queries, videos and Web browsing history — typically is stored in several data centers that transmit information to each other on high-speed fiber-optic lines.

Several other companies, including Microsoft, Apple and Facebook, increasingly have begun using encryption for some of their services, though the quality varies by company. Communications between services — when an e-mail, for example, is sent from a user of Gmail to a user of Microsoft’s Outlook mail — are not generally encrypted, appearing to surveillance systems as what experts call “clear text.”

Google officials declined to provide details on the cost of its new encryption efforts, the numbers of data centers involved, or the exact technology used. Officials did say that it will be what experts call “end-to-end,” meaning that both the servers in the data centers and the information on the fiber-optic lines connecting them will be encrypted using “very strong” technology. The project is expected to be completed soon, months ahead of the original schedule.

Grosse echoed comments from other Google officials, saying that the company resists government surveillance and has never weakened its encryption systems to make snooping easier — as some companies reportedly have, according to the Snowden documents detailed by the Times and the Guardian on Thursday.

“This is a just a point of personal honor,” Grosse said. “It will not happen here.”

Security experts said news reports detailing the extent of NSA efforts to defeat encryption were startling. It was widely presumed that the agency was working to gain access to protected information, but the efforts were far more extensive than understood and reportedly contributed to the creation of vulnerabilities that other hackers, including foreign governments, could exploit.

Matthew Green, a Johns Hopkins cryptography expert, applauded Google’s move to harden its defenses against government surveillance, but said recent revelations make clear the many weaknesses of commonly used encryption technology, much of which dates back to the 1990s or earlier. He called for renewed efforts among companies and independent researchers to update systems — the hardware, the software and the algorithms.

“The idea that humans can communicate safely is something we should fight for,” Green said.

But he said he wasn’t sure that would happen: “A lot of people in the next week are going to say, this is too hard. Let’s forget about the NSA.”

Haylet Tsukayama contributed to this report.


Google argues for right to continue scanning Gmail

I don't have a problem with Google scanning our emails. They are a private company and should be able to do what they want to do.

But is Google sleeping with the government and turning this information over to Uncle Sam, along with state, county and city cops???

Again if you don't want cops reading your email you shouldn't be using the internet to send it. If you don't want cops listening to you phone calls you shouldn't be using public networks that the police can monitor, or placing calls that use radio waves, such as cell phones.

Yes, it's a pain in the but to keep the government from spying on you, but it's a lot easier then doing 5 to 10 years in a Federal prison for a victimless drug war crime.

Source

Google argues for right to continue scanning Gmail

By Martha Mendoza Associated Press Thu Sep 5, 2013 9:48 AM

SAN JOSE, California — Google’s attorneys say their long-running practice of electronically scanning the contents of people’s Gmail accounts to help sell ads is legal, and they are asking a U.S. judge to dismiss a lawsuit that seeks to stop the practice.

In court records filed in advance of a federal hearing scheduled for Thursday, Google argues that “all users of email must necessarily expect that their emails will be subject to automated processing.”

The class action lawsuit filed in May says Google “unlawfully opens up, reads, and acquires the content of people’s private email messages” in violation of California’s privacy laws and federal wiretapping statutes. The lawsuit notes that the company even scans messages sent to any of the 425 million active Gmail users from non-Gmail users who never agreed to the company’s terms.

Google has repeatedly described how it targets its advertising based on words that show up in Gmail messages. For example, the company says if someone has received a lot of messages about photography or cameras, then it might display an advertisement from a local camera store. Google says the process is fully automated, “and no humans read your email ...”

Privacy advocates have long questioned the practice.

“People believe, for better or worse, that their email is private correspondence, not subject to the eyes of a $180 billion corporation and its whims,” said Consumer Watchdog president Jamie Court


Legislation Seeks to Bar N.S.A. Tactic in Encryption

Currently the 4th Amendment makes it illegal for the police to spy on us. But cops from the local city cop to government thugs in the NSA, DEA and BATF routinely treat the Fourth Amendment as toilet paper and routinely illegally spy on us.

With that in mind do you think any new laws are going to prevent the police from illegally spying on us like they currently do???

It's about as probable as a bank robber deciding not to rob a bank because it's a crime!!!

Last our elected officials at the city, county, state and Federal levels have the power to fire crooked cops who spy on us. But they never do. And that means they support the illegal spying.

Source

Legislation Seeks to Bar N.S.A. Tactic in Encryption

By SCOTT SHANE and NICOLE PERLROTH

Published: September 6, 2013

After disclosures about the National Security Agency’s stealth campaign to counter Internet privacy protections, a congressman has proposed legislation that would prohibit the agency from installing “back doors” into encryption, the electronic scrambling that protects e-mail, online transactions and other communications.

Representative Rush D. Holt, a New Jersey Democrat who is also a physicist, said Friday that he believed the N.S.A. was overreaching and could hurt American interests, including the reputations of American companies whose products the agency may have altered or influenced.

“We pay them to spy,” Mr. Holt said. “But if in the process they degrade the security of the encryption we all use, it’s a net national disservice.”

Mr. Holt, whose Surveillance State Repeal Act would eliminate much of the escalation in the government’s spying powers undertaken after the 2001 terrorist attacks, was responding to news reports about N.S.A. documents showing that the agency has spent billions of dollars over the last decade in an effort to defeat or bypass encryption. The reports, by The New York Times, ProPublica and The Guardian, were posted online on Thursday.

The agency has encouraged or coerced companies to install back doors in encryption software and hardware, worked to weaken international standards for encryption and employed custom-built supercomputers to break codes or find mathematical vulnerabilities to exploit, according to the documents, disclosed by Edward J. Snowden, the former N.S.A. contractor.

The documents show that N.S.A. cryptographers have made major progress in breaking the encryption in common use for everyday transactions on the Web, like Secure Sockets Layer, or SSL, as well as the virtual private networks, or VPNs, that many businesses use for confidential communications among employees.

Intelligence officials say that many of their most important targets, including terrorist groups, use the same Webmail and other Internet services that many Americans use, so it is crucial to be able to penetrate the encryption that protects them. In an intense competition with other sophisticated cyberespionage services, including those of China and Russia, the N.S.A. cannot rule large parts of the Internet off limits, the officials argue.

A statement from the director of national intelligence, James R. Clapper Jr., criticized the reports, saying that it was “not news” that the N.S.A. works to break encryption, and that the articles would damage American intelligence collection.

The reports, the statement said, “reveal specific and classified details about how we conduct this critical intelligence activity.”

“Anything that yesterday’s disclosures add to the ongoing public debate,” it continued, “is outweighed by the road map they give to our adversaries about the specific techniques we are using to try to intercept their communications in our attempts to keep America and our allies safe and to provide our leaders with the information they need to make difficult and critical national security decisions.”

But if intelligence officials felt a sense of betrayal by the disclosures, Internet security experts felt a similar letdown — at the N.S.A. actions.

“There’s widespread disappointment,” said Dan Kaminsky, a prominent security researcher. “This has been the stuff of wild-eyed accusations for years. A lot of people are heartbroken to find out it’s not just wild-eyed accusations.”

Sascha Meinrath, the director of the Open Technology Institute, a research group in Washington, said the reports were “a startling indication that the U.S. has been a remarkably irresponsible steward of the Internet,” which he said the N.S.A. was trying to turn into “a massive platform for detailed, intrusive and unrestrained surveillance.”

Companies like Google and Facebook have been moving to new systems that, in principle, would make government eavesdropping more difficult. Google is in the process of encrypting all data that travels via fiber-optic lines between its data centers. The company speeded up the process in June after the initial N.S.A. disclosures, according to two people who were briefed on Google’s plans but were not authorized to speak publicly about them. The acceleration of the process was first reported Friday by The Washington Post.

For services like Gmail, once data reaches a user’s computer it has been encrypted. But as messages and other data like search queries travel internally among Google’s data centers they are not encrypted, largely because it is technically complicated and expensive to do.

Facebook announced last month that it would also transition to a novel encryption method, called perfect forward secrecy, that makes eavesdropping far more difficult.

Marc Rotenberg, the executive director of the Electronic Privacy Information Center, a civil liberties group in Washington, said the quandary posed by the N.S.A.’s efforts against encryption began with its dual role: eavesdropping on foreign communications while protecting American communications.

“Invariably the two missions collide,” he said. “We don’t dispute that their ability to capture foreign intelligence is quite important. The question is whether their pursuit of that mission threatens to undermine the security and privacy of Internet communications.”

Mr. Rotenberg is a veteran of what were known as the “crypto wars” of the 1990s, when the N.S.A. proposed the Clipper Chip, a government back door that would be built into every encryption program.

That proposal was defeated by a diverse coalition of technology businesses and privacy advocates, including Mr. Rotenberg’s organization. But the documents make clear that the N.S.A. never gave up on the goal of being able to read everything and has made what memos call “breakthroughs” in recent years in its efforts.

A complicating factor is the role of the major American Internet companies, which have been the target of counterencryption efforts by both the N.S.A. and its closely allied British counterpart, GCHQ. One document describes “new access opportunities” in Google systems; the company said on Thursday that it had not given the agencies access and was aware of no breach of its security.

But the perception of an N.S.A. intrusion into the networks of major Internet companies, whether surreptitious or with the companies’ cooperation, could hurt business, especially in international markets.

“What buyer is going to purchase a product that has been deliberately made less secure?” asked Mr. Holt, the congressman. “Even if N.S.A. does it with the purest motive, it can ruin the reputations of billion-dollar companies.”

In addition, news that the N.S.A. is inserting vulnerabilities into widely used technologies could put American lawmakers and technology companies in a bind with regard to China.

Over the last two years, American lawmakers have accused two of China’s largest telecommunications companies, Huawei Technologies and ZTE, of doing something parallel to what the N.S.A. has done: planting back doors into their equipment to allow for eavesdropping by the Chinese government and military.

Both companies have denied collaborating with the Chinese government, but the allegations have eliminated the companies’ hopes for significant business growth in the United States. After an investigation last year, the House Intelligence Committee concluded that government agencies should be barred from doing business with Huawei and ZTE, and that American companies should avoid buying their equipment.

Some foreign governments and companies have also said that they would not rely on the Chinese companies’ equipment out of security concerns. Last year, Australia barred Huawei from bidding on contracts in Australia’s $38 billion national broadband network. And this year, as part of its effort to acquire Sprint Nextel, SoftBank of Japan pledged that it would not use Huawei equipment in Sprint’s cellphone network.


NSA can access most smartphone data

Source

Report: NSA can access most smartphone data

By FRANK JORDANS, Associated Press

Updated 12:53 pm, Sunday, September 8, 2013

BERLIN (AP) — The U.S. National Security Agency is able to crack protective measures on iPhones, BlackBerry and Android devices, giving it access to users' data on all major smartphones, according to a report Sunday in German news weekly Der Spiegel.

The magazine cited internal documents from the NSA and its British counterpart GCHQ in which the agencies describe setting up dedicated teams for each type of phone as part of their effort to gather intelligence on potential threats such as terrorists.

The data obtained this way includes contacts, call lists, SMS traffic, notes and location information, Der Spiegel reported. The documents don't indicate that the NSA is conducting mass surveillance of phone users but rather that these techniques are used to eavesdrop on specific individuals, the magazine said.

The article doesn't explain how the magazine obtained the documents, which are described as "secret." But one of its authors is Laura Poitras, an American filmmaker with close contacts to NSA leaker Edward Snowden who has published several articles about the NSA in Der Spiegel in recent weeks.

The documents outline how, starting in May 2009, intelligence agents were unable to access some information on BlackBerry phones for about a year after the Canadian manufacturer began using a new method to compress the data. After GCHQ cracked that problem, too, analysts celebrated their achievement with the word "Champagne," Der Spiegel reported.

The magazine printed several slides alleged to have come from an NSA presentation referencing the film "1984," based on George Orwell's book set in a totalitarian surveillance state. The slides — which show stills from the film, former Apple Inc. chairman Steve Jobs holding an iPhone, and iPhone buyers celebrating their purchase — are captioned: "Who knew in 1984...that this would be big brother...and the zombies would be paying customers?"

Snowden's revelations have sparked a heated debate in Germany about the country's cooperation with the United States in intelligence matters.

On Saturday, thousands of people in Berlin protested the NSA's alleged mass surveillance of Internet users. Many held placards with slogans such as "Stop watching us."

Separately, an incident in which a German police helicopter was used to photograph the roof of the American consulate in Frankfurt has caused a minor diplomatic incident between the two countries.

German magazine Focus reported Sunday that U.S. Ambassador John B. Emerson complained about the overflight, which German media reported was ordered by top officials after reports that the consulate housed a secret espionage site.

A U.S. embassy spokesman downplayed the story, saying "the helicopter incident was, naturally enough, the subject of embassy conversation with the Foreign Ministry, but no demarche or letter of complaint about the incident was sent to the German government."

___

Frank Jordans can be reached at http://www.twitter.com/wirereporter


Obama administration had restrictions on NSA reversed in 2011

Sadly Emperor Obama is just as much of a war mongering tyrant as Emperor George W. Bush was.

Source

Obama administration had restrictions on NSA reversed in 2011

By Ellen Nakashima, Published: September 7 E-mail the writer

The Obama administration secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agency’s use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases, according to interviews with government officials and recently declassified material.

In addition, the court extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years — and more under special circumstances, according to the documents, which include a recently released 2011 opinion by U.S. District Judge John D. Bates, then chief judge of the Foreign Intelligence Surveillance Court.

What had not been previously acknowledged is that the court in 2008 imposed an explicit ban — at the government’s request — on those kinds of searches, that officials in 2011 got the court to lift the bar and that the search authority has been used.

Together the permission to search and to keep data longer expanded the NSA’s authority in significant ways without public debate or any specific authority from Congress. The administration’s assurances rely on legalistic definitions of the term “target” that can be at odds with ordinary English usage. The enlarged authority is part of a fundamental shift in the government’s approach to surveillance: collecting first, and protecting Americans’ privacy later.

“The government says, ‘We’re not targeting U.S. persons,’ ” said Gregory T. Nojeim, senior counsel at the Center for Democracy and Technology. “But then they never say, ‘We turn around and deliberately search for Americans’ records in what we took from the wire.’ That, to me, is not so different from targeting Americans at the outset.”

The court decision allowed the NSA “to query the vast majority” of its e-mail and phone call databases using the e-mail addresses and phone numbers of Americans and legal residents without a warrant, according to Bates’s opinion.

The queries must be “reasonably likely to yield foreign intelligence information.” And the results are subject to the NSA’s privacy rules.

The court in 2008 imposed a wholesale ban on such searches at the government’s request, said Alex Joel, civil liberties protection officer at the Office of the Director of National Intelligence (ODNI). The government included this restriction “to remain consistent with NSA policies and procedures that NSA applied to other authorized collection activities,” he said.

But in 2011, to more rapidly and effectively identify relevant foreign intelligence communications, “we did ask the court” to lift the ban, ODNI general counsel Robert S. Litt said in an interview. “We wanted to be able to do it,” he said, referring to the searching of Americans’ communications without a warrant.

Joel gave hypothetical examples of why the authority was needed, such as when the NSA learns of a rapidly developing terrorist plot and suspects that a U.S. person may be a conspirator. Searching for communications to, from or about that person can help assess that person’s involvement and whether he is in touch with terrorists who are surveillance targets, he said. Officials would not say how many searches have been conducted.

The court’s expansion of authority went largely unnoticed when the opinion was released, but it formed the basis for cryptic warnings last year by a pair of Democratic senators, Ron Wyden (Ore.) and Mark Udall (Colo.), that the administration had a “back-door search loophole” that enabled the NSA to scour intercepted communications for those of Americans. They introduced legislation to require a warrant, but they were barred by classification rules from disclosing the court’s authorization or whether the NSA was already conducting such searches.

“The [surveillance] Court documents declassified recently show that in late 2011 the court authorized the NSA to conduct warrantless searches of individual Americans’ communications using an authority intended to target only foreigners,” Wyden said in a statement to The Washington Post. “Our intelligence agencies need the authority to target the communications of foreigners, but for government agencies to deliberately read the e-mails or listen to the phone calls of individual Americans, the Constitution requires a warrant.”

Senior administration officials disagree. “If we’re validly targeting foreigners and we happen to collect communications of Americans, we don’t have to close our eyes to that,” Litt said. “I’m not aware of other situations where once we have lawfully collected information, we have to go back and get a warrant to look at the information we’ve already collected.”

The searches take place under a surveillance program Congress authorized in 2008 under Section 702 of the Foreign Intelligence Surveillance Act. Under that law, the target must be a foreigner “reasonably believed” to be outside the United States, and the court must approve the targeting procedures in an order good for one year.

But — and this was the nub of the criticism — a warrant for each target would no longer be required. That means that communications with Americans could be picked up without a court first determining that there is probable cause that the people they were talking to were terrorists, spies or “foreign powers.”

That is why it is important to require a warrant before searching for Americans’ data, Udall said. “Our founders laid out a roadmap where Americans’ privacy rights are protected before their communications are seized or searched — not after the fact,” he said in a statement to The Post.

Another change approved by Bates allows the agency to keep the e-mails of or concerning Americans for up to six years, with an extension possible for foreign intelligence or counterintelligence purposes. Because the retention period begins “from the expiration date” of the one-year surveillance period, the court effectively added up to one year of shelf life for the e-mails collected at the beginning of the period.

Joel said that the change was intended to standardize retention periods across the agencies and that the more generous standard was “already in use” by another agency.

The NSA intercepts more than 250 million Internet communications each year under Section 702. Ninety-one percent are from U.S. Internet companies such as Google and Yahoo. The rest come from “upstream” companies that route Internet traffic to, from and within the United States. The expanded search authority applies only to the downstream collection.

Barton Gellman contributed to this report.


Journalist Facing Prison Over a Link

Placing a "link" or an "A tag" to a document is a Federal crime???

Placing a "link" or an "A tag" like <a href="xxx"> to a document the government doesn't like is a Federal crime???

"By trying to criminalize linking, the federal authorities ... are suggesting that to share information online is the same as possessing it or even stealing it"

I guess that is just a cockamamie, convoluted, lame excuse to flush the First Amendment down the toilet by Obama's federal goons.

Source

A Journalist-Agitator Facing Prison Over a Link

By DAVID CARR

Published: September 8, 2013

Barrett Brown makes for a pretty complicated victim. A Dallas-based journalist obsessed with the government’s ties to private security firms, Mr. Brown has been in jail for a year, facing charges that carry a combined penalty of more than 100 years in prison.

Professionally, his career embodies many of the conflicts and contradictions of journalism in the digital era. He has written for The Guardian, Vanity Fair and The Huffington Post, but as with so many of his peers, the line between his journalism and his activism is nonexistent. He has served in the past as a spokesman of sorts for Anonymous, the hacker collective, although some members of the group did not always appreciate his work on its behalf.

In 2007, he co-wrote a well-received book, “Flock of Dodos: Behind Modern Creationism, Intelligent Design and the Easter Bunny,” and over time, he has developed an expertise in the growing alliance between large security firms and the government, arguing that the relationship came at a high cost to privacy.

From all accounts, including his own, Mr. Brown, now 32, is a real piece of work. He was known to call some of his subjects on the phone and harass them. He has been public about his struggles with heroin and tends to see conspiracies everywhere he turns. Oh, and he also threatened an F.B.I. agent and his family by name, on a video, and put it on YouTube, so there’s that.

But that’s not the primary reason Mr. Brown is facing the rest of his life in prison. In 2010, he formed an online collective named Project PM with a mission of investigating documents unearthed by Anonymous and others. If Anonymous and groups like it were the wrecking crew, Mr. Brown and his allies were the people who assembled the pieces of the rubble into meaningful insights.

Project PM first looked at the documents spilled by the hack of HBGary Federal, a security firm, in February 2011 and uncovered a remarkable campaign of coordinated disinformation against advocacy groups, which Mr. Brown wrote about in The Guardian, among other places.

Peter Ludlow, a professor of philosophy at Northwestern and a fan of Mr. Brown’s work, wrote in The Huffington Post that, “Project PM under Brown’s leadership began to slowly untangle the web of connections between the U.S. government, corporations, lobbyists and a shadowy group of private military and infosecurity consultants.”

In December 2011, approximately five million e-mails from Stratfor Global Intelligence, an intelligence contractor, were hacked by Anonymous and posted on WikiLeaks. The files contained revelations about close and perhaps inappropriate ties between government security agencies and private contractors. In a chat room for Project PM, Mr. Brown posted a link to it.

Among the millions of Stratfor files were data containing credit cards and security codes, part of the vast trove of internal company documents. The credit card data was of no interest or use to Mr. Brown, but it was of great interest to the government. In December 2012 he was charged with 12 counts related to identity theft. Over all he faces 17 charges — including three related to the purported threat of the F.B.I. officer and two obstruction of justice counts — that carry a possible sentence of 105 years, and he awaits trial in a jail in Mansfield, Tex.

According to one of the indictments, by linking to the files, Mr. Brown “provided access to data stolen from company Stratfor Global Intelligence to include in excess of 5,000 credit card account numbers, the card holders’ identification information, and the authentication features for the credit cards.”

Because Mr. Brown has been closely aligned with Anonymous and various other online groups, some of whom view sowing mayhem as very much a part of their work, his version of journalism is tougher to pin down and, sometimes, tougher to defend.

But keep in mind that no one has accused Mr. Brown of playing a role in the actual stealing of the data, only of posting a link to the trove of documents.

Journalists from other news organizations link to stolen information frequently. Just last week, The New York Times, The Guardian and ProPublica collaborated on a significant article about the National Security Agency’s effort to defeat encryption technologies. The article was based on, and linked to, documents that were stolen by Edward J. Snowden, a private contractor working for the government who this summer leaked millions of pages of documents to the reporter Glenn Greenwald and The Guardian along with Barton Gellman of The Washington Post.

By trying to criminalize linking, the federal authorities in the Northern District of Texas — Mr. Brown lives in Dallas — are suggesting that to share information online is the same as possessing it or even stealing it. In the news release announcing the indictment, the United States attorney’s office explained, “By transferring and posting the hyperlink, Brown caused the data to be made available to other persons online, without the knowledge and authorization of Stratfor and the card holders.”

And the magnitude of the charges is confounding. Jeremy Hammond, a Chicago man who pleaded guilty to participating in the actual hacking of Stratfor in the first place, is facing a sentence of 10 years.

Last week, Mr. Brown and his lawyers agreed to an order that allows him to continue to work on articles, but not say anything about his case that is not in the public record.

Speaking by phone on Thursday, Charles Swift, one of his lawyers, spoke carefully.

“Mr. Brown is presumed innocent of the charges against him and in support of the presumption, the defense anticipates challenging both the legal assumptions and the facts that underlie the charges against him,” he said.

Others who are not subject to the order say the aggressive set of charges suggests the government is trying to send a message beyond the specifics of the case.

“The big reason this matters is that he transferred a link, something all of us do every single day, and ended up being charged for it,” said Jennifer Lynch, a staff lawyer at the Electronic Frontier Foundation, an advocacy group that presses for Internet freedom and privacy. “I think that this administration is trying to prosecute the release of information in any way it can.”

There are other wrinkles in the case. When the F.B.I. tried to serve a warrant on Mr. Brown in March 2012, he was at his mother’s house. The F.B.I. said that his mother tried to conceal his laptop and it charged her with obstruction of justice. (She pleaded guilty in March of this year and is awaiting sentencing.)

The action against his mother enraged Mr. Brown and in September 2012 he made a rambling series of posts to YouTube in which he said he was in withdrawal from heroin addiction. He proceeded to threaten an F.B.I. agent involved in the arrest, saying, “I don’t say I’m going to kill him, but I am going to ruin his life and look into his (expletive) kids ... How do you like them apples?”

The feds did not like them apples. After he was arrested, a judge ruled he was “a danger to the safety of the community and a risk of flight.” In the video, Mr. Brown looks more like a strung-out heroin addict than a threat to anyone, but threats are threats, especially when made against the F.B.I.

“The YouTube video was a mistake, a big one,” said Gregg Housh, a friend of Mr. Brown’s who first introduced him to the activities of Anonymous. “But it is important to remember that the majority of the 105 years he faces are the result of linking to a file. He did not and has not hacked anything, and the link he posted has been posted by many, many other news organizations.”

At a time of high government secrecy with increasing amounts of information deemed classified, other routes to the truth have emerged, many of them digital. News organizations in receipt of leaked documents are increasingly confronting tough decisions about what to publish, and are defending their practices in court and in the court of public opinion, not to mention before an administration determined to aggressively prosecute leakers.

In public statements since his arrest, Mr. Brown has acknowledged that he made some bad choices. But punishment needs to fit the crime and in this instance, much of what has Mr. Brown staring at a century behind bars seems on the right side of the law, beginning with the First Amendment of the Constitution.

E-mail: carr@nytimes.com;

Twitter: @carr2n


Your cellphone: private or not?

Source

Your cellphone: private or not?

Sep. 9, 2013

by Richard Wolf, USA TODAY

Police uncovered Brima Wurie's drug dealing during a routine arrest in Boston six years ago, thanks in part to the frequent calls from "my house" arriving on his flip-top cellphone.

David Riley's participation in a San Diego gang shooting in 2009 was revealed after police stopped his Lexus for having expired tags, found weapons and eventually located incriminating photos and video on his smartphone.

Cellphones - owned by more than nine in 10 American adults - are at the center of a growing legal debate over privacy rights and technology, one that's probably headed to the Supreme Court in the coming months.

As the Wurie and Riley cases illustrate, your cellphone and the intimate information it contains can be used against you. At issue is whether police can search mobile devices upon arrest without first obtaining a warrant - and whether the data inside, from e-mail to the Internet, are fair game.

For the court, it's the latest in a string of Fourth Amendment search and seizure cases involving society's innovations - from the automobile in the past century to the current alphabet soup of DNA, GPS and mobile apps.

"Every generation has its new technologies that raise novel Fourth Amendment questions," says Orin Kerr, an expert on computer crime law at George Washington University Law School. "Technology changes the facts."

The facts about what police can do when making an arrest have been clear for 40 years: They can search the person being arrested and what's within reach, with an eye toward weapons or evidence that could be destroyed.

"It is settled law that a custodial arrest based on probable cause justifies a full search of an arrestee and any items found on him - including items such as wallets, calendars, address books, pagers and pocket diaries," the Obama administration argues in its petition asking the court to hear United States v. Wurie.

Cellphones and, increasingly, smartphones that mimic computers have clouded those facts. At least six federal or state appellate courts have ruled that they are fair game; at least three others have said search warrants are required.

In the past few weeks, the Supreme Court has been asked to hear both the California and Massachusetts cases, which could help restore clarity in Fourth Amendment search and seizure law. The justices probably will decide this fall whether to hear one or both, and a decision is possible next spring.

'THE REAL CHALLENGE' FOR DECADES

In the Wurie case, the Obama administration urges the court to reverse a 1st Circuit appeals court decision against the police search.

"Over the last decade, cellphones have become ubiquitous in the United States," the Justice Department's petition says. "Inexpensive, disposable phones that are difficult to trace are particularly common in drug-trafficking conspiracies."

In Riley v. California, lawyers for the appealing defendant argue that cellphone searches without a warrant are unreasonable.

"A cellphone nowadays is a portal into our most sensitive information and the most private aspects of our lives," says Jeffrey Fisher, lead attorney for David Riley and co-director of Stanford University's Supreme Court Litigation Clinic. "It's also a device that is the gateway to your office, health records, bank records."

Given the volume of lower court cases and split decisions, it's unlikely the Supreme Court can duck the issue, as several justices publicly wished they could do this year on same-sex marriage - an institution that Justice Samuel Alito noted was "newer than cellphones or the Internet."

In fact, Chief Justice John Roberts and some of his colleagues have said the clash between modern technology and privacy rights is likely to become a dominant legal issue in the future.

"I think that is going to be the real challenge for the next 50 years â?? how we do adopt old, established rules to new technology," Roberts said during an appearance at Rice University last year. "What does the Fourth Amendment mean when you can, through technology, literally see through walls with heat imaging? I mean, is that a search and a seizure?"

Such cases, Roberts said, "are difficult for us, frankly, because we're not all technologically expert."

CASE LAW IS 'CONFUSING'

The cases coming before the court for possible consideration have little in common beyond cellphones and criminal behavior.

In the Massachusetts case, police opened Wurie's flip-phone to get the number for the repeated incoming calls. The limited search led them to get a search warrant for his apartment, where they seized crack cocaine, marijuana, cash, a firearm and ammunition. Wurie was convicted and sentenced to more than 20 years in prison.

An appeals court panel reversed on two counts, ruling that the cellphone search violated Wurie's constitutional protection against unreasonable search and seizure. The Justice Department asked the Supreme Court to take the case, contending that "police have full authority not only to seize any object they find on an arrestee, but also to search its contents."

In the California case, a routine traffic stop led police to discover Riley's suspended license. They impounded his car, found two guns under the hood and arrested him for concealing weapons. Upon his arrest and again at the police station, they searched his Samsung smartphone, including text messages, photos and video.

Based on that evidence, Riley was convicted and sentenced to at least 15 years in prison; the conviction was upheld at the state appeals court, and the state Supreme Court refused to reconsider it.

Several experts agree with Fisher that the Riley appeal is more pertinent, both because of today's smartphone technology and the broader police searches that could reveal unrelated data. The Pew Research Center estimates that 56% of Americans have a smartphone, 31% seek medical information on their cellphones, and 29% use them for online banking.

"The Fourth Amendment must be sensitive to new technologies enabling police to easily obtain massive amounts of personal information that, at least as a practical matter, would previously have been inaccessible," Fisher argues in his petition.

What both sides agree on is that the high court should tackle the issue. In the Wurie case, judges on both sides of the ruling appealed for Supreme Court intervention.

"The differing standards which the courts have developed provide confusing and often contradictory guidance to law enforcement," said 1st Circuit Court of Appeals Chief Judge Sandra Lynch in her ruling.

FROM QUILL PENS TO E-MAIL

The history of Supreme Court cases on phone technology has been similarly confusing. In 1928, the court said wiretapping didn't require a warrant. By 1967, it said bugging a phone booth certainly did.

Decisions on Fourth Amendment cases also have gone back and forth. The 1969 case Chimel v. California and 1973's U.S. v. Robinson set the standard for what police could search upon an arrest. But in the past few years, courts from California to Texas to Florida have split over the issue of cellphones and digital content.

"The new frontier of Fourth Amendment jurisprudence continues to expand as technology advances," Matthew Orso, a North Carolina attorney, wrote in a 2010 paper on the subject. "This constant expansion creates difficulty for courts in applying decades-old case law to factual scenarios never before considered."

Not far behind the issue of cellphone searches is another legal conundrum: whether police can get the location of cellphone users from service providers without a warrant. Lower courts have split on that issue as well, making a Supreme Court showdown likely in the future.

Increasingly in recent years, the high court has been asked to take on issues so complex or newfangled as to stump the justices, who live in a marble palace of ivory paper and quill pens.

When the justices ruled unanimously this year that human genes cannot be patented, the depth of knowledge required about genetics prompted Justice Antonin Scalia to disassociate himself from parts of the opinion "going into fine details of molecular biology."

"I am unable to affirm those details on my own knowledge or even my own belief," Scalia said.

Computer technology poses other problems for the court. "E-mail is already old-fashioned," Justice Elena Kagan quipped last month, "and the court hasn't gotten to that yet."

A DIGITAL HARE, A LEGAL TORTOISE

Time doesn't stop for the courts to catch up with modern medicine or technological innovation.

"At every turn, as the digital age hare leaps forward, the constitutional jurisprudence lags, like a tortoise, far behind," says Charles MacLean, an assistant professor at Indiana Tech Law School who has written extensively on the issue. "Perhaps the most unfortunate flaw in the tortoise-hare analogy is that constitutional jurisprudence, unlike Aesop's tortoise, never quite seems to catch up."

MacLean has concluded that legislatures, not courts, should address issues of rapidly changing technology - or else, "the risk is that we defer our privacy limits to programmers and marketers."

When it comes to criminal law involving search and seizure, the court since 2001 has been asked to rule on cases involving thermal imaging, global positional systems (GPS) and deoxyribonucleic acid (DNA):

- In Kyllo v. United States, the court ruled 5-4 that police needed a search warrant to use a thermal imaging device that detected heat used to grow marijuana inside a home.

- In U.S. v. Jones, the court ruled unanimously that police could not attach a GPS device to a car without a warrant in order to monitor its movements. Perhaps the die was cast during oral arguments when Roberts confirmed that otherwise, even the justices' cars could be followed.

- In Maryland v. King, the court ruled 5-4 last year that police can swab the cheek of someone arrested for a serious offense to obtain DNA - which then can be matched against databases of unsolved crimes.

Scalia, who wrote the Kyllo and Jones decisions and frequently sides with defendants in Fourth Amendment cases, wrote a scathing dissent in the King case. He warned that in the future, "your DNA can be taken and entered into a national DNA database if you are ever arrested, rightly or wrongly, and for whatever reason."

Some experts warn that if cellphones go the way of cheek swabs, the arrests that follow could lead to embarrassment or legal complications for otherwise law-abiding citizens.

If that happens, "any offense they can arrest you for, they can search the full contents of the phone," says Adam Gershowitz, a professor at William & Mary Law School and an expert on the subject. "I probably do six things that are illegal on my drive to work every day."


Officials misused U.S. surveillance program

NSA - You don't have any stinking 4th Amendment rights!!!

Source

Docs: Officials misused U.S. surveillance program

Associated Press Tue Sep 10, 2013 5:46 PM

SAN FRANCISCO — U.S. government officials for nearly three years accessed data on thousands of domestic phone numbers they shouldn’t have and then misrepresented their actions to a secret spy court to reauthorize the government’s surveillance program, documents released Tuesday show.

The government’s explanation points to an enormous surveillance infrastructure with such incredible power that even the National Security Agency doesn’t fully know how to properly use it: Officials told a judge in 2009 that the system is so large and complicated that “there was no single person who had a complete technical understanding” of it.

The documents, which the Obama administration was compelled to release as part of a lawsuit by a civil liberties group, show that National Security Agency analysts routinely exceeded their mission to track only phone numbers with reasonable connections to terrorism.

Officials said that the complexity of the computer system — and a misunderstanding of the laws, court orders and internal policies controlling analysts’ actions — contributed to the abuses. There’s no evidence that the NSA intentionally used its surveillance powers to spy on Americans for political purposes, a fear of many critics who recall the FBI’s intrusive surveillance of civil rights leaders and protesters in the 1960s.

“The documents released today are a testament to the government’s strong commitment to detecting, correcting and reporting mistakes that occur in implementing technologically complex intelligence collection activities, and to continually improving its oversight and compliance processes,” said Director of National Intelligence James Clapper. “As demonstrated in these documents, once compliance incidents were discovered in the telephony metadata collection program, additional checks, balances and safeguards were developed to help prevent future instances of noncompliance.”

The Obama administration had earlier conceded that its surveillance program scooped up more domestic phone calls and emails than Congress or a court authorized. But many details of the program’s abuse were not known until Tuesday.

In a sweeping violation of court-imposed surveillance rules that went on daily between 2006 and 2009, the documents show the NSA tapped the bulk telephone records and compared them with thousands of others without “reasonable, articulable suspicion,” the required legal standard.

The NSA told the Foreign Intelligence Surveillance Court it misunderstood restrictions on accessing data once it was archived, but Judge Reggie B. Walton wrote in a March 2009 order that such an interpretation of the court’s orders “strains credulity.” He was so fed up with the government’s overreaching that he threatened to shutter the surveillance program.

After discovering government officials had been accessing domestic phone records for nearly three years without “reasonable, articulate suspicion” that they were connected to terrorism, the judge said in a blistering opinion that he had “lost confidence” in officials’ ability to legally operate the program.

Walton noted, for instance, that just 1,935 phone numbers out of 17,835 on a list investigators were working with in early 2009 met the legal standard.

The judge ordered the NSA to conduct an “end-to-end” review of its processes and policies while also ordering closer monitoring of its activities.

Later in 2009, a Justice Department lawyer reported to the spy court a “likely violation” of NSA surveillance rules. The lawyer said that in some cases, it appeared the NSA was distributing the sensitive phone records by email to as many as 189 analysts, but only 53 were approved by the spy court to see them.

Walton wrote that he was “deeply troubled by the incidents,” which he said occurred just weeks after the NSA had performed a major review of its internal practices because of the initial problems reported earlier in the year.

The hundreds of previously classified documents federal officials released Tuesday came in response to a lawsuit filed by the Electronic Frontier Foundation.

The Obama administration has been facing mounting pressure to reveal more details about the government’s domestic surveillance program since a former intelligence contractor released documents showing massive trawling of domestic data by the NSA.

The data included domestic telephone numbers, calling patterns and the agency’s collection of Americans’ Internet user names, IP addresses and other metadata swept up in surveillance of foreign terror suspects.

The Obama administration’s decision to release the documents comes just two weeks after it declassified three secret Foreign Intelligence Surveillance Court opinions — including one in response to a separate EFF lawsuit in the federal court in Washington. In that October 2011 opinion, Judge John D. Bates said he was troubled by at least three incidents over three years where government officials admitted to mistaken collection of domestic data.

The NSA’s huge surveillance machine proved unwieldy even for the experts inside the agency. In a long report to the surveillance court in August 2009, the Obama administration blamed its mistakes on the complexity of the system and “a lack of shared understanding among the key stakeholders” about the scope of the surveillance.


Previous articles on Edward Snowden NSA Freedom Fighter!!!

More articles on Edward Snowden NSA Freedom Fighter!!!

 
Homeless in Arizona

stinking title