Attkisson: Media no longer follows rules because of Trump
Trump administration’s fight against fake news
Sharyl Attkisson – Trump DOJ & State Withholding Fast & Furious Documents
Lars Larson Show with Sharyl Attkisson
Sharyl Attkisson speaks out about Obama-era surveillance
Sharyl Attkisson: why she left CBS
PLC2015 Sharyl Attkission Q and A
How Real Is Fake News? | Sharyl Attkisson | TEDx University of Nevada
Sharyl Attkisson: “Journalism is suffering from a crisis of its own making”
Sharyl Attkisson Keynote: The Rightful Owners of Public Information
“Investigative Journalism and the Obama Administration” – Sharyl Attkisson
Atkisson: I’ve never seen journalists so uncurious about spying
Astroturf and manipulation of media messages | Sharyl Attkisson | TEDxUniversityofNevada
Sharyl Attkisson: ‘Government Hacked Me” | msnbc
Sharyl Attkisson Talks “Stonewalled”
Richard Nixon Foundation
Published on Mar 11, 2015
March 10, 2015: Author of Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation and Harassment in Obama’s Washington The Emmy-award winner spoke of how she was the target of hacking and surveillance while reporting in Washington DC and offered an incisive critique of the media and the shrinking role of investigative journalism in today’s world. Sharyl Attkisson has been a journalist for more than 20 years. During that time she has exposed scandals and covered controversies under both Republican and Democratic administrations.
Full Measure with Sharyl Attkisson is television’s most original Sunday news program. The program specializes in fearless reporting on untouchable subjects to bring you stories you won’t see anywhere else. The host is investigative journalist Sharyl Attkisson, five-time Emmy Award winner and recipient of the Edward R. Murrow award for investigative reporting. Attkisson is backed by a team of award winning journalists.
FULL MEASURE: September 23, 2018 – Uneven Admissions
FULL MEASURE: September 23, 2018 – Flood Funding
FULL MEASURE: September 16, 2018 – Anti-Sanctuary
FULL MEASURE: September 10, 2017 – Apocalypse When
FULL MEASURE: September 9, 2018 – Raven 23
FULL MEASURE: SEPTEMBER 2, 2018
Full Measure: Season 3, Episode 38
FULL MEASURE: April 15, 2018 – DNA Database
FULL MEASURE: April 1, 2018 – Snowflake Syndrome Part 2
FULL MEASURE: February 18, 2018 – Washington’s Press
FULL MEASURE: February 18, 2018 – Russia Probe
FULL MEASURE: January 21, 2018 – Cram Culture
FULL MEASURE: January 21, 2018 – Trump and Media
Full Measure Continuing Coverage: Swamp Creatures
FULL MEASURE: November 12, 2017 – The Big Miss Revisited
FULL MEASURE: October 29, 2017 – High-Speed Spending
Sharyl Attkisson
American author
Sharyl Attkisson is an American author and host of the weekly Sunday public affairs program Full Measure with Sharyl Attkisson, which airs on television stations operated by the Sinclair Broadcast Group. She was formerly an investigative correspondent in the Washington bureau for CBS News. Wikipedia
Sharyl Attkisson (born January 26, 1961[4]) is an American author and host of the weekly Sunday public affairs program Full Measure with Sharyl Attkisson, which airs on television stations operated by the Sinclair Broadcast Group.[5] She was formerly an investigative correspondent in the Washington bureau for CBS News. She had also substituted as anchor for the CBS Evening News. She resigned from CBS News on March 10, 2014, after 21 years with the network. Her book Stonewalled reached number 3 on The New York Times e-book non-fiction best seller list in November 2014[6] and number 5 on The New York Times combined print and e-book non-fiction best-seller list the same week.[7]
Attkisson began her broadcast journalism career in 1982 as a reporter at WUFT-TV, the PBS station in Gainesville, Florida. She later worked as an anchor and reporter at WTVX-TV Fort Pierce/West Palm Beach, Florida from 1982–1985, WBNS-TV, the CBS affiliate in Columbus, Ohio from 1985–86, and WTVT Tampa, Florida (1986–1990).[10]
1990s
From 1990–1993, Attkisson was an anchor for CNN, and also served as a key anchor for CBS space exploration coverage in 1993.[11] Attkisson left CNN in 1993,[12] moving to CBS, where she anchored the television news broadcast CBS News Up to the Minute and became an investigative correspondent based in Washington, D.C.[10]
She served on the University of Florida‘s Journalism College Advisory Board (1993–1997) and was its chair in 1996.[10] The University gave her an Outstanding Achievement Award in 1997. From 1997 to 2003, Attkisson simultaneously hosted CBS News Up to the Minuteand the PBS health-news magazine HealthWeek.[13]
In 2002, she co-authored a college textbook, Writing Right for Broadcast and Internet News; later that same year she won an Emmy Award for her Investigative Journalism about the American Red Cross.[10] The award was presented in New York City on September 10, 2002.[16] Attkisson was part of the CBS News team that received RTNDA-Edward R. Murrow Awards in 2005 for Overall Excellence.[14]
In 2006, Attkisson served as Capitol Hill correspondent for CBS,[17] as one of a small number of female anchors covering the 2006 midterms.[18] Attkisson was part of the CBS News team that received RTNDA-Edward R. Murrow Awards in 2008 for Overall Excellence.[14]
In 2008, Attkisson reported that a claim by Hillary Clinton to have dodged sniper fire in Bosnia was unfounded: Clinton’s trip to Bosnia was risky, Attkisson said, but no real bullets were dodged. Attkisson was on the trip with Clinton.[19] The day after Attkisson’s report on the CBS Evening News, Clinton admitted there was no sniper fire and said she “misspoke.” [20][21] In 2009, Attkisson won an Investigative Emmy Award for Business and Financial Reporting for her exclusive reports on the Troubled Asset Relief Program (TARP) and the bank bailout.[14] The award was presented on December 7 at Fordham University‘s Lincoln Center Campus in New York City.[22]
2010s
Attkisson returned to the University of Florida as a keynote speaker at the College of Journalism and Communications in 2010.[9] That same year, she received an Emmy Award nomination for her investigations into members of Congress, and she also received a 2010 Emmy Award nomination for her investigation into waste of tax dollars.[23] In July 2011, Attkisson was nominated for an Emmy Award for her Follow the Money investigations into Congressional travel to the Copenhagen climate summit, and problems with aid to Haiti earthquake victims.[14][24]
In 2011, Paul Offit criticized Attkisson’s reporting on vaccines as “damning by association” and lacking sufficient evidence in his book Deadly Choices .[25] In the medical literature, Attkisson has been accused of using problematic rhetorical tactics to “imply that because there is no conclusive answer to certain problems, vaccines remain a plausible culprit.”[26]
In June 2012, Attkisson’s investigative reporting for the Gunwalker story also won the CBS Evening News the Radio and Television News Directors Association’s National Edward R. Murrow Award for Excellence in Video Investigative Reporting. The award was presented October 8, 2012 in New York City.[28] In July 2012, Attkisson’s Gunwalker: Fast and Furious reporting received an Emmy Award.[29]
On March 10, 2014, Attkisson resigned from CBS News in what she stated was an “amicable” parting.[30][31]Politico reported that according to sources within CBS there had been tensions leading to “months of hard-fought negotiations” – that Attkisson had been frustrated over what she perceived to be the network’s liberal bias and lack of dedication to investigative reporting, as well as issues she had with the network’s corporate partners, while some colleagues within the network saw her reporting as agenda-driven and doubted her impartiality.[31]
Later that year, her book Stonewalled: One Reporter’s Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington (Harpers) was published.[7] In this work, she accused CBS of protecting the Obama administration by not giving enough coverage to such stories as the 2012 Benghazi attack and slow initial enrollments under Obamacare.[32] The book was a New York Times Best Seller.[7]
The Smear: How Shady Political Operatives and Fake News Control What You See, What You Think, and How You Vote was published by HarperCollins in summer 2017.[33]
Report of Attkisson’s computer being hacked
In May 2013, while still employed at CBS, Attkisson alleged that her personal and work computers had been “compromised” for more than two years.[34]CBS News stated that it had investigated her work computer and found evidence of multiple unauthorized accesses by a third party in late 2012.[35] The U.S. Department of Justice denied any involvement.[36] In her 2014 book, she reported that a forensic examination revealed that her personal computer was hacked with keystroke logging spyware, enabling an intruder to read all her e-mail messages and gain access to the passwords for her financial accounts.[37]
In late January 2015, Attkisson appeared before the Senate Judiciary Committee[38] during a confirmation hearing for Loretta Lynch, President Obama’s nominee to replace outgoing Attorney General Eric Holder. As part of her appearance in front of that committee, a report by the Office of Inspector General (OIG) was released[39] stating that “their investigation was not able to substantiate… allegations that Attkisson’s computers were subject to remote intrusions by the FBI, other government personnel, or otherwise” and the deletion seen in Attkisson’s video “appeared to be caused by the backspace key being stuck, rather than a remote intrusion”.[40][41][42] “CBS News told the OIG that they did not conduct any analysis on her personal computer.”[43]
In February 2015, The Washington Examiner clarified that the OIG did not examine the CBS News computer that Attkison claimed was compromised, but only inspected Attkisson’s personal devices.[44]
In March 2015, Attkisson and her family filed a suit against Holder, Patrick R. Donahoe and unnamed agents of the US Department of Justice, the US Postal Service and the United States in the Superior Court of the District of Columbia claiming to have been subject to illegal surveillance activities.[45][46] Her claim was dismissed in 2017, with the court finding “that the complaint fails to allege sufficient facts [which] make a plausible claim that either defendant personally engaged in the alleged surveillance”.[47]
Personal life
Attkisson has reached fourth-degree black belt in taekwondo.[8] She is married and has a daughter.[48]
Nigel Farage on Trump’s ‘bombshell’ Brexit intervention
Brexit: Why Britain Left the European Union
Donald Trump casts doubt on how Brexit will go for Britain – Daily Mail
Donald Trump accuses PM of WRECKING Brexit during UK visit
Trump-May Wrecking Ball: President makes a series of critical comments to British newspaper
Susanna Reid Debates Steve Bannon over Trump’s Brexit Criticism | Good Morning Britain
Press conference : Donald Trump and Theresa May – BBC News
Jacob Rees-Mogg Answers Questions About Chequers Brexit Meeting
NIGEL FARAGE Turned up the heat on May’s Brexit paper – Makes a US trade deal ‘virtually impossible’
“This time – no more Mr Nice Guy” | Nigel Farage talks to James Whale over Brexit chaos
Rees-Mogg PRAISES Trump’s Brexit criticism for pointing out holes in May’s white paper
Theresa May’s Complete Brexit Betrayal
May Defends Brexit Amid Tory Chaos
Prime Minister Theresa May defends Brexit plan
Theresa May addresses David Davis and Boris Johnson resignations – Daily Mail
David Davis explains why he resigned as Brexit Secretary | ITV News
What’s next for Theresa May? – BBC Newsnight
Expert: UK would be in better position on Brexit if not for infighting | In The News
Another Brexit crisis moment for Theresa May
Tory civil war amid plot to bring down PM over Brexit policy
Brexit: Britain’s Great Escape
Brexit: A Very British Coup?
Nigel Farage on returning to politics, Trump, Theresa May and Article 50
Brexit The Movie
Trump tells Theresa May her soft Brexit plan will ‘kill’ any US trade deal after Britain leaves the EU, adds Boris will make a great PM and blames Sadiq Khan for terrorism in explosive start to UK visit
Trump said the PM has ignored his advice on Brexit negotiations, explaining: ‘I would have done it differently’
Sources close to president earlier warned lucrative transatlantic trade deal cannot happen with a soft Brexit
It comes after May used a lavish welcome dinner for Trump at Blenheim Palace to press her case for a deal
PUBLISHED: 16:40 EDT, 12 July 2018 | UPDATED: 10:37 EDT, 13 July 2018
Donald Trump sent the Special Relationship into meltdown today after lobbing a series of extraordinary verbal hand grenades at Theresa May on his visit to the UK.
The US president tore up diplomatic niceties to deliver a series of crushing blows to the PM, warning that her soft Brexit plan would ‘kill’ a trade deal with the US – and heaping praise on Boris Johnson, who quit in protest earlier this week.
Rampaging unapologetically into domestic politics, Mr Trump said Mrs May had ignored his advice to face down the EU in negotiations and condemned slack controls on immigration.
The bombshell intervention left ministers struggling to come up with a response, just hours before Mrs May is due to host the president at Chequers for talks on the second anniversary of her premiership.
Downing Street is braced for him to double down on his criticism at a joint press conference in what could be a devastating humiliation as she struggles to cling on to power amid a huge revolt by Tory Eurosceptics.
Foreign Office minister Alan Duncan was sent out to try to put a brave face on the embarrassment this morning, stretching credibility by insisting the government did not regard Mr Trump’s behaviour as ‘rude’.
‘Donald Trump is in many ways a controversialist, that’s his style, that’s the colour he brings to the world stage,’ he told BBC Radio 4’s Today programme.
Chancellor Philip Hammond, in Brussels for meetings, suggested the president had not yet studied the government’s Brexit plans properly.
But many MPs made no effort to hide their outrage – with universities minister Sam Gyimah tweeting: ‘Where are your manners, Mr President?’
Tory backbencher Sarah Wollaston raged that Mr Trump was ‘determined to insult’ Mrs May. In a sign of the growing chaos in UK politics, shadow foreign secretary Emily Thornberry also leapt to Mrs May’s defence, branding him ‘extraordinarily rude’.
‘She is his host. What did his mother teach him?’ Mrs Thornberry said.
US President Donald Trump and First Lady Melania Trump are welcomed at Blenheim Palace by Britain Prime Minister Theresa May and her husband Philip May
From left, first lady Melania Trump, President Donald Trump, British Prime Minister Theresa May and her husband Philip May watch during the arrival ceremony at Blenheim Palace
Awkwardly grabbing Theresa May hand – in a replay of their White House meeting last year – Trump was treated to a fanfare welcome by the Scots, Irish and Welsh Guards bands
Video playing bottom right…
President Trump’s wife Melania wore a floor-length, pleated buttercup yellow gown for her first visit to Britain as First Lady
President Trump and his wife walked hand-in-hand to Marine One which flew them from London to the evening’s gala dinner
US First Lady Melania Trump, US President Donald Trump, Britain’s Prime Minister Theresa May and her husband Philip May stand on steps in the Great Court watching and listening to the bands of the Scots, Irish and Welsh Guards perform a ceremonial welcome
Theresa May has used a lavish welcome dinner for Donald Trump at Blenheim Palace to press her case for an ambitious new trade deal with the US after Brexit
Britain and the US are the largest investors in each other’s economies, with over a trillion dollars of investments between them, said Mrs May (left with her husband, right with Trump)
Fanfare: Bandsmen from the Scots, Welsh and Irish Guards welcomed the Presidential party to Blenheim Palace last night
Dignitaries including International Trade minister Liam Fox (centre) awaited the President’s arrival for the Blenheim dinner
Mr Trump’s outburst emerged last night just as Mrs May feted him at a lavish business dinner at Blenheim Palace – the family home of his hero Winston Churchill in Oxfordshire.
As the leaders posed for the cameras, even holding hands at one point, it was revealed that Mr Trump had launched a full-scale attack on Mrs May’s leadership in an interview with The Sun before arriving in Britain.
Giving a withering assessment of her Brexit plan to align with EU rules to ease trade and keep a soft Irish border, he said: ‘If they do a deal like that, we would be dealing with the European Union instead of dealing with the UK, so it will probably kill the deal. I actually told Theresa May how to do it, but she didn’t listen to me’.
Sources close to the president earlier warned that a lucrative transatlantic trade deal would be impossible if the UK keeps close ties with Brussels – effectively meaning Britain must choose between the US and EU.
In an interview with the British newspaper, Mr Trump said he thought Boris Johnson would make a ‘great prime minister’ and that he was ‘saddened’ the former foreign secretary was out of the government.
The president also renewed his war of words with Sadiq Khan, saying the London mayor has ‘done a very bad job on terrorism’.
He said he thought that allowing ‘millions and millions’ of people into Europe was ‘very sad’ and pointed to crime being ‘brought in’ to London, criticising the Labour mayor for failing to deal with it.
Europe, he added, is ‘losing its culture’ because of mass migration and warned it will never be the same again unless leaders act quickly.
‘Look around,’ he said. ‘You go through certain areas that didn’t exist ten or 15 years ago.’ He added: ‘Allowing the immigration to take place in Europe is a shame.’
The White House tried to go on cleanup duty after the explosive interview.
‘The President likes and respects Prime Minister May very much,’ White House press secretary Sarah Sanders said in a statement.
‘As he said in his interview with the Sun she ‘is a very good person’ and he ‘never said anything bad about her.’ He thought she was great on NATO today and is a really terrific person.’
Donald Trump and Theresa May give press conference at Chequers
Protests against Mr Trump are taking place in central London today, with a ‘Baby Trump’ blimp flying in Parliament Square
In an apparent plea to the president to remember his allies when he meets Vladimir Putin in Helsinki in Monday, May noted that Britain and America work closely together in the interests of their shared security, ‘whether through targeting Daesh terrorists or standing up to Russian aggression’
She continued: ‘He is thankful for the wonderful welcome from the Prime Minister here in the U.K.’
Discussing protests – including the decision by anti-Trump activists to fly a giant blimp of the president wearing a nappy over the capital – he said they made him feel unwelcome in London.
He added that he used to love the city, but now feels little reason to go there because of the animosity directed towards him.
But he did say he respected the Queen, telling The Sun she is a ‘tremendous woman’ who has never made any embarrassing mistakes.
And the president also said he loves the UK and believes the British people ‘want the same thing I want’.
Mrs May had been trying to use the lavish welcome dinner for Mr Trump at Blenheim Palace to press her case for an ambitious new trade deal with the US after Brexit.
The president arrived in Marine One in a tuxedo alongside First Lady Melania, wearing a floor-length, pleated buttercup yellow gown.
Awkwardly grabbing Theresa May’s hand – in a replay of their White House meeting last year – Trump was treated to a fanfare welcome by the Welsh, Irish and Scots Guards’ bands.
The president was given a performance of Amazing Grace featuring a bagpipe solo during his red-carpet reception as well as Liberty Fanfare and the National Emblem.
Critics of the Prime Minister’s proposals for future relations with the EU claim that her willingness to align with Brussels rules on agricultural produce will block a US deal.
That is because Washington is certain to insist on the inclusion of GM crops and hormone-enhanced beef, which are banned in Europe.
But addressing the US president in front of an audience of business leaders at Winston Churchill’s birthplace, Mrs May insisted that Brexit provides an opportunity for an ‘unprecedented’ agreement to boost jobs and growth.
Noting that more than one million Americans already work for British-owned firms, she told Mr Trump: ‘As we prepare to leave the European Union, we have an unprecedented opportunity to do more.
Mrs May said that the history, language, values and culture shared by the UK and US ‘inspire mutual respect’ and make the two nations ‘not just the closest of allies, but the dearest of friends’
A member of security cleans the limousine of U.S. President Donald Trump and First Lady Melania Trump at Blenheim Palace this evening
President Trump is welcomed to Blenheim Palace by Theresa May
‘It’s an opportunity to reach a free trade agreement that creates jobs and growth here in the UK and right across the United States.
‘It’s also an opportunity to tear down the bureaucratic barriers that frustrate business leaders on both sides of the Atlantic.
‘And it’s an opportunity to shape the future of the world through co-operation in advanced technology, such as artificial intelligence.’
She also highlighted the importance of trans-Atlantic business links to a president who has sometimes seemed more interested in forging new links with former adversaries around the world than nurturing long-standing partnerships.
Britain and the US are the largest investors in each other’s economies, with over a trillion dollars of investments between them, said Mrs May.
And she told the president: ‘The strength and breadth of Britain’s contribution to the US economy cannot be understated.
‘The UK is the largest investor in the US, providing nearly a fifth of all foreign investment in your country.
‘We invest 30 per cent more than our nearest rival. More than 20 times what China invests. And more than France and Germany combined.
‘That all means a great deal more than simply numbers in bank accounts.
Trump says May’s Brexit plan may not be what Britons ‘voted for’
The Duke of Malborough, James Spencer-Churchill (right in both photos above), with his son The Marquess of Blandford, who both welcomed the Trumps to their ancestral home Blenheim Palace
Defence Secretary Gavin Williamson arrives in a tuxedo at Blenheim Palace as President Donald Trump is given a formal welcome
Guests are expected to enjoy a meal of Scottish salmon, English beef and a desert of strawberries and cream. Pictured: William Hague arrives
Foreign Secretary Jeremy Hunt and his wife Lucia arrive at Blenheim Palace, Oxfordshire, for a dinner hosted by Prime Minister Theresa May for President Donald Trump
‘It means jobs, opportunities and wealth for hardworking people right across America.’
British firms represented at the Blenheim banquet alone employ more than 250,000 people in the US, she said.
Mr Trump earlier made clear that he did not approve of the softer stance the PM has been advocating despite fury from many Tory MPs.
‘Brexit is Brexit, the people voted to break it up so I would imagine that is what they’ll do, but they might take a different route. I’m not sure that’s what people voted for,’ Mr Trump said.
Mrs May dismissed the criticism as she departed the summit this afternoon, telling journalists: ‘We have come to an agreement at the proposal we’re putting to the European Union which absolutely delivers on the Brexit people voted for.
‘They voted for us to take back control of our money, our law and our borders and that’s exactly what we will do’.
Protesters against Donald Trump gather outside Blenheim Palace
The Presidential helicopter Marine One ferried the Trumps from the US ambassador’s residence in London to Blenheim Palace
Protesters gathered at the security fence watch as US President Donald Trump and US First Lady Melania Trump leave in Marine One from the US ambassador’s residence, Winfield House
Several protesters hold up their placards outside Blenheim Palace, where President Donald Trump will have dinner tonight
Anti-Trump activists gather outside the ‘Ring of Steel’ fence put up to secure the president when he stays in Regent’s Park, London
The protesters promised to create a ‘wall of sound’ outside the official US ambassador’s residence. Above, a woman strikes a colander with a ladle while others hold up signs expressing disapprobation of the president
Mr Trump also said the UK was a ‘pretty hot spot right now’ with ‘lots of resignations’.
‘Brexit is – I have been reading about Brexit a lot over the last few days and it seems to be turning a little bit differently where they are getting at least partially involved back with the European Union,’ he said.
‘I have no message it is not for me to say…’
He added: ‘I’d like to see them be able to work it out so it can go quickly – whatever they work out.
‘I would say Brexit is Brexit. When you use the term hard Brexit I assume that’s what you mean.
‘A lot of people voted to break it up so I would imagine that’s what they would do but maybe they are taking a little bit of a different route. I don’t know if that’s what they voted for.
‘I just want the people to be happy…..I am sure there will be protests because there are always protests.’
Speaking about the prospect of demonstrations in the UK over his visit, Mr Trump told reporters: ‘They like me a lot in the UK. I think they agree with me on immigration.’
Angry anti-Trump activists hold up signs and bang pots and colanders outside the US ambassador’s Regent’s Park residence
He added: ‘I think that’s why Brexit happened.’
Mrs May was joined at Blenheim by ministers including Chancellor Philip Hammond, Foreign Secretary Jeremy Hunt, Defence Secretary Gavin Williamson, Trade Secretary Liam Fox, Business Secretary Greg Clark, Transport Secretary Chris Grayling and her effective deputy David Lidington.
Boris Johnson missed out on a seat at the table by resigning as foreign secretary on Monday in protest at Mrs May’s Brexit policy, though Mr Trump has said he might try to speak to him during his visit.
Mrs May, dressed in an ankle length red gown and red high heeled shoes, and her husband Philip, in black tie, welcomed Mr Trump and wife Melania to the gala dinner on the first evening of the President’s working visit to the UK.
Mrs Trump was dressed in a floor length yellow ball gown.
In a near replay of their famous hand-holding at the White House, the president briefly took Mrs May’s hand as they went up the stairs into the palace.
The Trumps arrived from London by Marine One helicopter before being driven in the armoured presidential limousine, nicknamed The Beast, to the opulent 18th century palace near Woodstock in Oxfordshire.
Built for the Duke of Marlborough in recognition of his military victories and named a Unesco World Heritage Site, Blenheim is one of a series of historic architectural gems Mr Trump will visit on a four-day trip.
His arrival was marked by a military ceremony, with bandsmen of the Scots, Irish and Welsh Guards playing the Liberty Fanfare, Amazing Grace and the National Emblem.
Leaders of the financial services, travel, creative, food, engineering, technology, infrastructure, pharmaceutical and defence sectors were among around 100 guests who dined on Scottish salmon, English Hereford beef fillet and strawberries with clotted cream ice-cream.
Mrs May told him: ‘Mr President, Sir Winston Churchill once said that ‘to have the United States at our side was, to me, the greatest joy’.
‘The spirit of friendship and co-operation between our countries, our leaders and our people, that most special of relationships, has a long and proud history.
‘Now, for the benefit of all our people, let us work together to build a more prosperous future.’
Mrs May said that the history, language, values and culture shared by the UK and US ‘inspire mutual respect’ and make the two nations ‘not just the closest of allies, but the dearest of friends’.
Blenheim’s glorious history: From 18th century gift to a victorious general to birthplace of Winston Churchill
Presented by Queen Anne to the Duke of Marlborough, John Churchill in 1704, Blenheim Palace has always been a symbol of British pride.
The astonishing Oxfordshire pile has seen everything from Sir Winston Churchill’s birth in 1874 to two World Wars in which it acted both as a military hospital and a college for boys.
Churchill, who also married his wife, Clementine Hozier at the palace once said: ‘At Blenheim I took two very important decisions; to be born and to marry. I am content with the decision I took on both occasions…’
The baroque-style site set in 11,500 acres was listed as a World Heritage site by UNESCO in 1987 and is owned by 13 trustees including Sir Rocco Forte of Rocco Forte Hotels.
Currently the 12th Duke of Marlborough, Jamie Blandford, and his family live in a section of the palace, although he does not appear to be on the board of trustees.
The astonishing Oxfordshire pile has seen everything from Sir Winston Churchill’s birth in 1874 to two World Wars in which it acted both as a military hospital and a college for boys
Churchill, who also married his wife, Clementine Hozier at the palace once said: ‘At Blenheim I took two very important decisions; to be born and to marry. I am content with the decision I took on both occasions…’
In more recent years, Blenheim has been used as a set in a number of blockbuster films.
The famous ‘Harry Potter tree’ that appeared in Severus Snape’s flashback scene in Harry Potter and the Order of the Phoenix still stands in the palace grounds, despite fears the ancient Cedar had developed a deadly disease two years ago.
The palace’s additional film credits include the James Bond film, Spectre 007, in which it doubled as Rome’s Palazzo Cadenza, and Mission Impossible – Rogue Nation, in which the building’s Green Writing Room acted as the set for a crucial meeting between the British Prime Minister and a secret agent.
Perhaps Mission Impossible’s location team were inspired by the events of September 1940, when MI5 used Blenheim Palace as a real-life base.
Originally called Woodstock Manor, the land was given to the first Duke of Marlborough by the British in recognition of an English victory over the French in the war of the Spanish Succession.
A Column of Victory stands central to the 2,000 acres of parkland and 90 acres of formal garden landscaped by Lancelot ‘Capability’ Brown.
At 134ft-tall the monument depicts the first Duke of Marlborough as a Roman General.
Meanwhile the magnificent Baroque palace was designed by Sir John Vanbrugh who reportedly aimed to create a ‘naturalistic Versailles’.
In an apparent plea to the president to remember his allies when he meets Vladimir Putin in Helsinki in Monday, she noted that Britain and America work closely together in the interests of their shared security, ‘whether through targeting Daesh terrorists or standing up to Russian aggression’.
The Countess of Wessex’s Orchestra played British and American hits of the 20th century during dinner.
And Mr Trump, whose mother was Scottish, was due to be piped out by the Royal Regiment of Scotland as he and Melania left to spend the night at the US ambassador’s residence in London’s Regent’s Park.
Outside the palace gates, several hundred protesters waved banners and placards reading Dump Trump, Not Welcome Here, Protect children Not Trump and Keep Your Tiny Hands Off My P****!
Trump touched down in Britain for his first official visit early yesterday after landing at Stansted Airport
He said: ‘I think they like me a lot in the UK’
Most people, a number of whom said they worked at the embassy in London, were tight-lipped as they left a secured area in the park near the US ambassador’s residence, where Mr Trump and his wife Melania stayed overnight.
Some cited ‘job restrictions’ while another said he was wary of the press. But one woman said Mr Trump had given a ‘short speech’ which she described as ‘lovely’.
US President Donald Trump and First Lady Melania were given a guard of honour by the RAF after arriving in the UK today
Earlier President Trump and Melania walked from Air Force One as they landed at Stansted Airport this afternoon
Britain’s most elite counter terrorism police unit CTSFO are also shadowing the US President during his high-profile stay
The exterior of The Trump Arms public house in west London, formally named The Jameson, which has embraced the arrival of US President Donald Trump. Damien Smyth, from County Antrim in Northern Ireland, runs the establishment. He told the i newspaper: ‘America is our biggest ally. They’re our best friends in the world. They’d be the ones here first if something went wrong – not Germany, not France. I think these people protesting his visit are rude and insulting’
Donald Trump raises his fist in the air as he lands at the US Ambassador’s historic London home at the start of his four-day tour
Marine One carrying The Donald and his wife passes the BT Tower and comes in to land at the US Ambassador’s central London residence this afternoon
Another man, who did not wish to give his name, said: ‘It was very complimentary to England and to the allies that we have, very positive.’
The US President, 72, who will meet the Prime Minister and Queen during a four-day red carpet visit, landed at Stansted Airport on Air Force One at just before 2pm and walked off hand-in-hand with First Lady Melania.
America’s Commander-in-Chief has 1,000 of his own staff in the UK and a giant motorcade led by his bomb-proof Cadillac nicknamed ‘The Beast’ as well as multiple helicopters including Marine One to fly him around.
The President and his First Lady were met on the tarmac by US Ambassador Woody Johnson and UK Trade Secretary Liam Fox before he was whisked off to Mr Johnson’s house near Regent’s Park.
Earlier Mr Trump gave an extraordinary press conference in Brussels after giving NATO leaders a bruising over defence cash, where he wrote off protesters and said Theresa May’s Brexit deal probably wasn’t what Britons voted for.
When asked about the threat of mass demonstrations he said: ‘I think it’s fine. A lot of people like me there. I think they agree with me on immigration. I think that’s why Brexit happened’.
President Donald Trump and First Lady arrive at Stansted Airport
Donald Trump salutes the US Marines who flew him from Stansted to Regent’s Park in London on the first day of his four-day tour
Mr Trump and Melania hold hands and talk to US Ambassador Woody Johnson, who will give them a place to stay tonight
Marine One, the President’s helicopter, is one of a large number of aircraft he has brought with him for the British visit (shown here landing with him inside)
His aerial entourage followed him, and included an Osprey helicopter carrying elite troops from the US Marine Corps protecting him in the UK
Protesters, meanwhile, staged a noisy gathering near Winfield House where Trump and his wife Melania spent the night.
A large group of demonstrators adopted an alternative version of England’s World Cup anthem Three Lions as they sang and shouted, ‘He’s going home, he’s going home, he’s going, Trump is going home’ in Regent’s Park.
A wide range of campaigners, including unions, faith and environmental groups came together to unite in opposition to Mr Trump’s visit to the UK, organisers said.
Bells and whistles rang out alongside cheers and claps for speakers throughout the protest, staged near the US ambassador’s official residence, as the crowd was encouraged to shout loudly in the hope Mr Trump could hear.
Placards including ‘Dump Trump’ and ‘Trump not welcome’ were held aloft by the enthusiastic crowd before some began banging on the metal fence which has been erected in the park.
A clip of what organisers said was the sound of children crying at the US border after being separated from their parents was played and described by those listening as ‘disgusting’.
Donald Trump’s motorcade speeds through Regent’s Park led by elite British police from Scotland Yard
Marine One comes in to land at the US Ambassador’s central London residence this afternoon, which sits next door to the London Central Mosque in Regent’s Park (minaret pictured)
Days of protests are planned for The Donald’s visit, including a march through central London tomorrow and everywhere he is visiting
The ‘Nuclear Football’ – the suitcase containing the United States’ nuclear codes – is shown being carried by a member of Trump’s entourage after the president landed in Stansted
This giant and controversial Trump balloon showing the world leader in a nappy will be flying over London this weekend
Sam Fullerton from Oklahoma said while Mr Trump may not see the protest from Winfield House which is set back inside the fenced-off area in the park, he hoped he would hear it or see it on television.
Mr Fullerton said: ‘He watches a lot of TV so he’ll see it on TV. Or they may be out in the backyard.’
His wife Jami, a Hillary Clinton supporter, said the protest was ‘democracy at its finest’.
‘I’m here to witness democracy outside of our own country to see how other democratic societies express themselves,’ she said.
‘I think it’s great. The British are pretty gentle people.’
John Rees, of the Stop The War group, described Mr Trump as a ‘wrecking ball’ as he addressed those gathered.
He said: ‘He’s a wrecking ball for race relations, he’s a wrecking ball for prosperity, he’s a wrecking ball for women’s rights, he’s a wrecking ball for any peace and justice in this world and we have to stop him.’
Some of those gathered said they planned to stay for Mr Trump’s return after the First Couple dine at Blenheim Palace with Theresa May.
PUBLISHED: 02:35 EDT, 10 July 2018 | UPDATED: 02:50 EDT, 10 July 2018
The resignations of Boris Johnson and David Davis over Theresa May’s Brexit plans have fuelled fevered speculation that the Prime Minister could face a leadership challenge. Here are some key questions answered:
– How would rivals launch a leadership challenge?
To trigger a no-confidence vote in the PM, 15% of Tory MPs must write to the chairman of the backbench 1922 Committee, currently Sir Graham Brady.
With 316 Conservative MPs in the House of Commons, Sir Graham must receive 48 letters to call a ballot.
– Are there enough?
According to reports, Sir Graham told a meeting on Monday night that he had not received the 48 letters required.
There are believed to be around 60 backbenchers in the Eurosceptic European Research Group (ERG), along with many others who would like to see a “harder” Brexit than the version set out at Chequers last week, making Mrs May vulnerable to an anti-EU revolt.
The ERG’s chairman, Jacob Rees-Mogg, has said he has not sent a letter to the 1922 Committee, and expects Mrs May to remain in office at least until Brexit Day in March 2019. Others may take their lead from him.
– Who might take on the Prime Minister?
Mr Johnson and Mr Davis could be the front-runners in the event of a no-confidence vote, although other figures may launch bids of their own.
In his resignation letter, Mr Johnson did not back Mrs May to stay on as Prime Minister, while Mr Davis said she should.
According to the Daily Mail, Mr Rees-Mogg said on Monday night that Mr Johnson would make an “brilliant” prime minister.
– What if Mrs May refuses to stand aside?
If she chose to fight, she would need the support of more than 50% of Conservative MPs – currently 159 – in the confidence vote to stay in office.
But even if she achieved that threshold, a narrow victory would seriously undermine her authority and may lead her to question whether it was worth carrying on.
If she lost the vote, she would not be able to stand in the subsequent leadership contest, arranged by the chairman of the ’22.
– Why would critics not want to challenge Mrs May?
There are a number of issues that may make Eurosceptic critics hold back from an attempt to unseat the PM.
Theresa May holding a cabinet meeting in 2016
Aside from the loyalty which MPs naturally feel towards their leader, many are concerned that Mrs May’s removal could plunge the party into chaos, with no obvious replacement lined up, potentially setting the scene for Jeremy Corbyn to seize power in a new general election.
Some Brexiteers think the most crucial issue is to ensure that Britain actually leaves the EU in March next year, and feel that whatever arrangements Mrs May has secured can always be renegotiated once that point has been reached.
– What has she said?
Mrs May raised the prospect of a Jeremy Corbyn-led government to appeal for Tory unity on Brexit at a meeting of the ’22 on Monday night.
She said the alternative to the party coming together could be a left-wing Labour administration.
PUBLISHED: 19:04 EDT, 24 June 2018 | UPDATED: 03:35 EDT, 25 June 2018
Ministers hit back at big business yesterday for ‘undermining’ Theresa May on Brexit, warning it increased the risk of a bad deal with Brussels.
Health Secretary Jeremy Hunt rounded on the French-based aerospace giant Airbus for making ‘completely inappropriate’ threats.
And International Trade Secretary Liam Fox urged corporations worried about the risk of a ‘no deal’ Brexit to put pressure on Brussels to secure one.
Health Secretary Jeremy Hunt rounded on the French-based aerospace giant Airbus for making ‘completely inappropriate’ threats
Airbus, which employs 14,000 people in the UK, warned last week that it could quit the country if Britain leaves the EU without a deal.
This was followed up by a claim from BMW that its British operations would become ‘less competitive’ unless ministers provide clarity on future trading relationships with the EU soon.
Yesterday it emerged that five business lobby groups, headed by the Confederation of British Industry, have written to the Prime Minister warning that a lack of clarity on Brexit ‘could cost the UK economy billions of pounds’.
They have copied in Jean-Claude Juncker, president of the European Commission, and Donald Tusk, president of the European Council.
Asked about the intervention from Airbus, Mr Hunt told the BBC’s Andrew Marr show yesterday: ‘I thought it was completely inappropriate for businesses to be making these kinds of threats for one very simple reason.
‘We are at an absolutely critical moment in the Brexit discussions and what that means is that we need to get behind Theresa May to deliver the best possible Brexit – a clean Brexit.
‘What businesses want… is clarity and certainty and the more that we undermine Theresa May, the more likely we are to end up with a fudge, which would be an absolute disaster for everyone.’
Meanwhile, Dr Fox told Sky News: ‘Companies are right to say that if there’s no deal that won’t be good for Britain, but it won’t be good for Europe either.
‘The point I make to them is that they should also be making the same case to European governments. That will be bad for them in an era where we have got complex integrated supply chains. It will be necessarily bad for both sides.’
Senior Tories believe big business is being urged to speak out publicly by leading Cabinet Remainers, including Business Secretary Greg Clark and Chancellor Philip Hammond, in order to strengthen their hand in the debate about future trading relations with the EU.
Some in Downing Street believe pro-Remain ministers are using business to try to tilt the debate ahead of a crunch meeting at Chequers next month when the Cabinet will try to thrash out its strategy for future dealings with the EU.
Mr Clark held private talks with Airbus days before it spoke out. And yesterday it emerged that he holds weekly meetings with a coalition of business lobby groups that have issued a fresh warning over Brexit to the Prime Minister.
International Trade Secretary Liam Fox urges businesses worried about the risk of a ‘no deal’ Brexit to put pressure on Brussels to secure one
In a joint letter, the CBI, Institute of Directors, Engineering Employers Federation, British Chambers of Commerce and Federation of Small Businesses warn that firms are starting to pull investment from the UK because of frustration over Brexit talks.
The five groups warn: ‘The business community is concerned that time is running out.’ The intervention will fuel growing government irritation at the role being played by business to prevent a clean break with the EU.
Both the CBI and EEF have called for the UK to stay in the customs union, preventing Britain from setting an independent trade policy.
Boris Johnson is reported to have responded to a question about business concerns this month by saying: ‘F*** business.’
Former CBI chief Digby Jones said yesterday Brexit divisions were undermining Mrs May’s negotiating position, making it harder for her to say credibly that she is prepared to walk away without a deal.
Lord Jones, a former Labour trade minister, added: ‘If the whole country had come together on this right at the start, if Michel Barnier [the EU’s chief negotiator] and Berlin were presented with a united front in Britain at the start, then walking away would not have been a catastrophe.’ At the weekend, Mr Johnson appeared to question Mrs May’s softly-softly tactics, saying voters ‘don’t want some bog roll Brexit – soft, yielding and seemingly infinitely long’.
Calling for a ‘full British Brexit’, the Foreign Secretary added voters ‘don’t want some sort of hopeless compromise, some perpetual push-me, pull-you arrangement in which we stay half in and half out in a political no man’s land.
But Mr Hunt said: ‘If you look at the approach Theresa May has taken to Brexit, what you can see is someone who has the instincts of a Brexiteer, but the cautious pragmatism of a Remainer, which is where I think the British people are.’
Boardroom moaners who always get it wrong
Five business lobby groups have written to the Prime Minister warning that a lack of clarity on Brexit could cost the economy billions. However, their previous dire warnings have proved wide of the mark…
CONFEDERATION OF BRITISH INDUSTRY
WHAT IT SAID:
The CBI warned repeatedly against leaving the EU during the referendum campaign.
In March 2016 it said Brexit would cause a ‘serious economic shock’ that could destroy 950,000 jobs and cost the country £100billion by 2020 by damaging growth.
CBI director-general Carolyn Fairbairn said: ‘Leaving the EU would be a real blow for living standards, jobs and growth. The savings from reduced EU budget contributions and regulation are greatly outweighed by the negative impact on trade and investment.’
WHAT HAPPENED:
The employment rate has climbed to a record of 75.6 per cent. There are 32.4million people in work – 659,000 more than before the vote. The unemployment rate has fallen to 4.2 per cent, its lowest since 1975.
The CBI’s forecast of a £100billion economic hit by 2020 also appears mistaken.
It said growth would fall to an average 0.9 per cent in the worst case scenario after a vote for Brexit. But the economy grew at 1.9 per cent in 2016 and 1.8 per cent last year.
ENGINEERING EMPLOYERS’ FED
WHAT IT SAID:
In a letter weeks before the Brexit vote, EEF boss Terry Scuoler said: ‘Many manufacturers fear that Britain would be economically weaker if there is a vote to leave the EU. We would certainly lose jobs and contracts overseas.’
WHAT HAPPENED:
The post-vote fall in the pound acted as a boost for manufacturers, with surveys consistently showing a surge in exports. Factory output has grown for the past 22 months, a survey by IHS Markit shows.
Meanwhile, the number of manufacturing jobs has risen by 31,000 to 2.5million since the referendum.
BRITISH CHAMBERS OF COMMERCE
WHAT IT SAID:
The BCC was neutral during the referendum campaign. But in September 2016 after the vote to Leave, it cut its growth forecasts from 2.2 per cent to 1.8 per cent in 2016 and from 2.3 per cent to 1 per cent in 2017.
WHAT HAPPENED:
The economy beat the BCC’s forecasts in 2016 by 0.1 percentage points. Last year it did much better than the organisation expected, with growth of 1.8 per cent.
FEDERATION OF SMALL BUSINESSES
WHAT IT SAID:
An FSB survey weeks after the Brexit vote suggested confidence among members had fallen to a four-year low. Chairman Mike Cherry said: ‘For the first time since 2009, the UK economy faces a real chance of a recession.’
WHAT HAPPENED:
The economy grew by 1.9 per cent in 2016. At the start of 2017, an FSB survey showed confidence had bounced back to where it was before the vote.
INSTITUTE OF DIRECTORS
WHAT IT SAID:
An IOD survey after the vote found 25 per cent of its members were planning a hiring freeze and 5 per cent were threatening to make redundancies. Around a fifth claimed they were planning to move operations and jobs to cities such as Frankfurt and Dublin.
WHAT HAPPENED:
The number of people in employment rose by 44,000 in the three months after the Brexit vote. Redundancies rose slightly after the vote, but have fallen back to below their pre-referendum levels.
Relocations to foreign cities are harder to measure. But in banking many chief executives have quietly scaled back their plans to shift workers abroad.
Withdrawal from the European Union is governed by Article 50 of the Treaty on European Union. Under the Article 50 invocation procedure, a member notifies the European Council, whereupon the EU is required to negotiate and conclude an agreement with [the leaving] State, setting out the arrangements for its withdrawal, taking account of the framework for its future relationship with the [European] Union. The negotiation period is limited to two years unless extended, after which the treaties cease to apply.[81] There was a discussion whether parallel negotiation of withdrawal terms and future relationships under Article 50 are appropriate (Chancellor Merkel’s initial view) or whether Britain did not have the right to negotiate future trade with the EU27 as this power is arguably reserved to the EU as long as the UK is a member (the view of a European Commission lawyer).[82]
Although the 2015 Referendum Act did not expressly require Article 50 to be invoked,[83] the UK government stated that it would expect a leave vote to be followed by withdrawal.[84][85] Following the referendum result, Cameron resigned and said that it would be for the incoming Prime Minister to invoke Article 50.[86][87]
Letter from Theresa May invoking Article 50
The Supreme Court ruled in the Miller case in January 2017 that the government needed parliamentary approval to trigger Article 50.[88][89] Subsequently, the House of Commons overwhelmingly voted, on 1 February 2017, for a government bill authorising the prime minister to invoke Article 50,[90] and the bill passed into law as the European Union (Notification of Withdrawal) Act 2017. Theresa May then signed a letter invoking Article 50 on 28 March 2017, which was delivered on 29 March by Tim Barrow, the UK’s ambassador to the EU, to European Council President Donald Tusk.[91][92][93]
It has been argued that the Article 50 withdrawal process may be halted unilaterally by the British government,[94] with which opinion the author of Article 50 itself, Lord Kerr, has expressed agreement.[95] The European Parliament’s Brexit committee has noted that unilateral revocation, regardless of its legality, poses a substantial moral hazard, with EU member states potentially able to abuse it to blackmail the Union.[96]
Date of Brexit
Both parties to the withdrawal negotiation are bound by Article 50 (3), which states explicitly that the EU treaties will cease to apply “from the date of entry into force of the withdrawal agreement or, failing that, two years after” the withdrawal notification unless the EU Council and UK agree to extend the two-year period.
On the EU side, the EU’s Directives for the negotiation of an agreement notes that “The Agreement should set a withdrawal date which is at the latest 30 March 2019 at 00:00 (Brussels time),” —i.e. Central European Time— “unless the European Council, in agreement with the United Kingdom, unanimously decides to extend this period in accordance with Article 50(3) of the Treaty on European Union.”[97]
The British and EU negotiators agreed that initial negotiations, relating especially to residency rights, would commence in June 2017 (immediately after the French presidential and parliamentary elections), and full negotiations, relating especially to trading agreements, could commence in October 2017 (immediately after the German federal election, 2017).[98][99][100] The first day of talks was 19 June.[99]
History
On 28 June 2016, Chancellor of Germany Angela Merkel, and on the following day European Council President Tusk, stated that the UK could remain in the European Single Market (ESM) only if the UK accepted its four freedoms of movement: for goods, capital, services, and labour.[101][102] In October, Prime Minister Theresa May emphasised that ending the jurisdiction of EU law and free movement from Europe were the UK’s priorities, along with British and EU companies having maximum freedom to trade in the UK and the ESM.[103][104]
In November 2016, May proposed that Britain and the other EU countries mutually guarantee the residency rights of the 3.3 million EU immigrants in Britain and those of the 1.2 million British citizens living on the Continent, in order to exclude their fates being bargained during Brexit negotiations.[105] Despite initial approval from a majority of EU states, May’s proposal was blocked by Tusk and Merkel.[106]
In January 2017, the Prime Minister presented 12 negotiating objectives and confirmed that the UK government would not seek permanent single market membership.[107] The European Parliament’s lead negotiator Guy Verhofstadt responded that there could be no “cherry-picking” by the UK in the talks.[108]
The statutory period for negotiation began on 29 March 2017, when the UK formally submitted a letter notifying withdrawal. The letter called for a “deep and special relationship” between the UK and the EU, and warned that failure to reach an agreement would result in EU-UK trade under World Trade Organisation terms, and a weakening of the UK’s co-operation in the fight against crime and terrorism. The letter suggested prioritising an early deal on the rights of EU citizens in the UK and vice versa, and stated that the UK would not seek to remain within the ESM. Instead, the UK would seek a free trade agreement with the EU.[109] In response, Merkel insisted that the EU would not discuss future co-operation without first settling the terms of leaving the EU; Verhofstadt referred to the letter as “blackmail” with regard to the point on security and terrorism, and EU Commission president Jean-Claude Juncker said the UK’s decision to quit the block was a “choice they will regret one day”.[110]
On 29 April 2017, immediately after the first round of French presidential elections, the EU27 heads of state accepted negotiating guidelines prepared by Tusk.[111] The guidelines take the view that Article 50 permits a two-phased negotiation, in which the UK first agrees to a financial commitment and to lifelong benefits for EU citizens in Britain, and then negotiations on a future relationship can begin.[112] In the first phase, the EU27 would demand the UK pay a “divorce bill”, initially estimated as amounting to £52bn[113] and then, after additional financial demands from Germany, France, and Poland, to £92bn.[114] A report of the European Union Committee of the House of Lords, published on 4 March 2017, stated that if there is no post-Brexit deal at the end of the negotiating period, the UK could withdraw without payment.[115]
On 22 May 2017, the European Council authorised its negotiators to start the Brexit talks and it adopted its negotiating directives.[116] The first day of talks took place on 19 June, where Davis and Michel Barnier, European Chief Negotiator for Brexit, agreed to prioritise the question of residency rights, while Davis conceded that a discussion of the Northern Irish border would have to await future trade agreements.[117]
On 22 June 2017, Prime Minister May guaranteed that no EU citizen living legally in the UK would be forced to leave, and offered that any EU citizen who lived in the UK for more than five years until an unspecified deadline between March 2017 and March 2019 would enjoy the same rights as a UK citizen, conditional on the EU providing the same offer to British expatriates living in the EU.[118] The Prime Minister detailed her residency proposals on 26 June, but drew no concessions from EU negotiators,[119] who had declined to expedite agreement on expatriates by the end of June 2017,[120] and who are hoping for European courts to continue to have jurisdiction in the UK with regards to EU citizens, according to their negotiation aims published in May 2017.[121][122]
The second round of negotiations began in mid-July 2017. Progress was made on the Northern Irish border question; UK negotiators requested a detailed breakdown of the “divorce bill” demand; and the EU negotiators criticised the UK’s citizenship rights offer.[123]David Davis did not commit to a net payment by the UK to the EU with regards to the requested divorce bill, while Michel Barnier would not compromise on his demand for the European Court of Justice to have continuing jurisdiction over the rights of EU citizens living in the UK after Brexit,[124] rejecting the compromise proposal of a new international body made up of British and EU judges.[125]
On 16 August 2017, the UK government disclosed the first of several papers detailing British ambitions following Brexit, discussing trade and customs arrangements.[126] On 23 August, Theresa May announced that Britain will leave the EU Court of Justice’s direct jurisdiction when the Brexit transition period that is planned after March 2019 ends, but that both the British courts and the EU Court of Justice will also keep “half an eye” on each other’s rulings afterwards as well.[127] One of the UK government’s position papers published in August called for no additional restrictions for goods already on the market in the UK and EU.[128]
The third round of negotiations began on 28 August 2017. There was disagreement over the financial settlement; The Irish Times explained that British negotiators referred to the seven-year Multiannual Financial Framework (MFF or Maff) for the period 2014-2020 agreed by member states and the EU parliament as a “planning tool” for the next period rather than a legally-binding financial obligation on member states. The British case is that the MFF sets ceilings on spending under various headings and is later radically revised during the annual budget process when real legal obligations on each state arises. This contrasts with the EU Commission’s methodology for calculating the UK Brexit bill which involves dividing the MFF into the shares historically agreed by each member state.[129] On the Irish border question there was a “breakthrough”, with the British side guaranteeing free movement of EU citizens within the Common travel area constituting Ireland and the United Kingdom.[130]
On 5 September 2017, Davis said that “concrete progress” had been made over the summer in areas such as protecting the rights of British expats in the EU to access healthcare and over the future of the Irish border, while significant differences over the “divorce bill” remained.[131] On 9 September, the EU Commission published several negotiating papers, including one in which the EU concedes/declares that it is the responsibility of the UK to propose solutions for the post-Brexit Irish border. The paper envisages that a “unique” solution would be permissible here; in other words, any such exceptional Irish solution would not necessarily be a template for post-Brexit relationships with the other EU members.[132]
On 22 September 2017, May announced further details of her Brexit proposal.[133][134] In addition to offering 20 billion euros over a two-year transition period and continued acceptance of European immigrants,[135] she also offered a “bold new security relationship” with the EU which would be “unprecedented in its depth” and to continue to make “an ongoing contribution” to projects considered greatly to the EU and UK’s advantage, such as science and security projects.[134][133] She also confirmed that the UK would not “stand in the way” of Juncker’s proposals for further EU integration.[134][133] Barnier welcomed May’s proposal as “constructive,”[136] but that it also “must be translated into negotiating positions to make meaningful progress”.[136] Similarly, President of France Emmanuel Macronwas adamant that the EU would not begin negotiations on future EU-UK relationships until “the regulation of European citizens, the financial terms of the exit, and the questions of Ireland” were “clarified” by the UK.[137]
The fourth round of talks began on 25 September, with Barnier declaring he had no mandate from the EU27 to discuss a transition deal suggested by Prime Minister May. Davis reiterated that the UK could honour commitments made during its EU membership only in the context of a future “special partnership” deal with the EU.[138]
At the European Council meeting of 19/20 October 2017, the 27 leaders of the EU states were to decide whether or not to start trade negotiations with the UK.[128] However, Davis has conceded that so soon after the German elections on 24 September, a German coalition government may not be in place in time for making this decision in October, delaying any European Council decision until their December meeting.[139][140]
EU negotiators have stated that an agreement must be reached between Britain and the EU by October 2018 in order to leave time for national parliaments to endorse Brexit.[136]
On 9 October 2017, May announced to the British Parliament that Britain could operate as an “independent trading nation” after Brexit if no trade deal is reached with the EU.[141]
In December 2017, EU leaders announced an agreement to begin the next phase of negotiations, with talks on a transition period after March 2019 to begin in early 2018 and discussions on the future UK-EU relationship, including trade and security, to begin in March.[142]
After elections in March 2018, the Italian president appointed a eurosceptic Italian government on 1 June 2018,[143] a development expected to affect the Brexit outcome.[144]
On 10 June 2018, the Irish Prime Minister Leo Varadkar cleared the path for the June negotiations by postponing the Irish border question until the final Brexit deal in October 2018.[145]
On 19 June 2018, the UK and the EU published a joint statement outlining agreements at the negotiators’ level. Michel Barnier praised the “dedication and commitment” of the negotiating teams, and said progress had been made in issues like customs, VAT and the European nuclear agreement, Euratom.[146][147]
In October 2016, Theresa May promised a “Great Repeal Bill”, which would repeal the European Communities Act 1972 and restate in UK law all enactments previously in force under EU law. Subsequently renamed the European Union (Withdrawal) bill, it was introduced to the House of Commons on 13 July 2017.[148]
On 12 September 2017, the repeal bill (now renamed as the EU Withdrawal Bill) passed its first vote and second reading by a margin of 326 votes to 290 votes in the House of Commons.[149] The bill was further amended on a series of votes in both Houses of Parliament. After the Act became law on 26 June 2018, the European Council decided on 29 June to renew its call on Member States and Union institutions to step up their work on preparedness at all levels and for all outcomes.[150]
The Withdrawal Act fixes the period ending 21 January 2019 for the government to decide on how to proceed if the negotiations have not reached agreement in principle on both the withdrawal arrangements and the framework for the future relationship between the UK and EU; while, alternatively, making future ratification of the withdrawal agreement as a treaty between the UK and EU depend upon the prior enactment of another act of Parliament for approving the final terms of withdrawal when the current Brexit negotiations are completed. In any event, the act does not alter the two year period for negotiating allowed by Article 50 that ends at the latest on 29 March 2019 if the UK has not by then ratified a withdrawal agreement.
The Withdrawal Act, and two bills relating to world and cross-border trade after the withdrawal, that were progressing through Parliament when the Act became law in June 2018, allow for various outcomes including no negotiated settlement.
Additional government bills
A report published in March 2017 by the Institute for Government commented that, in addition to the European Union (Withdrawal) bill, primary and secondary legislation will be needed to cover the gaps in policy areas such as customs, immigration and agriculture.[151]The report also commented that the role of the devolved legislatures was unclear, and could cause problems, and as many as fifteen new additional Brexit Bills may be required, which would involve strict prioritisation and limiting Parliamentary time for in-depth examination of new legislation.[152]
In 2016 and 2017, the House of Lords published a series of reports on Brexit-related subjects, including:
The Nuclear Safeguards Bill 2017–19, relating to withdrawal from Euratom, was presented to Parliament in October 2017 and began its Report Stage in January 2018.[153]
Voting on the final outcome
Replying to questions at a parliamentary committee about Parliament’s involvement in voting on the outcome of the negotiations with the EU, the Prime Minister said that “delivering on the vote of the British people to leave the European Union” was her priority. The shadow Brexit secretary, Keir Starmer, commented that the government did not want a vote at the beginning of the process, to trigger Article 50, nor a vote at the end.[154]
Developments since the Referendum of 2016
Elections
Opinion polls in the fortnight following the referendum suggested that the immediate reaction in the Netherlands and other European countries was a decline in support for Eurosceptic movements.[155]
A general election was held on 8 June 2017, announced at short notice by the new Prime Minister Theresa May. The Conservative Party, Labour and UKIP made manifesto pledges to implement the referendum, although the Labour manifesto differed in its approach to Brexit negotiations, such as unilaterally offering permanent residence to EU immigrants.[156][157][158][159] The Liberal Democrat Party and the Green Party manifestos proposed a policy of remaining in the EU via a second referendum.[160][161][162] The Scottish Nationalist Party manifesto proposed a policy of waiting for the outcome of the Brexit negotiations and then holding a referendum on Scottish independence.[163][164] Compared to the 2015 general election, the Conservatives gained votes (but nevertheless lost seats and their majority in the House of Commons). Labour gained significantly on votes and seats, retaining its position as the second-largest party. The DUP and Sinn Féin also made gains in votes and seats. Parties losing votes included the SNP, Liberals, Greens, and especially UKIP.[165] On 26 June the Conservatives and the DUP reached a confidence and supply agreement whereby the DUP would back the Conservatives in key votes in the House of Commons over the course of the parliament. The agreement included additional funding of £1 billion for Northern Ireland, highlighted mutual support for Brexit and national security, expressed commitment to the Good Friday Agreement, and indicated that policies such as the state pension triple lock and winter fuel payments would be maintained.[166]
Economy
Six weeks after the referendum, the Bank of England sought to cushion the potential shock to the economy by lowering interest rates to the record low of 0.25%, and by creating 70 billion pounds of new money, thereby depreciating the pound and encouraging commercial banks to pass on lower borrowing costs.[167]
A year-long “wage squeeze” attributed to the referendum ended in February 2018, with wage growth catching up with inflation. Inflation had gradually risen to 3% before receding again. Since the referendum, absolute employment has continuously risen to previously unrecorded levels, and by early 2018 relative unemployment reached its lowest level (4.2%) recorded since 1975.[168]
During 2017 the UK continued to be the favourite European destination for foreign physical investment (as distinct from company takeovers), creating 50,000 new jobs, ahead of Germany (31,000 jobs) and France. Factors mentioned were sterling devaluation since the referendum, broadband, and American investment.[169]
Immigration
Official figures for June 2017 (published in February 2018) showed that net EU immigration to the UK had slowed to about 100,000 immigrants per year, corresponding to the immigration level of 2014. Meanwhile, immigration from non-EU countries had increased. Taken together, the two inflows into the UK result in an only slightly reduced net immigration of 230,000 newcomers in the year to June 2017. The Head of the Office of National Statistics suggested that Brexit could well be a factor for the slowdown in EU immigration, but cautioned there might be other reasons.[170]
Impact on the United Kingdom
The Department for Exiting the European Union (DExEU) produced reports on the economic impact on 58 industries of Britain leaving the EU. The Labour Party made a freedom of information request for details about the reports, but DExEU said that publishing the information would undermine policy formulation, and that it needed to carry out policymaking in a “safe space”.[171] Labour then proposed a motion of a rarely-used type known as a “humble address” in the Commons on 1 November 2017, calling for the papers to be released; the motion was passed unanimously. The leader of the house, Andrea Leadsom, said that there could be some delay while ministers decided how to release the information without prejudicing Brexit negotiations.[172]
Immigration
Long term
Immigration was cited as the second-most important reason for those voting to Leave. KPMG, based on a survey of 2,000 EU workers in UK, estimates that about a million EU citizens working in the UK, see their future in Britain as over or hanging in the balance.[173]
A 2017 paper by King’s College London economists Giuseppe Forte and Jonathan Portes found that “while future migration flows will be driven by a number of factors, macroeconomic and otherwise, Brexit and the end of free movement will result in a large fall in immigration from EEA countries to the UK.”[174] According to a 2016 study by Portes, “The spectrum of options for UK immigration policy post Brexit remains wide… However, almost any plausible outcome will result in an increase in regulatory burdens on business; a reduction in the flows of both unskilled and skilled workers; and an increase in illegal working. The key question for policymakers will be how to minimise these negative impacts while at the same time addressing domestic political demands for increased control without antagonising our EU partners to the point of prejudicing other key aspects of the negotiations. This will not be an easy task.”[13] Will Somerville of the Migration Policy Institute wrote that “Future migration levels are impossible to predict in the absence of policy and economic certainty”, but estimated immediately after the referendum that the UK “would continue to receive 500,000 or more immigrants (from EU and non-EU countries taken together) per year, with annual net migration around 200,000”.[175]
The decline in EEA immigration is likely to have an adverse impact on the British health sector.[176] According to the New York Times, Brexit “seems certain” to make it harder and costlier for the N.H.S., which already suffers from chronic understaffing, to recruit nurses, midwives and doctors from the rest of Europe.[176]
Immediate effects
Official figures in March 2017 indicated that EU immigration to the UK continued to exceed emigration, but the difference between immigration and emigration (“net migration”) had fallen to its lowest for three years.[177] The number of EU nurses registering with the NHS fell from 1,304 in July 2016 to 46 in April 2017.[178]
Research on the effects that have already materialised in the United Kingdom since the referendum results show that the referendum result pushed up UK inflation by 1.7 percentage points, leading to an annual cost of £404 for the average British household.[10]Another study on the effects that had already materialised found “contrary to public perception, by the third quarter of 2017 the economic costs of the Brexit vote are already 1.3% of GDP. The cumulative costs amount to almost 20 billion pounds and are expected to grow to more than 60 billion pounds by end-2018.”[11][179] An extension of the latter study to June 2018 showed that the losses amounted to 2.1% of GDP and that the fiscal costs were £23 billion (£440 million a week).[12]
According to a Financial Times analysis, the Brexit referendum results had by December 2017 reduced national British income by between 0.6% and 1.3%, which amounts to almost £350 million a week.[180]University of California, Berkeley, economist Barry Eichengreen noted in August 2017 that some of the adverse effects of uncertainty brought about by the Brexit referendum were being made apparent, as British consumer confidence was down and spending had declined to its lowest level in four years.[181] In November 2017, it was reported that European banks had reduced their UK-related assets by €350bn in the 12 months after Brexit vote, and that the trend was expected to increase ahead of the March 2019 Brexit deadline.[182]
Long-term economic analyses
There is overwhelming or near-unanimous agreement among economists that leaving the European Union will adversely affect the British economy in the medium- and long-term.[a] Surveys of economists in 2016 showed overwhelming agreement that Brexit would likely reduce the UK’s real per-capita income level.[184][185][186] A 2017 survey of the existing academic literature found “the research literature displays a broad consensus that in the long run Brexit will make the United Kingdom poorer because it will create new barriers to trade, foreign direct investment, and immigration. However, there is substantial uncertainty over how large the effect will be, with plausible estimates of the cost ranging between 1 and 10 percent of the UK’s income per capita.”[7] These estimates differ depending on whether the UK stays in the European Single Market (for instance, by joining the EEA), makes a free trade agreement with the EU, or reverts to the trade rules that govern relations between all World Trade Organization members.[7] In January 2018, the UK government’s own Brexit analysis was leaked; it showed that UK economic growth would be stunted by 2%-8% for at least 15 years following secession from the EU, depending on the leave scenario.[194][195]
Most economists, including the UK Treasury, argue that being in the EU has a strong positive effect on trade and as a result the UK’s trade would be worse off if it left the EU.[196][197][198][199] According to a group of University of Cambridge economists, under a “hard Brexit” whereby the UK reverts to WTO rules, one-third of UK exports to the EU would be tariff-free, one-quarter would face high trade barriers and other exports risk tariffs in the range of 1-10%.[200] A 2017 study based on data from 2010 found that “almost all UK regions are systematically more vulnerable to Brexit than regions in any other country. Due to their longstanding trade integration with the UK, Irish regions have levels of Brexit exposure, which are similar to those of the UK regions with the lowest levels of exposure, namely London and northern parts of Scotland. Meanwhile, the other most risk-exposed EU regions are all in southern Germany, with levels of risk which are typically half that of any UK or Irish region, and one third of that displayed by many UK regions. There is also a very noticeable economic geography logic to the levels of exposure with north-western European regions typically being the most exposed to Brexit, while regions in southern and eastern Europe are barely affected at all by Brexit, at least in terms of the trade linkages… Overall, the UK is far more exposed to Brexit risks than the rest of the EU.”[201]
After the referendum, the Institute for Fiscal Studies published a report funded by the Economic and Social Research Council which warned that Britain would lose up to £70 billion in reduced economic growth if it did not retain Single Market membership, with new trade deals unable to make up the difference.[202] One of these areas is financial services, which are helped by EU-wide “passporting” for financial products, which an Oliver Wyman report for a pro-EU lobby group estimated indirectly accounted for up to 71,000 jobs and £10 billion of tax annually,[203][not in citation given] and some banks announced plans to relocate some of their operations outside the UK.[204] According to a 2016 article by John Armour, Professor of Law and Finance at Oxford University, “a ‘soft’ Brexit, whereby the UK leaves the EU but remains in the single market, would be a lower-risk option for the City than other Brexit options, because it would enable financial services firms to continue to rely on regulatory passporting rights.”[205]
A 2017 study found, on the basis of “plausible, empirically based estimates of the likely impacts on growth and wages using relationships from the existing empirical literature”, that “Brexit-induced reductions in migration are likely to have a significant negative impact on UK GDP per capita (and GDP), with marginal positive impacts on wages in the low-skill service sector.”[206][7] It is unclear how changes in trade and foreign investment will interact with immigration, but these changes are likely to be important.[7]
Former Governor of the Bank of England Mervyn King commented that warnings of economic doom regarding leaving the EU were overstated and that the UK should leave the single market and probably the customs union in order to gain more opportunities, which would lead to improved British economic performance.[207]
Short-term economic analyses
Short-term macroeconomic forecasts by the Bank of England and other banks of what would happen immediately after the Brexit referendum proved to be too pessimistic.[188][208] The assessments assumed that the referendum results would create greater uncertainty on financial markets and in business and reduce consumer confidence more than it did.[208] According to Oxford University economist Simon Wren-Lewis, “short term unconditional macroeconomic forecasts are extremely unreliable” and they are something that academic economists do not do, unlike banks.[209] Wren-Lewis notes that long-term projections of the impact of Brexit, on the other hand, have a strong empirical foundation.[209]University of California, Berkeley, economist Barry Eichengreen wrote that economists “have had little success at reliably predicting when and why uncertainty arises” and that it is unclear how severe the impact of uncertainty actually is.[181] King’s College London economist Jonathan Portes said that “short-term economic forecasting is very unreliable”, and compared short-term economic forecasts to weather forecasts and the long-term economic forecasts to climate forecasts: the methodologies used in long-term forecasts are “well-established and robust”.[208] Other economists note that central bank forecasts are not intended for pinpoint accuracy.[208]London School of Economics economist Thomas Sampson notes that it is harder to assess the short-term impact that the transition process to Brexit will have, but that long-term assessments of the post-Brexit period are more reliable.[7] According to the Financial Times, economists are in agreement that the short-term effects are uncertain.[188]
On 5 January 2017 Andy Haldane, the Chief Economist and the Executive Director of Monetary Analysis and Statistics at the Bank of England, said that the BoE’s own forecast predicting an immediate economic downturn due to the referendum result was inaccurate and noted strong market performance immediately after the referendum,[210][211][212] although some have pointed to prices rising faster than wages.[213] Haldane said that the field of economics was “to some degree in crisis” because of its failure to predict the financial crisis of 2007–2008, and added that the Brexit economic forecast was only inaccurate in its near-term assessment, and that over time, the Bank still expected that Brexit would harm economic growth.[211] Imperial College London economist David Miles responded to Haldane, saying that there was no crisis in economics, and that economists did not purport to be able to forecast with full certainty or predict the precise timing of events.[214] Miles said that it was widely acknowledged among economists that short-term forecasts, such as the BoE’s, are unreliable.[214]
Loss of agencies
Brexit requires relocating the offices and staff of the European Medicines Agency and European Banking Authority, currently based in London.[215] The agencies together employ more than 1,000 people and will respectively relocate to Amsterdam and Paris.[216] The EU is also considering restricting the clearing of euro-denominated trades to eurozone jurisdictions, which would end London’s dominance in this sector.[217]
According to a 2016 study by Ken Mayhew, Emeritus Professor of Education and Economic Performance at Oxford University, Brexit poses the following threats to higher education: “loss of research funding from EU sources; loss of students from other EU countries; the impact on the ability of the sector to hire academic staff from EU countries; and the impact on the ability of UK students to study abroad.”[14]
The UK received more from the EU for research than it contributed[218] with universities getting just over 10% of their research income from the EU.[219] All funding for net beneficiaries from the EU, including universities, was guaranteed by the government in August 2016.[220] Before the funding announcement, a newspaper investigation reported that some research projects were reluctant to include British researchers due to uncertainties over funding.[221] Currently the UK is part of the European Research Area and the UK is likely to wish to remain an associated member.[222]
Scotland
As suggested by the Scottish Government before the referendum,[223] the First Minister of Scotland announced that officials were planning an independence referendum due to the result of Scotland voting to remain in the European Union when England and Wales voted to leave.[224] In March 2017, the SNP leader and First Minister Nicola Sturgeon requested a second Scottish independence referendum in 2018 or 2019 (before Britain’s formal exit from the EU).[225] The UK Prime Minister immediately rejected the requested timing, but not the referendum itself.[226] The referendum was approved by the Scottish Parliament on 28 March 2017. Sturgeon called for a “phased return” of an independent Scotland back to the EU.[227]
After the referendum, First Minister Sturgeon suggested that Scotland might refuse consent for legislation required to leave the EU,[228] though some lawyers argue that Scotland cannot block Brexit.[229]
On 21 March 2018, the Scottish Parliament passed the Scottish Continuity Bill.[230] This was passed due to stalling negotiations between the Scottish Government and the British Government on where powers within devolved policy areas should lie after exit day from the European Union. This Act allows for all devolved policy areas to remain within the remit of the Scottish Parliament and reduces the executive power upon exit day that the UK Withdrawal Bill provides for Ministers of the Crown.[231] The Bill gained Royal Assent on 28 April 2018.[230]
International agreements
The Financial Times said that there were approximately 759 international agreements, spanning 168 non-EU countries, that the UK would no longer be a party to upon leaving the EU.[232] This figure does not include World Trade Organisation or United Nations opt-in accords, and excludes “narrow agreements”, which may also have to be renegotiated.[232]
The UK’s post-Brexit relationship with the remaining EU members could take several forms. A research paper presented to the UK Parliament in July 2013 proposed a number of alternatives to membership which would continue to allow access to the EU internal market. These include remaining in the European Economic Area,[233] negotiating deep bilateral agreements on the Swiss model,[233] or exit from the EU without EEA membership or a trade agreement under the WTO Option. There may be an interim deal between the time the UK leaves the EU and when the final relationship comes in force.
The UK/Republic of Ireland border crosses this road at Killeen (near Newry), marked only by a speed limit in km/h. (Northern Ireland uses mph.)
There is still great uncertainty about Brexit’s impact on the border between the Republic of Ireland and Northern Ireland, in particular the impact it may have on the economy and people of the island were a “hard border” to be put in place.[234] At present (November 2017), both the UK and the Republic of Ireland are members of the EU, and therefore both are in the Customs Union and the Single Market. There is freedom of movement for all EU nationals within the Common Travel Area and there are no customs or fixed immigration controls at the border. Since the 1998 Good Friday Agreement (an international treaty between the UK and Ireland as well as an agreement within Northern Ireland), the border has been essentially invisible. Following Brexit, the border between Northern Ireland and the Republic of Ireland will become a land border between the EU and a non-EU state. It is therefore possible that the border will return to being a “hard” one, with fewer, controlled, crossing posts and a customs infrastructure. This would be a return to the position before both states joined the EU with the additional point that, unless the Free Travel Area is maintained, passport checks may also be required. This outcome, or one like it, is referred to as a “Hard Border” and both the EU and the UK have agreed this would be a poor outcome to be avoided if possible. Creating a border control system between Ireland and Northern Ireland could jeopardise the Good Friday Agreement.[235][236][237][238]
When in 1922 the Irish Free State seceded from the United Kingdom, the border between the Free State and Northern Ireland, which chose to remain in the UK, became an international frontier. This event became commonly known as the “partition of Ireland“. Trade in goods and services across this frontier became subject to differing tax and tariff arrangements. Consequently, an infrastructure of Customs posts was put in place at designated crossing areas. All traffic was subject to inspection by the jurisdiction it was passing in to. This could entail full vehicle searches with consequent delay and inconvenience. However passport checks were not applied. The Republic of Ireland, Northern Ireland and the rest of the United Kingdom were part of the Common Travel Area. This allowed travel between the Republic of Ireland and Northern Ireland and between the islands of Ireland and Great Britain, without passport controls. The Isle of Man and the Channel Isles are also part of the area. This arrangement came into existence in 1922 with the establishment of the Irish Free State and so predated the freedom of travel provisions consequent on membership of the EU, which to some degree superseded it. In 2011, the British and Irish Governments agreed informally to continue their common controls on entry to the CTA [for non-EEA nationals].[239] According to statements by Theresa May and Enda Kenny, it is intended to maintain this arrangement after the United Kingdom leaves the EU.[240] After Brexit, in order to control migration by EU citizens (other than Irish nationals) across the open Northern Irish land border into the United Kingdom, the UK and Irish governments suggested in October 2016 an outline plan entailing British immigration controls being applied to Irish ports and airports. This would avoid passport checks being required between the Republic of Ireland and Northern Ireland.[241] However, this agreement was never finalised and was met by opposition from political parties in the Republic of Ireland,[242] On 23 March 2017, it was confirmed that British immigration officials would not be allowed to use Irish ports and airports in order to combat British immigration concerns following Brexit.[243]
The President of the Regional Council of Hauts-de-France, Xavier Bertrand, stated in February 2016 that “If Britain leaves Europe, right away the border will leave Calais and go to Dover. We will not continue to guard the border for Britain if it’s no longer in the European Union,” indicating that the juxtaposed controls would end with a leave vote. French Finance Minister Emmanuel Macron also suggested the agreement would be “threatened” by a leave vote.[246] These claims have been disputed, as the Le Touquet 2003 treaty enabling juxtaposed controls was not an EU treaty, and would not be legally void upon leaving.[247]
After the Brexit vote, Xavier Bertrand asked François Hollande to renegotiate the Touquet agreement,[248] which can be terminated by either party with two years’ notice.[249] Hollande rejected the suggestion, and said: “Calling into question the Touquet deal on the pretext that Britain has voted for Brexit and will have to start negotiations to leave the Union doesn’t make sense.” Bernard Cazeneuve, the French Interior Minister, confirmed there would be “no changes to the accord”. He said: “The border at Calais is closed and will remain so.”[250]
Cars crossing into Gibraltar clearing customs formalities. Gibraltar is outside the customs union, VAT area and Schengen Zone.
Gibraltar is outside the European Union’s common customs area and common commercial policy and so has a customs border with Spain. Nevertheless, the territory remains within the European Union until Brexit is complete.
During the campaign leading up to the referendum[251] the Chief Minister of Gibraltar warned that Brexit posed a threat to Gibraltar’s safety.[252] Gibraltar overwhelmingly voted to remain in the EU. After the result Spain’s Foreign Minister renewed calls for joint Spanish–British control of the peninsula.[253] These calls were strongly rebuffed by Gibraltar’s Chief Minister[254] and questions were raised over the future of free-flowing traffic at the Gibraltar–Spain border.[255] The UK government states it will only negotiate on the sovereignty of Gibraltar with the consent of its people.[256]
In February 2018, Sir Joe Bossano, Gibraltar’s Minister for Enterprise, Training, Employment and Health and Safety (and former Chief Minister) expressed frustration at the EU’s attitude, suggesting that Spain was being offered a veto, adding “It’s enough to convert me from a supporter of the European Union into a Brexiteer”.[257]
In April 2018, Spanish Foreign Minister Alfonso Dastis announced that Spain hopes to sign off on a bilateral agreement with Britain over Gibraltar before October so as not to hinder a Brexit transition deal. Talks between London and Madrid had progressed well. While reiterating the Spanish long-term aim of “recovering” Gibraltar, he said that Spain would not hold Gibraltar as a “hostage” to the EU negotiations.[258]
Shortly after the referendum, the German parliament published an analysis on the consequences of a Brexit on the EU and specifically on the economic and political situation of Germany.[268] According to this, Britain is, after the United States and France, the third-most important export market for German products. In total Germany exports goods and services to Britain worth about €120 billion annually, which is about 8% of German exports, with Germany achieving a trade surplus with Britain worth €36.3 billion (2014). Should there be a “hard Brexit”, exports would be subject to WTO customs and tariffs. The trade weighted average tariff is 2.4%, but the tariff on automobiles, for instance, is 9.7%, so trade in automobiles would be particularly affected; this would also affect German automobile manufacturers with production plants in the United Kingdom. In total, 750,000 jobs in Germany depend upon export to Britain, while on the British side about three million jobs depend on export to the EU. The study emphasises however that the predictions on the economic effects of a Brexit are subject to significant uncertainty.
According to the Lisbon Treaty (2009), Council of the EU decisions made by qualified majority voting can only be blocked if at least four members of the Council form a blocking minority. This rule was originally developed to prevent the three most populous members (Germany, France, Britain) from dominating the Council of the EU.[269] However, after a Brexit of the economically liberal British, the Germans and like-minded northern European countries (the Irish, Dutch, Scandinavians and Baltic states) would lose an ally and therefore also their blocking minority.[270] Without this blocking minority, other EU states could overrule Germany and its allies in questions of EU budget discipline or the recruitment of German banks to guarantee deposits in troubled southern European banks.[271]
With Brexit, the EU would lose its second-largest economy, the country with the third-largest population and “the financial capital of the world”, as the German newspaper Münchner Merkur put it.[272] Furthermore, the EU would lose its second-largest net contributor to the EU budget (2015: Germany €14.3 billion, United Kingdom €11.5 billion, France €5.5 billion).[273]
Thus, the departure of Britain would result in an additional financial burden for the remaining net contributors, unless the budget is reduced accordingly: Germany, for example, would have to pay an additional €4.5 billion for 2019 and again for 2020; in addition, the UK would no longer be a shareholder in the European Investment Bank, in which only EU members can participate. Britain’s share amounts to 16%, €39.2 billion (2013), which Britain would withdraw unless there is an EU treaty change.[274]
Council of the European Union
The departure of the UK is expected to have a major effect on the EU. In many policy votes Britain had allied with the relatively more economically liberal Germany who together with other northern EU allies had a blocking minority of 35% in the Council of the European Union. The exit of the UK from the European Union means that this blocking minority can no longer be assembled leading to speculation that it could enable the other EU countries to enforce specific proposals such as relaxing EU budget discipline or providing EU-wide deposit guarantees within the banking union.[275][271]
European Parliament
UK MEPs are expected to retain full rights to participate in the European Parliament up to the Article 50 deadline. However, there have been discussions about excluding UK MEPs from key committee positions.[276]
The EU will need to decide on the revised apportionment of seats in the European Parliament in time for the next European Parliament election, expected to be held in June 2019, when the United Kingdom’s 73 MEPs will have vacated their seats. In April 2017, a group of European lawmakers discussed what should be done about the vacated seats. One plan, supported by Gianni Pittella and Emmanuel Macron, is to replace the 73 seats with a pan-European constituency list; other options which were considered include dropping the British seats without replacement, and reassigning some or all of the existing seats from other countries to reduce inequality of representation.[277][278]
Legal system
The UK’s exit from the European Union will leave the Republic of Ireland and Cyprus as the only two remaining common law jurisdictions in the EU. Paul Gallagher, a former Attorney General of Ireland, has suggested this will isolate those countries and deprive them of a powerful partner that shared a common interest in ensuring that EU legislation was not drafted or interpreted in a way that would be contrary to the principles of the common law.[279]Lucinda Creighton, a former Irish government minister for legal affairs, has said that Ireland relies on the “bureaucratic capacity of the UK” to understand, influence and implement EU legislation.[280]
Fishing
The combined EU fishing fleets land about 6 million tonnes of fish per year,[281] of which about 3 million tonnes are from UK waters.[282] The UK’s share of the overall EU fishing catch is only 750,000 tonnes (830,000 tons).[283] This proportion is determined by the London Fisheries Convention of 1964 and by the EU’s Common Fisheries Policy. The UK government announced in July 2017 that it would end the 1964 convention in 2019. Loss of access to UK waters will particularly affect the Irish fishing industry which obtains a third of its catch there.[284] The Common Fisheries Policy gives access for any member country to the waters of any other member country. The policy is generally considered a disadvantage to fish-rich countries and is a major reason why Norway and Iceland are not members. The European Economic Area treaty gives access to the inner market but does not include fishing.
World Trade Organization
Questions have arisen over how existing international arrangements with the EU under World Trade Organization terms should evolve. Some countries – such as Australia and the United States – wish to challenge the basis for division (i.e., division between the UK and the continuing EU) of the trade schedules previously agreed between them and the EU, because it reduces their flexibility.[285]
As of 2018, the WTO does not have any protocols covering trade in services.
Public opinion and comment
Public comment up to February 2017 UK white paper
Various EU leaders said that they would not start any negotiation before the UK formally invokes Article 50. Jean-Claude Juncker ordered all members of the EU Commission not to engage in any kind of contact with UK parties regarding Brexit.[286] In October 2016, he stated that he was agitated that the British had not developed a sense of community with Europeans during 40 years of membership; Juncker denied that Brexit was a warning for the EU, envisaged developing an EU defence policy without the British after Brexit, and rejected a suggestion that the EU should negotiate in such a way that Britain would be able to hold a second referendum.[287] On 5 November 2016, Juncker reacted to reports of some European businesses seeking to make agreements with the UK government, and warned: “I am telling them [companies] that they should not interfere in the debate, as they will find that I will block their path.”[288] Juncker stated in February 2017 that the UK would be expected to pay outstanding commitments to EU projects and pensions as part of the withdrawal process, suggesting such bills would be “very hefty.”[289]
German foreign secretary Frank-Walter Steinmeier met Britain’s foreign secretary Boris Johnson on 4 November 2016; Johnson stressed the importance of British-German relationships, whereas Steinmeier responded that the German view was that the UK should have voted to stay in the EU and that the German priority now was to preserve the remaining union of 27 members. There could be no negotiations before the UK formally gives notice. A long delay before beginning negotiations would be detrimental. Britain could not keep the advantages of the single market but at the same time cancel the “less pleasant rules”.[290]
Newly appointed prime minister Theresa May made clear that negotiations with the EU required a “UK-wide approach”. On 15 July 2016, she said: “I have already said that I won’t be triggering article 50 until I think that we have a UK approach and objectives for negotiations – I think it is important that we establish that before we trigger article 50.”[291]
According to The Daily Telegraph, the Department for Exiting the European Union spent over £250,000 on legal advice from top Government lawyers in two months, and had plans to recruit more people. Nick Clegg said the figures showed the Civil Service was unprepared for the very complex negotiations ahead.[292]
On 17 January 2017, Prime Minister Theresa May, announced a series of 12 negotiating objectives in a speech at Lancaster House. These consist of an end to European Court of Justice jurisdiction, withdrawal from the single market with a “comprehensive free-trade agreement” replacing this, a new customs agreement excluding the common external tariff and the EU’s common commercial policy, an end to free movement of people, co-operation in crime and terrorism, collaboration in areas of science and technology, engagement with devolved administrations, maintaining the Common Travel Area with Ireland, and preserving existing workers’ rights. She also confirmed, “that the Government will put the final deal that is agreed between the UK and the EU to a [meaningful] vote in both Houses of Parliament, before it comes into force.”[295]
The Government has stated its intention to “secure the specific interests of Scotland, Wales and Northern Ireland, as well as those of all parts of England”. Through the Joint Ministerial Committee on EU Negotiations (JMC(EN)), the Government intends to involve the views of the Scottish Parliament, the Welsh Assembly and the Northern Ireland Assembly in the process of negotiating the UK’s exit from the EU. For instance, at the January 2017 meeting of the JMC(EN), the Scottish Government’s proposal to remain in the European Economic Area was considered.[296]
Public comment pre- and post-Article 50 notification
EU negotiator Guy Verhofstadt, the European parliament’s chief negotiator, said that: “All British citizens today have also EU citizenship. That means a number of things: the possibility to participate in the European elections, the freedom of travel without problem inside the union. We need to have an arrangement in which this arrangement can continue for those citizens who on an individual basis are requesting it.” The suggestion being an “associate citizenship”.[297]
An EU meeting to discuss Brexit was called for 29 April 2017, Donald Tusk stating that the “priority would be giving “clarity” to EU residents, business and member states about the talks ahead”. Barnier called for talks to be completed by October 2018 to give time for any agreement to be ratified before the UK leaves in March 2019.[298]
Sinn Féin called for a referendum to create a united Ireland, following the Northern Ireland majority decision (56% to 44%) to vote no to Brexit and 2 March election to the Northern Ireland Assembly wherein Sinn Féin increased its number of seats.[299]
In early May, Jean-Claude Juncker said that the UK leaving the EU was a “tragedy” and that it is partly the responsibility of the EU. “The EU, in many respects has done too much, especially the Commission”, including “too much regulation and too many interferences in the lives of our fellow citizens”. The European Commission has, following the “Better regulation” initiative, in place since before Brexit, reduced the number of legislative proposals from 130 to 23 per year.[300][301]
Post-referendum opinion polling
Following the EU referendum, there have been several opinion polls on the question of whether the UK was “right” or “wrong” to vote to leave the EU. The results of these polls are shown in the table below.
There have also been opinion polls on the question of how people would vote in a second referendum on the same question. The results of these polls are shown in the table below.
The response of artists and writers to Brexit has in general been negative, reflecting a reported overwhelming percentage of people involved in Britain’s creative industries voting against leaving the European Union.[321]
Responses by visual artists to Brexit include a mural, painted in May 2017, by the secretive graffiti artist Banksy near the ferry port at Dover in southern England. It shows a workman using a chisel to chip off one of the stars on the European Union Flag.[322]
In his 2017 art exhibition at the Serpentine Gallery in London, the artist Grayson Perry showed a series of ceramic, tapestry and other works of art dealing with the divisions in Britain during the Brexit campaign and in its aftermath. This included two large ceramic pots, Perry called his Brexit Vases, standing on plinths ten feet apart, on the first of which were scenes involving pro-European British citizens, and on the second scenes involving anti-European British citizens. These were derived from what Perry called his “Brexit tour of Britain.”[323]
Brexit in novels
One of the first novels to engage with a post-Brexit Britain was Rabbitman by Michael Paraskos (published 9 March 2017). Rabbitman is a dark comic fantasy in which the events that lead to the election of a right-wing populist American president, who happens also to be a rabbit, and Britain’s vote to leave the European Union, were the result of a series of Faustian pacts with the Devil. As a result, Rabbitman is set partly in a post-Brexit Britain in which society has collapsed and people are dependent on European Union food aid.[324]
Mark Billingham’s Love Like Blood (published 1 June 2017) is a crime thriller in which Brexit sees a rise in xenophobic hate crime.[325] In the novel The Remains of the Way (published 6 June 2017), David Boyle imagines Brexit was a conspiracy led by a forgotten government quango, still working away in Whitehall, originally set up by Thomas Cromwell in the sixteenth century during the reign of King Henry VIII, and now dedicated to a Protestant Brexit.[326]
Post-Brexit Britain is also the setting for Amanda Craig‘s The Lie of the Land (published 13 June 2017), a satirical novel set ten years after the vote to leave the European Union, in which an impoverished middle class couple from Islington in north London are forced to move from the heart of the pro-European Union capital, to the heart of the pro-Brexit countryside in Devon.[327]
Brexit is also the baseline for Douglas Board’s comic political thriller Time of Lies (published 23 June 2017). In this novel, the first post-Brexit general election in 2020 is won by a violent right-wing former football hooligan called Bob Grant. Board charts the response to this of the hitherto pro-European Union metropolitan political elite.[328]
Stanley Johnson‘s Kompromat (scheduled for July 2017) is a political thriller that suggests the vote to leave the European Union was a result of Russian influence on the referendum, although Johnson has insisted his book is not intended to point the finger at Russia’s secret services, but is “just meant to be fun.”[329]
John King’s dystopian novel The Liberal Politics of Adolf Hitler (2016) imagines the European Union fifty years into the future when the UK has been broken up into regions of a centralised super-state. The United State of Europe (USE) is a closet dictatorship where Orwellian doublespeak and internet censorship is the norm, and elections are no longer considered necessary.[citation needed]
Brexit in theatre
In June 2017, the National Theatre in London presented a play by Carol Ann Duffy, entitled My Country; a work in progress. An allegorical work, the play uses the device of a convention called by the goddess Britannia, who is concerned about the future of the British people.[330] The play differs from some artistic responses in that Duffy and the National Theatre-based the attitudes of the characters in part on the responses of ordinary people in interviews that were conducted by the regional offices of the UK Arts Councils, but excluding responses from London and the south-east of England, where most people voted not to leave the EU. As a result, according to Dominic Cavendish, writing in The Daily Telegraph, “the bias is towards the Leave camp”.[331]
Brexit in film
In 2016, the television director Martin Durkin wrote and directed an 81 minute long documentary film titled “Brexit: The Movie” which advocated with the withdrawal of the United Kingdom from the European Union. The film was produced by the production company Wag TV with a budget of £300,000.[332] The production costs were sourced primarily through crowdfunding via Kickstarter alongside a £50,000 contribution from the hedge fund Spitfire Capital. In May 2016 the film premiered in Leicester Square, with notable figures such as Nigel Farage and David Davis (who later became Secretary of State for Exiting the European Union) in attendance.
Establishment of pro-European political organisations
In 2017, newly elected Liberal Democrats leader Vince Cable criticised ‘pop up’ anti-Brexit parties formed following the 2016 referendum, saying of those groups policies “…it is the kind of ideology-free, technocratic, authoritarian centrism that would be more at home in, say, Singapore.” and “Voters beware.”[335]
It’s been almost a year since the United Kingdom formally notified the European Union of its intention to leave the EU. Since then, the UK and EU have been engaged in intense negotiations about the mechanics of Brexit, all with a view to the UK’s formal departure on 29 March 2019. In the meantime, British Prime Minister Theresa May called a snap general election in June 2017 in order to boost her majority and negotiating mandate – a strategy that failed dismally and delivered her a minority governmentand shaky hold on her own job.
The atmosphere in the UK is still intensely divided, with polls indicating support for Leave and Remain almost neck and neck. That said, more Britons than not think the UK should go ahead with Brexit rather than attempt to reverse the referendum result.
UK–EU negotiations have been tetchy and at times chaotic. There is no precedent for leaving the EU, only acceding to it, so both sides are in uncharted territory trying to disentangle the mess that is a 45-year EU membership. Further, the referendum result gave the UK Government no direction on the nature of the post-Brexit relationship with the EU. Among those who sensibly accept that Brexit is a fait accompli, two sides claim legitimacy for their own version of the result: the choice between hard or soft Brexit.
Hard Brexit means leaving both the EU’s Customs Union and Single Market, ending the EU budget payments and withdrawing from the jurisdiction of the European Court of Justice. Soft Brexit means the UK leaves the EU but remains part of the Customs Union and/or Single Market, as a sort of quasi-EU member without voting power and perhaps with less constraints on its sovereignty.
If the UK wants to sign its own Free Trade Agreements (FTAs) – and all indications are that it does aspire to FTAs with Australia, the United States, and even to joining the Trans-Pacific Partnership – then it must leave the Customs Union. The EU Customs Union creates a trading area with a common external tariff, but within which there are no tariffs or quotas. Individual member states do not have the authority to enter into their own FTAs. Rather, the European Commission negotiates and enters into these agreements on behalf of the EU.
If the UK wants to restrict the movement of EU citizens to the UK – and, again, the indications are that the British people want this – then it cannot be a member of the Single Market whose “four freedoms” require member states to grant the free movement of people, goods, services, and capital.
Simply put, Theresa May and her government are largely in favour of a hard Brexit (articulated in May’s recent Mansion Housespeech), while the Opposition Leader Jeremy Corbyn favours a have-your-cake-and-eat-it soft Brexit.
With elections not due until May 2022, Corbyn’s position on Brexit as laid out in his recent Coventry speech is more posture than policy. (He wants a new, bespoke UK–EU Customs Union that would allow the UK to enter into its own trade agreements.) Brexit will be done and dusted by the time he gets a chance at the top job. Corbyn’s agenda, rather, is to place maximum pressure on an already weakened Theresa May, perhaps claim her scalp, and set himself up to lead Labour to a win in four years’ time.
In the meantime, when she’s not taking heat from Corbyn during Prime Minister’s Questions in the House of Commons, May must deal with the European Commission’s Chief Negotiator, Frenchmen Michel Barnier.
The EU’s latest offering in the negotiations is the Draft Withdrawal Agreement released on 28 February 2018. While the document raised many contentious issues, including the nature and length of the implementation or transition period, the biggest debate has raged over the treatment of the EU–UK border between the Republic of Ireland and Northern Ireland. May has made the maintenance of a “soft border” between the Republic of Ireland and Northern Ireland a negotiating red line for the UK, given the impact any change could have on the hard-won peace in Northern Ireland.
While much remains up in the air in the UK–EU negotiations, a few issues have settled relatively quickly. For example, the rights of EU citizens currently living in the UK, and vice versa, are secure. These citizens can remain in their host country indefinitely after 29 March 2019 by applying for “settled status”, and then citizenship. Further, on the so-called Brexit divorce bill, depending on the final agreement, the UK has agreed to pay the EU a staggering £35–39 billion.
Whatever the nature of the final deal struck, it will need approval by the British Parliament. May’s numbers in the House of Commons are wafer thin – she holds government with the support of 10 Democratic Unionist Party MPs from Northern Ireland – and the 11 Brexit rebels in her own party could prove problematic if they don’t like the final deal.
The Brexit negotiations, the implementation of the final deal, and the ramifications of whatever is agreed are not going away anytime soon. Britain might be technically free of the EU on 30 March 2019, but just how free remains an extremely vexed question.
Minsky wrote the book Perceptrons (with Seymour Papert), which became the foundational work in the analysis of artificial neural networks. This book is the center of a controversy in the history of AI, as some claim it to have had great importance in discouraging research of neural networks in the 1970s, and contributing to the so-called “AI winter“.[23] He also founded several other famous AI models. His book A framework for representing knowledge created a new paradigm in programming. While his Perceptrons is now more a historical than practical book, the theory of frames is in wide use.[24] Minsky has also written on the possibility that extraterrestrial life may think like humans, permitting communication.[25]
In the early 1970s, at the MIT Artificial Intelligence Lab, Minsky and Papert started developing what came to be known as the Society of Mind theory. The theory attempts to explain how what we call intelligence could be a product of the interaction of non-intelligent parts. Minsky says that the biggest source of ideas about the theory came from his work in trying to create a machine that uses a robotic arm, a video camera, and a computer to build with children’s blocks. In 1986, Minsky published The Society of Mind, a comprehensive book on the theory which, unlike most of his previously published work, was written for the general public.
In November 2006, Minsky published The Emotion Machine, a book that critiques many popular theories of how human minds work and suggests alternative theories, often replacing simple ideas with more complex ones. Recent drafts of the book are freely available from his webpage.[26]
Role in popular culture
Minsky was an adviser[27] on Stanley Kubrick‘s movie 2001: A Space Odyssey; one of the movie’s characters, Victor Kaminski, was named in Minsky’s honor[28]. Minsky himself is explicitly mentioned in Arthur C. Clarke‘s derivative novel of the same name, where he is portrayed as achieving a crucial break-through in artificial intelligence in the then-future 1980s, paving the way for HAL 9000 in the early 21st century:
In the 1980s, Minsky and Good had shown how neural networks could be generated automatically—self replicated—in accordance with any arbitrary learning program. Artificial brains could be grown by a process strikingly analogous to the development of a human brain. In any given case, the precise details would never be known, and even if they were, they would be millions of times too complex for human understanding.[29]
In 1952, Minsky married pediatrician Gloria Rudisch; together they had three children.[30] Minsky was a talented improvisational pianist[31] who published musings on the relations between music and psychology.
Opinions
Minsky was an atheist[32] and a signatory to the Scientists’ Open Letter on Cryonics.[33] He was a critic of the Loebner Prize for conversational robots.[34][35]
Minsky believed that there is no fundamental difference between humans and machines, and that humans are machines whose “intelligence” emerges from the interplay of the many unintelligent but semi-autonomous agents that comprise the brain.[36] He has stated that “somewhere down the line, some computers will become more intelligent than most people,” but that it’s very hard to predict how fast progress will be.[37] He has cautioned that an artificial superintelligence designed to solve an innocuous mathematical problem might decide to assume control of Earth’s resources to build supercomputers to help achieve its goal,[38] but believed that such negative scenarios are “hard to take seriously” because he was confident AI would go through “a lot of testing” before being deployed.[39]
Death
Minsky died of a cerebral hemorrhage at the age of 88.[40] Minsky was a member of Alcor‘s Scientific Advisory Board,[41] and is believed to have been cryonically preserved by Alcor,[42] presumably as ‘Patient 144’, whose cooling procedures began on January 27, 2016.[43]
Bibliography (selected)
1967 – Computation: Finite and Infinite Machines, Prentice-Hall
Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2
Wyden: No to warrantless searches by the FBI through National Security Letters
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
William Binney – The Government is Profiling You (The NSA is Spying on You)
NSA Surveillance and What To Do About It
Taking a Look at the NSA’s Massive Data Center
NSA’s Largest Spy Center Located in Utah (What you need to know)
NSA Whistleblower William Binney: The Future of FREEDOM
‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)
Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’
DOCUMENTARY: Edward Snowden – Terminal F (2015)
NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’
NSA paying US Companies hundreds of millions of dollars for access to data
“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying
Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)
Published on Jul 8, 2013
The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.
During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.
All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.
The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]
After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.
FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying
If you think you can handle the truth, well here it is folks
The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]
Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.
NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]
Contents
[show]
History
Army predecessor
The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]
Black Chamber
Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]
MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]
Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]
Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]
World War II and its aftermath
During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]
On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]
The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]
A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]
The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79
In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]
In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]
In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]
NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]
War on Terror
After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]
In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]
Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.
Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]
The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.
Scope of surveillance
It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]
A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]
The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]
Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]
The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]
Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]
According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]
Legal accountability
Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]
Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]
Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]
An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]
Official responses
On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]
Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]
The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]
NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]
Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.
As of the mid-1990s, the National Security Agency was organized into five Directorates:
The Operations Directorate, which was responsible for SIGINT collection and processing.
The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
The Support Services Directorate, which provided logistical and administrative support activities.[90]
Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]
Structure
As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.
The main elements of the organizational structure of the NSA are:[93]
F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
L – Installation and Logistics
M – Human Resources
Q – Security and Counterintelligence
R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
S1 – Customer Relations
S2 – Analysis and Production Centers, with the following so-called Product Lines:
S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
S3 – Data Acquisition, with these divisions for the main collection programs:
S31 – Cryptanalysis and Exploitation Services (CES)
S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
S34 – Collections Strategies and Requirements Center
S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
T – Technical Directorate (TD)
Directorate for Education and Training
Directorate for Corporate Leadership
Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
Acquisitions and Procurement Directorate
Information Sharing Services (ISS), led by a chief and a deputy chief.[100]
In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]
After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]
A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]
Watch centers
The NSA maintains at least two watch centers:
National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]
Employees
The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]
In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.
The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.
The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]
Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]
The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]
NSA-produced video on the polygraph process
There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]
In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]
After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]
Arbitrary firing
The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]
Insignia and memorials
The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]
When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]
The NSA’s flag consists of the agency’s seal on a light blue background.
National Cryptologic Memorial
Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]
The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]
NSANet (NSA’s intranet)
Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS
NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]
NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]
In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]
The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]
National Computer Security Center
The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]
Facilities
Headquarters
National Security Agency headquarters in Fort Meade, 2013
Headquarters for the National Security Agency is located at 39°6′32″N76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]
NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]
NSA headquarters building in Fort Meade (left), NSOC (right)
The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]
The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]
The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]
Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]
Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]
Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]
One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]
When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]
Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]
On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]
The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163]In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]
An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165]but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]
NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]
Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149]Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]
On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]
In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]
NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]
The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]
In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]
Thailand
Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.
Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]
The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]
NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]
According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]
The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]
Mission
NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]
According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]
Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).
As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]
Operations
Operations by the National Security Agency can be divided in three types:
Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.
During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]
NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]
The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]
In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]
The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]
BoundlessInformant
Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]
In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209]Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]
XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]
NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]
NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]
George W. Bush administration
George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]
One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]
Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]
On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]
As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.
In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]
Data mining
NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]
A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]
In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]
Barack Obama administration
In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]
Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235]Rasmussen Reports found that 59% of Americans disapprove,[236]Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]
Section 215 metadata collection
On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]
In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]
The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]
Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]
In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.
Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247]Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.
In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]
July 2015 – WikiLeaks: Espionage against German federal ministries[edit]
In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]
Claims of prevented terrorist attacks
Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]
Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.
NSA’s China hacking group
According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]
Syrian internet blackout
In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]
Suspected responsibility for hacking operations by the Equation Group[edit]
The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drivefirmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31
When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.
— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]
Boomerang routing
While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]
Hardware implanting
Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon
A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]
Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269]Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]
Role in scientific research and development[
NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.
Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]
NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipheralgorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.
The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]
The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]
The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]
SHA
The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]
A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]
NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]
This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]
Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]
Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.
Academic research
NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]
Patents
NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]
One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]
Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs
In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.
President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.
As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.
Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.
This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.
Rand Paul Disgusted at NSA Spying on Congress and Israel | Fox News
Report: NSA captured conversations of Congress members with Israeli leaders
Report Says NSA Captured Conversations Of Congress Members With Israeli Leaders
Report: NSA Wiretapped Conversations Between Israeli PM And Members Of Congress
What NSA Eavesdropping On Israel Reveals About Relations
Wall Street Journal: NSA spied on Israeli leaders
WSJ: NSA Spied Not Only On Israel But Congress During Nuke Talks – America’s Newsroom
NSA spied on Israel amid Iran talks, caught some US lawmakers’ US talks
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All
NSA Surveillance and What To Do About It
ShmooCon 2014: The NSA: Capabilities and Countermeasures
Bruce Schneier: “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World”
JACOB APPELBAUM EXPOSES NSA TOOLS HACKING YOUR COMPUTER-BACK DOORS & MALWARE
Jacob Appelbaum Interview – Discusses Edward Snowden, The NSA, TOR, WikiLeaks
William Binney – NSA Hiding Extent of Surveillance From FISA Courts & Congress
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
He told you so: Bill Binney talks NSA leaks
William Binney – The Government is Profiling You (The NSA is Spying on You)
William Binney: NSA had 9/11 foreknowledge
NSA Spying on All Americans Part 1
NSA Spying on All Americans Part 2
How the NSA Spies on Americans (Jim Harper)
The NSA: Future Crime Unit (Jim Harper)
NSA Whistleblower William Binney the 3 words that will put you on the NSA List
NSA whistleblower William Binney Keynote at HOPE Number Nine
NSA Whistleblower William Binney: The Future of FREEDOM
Alex Jones interviews William Binney December 22nd 2015
The Alex Jones Show (3rd HOUR-VIDEO Commercial Free) Wednesday December 30 2015: Seymour Hersh
Operation “Toto” Pulling Back The Curtain: Full NSA Interview
FULL Senate Debate On NSA Spying On ALL Americans
Spying on the Homefront-PBS Frontline
State of Surveillance: Police, Privacy and Technology
The USA Freedom Act | True News
Next Future Terrifying Technology Will Blow Your Mind
Enemy of the State Movie Will Smith (1998)
Encryption as Fast As Possible
Why the NSA is breaking our encryption — and why we should care | Matthew Green | TEDxMidAtlantic
U.S. Spy Net on Israel Snares Congress
NSA’s targeting of Israeli leaders swept up the content of private conversations with U.S. lawmakers
By ADAM ENTOUS and DANNY YADRON
President Barack Obama announced two years ago he would curtail eavesdropping on friendly heads of state after the world learned the reach of long-secret U.S. surveillance programs.
But behind the scenes, the White House decided to keep certain allies under close watch, current and former U.S. officials said. Topping the list was Israeli Prime MinisterBenjamin Netanyahu.
The U.S., pursuing a nuclear arms agreement with Iran at the time, captured communications between Mr. Netanyahu and his aides that inflamed mistrust between the two countries and planted a political minefield at home when Mr. Netanyahu later took his campaign against the deal to Capitol Hill.
The National Security Agency’s targeting of Israeli leaders and officials also swept up the contents of some of their private conversations with U.S. lawmakers and American-Jewish groups. That raised fears—an “Oh-s— moment,” one senior U.S. official said—that the executive branch would be accused of spying on Congress.
The White House kept certain allies including Israeli Prime Minister Benjamin Netanyahu under surveillance after President Obama announced the U.S. would curtail surveillance on friendly heads of state. WSJ’s Adam Entous has details on Lunch Break. Photo: Getty
White House officials believed the intercepted information could be valuable to counter Mr. Netanyahu’s campaign. They also recognized that asking for it was politically risky. So, wary of a paper trail stemming from a request, the White House let the NSA decide what to share and what to withhold, officials said. “We didn’t say, ‘Do it,’ ” a senior U.S. official said. “We didn’t say, ‘Don’t do it.’ ”
Explore more than 60 countries that have or are building cyberwar tools
WSJ’s Adam Entous explains how the U.S. determined which world leaders to spy on after announcing it would curtail surveillance. Photo: Getty
Stepped-up NSA eavesdropping revealed to the White House how Mr. Netanyahu and his advisers had leaked details of the U.S.-Iran negotiations—learned through Israeli spying operations—to undermine the talks; coordinated talking points with Jewish-American groups against the deal; and asked undecided lawmakers what it would take to win their votes, according to current and former officials familiar with the intercepts.
In closed-door debate, the Obama administration weighed which allied leaders belonged on a so-called protected list, shielding them from NSA snooping. French President François Hollande, German Chancellor Angela Merkel and other North Atlantic Treaty Organization leaders made the list, but the administration permitted the NSA to target the leaders’ top advisers, current and former U.S. officials said. Other allies were excluded from the protected list, including Recep Tayyip Erdogan, president of NATO ally Turkey, which allowed the NSA to spy on their communications at the discretion of top officials.
Privately, Mr. Obama maintained the monitoring of Mr. Netanyahu on the grounds that it served a “compelling national security purpose,” according to current and former U.S. officials. Mr. Obama mentioned the exception in his speech but kept secret the leaders it would apply to.
Israeli, German and French government officials declined to comment on NSA activities. Turkish officials didn’t respond to requests Tuesday for comment. The Office of the Director of National Intelligence and the NSA declined to comment on communications provided to the White House.
The White House stopped directly monitoring the private communications of German Chancellor Angela Merkel but authorized the National Security Agency to eavesdrop on her top advisers.PHOTO: ODD ANDERSEN/AGENCE FRANCE-
This account, stretching over two terms of the Obama administration, is based on interviews with more than two dozen current and former U.S. intelligence and administration officials and reveals for the first time the extent of American spying on the Israeli prime minister.
Taking office
After Mr. Obama’s 2008 presidential election, U.S. intelligence officials gave his national-security team a one-page questionnaire on priorities. Included on the form was a box directing intelligence agencies to focus on “leadership intentions,” a category that relies on electronic spying to monitor world leaders.
The NSA was so proficient at monitoring heads of state that it was common for the agency to deliver a visiting leader’s talking points to the president in advance. “Who’s going to look at that box and say, ‘No, I don’t want to know what world leaders are saying,’ ” a former Obama administration official said.
In early intelligence briefings, Mr. Obama and his top advisers were told what U.S. spy agencies thought of world leaders, including Mr. Netanyahu, who at the time headed the opposition Likud party.
Michael Hayden, who led the NSA and the Central Intelligence Agency during the George W. Bush administration, described the intelligence relationship between the U.S. and Israel as “the most combustible mixture of intimacy and caution that we have.”
The NSA helped Israel expand its electronic spy apparatus—known as signals intelligence—in the late 1970s. The arrangement gave Israel access to the communications of its regional enemies, information shared with the U.S. Israel’s spy chiefs later suspected the NSA was tapping into their systems.
When Mr. Obama took office, the NSA and its Israeli counterpart, Unit 8200, worked together against shared threats, including a campaign to sabotage centrifuges for Iran’s nuclear program. At the same time, the U.S. and Israeli intelligence agencies targeted one another, stoking tensions.
“Intelligence professionals have a saying: There are no friendly intelligence services,” said Mike Rogers, former Republican chairman of the House Intelligence Committee.
Early in the Obama presidency, for example, Unit 8200 gave the NSA a hacking tool the NSA later discovered also told Israel how the Americans used it. It wasn’t the only time the NSA caught Unit 8200 poking around restricted U.S. networks. Israel would say intrusions were accidental, one former U.S. official said, and the NSA would respond, “Don’t worry. We make mistakes, too.”
Convinced Mr. Netanyahu would attack Iran without warning the White House, U.S. spy agencies ramped up their surveillance, with the assent of Democratic and Republican lawmakers serving on congressional intelligence committees.
By 2013, U.S. intelligence agencies determined Mr. Netanyahu wasn’t going to strike Iran. But they had another reason to keep watch. The White House wanted to know if Israel had learned of the secret negotiations. U.S. officials feared Iran would bolt the talks and pursue an atomic bomb if news leaked.
The NSA had, in some cases, spent decades placing electronic implants in networks around the world to collect phone calls, text messages and emails. Removing them or turning them off in the wake of the Snowden revelations would make it difficult, if not impossible, to re-establish access in the future, U.S. intelligence officials warned the White House.
Instead of removing the implants, Mr. Obama decided to shut off the NSA’s monitoring of phone numbers and email addresses of certain allied leaders—a move that could be reversed by the president or his successor.
There was little debate over Israel. “Going dark on Bibi? Of course we wouldn’t do that,” a senior U.S. official said, using Mr. Netanyahu’s nickname.
One tool was a cyber implant in Israeli networks that gave the NSA access to communications within the Israeli prime minister’s office.
Given the appetite for information about Mr. Netanyahu’s intentions during the U.S.-Iran negotiations, the NSA tried to send updates to U.S. policy makers quickly, often in less than six hours after a notable communication was intercepted, a former official said.
Despite NSA surveillance, Obama administration officials said they were caught off guard when Mr. Boehner announced the invitation on Jan. 21.
Soon after, Israel’s lobbying campaign against the deal went into full swing on Capitol Hill, and it didn’t take long for administration and intelligence officials to realize the NSA was sweeping up the content of conversations with lawmakers.
The message to the NSA from the White House amounted to: “You decide” what to deliver, a former intelligence official said.
NSA rules governing intercepted communications “to, from or about” Americans date back to the Cold War and require obscuring the identities of U.S. individuals and U.S. corporations. An American is identified only as a “U.S. person” in intelligence reports; a U.S. corporation is identified only as a “U.S. organization.” Senior U.S. officials can ask for names if needed to understand the intelligence information.
The Obama administration included French President François Hollande on a so-called protected list, shielding him from NSA snooping.PHOTO: PHILIPPE WOJAZER/REUTERS
The rules were tightened in the early 1990s to require that intelligence agencies inform congressional committees when a lawmaker’s name was revealed to the executive branch in summaries of intercepted communications.
A 2011 NSA directive said direct communications between foreign intelligence targets and members of Congress should be destroyed when they are intercepted. But the NSA director can issue a waiver if he determines the communications contain “significant foreign intelligence.”
The NSA has leeway to collect and disseminate intercepted communications involving U.S. lawmakers if, for example, foreign ambassadors send messages to their foreign ministries that recount their private meetings or phone calls with members of Congress, current and former officials said.
“Either way, we got the same information,” a former official said, citing detailed reports prepared by the Israelis after exchanges with lawmakers.
During Israel’s lobbying campaign in the months before the deal cleared Congress in September, the NSA removed the names of lawmakers from intelligence reports and weeded out personal information. The agency kept out “trash talk,” officials said, such as personal attacks on the executive branch.
Administration and intelligence officials said the White House didn’t ask the NSA to identify any lawmakers during this period.
“From what I can tell, we haven’t had a problem with how incidental collection has been handled concerning lawmakers,” said Rep. Adam Schiff, a California Democrat and the ranking member of the House Permanent Select Committee on Intelligence. He declined to comment on any specific communications between lawmakers and Israel.
The NSA reports allowed administration officials to peer inside Israeli efforts to turn Congress against the deal. Mr. Dermer was described as coaching unnamed U.S. organizations—which officials could tell from the context were Jewish-American groups—on lines of argument to use with lawmakers, and Israeli officials were reported pressing lawmakers to oppose the deal.
“These allegations are total nonsense,” said a spokesman for the Embassy of Israel in Washington.
A U.S. intelligence official familiar with the intercepts said Israel’s pitch to undecided lawmakers often included such questions as: “How can we get your vote? What’s it going to take?”
NSA intelligence reports helped the White House figure out which Israeli government officials had leaked information from confidential U.S. briefings. When confronted by the U.S., Israel denied passing on the briefing materials.
The agency’s goal was “to give us an accurate illustrative picture of what [the Israelis] were doing,” a senior U.S. official said.
Just before Mr. Netanyahu’s address to Congress in March, the NSA swept up Israeli messages that raised alarms at the White House: Mr. Netanyahu’s office wanted details from Israeli intelligence officials about the latest U.S. positions in the Iran talks, U.S. officials said.
A day before the speech, Secretary of State John Kerry made an unusual disclosure. Speaking to reporters in Switzerland, Mr. Kerry said he was concerned Mr. Netanyahu would divulge “selective details of the ongoing negotiations.”
The State Department said Mr. Kerry was responding to Israeli media reports that Mr. Netanyahu wanted to use his speech to make sure U.S. lawmakers knew the terms of the Iran deal.
Intelligence officials said the media reports allowed the U.S. to put Mr. Netanyahu on notice without revealing they already knew his thinking. The prime minister mentioned no secrets during his speech to Congress.
In the final months of the campaign, NSA intercepts yielded few surprises. Officials said the information reaffirmed what they heard directly from lawmakers and Israeli officials opposed to Mr. Netanyahu’s campaign—that the prime minister was focused on building opposition among Democratic lawmakers.
The NSA intercepts, however, revealed one surprise. Mr. Netanyahu and some of his allies voiced confidence they could win enough votes.
“Encrypt” redirects here. For the film, see Encrypt (film).
This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography.
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.[1] Encryption does not of itself prevent interception, but denies the message content to the interceptor.[2]:374 In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted.[2] For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.
Types of encryption
Symmetric key encryption
In symmetric-key schemes,[3] the encryption and decryption keys are the same. Communicating parties must have the same key before they can achieve secure communication.
In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.[4] Public-key encryption was first described in a secret document in 1973;[5] before then all encryption schemes were symmetric-key (also called private-key).[2]:478
A publicly available public key encryption application called Pretty Good Privacy (PGP) was written in 1991 by Phil Zimmermann, and distributed free of charge with source code; it was purchased by Symantec in 2010 and is regularly updated.[6]
Uses of encryption
Encryption has long been used by military and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage.[7] Encryption can be used to protect data “at rest”, such as information stored on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers’ personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems, which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection), is another somewhat different example of using encryption on data at rest.[8]
Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of amessage authentication code (MAC) or a digital signature. Standards for cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single error in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. See, e.g., traffic analysis, TEMPEST, or Trojan horse.[11]
Digital signature and encryption must be applied to the ciphertext when it is created (typically on the same device used to compose the message) to avoid tampering; otherwise any node between the sender and the encryption agent could potentially tamper with it. Encrypting at the time of creation is only secure if the encryption device itself has not been tampered with.
Story 1: Hillary Clinton Has A History of Using Private Investigators — Imagine What She Would Do If Elected President With The Federal Bureau of Investigation (FBI), Internal Revenue Service (IRS) and National Security Agency (NSA) — Hillary Would Turn The Key Of NSA’s Turnkey Tyranny — Indict Hillary Clinton For Her Crimes of Destroying Government Documents and Obstructing Justice! — Videos
Kurtz: Sid Blumenthal’s shadowy role
New revelation in the Clinton email scandal
Impact of the Clinton emails on the Benghazi investigation
John King: Hillary Clinton ‘Has Only Herself to Blame’ for Private Email Scandal
America’s Forum | Dick Morris discusses the Hillary Clinton email scandal
Dick Morris: Beware hillary’s abuse of women + power
The Hard Line | Dick Morris discusses Bernie Sanders, Hillary Clinton, and Martin O’Malley
Hillary Clinton Cold Open – SNL
Bernie Sanders gaining momentum in presidential race
Bernie Sanders Says He’ll Win New Hampshire, Iowa, and the White House
Bernie Sanders Speaks With Katie Couric – Full Interview
Bernie Sanders Rally in Madison, Wisconsin
Hillary Clinton Exposed, Movie She Banned From Theaters Full Movie
Hillary’s Flawed Strategy! Dick Morris TV: Lunch ALERT!
America’s Forum | Dick Morris discusses Ted Cruz and Hillary Clinton
President Bill Clinton on the resignation of aide Dick Morris
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
He told you so: Bill Binney talks NSA leaks
William Binney – Inside NSA
NSA Whistleblower William Binney: The Future of FREEDOM
Enemy Of The State 1998 (1080p) (Full movie)
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
Published on Dec 30, 2013
Through a PRISM, Darkly
Everything we know about NSA spying
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.
Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english
Has Clinton Dispatched Oppo Researchers to UVM’s Sanders Archive?
By PAUL HEINTZ @PAULHEINTZ
Librarians at the University of Vermont’s special collections say interest is spiking in the “Bernard Sanders papers” — 30 boxes of meticulously organized material documenting Sanders’ eight years as mayor of Burlington.
That should come as no surprise, given the independent senator’s rapid rise in the polls in New Hampshire and Iowa, which hold the nation’s first presidential nominating contests.
Media outlets, such as the Guardian, have drilled deep into the archives and unearthed tasty tidbits — but they’re not the only ones interested in getting to know the senator.
Last Thursday, two casually dressed twentysomethings were spotted combing through the Sanders files and decades-old Vermont newspapers. As they were on their way out the door at the end of the day, Seven Days asked what they were doing.
“No comment,” said one of the young men, dressed in a T-shirt and flannel. “No comment.”
As they emerged into the sunlight outside Bailey/Howe Library, Seven Dayspressed again: “Come on! We’re all doing the same thing.”
“No, we’re not,” Flannel Man shot back.
“We’re just looking,” said the other one, dressed in a white shirt with black stripes.
“Looking at what?”
“Old newspapers,” Stripy said. “Vermont history.”
So who were these mysterious characters? Opposition researchers working for one of Sanders’ rivals? Earlier that day a super PAC supporting former Maryland governor Martin O’Malley launched the first negative ad of the race targeting Sanders.
Asked if Team O’Malley had dispatched Flannel Man and Stripy to Burlington, campaign spokeswoman Lis Smith said, “We have not, and they are not affiliated with our campaign.”
But wait! Here’s a clue: That T-shirt Flannel Man was wearing? It read, “New Hampshire for Jeanne Shaheen.”
Earlier this year, Hillary Clinton absorbed much of Shaheen’s political operation to run her Granite State campaign: state director Mike Vlacich, senior political aide Kari Thurman and spokesman Harrell Kirstein.
Asked if Flannel Man and Stripy belonged to Team Clinton, Kirstein did not respond.
Welcome to Burlington, Hillary. Next time, tell your people to leave their Shaheen shirts at home.
Story 1: National Security Agency Is Still Massively Collecting All Your Communications — The USA Freedom Act Is At Best A Baby Step Towards Restoring Your Fourth Amendment Constitutional Rights — Fire Your Representatives For Betraying Their Oath Of Office — NSA Turnkey Tyranny Totalitarian Targeting of American People — Videos
USA Freedom Act passed by Senate and signed by President Obama, limiting NSA surveillance
Freedom Act Changes NSA Rules For Data Collection
Senate Passes USA Freedom Act, Stops NSA Phone Data Gathering Special Report 1st Segment
Bill Binney: We Are A Gov’t With A Country
Freedom Act: Edward Snowden speaks out on surveillance reform
Politics Panel: Cowards! The Freedom Act is Passed
William Binney’s Heartfelt Plea to the American People
Operation “Toto” Pulling Back The Curtain: Full NSA Interview
William Binney Tells RT That USA Freedom Act is a Farce
NSA Whistleblower William Binney: The Future of FREEDOM
Bill Binney: ‘21 recommendations on fixing NSA sent to US president last year’
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
Rand Paul Causes A Vicious Senate Cat Fight Over Patriot Act
Rand Paul’s Freedom Act Filibuster
Senate Approves USA Freedom Act, Obama Signs It, After Amendments Fail
BILL CHAPPELL
The Senate has approved the USA Freedom Act, which will alter the way U.S. agencies conduct surveillance and gather data. A final vote on the bill came late Tuesday afternoon, after amendments to the bill failed.
Update at 9:30 p.m. ET: Obama’s Signature
Following an expedited enrollment process, President Obama signed the bill into law late Tuesday.
Enactment of this legislation will strengthen civil liberty safeguards and provide greater public confidence in these programs,” Obama said in a statement after the vote. “I am gratified that Congress has finally moved forward with this sensible reform legislation.”
Update at 4:30 p.m. ET: The Bill Has Passed
In the final tally of the vote, 67 senators were in favor of the measure and 32 against. The legislation needed a simple majority to pass.
Last November, the Freedom Act failed in the Senate after not receiving enough support to avoid a filibuster. Its critics say the act doesn’t go far enough to curtail surveillance programs that can access huge databases of information about Americans.
Sen. Rand Paul, R-Ky., voted against the measure today, as he did last fall. Also voting against the bill Tuesday was independent Sen. Bernie Sanders, who is seeking the Democratic presidential nomination.
The lead sponsor of the bill in the House, Rep. Jim Sensenbrenner, R-Wis., promises it will “rein in the dragnet collection of data” by the NSA and others, and “increase transparency of the Foreign Intelligence Surveillance Court.”
Calling today’s passage “a milestone,” ACLU Deputy Legal Director Jameel Jaffer says, “This is the most important surveillance reform bill since 1978, and its passage is an indication that Americans are no longer willing to give the intelligence agencies a blank check.”
Our original post continues:
The vote comes two days after controversial provisions of the Patriot Act expired because the Senate was unable to “overcome parliamentary maneuvers by Sen. Rand Paul,” as Eyder reported Sunday night, “and let three controversial provisions of the Patriot Act expire at midnight.”
The House of Representatives approved the Freedom Act on May 13. The legislation would remain in effect until Dec. 15, 2019.
“We worked for two years across the aisle and across the Capitol,” said Sen. Patrick Leahy, a champion of the bill. He said it would bring much-needed reform to America’s intelligence-gathering.
Leahy and his chief ally on the bill, Sen. Mike Lee, R-Utah, spent their Tuesday in the Senate fighting against amendments to the USA Freedom Act that were put forth — and defeated.
Tuesday’s vote on the Freedom Act comes less than a month after a federal appeals court ruled that the National Security Agency’s practice of collecting bulk data about Americans’ phone calls violates the Constitution.
Before the vote, a displeased Majority Leader Sen. Mitch McConnell criticized the policies of President Obama and said that the Freedom Act weakens America’s ability to protect itself. He also cited an AP article that called the turn of events in the surveillance and spying field as “a victory for Edward Snowden,” the former NSA contractor who released secret information about U.S. spying in June of 2013 (Snowden discussed the Patriot Act Tuesday).
After McConnell spoke, Minority Leader Sen. Harry Reid responded by saying that if McConnell is worried about making America look weaker, “he should look in the mirror.”
Reid accused the majority leader of trying to deploy distractions from the real issues and said that McConnell had also implicitly criticized the House of Representatives.
“I don’t think any of us,” Reid said, “need a lecture on why we’re less secure today.”
With or Without the Patriot Act, Here’s How the NSA Can Still Spy on Americans
June 1, 2015,Jason M. Breslow
While it may only be temporary, the National Security Agency on Monday lost its authority to collect Americans’ phone records in bulk after the Senate failed to extend provisions of the Patriot Act authorizing the controversial domestic surveillance program.
For now, the stall in the Senate means the NSA can’t collect any newly created telephone records. Under the now-lapsed Section 215 of the Patriot Act, the NSA gathered metadata such as who called whom, the time the call was placed and how long the conversation lasted.
Also lapsed are provisions of the law that allowed for wiretap orders on “lone wolf” terrorism suspects; that permitted roving wiretaps that follow suspects from device to device as they change phones; and that compelled businesses to turn over records deemed relevant to a national security investigation.
Under an entirely separate law, the 2008 FISA Amendments Act, the government still has the authority to access the communications of users of popular Internet sites such as Facebook, Google, Microsoft and Yahoo. Section 702 of the law, which does not expire until 2017, gives the government the ability to collect the content of an Internet user’s actual communications — not just metadata.
The law is geared towards non-citizens outside of the U.S., but as privacy advocates argue, it is inevitable that the communications of U.S. citizens and those of non-citizens lawfully living in the U.S. are swept up by the program.
“The phone records program under Section 215 is really just one piece of a much larger puzzle,” said Stephen Vladeck, a professor of law at the American University Washington College of Law. “They’re targeted at non-citizens but the way the technology works there is just no way for the vacuum cleaner to distinguish between the particles of dirt.”
An even older and more obscure Regan-era law, Executive Order No. 12333, provides U.S. intelligence with nearly identical surveillance capabilities to intercept overseas communications, Vladeck said, with the same implications for privacy.
“The way the government is intercepting communications under these authorities,” said Vladeck, referring to Section 702 and Executive Order 123333, “it cannot tell at the point of collection whether the actual sender or recipient is or is not a U.S. citizen.”
Also unaffected by the sunset of Section 215 is the use of National Security Letters, which since 9/11 have helped to dramatically expand the government’s ability to collect information about Americans directly from phone companies and Internet providers. Any FBI office can issue one, without a court’s review and with a gag order. In the past 10 years, more than 300,000 National Security Letters have been issued, according to the Electronic Frontier Foundation, and until 2013, no major Internet or phone company is known to have questioned the constitutionality of one.
Meanwhile, it’s not clear that all surveillance conducted under the Patriot Act has officially come to a close. As The New York Times noted, all three aspects of the law that expired Monday “contained a so-called grandfather clause that permits their authority to continue indefinitely for any investigation that had begun before June 1.”
Of course, by the end of the week, that may not matter. After having failed to extend the expiring Patriot Act provisions on Sunday, the Senate appears poised to pass a House bill, the USA Freedom Act, that would restore the lapsed Patriot Act powers into law. The one critical difference in the new law is that bulk phone records would stay in the hands of phone companies, rather than with the government.
In this two-part, Peabody Award-winning series, FRONTLINE explores how the U.S. government came to monitor and collect the communications of millions of people around the world — and here at home — and the lengths to which officials tried hide the massive surveillance from the public.
Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-Collection, and Online Monitoring Act
Full title
To reform the authorities of the Federal Government to require the production of certain business records, conduct electronic surveillance, use pen registers and trap and trace devices, and use other forms of information gathering for foreign intelligence, counterterrorism, and criminal purposes, and for other purposes.
Acronym
USA Freedom Act, a backronym for “Uniting and Strengthening America by FulfillingRights and Ending Eavesdropping,Dragnet-collection and Online Monitoring Act“
The USA Freedom Act is a law which was originally introduced in both houses of the U.S. Congress on October 29, 2013. Following the expiration of several provisions of the Patriot Act, the act was passed on June 2, 2015.[3][4] The title of the act is a ten-letter backronym (USA FREEDOM) that stands for “Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and OnlineMonitoring Act.”
When the bill was re-introduced in the 114th Congress (2015-2016), it was described by the bill sponsors as “a balanced approach”[5] while being questioned for extending the Patriot Act through the end of 2019.[6]Supporters of the bill said that the House Intelligence Committee and House leadership[7] would insist on reauthorizing all Patriot Act powers except bulk collection under Section 215 of the Patriot Act[8]. Critics assert that mass surveillance of the content of Americans’ communication will continue under Section 702 of FISA which does not expire until 2017[9][10] and Executive Order 12333[9][11] due to the “unstoppable surveillance-industrial complex”[12] despite the fact that a bipartisan majority of the House had previously voted to close backdoor mass surveillance.[7]
Purpose
According to supporters of the USA Freedom Act, the USA Freedom Act[13][full citation needed] was meant to end the bulk collection of Americans’ metadata by the NSA, end the secret laws created by the FISA court, and introduce a “Special Advocate” to represent public and privacy matters.[14][15][16] However, the USA Freedom Act does allow the bulk collection of Americans’ metadata by phone companies, which is then accessible by the NSA; it also does not address other laws which have purportedly challenged Americans’Fourth Amendment rights.[17] Other proposed changes included limits to programs like PRISM, which retains Americans’ Internet data,[18] and greater transparency by allowing companies such as Google andFacebook to disclose information about government requests for information.[19]
The bill comprised several titles: FISA business records reforms, FISA pen register and trap and trace device reforms, FISA acquisitions targeting persons outside the United States reforms, Foreign Intelligence Surveillance Court reforms, Office of the Special Advocate, National Security Letter reforms, FISA and National Security Letter transparency reforms, and Privacy and Civil Liberties Oversight Board subpoena authority.[27]
Purpose
Representative Jim Sensenbrenner, who introduced the bill, stated that its purpose was:
To rein in the dragnet collection of data by the National Security Agency (NSA) and other government agencies, increase transparency of the Foreign Intelligence Surveillance Court (FISC), provide businesses the ability to release information regarding FISA requests, and create an independent constitutional advocate to argue cases before the FISC.[14][28]
According to the bill’s sponsors, their legislation would have amended Section 215 of the Patriot Act to ensure that any phone records obtained by the government were essential in an investigation that involved terrorism or espionage, thereby ending bulk collection,[8] while preserving “the intelligence community’s ability to gather information in a more focused way.”[29]
Background
Many members of Congress believed that in the wake of the Snowden disclosures, restoration of public trust would require legislative changes.[30] More than 20 bills have been written since the disclosures began with the goal of clarifying government surveillance powers.[18]
Sensenbrenner, who introduced the USA PATRIOT Act (H.R. 3162) in 2001 following the September 11 terrorist attacks to give more power to US intelligence agencies, and who has described himself as “author of the Patriot Act,”[31] declared that it was time to put the NSA’s “metadata program out of business.” With its bulk collection of Americans’ phone data, Sensenbrenner asserted that the intelligence community “misused those powers,” had gone “far beyond” the original intent of the legislation, and had “overstepped its authority.”[30][32]
An opinion piece by Leahy and Sensenbrenner, published in Politico, described the impetus for proposed changes,[33]saying:
The intelligence community has failed to justify its expansive use of [the FISA and Patriot Act] laws. It is simply not accurate to say that the bulk collection of phone records has prevented dozens of terrorist plots. The most senior NSA officials have acknowledged as much in congressional testimony. We also know that the FISA court has admonished the government for making a series of substantial misrepresentations to the court regarding these programs. As a result, the intelligence community now faces a trust deficit with the American public that compromises its ability to do its job. It is not enough to just make minor tweaks around the edges. It is time for real, substantive reform.[29]
Markup in House Judiciary Committee
In May 2014, the U.S. House Judiciary Committee posted a “Manager’s Amendment” on its website. Title VII of the Amendment read “Section 102(b)(1) of the USA Patriot Improvement and Reauthorization Act of 2005 (50 U.S.C. 1805 note) is amended by striking “June 1, 2015” and inserting “December 31, 2017,” extending the controversial USA PATRIOT Act through the end of 2017.[34] The Electronic Privacy Information Center (EPIC) has criticized the Patriot Act as unconstitutional, especially when “the private communications of law-abiding American citizens might be intercepted incidentally”.[35] James Dempsey, of the CDT, believes that the Patriot Act unnecessarily overlooks the importance of notice under the Fourth Amendment and under a Title III wiretap,[36] while the American Library Associationbecame so concerned that they formed a resolution condemning the USA PATRIOT Act, and which urged members to defend free speech and protect patrons’ privacy against the Act.[37]
The Guardian wrote “civil libertarians on the Judiciary Committee had to compromise in order to gain support for the act. Significantly, the government will still be able to collect phone data on Americans, pending a judge’s individualized order based on ‘reasonable articulable suspicion‘ – a standard preferred by the NSA – of wrongdoing, and can collect call records two degrees or ‘hops’ of separation from the individual suspected.”[23] Kara Brandeisky of ProPublica said, “some worry that the bill does not unequivocally ban bulk collection of American records. Again, a lot depends on how the Foreign Intelligence Surveillance Court interprets the statute.”[38]
The Electronic Frontier Foundation (EFF) stated it remained “concerned that this bill omits important transparency provisions found in the (original 2013) USA FREEDOM Act, which are necessary to shed light on surveillance abuses”. In addition, the EFF said it believed “this bill should do more to address mass surveillance under Section 702 of Foreign Intelligence Surveillance Amendments Act, a section of law used to collect the communications of users worldwide.”[40]The Open Technology Institute commented “several other key reforms—such as provisions allowing Internet and phone companies to publish more information about the demands they receive, which OTI and a coalition of companies and organizations have been pressing for since last summer—have been removed, while the bill also provides for a new type of court order that the President has requested, allowing for continuous collection by the government of specified telephone records.”[41]
Despite the criticism from civil liberties groups, Mike Rogers, a defender of the NSA‘s surveillance practices and the chairman of the House Intelligence Committee, praised the amendments. Rogers, who had his own bill which would codify the NSA’s surveillance practices in to law, called the proposed amendments a “huge improvement.” Foreign Policy wrote “any compromise to the Judiciary bill risks an insurrection from civil libertarians in Congress. Michigan Republican Justin Amashled such a revolt last year when he offered an NSA amendment to a defense appropriations bill that would have stripped funding for the NSA’s collection program.” “Just a weakened bill or worse than status quo? I’ll find out,” Representative Amash said.[42]
After the marked up bill passed the House Judiciary Committee USA Freedom Act co-author and Senate Committee on the Judiciary Chairman Patrick Leahycommented that he “remain concerned that the legislation approved today does not include some of the important reforms related to national security letters, a strong special advocate at the FISA Court, and greater transparency. I will continue to push for those reforms when the Senate Judiciary Committee considers the USA Freedom Act this summer.”[25]
Passage in House of Representatives
The House of Representatives passed on May 22, 2014 the USA Freedom act by 303 votes to 121.[43] Because the House version was weakened by lawmakers loyal to the intelligence establishment it lost support of important House Judiciary members like Republicans Darrell Issa, Ted Poe and Raul Labrador and Democrat Zoe Lofgren who previously voted for the act.[44] “The result is a bill that will actually not end bulk collection, regrettably,” said Rep. Zoe Lofgren who voted against the bill.[45] The act would shift responsibility for retaining telephonic metadata from the government to telephone companies. Providers like AT&T and Verizon would be required to maintain the records and let the NSA search them in terrorism investigations when the agency obtains a judicial order or in certain emergency situations.[46] The USA Freedom Act demands that the NSA get approval for a search from the Foreign Intelligence Surveillance Court before demanding that the telecoms hand over metadata. However, no “probable-cause” Fourth Amendment standard is required to access the database[45] While an allowable search under the original USA Freedom Act was defined as “a term used to uniquely describe a person, entity, or account”, but under the House version a database search inquiry is now allowed if it is “a discrete term, such as a term specifically identifying a person, entity, account, address, or device.”[45] Provisions that were dropped from the bill included requirements to estimate the number of Americans whose records were captured under the program, and the creation of a public advocate to challenge the government’s legal arguments before the Foreign Intelligence Surveillance Court.[47][48]
The passed House version[49] was criticised by U.S. senators, tech firms like Google, Apple, Microsoft, Facebook and Twitter, as well as civil liberties groups.[44][45][46][47][50] Senator Sen. Patrick Leahy, chair of the Senate Judiciary Committee and lead Democratic author of the Freedom Act, criticized the House version by saying in a statement: “Today’s action in the House continues the bipartisan effort to restore Americans’ civil liberties. But I was disappointed that the legislation passed today does not include some of the meaningful reforms contained in the original USA Freedom Act. I will continue to push for these important reforms when the Senate judiciary committee considers the USA Freedom Act next month.”[50] And Senator Ron Wyden stated he was “gravely concerned that the changes that have been made to the House version of this bill have watered it down so far that it fails to protect Americans from suspicionless mass surveillance.”[50]Major U.S. tech firms like Google, Apple, Microsoft, Facebook, and Twitter joined together in the Reform Government Surveillance coalition which called the House version a move in the wrong direction. The Reform Government Surveillance released a statement on June 5, stating: “The latest draft opens up an unacceptable loophole that could enable the bulk collection of Internet users’ data … While it makes important progress, we cannot support this bill as currently drafted and urge Congress to close this loophole to ensure meaningful reform.”[51] Mark Jaycox, a legislative analyst with the Electronic Frontier Foundation, said: “The bill is littered with loopholes. The problem right now, especially after multiple revisions, is that it doesn’t effectively end mass surveillance.”[44][44] Zeke Johnson, director ofAmnesty International USA’s security and human rights program, accusing the House for failing to deliver serious surveillance reform said: “People inside and outside the U.S. would remain at risk of dragnet surveillance. The Senate should pass much stronger reforms ensuring greater transparency, robust judicial review, equal rights for non-U.S. persons, and a clear, unambiguous ban on mass spying. President Obama need not wait. He can and should implement such safeguards today.” The White House however endorsed the bill. “The Administration strongly supports House passage of H.R. 3361, the USA Freedom Act. … The Administration applauds and appreciates the strong bipartisan effort that led to the formulation of this bill, which heeds the President’s call on this important issue,” the White House said in a statement.[51] “The bill ensures our intelligence and law enforcement professionals have the authorities they need to protect the Nation, while further ensuring that individuals’ privacy is appropriately protected when these authorities are employed. Among other provisions, the bill prohibits bulk collection through the use of Section 215, FISA pen registers, and National Security Letters.”[46][52]
Civil rights groups and scholars said the new language allowing the NSA to search meta data handed over from telephone companies was vague and perhaps would allow the NSA to ensnare the metadata of broad swaths of innocent people in violation of their constitutional rights. “In particular, while the previous bill would have required any request for records to be tied to a clearly defined set of ‘specific selection terms,’ the bill that just passed leaves the definition of ‘specific selection terms’ open. This could allow for an overly broad and creative interpretation, which is something we’ve certainly seen from the executive branch and the FISA Court before,” said Elizabeth Goitein, a co-director of the Brennan Center’s Liberty and National Security Program.[45] “The new definition is incredibly more expansive than previous definitions … The new version not only adds the undefined words “address” and “device,” but makes the list of potential selection terms open-ended by using the term “such as.” Congress has been clear that it wishes to end bulk collection, but given the government’s history of twisted legal interpretations, this language can’t be relied on to protect our freedoms,” said the Electronic Frontier Foundation in a press release.[51][53]
Defeat in the Senate
Negotiations among intelligence agencies, the White House, lawmakers and their aides, and privacy advocates in the summer of 2014 led to a modified bill (S. S.2685)[54] in the U.S. Senate. This bill version addressed most privacy concerns regarding the NSA program that collects records of Americans’ phone calls in bulk and other issues.[55]
Under the bill the NSA would no longer collect those phone records. Instead, most of the records would have stayed in the hands of the phone companies, which would not have been required to hold them any longer than they already do for normal business purposes, which in some cases is 18 months. The bill would require the NSA to request specific data from phone companies under specified limits i.e. the NSA would need to show it had reasonable, articulable suspicion that the number it is interested in is tied to a foreign terrorist organization or individual. The proposed legislation would still have allowed analysts to perform so-called contact chaining in which they trace a suspect’s network of acquaintances, but they would been required to use a new kind of court order to swiftly obtain only those records that were linked, up to two layers away, to a suspect — even when held by different phone companies. It would also require the federal surveillance court to appoint a panel of public advocates to advance legal positions in support of privacy and civil liberties, and would expand company reporting to the public on the scope of government requests for customers’ data. This USA Freedom Act version thus gained the support of the Obama Administration, including the director of national intelligence and attorney general, as well as many tech companies including Apple, Google, Microsoft and Yahoo as well as a diverse range of groups, including the National Rifle Association and the American Civil Liberties Union.[26][55]
Following the 2014 Congressional elections, the Senate voted on November 18, 2014, to block further debate of the measure during the 113th United States Congress. Fifty-four Democrats and four Republicans who supported consideration failed to muster the 60 votes required.[56] Senator Patrick Leahy, who drafted the bill, blamed its defeat on what he called fear-mongering by opponents, saying, “Fomenting fear stifles serious debate and constructive solutions.” Senator Mitch McConnell, the Republican leader, argued that the NSA’s bulk collection of Americans’ metadata was a vital tool in the fight against terrorism. “This is the worst possible time to be tying our hands behind our backs,” he said.[26]
114th Congress (2015-2016)
The USA Freedom Act was re-introduced in the House Judiciary Committee and Senate Judiciary Committee in late April 2015 based upon a modified version of the one which failed in the Senate in the 113th Congress.
The 2015 USA Freedom Act[57] version is described by its sponsors as “a balanced approach that would ensure the NSA maintains an ability to obtain the data it needs to detect terrorist plots without infringing on Americans’ right to privacy.”[5] Human rights groups believed the bill’s transparency and court oversight provisions are less robust than would have been required in a previous version of the bill, with more limited reporting requirements and a more narrowly defined role for external court advocates.[58]
The bill received a mixture of reaction, ranging from support from national security and computer trade groups, skepticism or moderate objection from civil liberties groups, to outright opposition from former NSA whistle blowers. The editorial board of the New York Times ran an editorial against the bill which “will be weakened further in the Senate by the majority leader” and advised readers to “get used to the protections of your civil liberties being minimally viable”.[59]
Passage out of House Judiciary Committee
The bill passed out of the House Judiciary Committee on April 30, 2015.[60] The proposed bill would end the NSA’s bulk collection under Section 215 by requiring the government to seek records from companies using a “specific selection term” that identifies a specific person, account or address and “is used to limit . . . the scope” of records sought. The term may not be a phone or Internet company.[5]
Amendments to strengthen the bill were voted down during Committee markup. One would have offered a constitutional advocate and failed by voice vote,[61] while another would have offered protection for whistle blower complaints.[62] Representative Jordan unsuccessfully argued for another amendment with the following dialog, “It’s not a vote to blow up the deal. It’s a vote for the Fourth Amendment. Plain and simple. All the Gentleman says in his amendment is, if you’re going to get information from an American citizen, you need a warrant.”[63] The bill ultimately received 25 votes in support (64%), 12 abstentions (31%), and 2 in opposition (5%).[64]
House Judiciary Chairman Bob Goodlatte said “the USA Freedom Act reforms our nation’s intelligence-gathering programs to ensure they operate in a manner that reflects core American values … We urge both the House and Senate to move expeditiously on this legislation so that we rein in government overreach and rebuild trust with the American people”.[65]
Representative Ted Poe was one member to vote against the bill. “Between the Committee vote and the House floor the bill was changed and it now confused what should have been clarified. The version of the USA Freedom Act that passed the House today leaves room for different interpretations, potentially giving NSA the ability to continue to act outside the intent of Congress and the Constitution. I could not support a bill that may allow abuses of the fourth amendment to continue,” he said.[66]
Reaction
National security and trade groups
The Center for National Security supports the USA Freedom Act introduced on April 28, 2015 to end bulk collection of Americans’ telephone metadata under the so-called “section 215” program.[67]
The Software Alliance sponsored the legislation saying “in reforming government surveillance practices, it is critical that legislation strikes the right balance between securing our nation and its citizens and improving privacy protections for the public. The FISA reforms in the USA FREEDOM Act will help restore trust in both the US government and the US technology sector.”[68]
The ITIC said “the USA Freedom Act, H.R. 2048, builds on the foundation laid by the House Judiciary Committee last Congress and the result is a bill that strengthens privacy protections while maintaining the interests of national security.”[69]
Civil liberties advocates
The final USA Freedom Act is perceived as containing several concessions to pro-surveillance legislators meant to facilitate its passage.[6][70] The watered down version of the USA Freedom Act that passed the House of Representatives in 2015 has been widely criticized by civil liberties advocates and its original supporters amongst house members for extending the Patriot Act Mass surveillance programs without meaningful restraints, undermining the original purpose of the bill. [71]
“This bill would make only incremental improvements, and at least one provision-the material-support provision-would represent a significant step backwards,” ACLU deputy legal director Jameel Jaffer said in a statement. “The disclosures of the last two years make clear that we need wholesale reform.” Jaffer wants Congress to let Section 215 sunset completely and wait for a better reform package than endorse something half-baked[72], saying that “unless that bill is strengthened, sunset would be the better course.”[73] The ACLU had previously written of the 2013 version that “although the USA Freedom Act does not fix every problem with the government’s surveillance authorities and programs, it is an important first step and it deserves broad support.”[74][75]
Representative Justin Amash, author of the narrowly defeated Amash Amendment, a proposal that would have de-funded the NSA bulk-collection program, backed the 2013 legislation, but not the final 2015 version[76]. “It’s getting out of control,” he commented. “[Courts are issuing] general warrants without specific cause…and you have one agency that’s essentially having superpowers to pass information onto others”.[32]
According to Deputy Attorney General James Cole, even if the Freedom Act becomes law, the NSA could continue its bulk collection of American’s phone records. He explained that “it’s going to depend on how the [FISA] court interprets any number of the provisions” contained within the legislation.[8]Jennifer Granick, Director of Civil Liberties at Stanford Law School, stated:
The Administration and the intelligence community believe they can do whatever they want, regardless of the laws Congress passes, so long they can convince one of the judges appointed to the secretive Foreign Intelligence Surveillance Court (FISC) to agree. This isn’t the rule of law. This is a coup d’etat.[8]
International human rights groups remain somewhat skeptical of specific provisions of the bill. For example, Human Rights Watch expressed its concern that the “bill would do little to increase protections for the right to privacy for people outside the United States, a key problem that plagues U.S. surveillance activities. Nor would the bill address mass surveillance or bulk collection practices that may be occurring under other laws or regulations, such as Section 702 of the FISA Amendments Act or Executive Order 12333. These practices affect many more people and include the collection of the actual content of internet communications and phone calls, not just metadata”.[77] Zeke Johnson, Director of Amnesty International‘s Security and Human Rights Program, agreed that “any proposal that fails to ban mass surveillance, end blanket secrecy, or stop discrimination against people outside the U.S. will be a false fix”.[11]
Members of the anti-surveillance Civil Liberties Coalition are dismissing the USA Freedom Act in support of the Surveillance State Repeal Act, a far more comprehensive piece of legislation in the House that completely repeals the Patriot Act, as well as 2008’s FISA Amendments Act.[72] A group of 60 organizations called Congress to not stop at ending the NSA’s bulk collection of telephone information under the USA PATRIOT Act, but to also end the FISA Amendments Act and Executive Order 12333 mass surveillance programs and restore accountability for bad actors in the Intelligence Community.[9]
The Center for Democracy and Technology endorses the bill, but it points out that it doesn’t limit data retention for information collected on people who turn out to have no connection to a suspect or target, and emphasizes that this is not an omnibus solution.[72] The group argued the bill had to be supported because “the Senate will weaken the USA FREEDOM Act right before the sunset deadline, forcing the House to accept a weaker bill”.[78]
“This bill purports to ban certain acts under narrow authorities, but it doesn’t ban those behaviors outright. Nor does it increase meaningful oversight of the NSA,” said David Segal, executive director of Demand Progress, who wants Section 215 to expire. The group said “a vote for a bill that does not end mass surveillance is a vote in support of mass surveillance.”[79]
“Companies are provided monetary incentive to spy and share that information with the government and blanket liability once they do under USA Freedom — even if that breaks that law,” said Sascha Meinrath, the director of X-lab, an independent tech policy institute previously associated with New America. “Once companies receive that, they’ll have almost no reason to weigh in on meaningful surveillance reform.”[79] “In a way, it’s kind of like PRISM,” the program revealed by Snowden where major tech companies turned over the content of online communications to the NSA, said longtime independent surveillance researcher Marcy Wheeler. “It pushes things to providers: Everyone gets immunity, but it doesn’t add to the privacy.”[79]
“We think of the USA Freedom Act as yesterday’s news,” said Shahid Buttar of the Bill of Rights Defense Committee, “and we’re interested in forcing the [intelligence] agencies into a future where they comply with constitutional limits.” “If passed, it’ll be the only step,” predicted Patrick Eddington of the Cato Institute, a former House staffer, since the next expiration date for a major piece of surveillance legislation is 31 December 2017.[80]
Following the law’s passage on June 2, 2015, ACLU deputy legal director Jameel Jaffer claimed that “This is the most important surveillance reform bill since 1978, and its passage is an indication that Americans are no longer willing to give the intelligence agencies a blank check.”[81]
Former whistleblowers
Former NSA crypto-mathematician William Binney, who worked three decades at the agency, says the Freedom Act – widely seen as having the best chance of any surveillance-limiting proposal – “won’t do anything” if it passes. “Why do you think NSA [and other intelligence agencies] support it?” he says.[12][12]
Drake, a former NSA senior executive prosecuted unsuccessfully under the Espionage Act before pleading guilty to a misdemeanor in 2011, calls the bill the “Free-dumb Act 2.0,” and says he sees it as a ploy by government officials “to keep the status quo in place.” He also says the fixation on the call record program in public debate is unfortunate, because NSA Internet surveillance is far broader and more invasive. “It’s a shiny, shiny bright spot, [but] there’s a whole lot more being collected,” he says, including a “staggering” amount of American communications. Drake believes support from the Obama administration for the Freedom Act is motivated in part by a desire to hobble lawsuits against the call record program, three of which are pending with appeals courts and may lay the groundwork for a major Supreme Court privacy ruling.[12]
Wiebe, formerly a senior analyst at the NSA, says the anticipated Freedom Act likely will be “more of the same” and is “not going to change anything” in a meaningful way. Like Drake, he has no hope for meaningful reform and doesn’t believe efforts to lobby Congress would work. “We’ve tried,” he says. “It makes no difference.” He believes well-funded government contractors and powerful, “co-opted” lawmakers who lead key committees make up a virtually unstoppable surveillance-industrial complex.[12]
House Passage
The USA Freedom Act passed the U.S. House of Representatives on May 13, 2015.[82] The bill received broad support in the House, with 338 votes for the bill and 88 against it. It was passed without any amendments to the House Judiciary version because the House Rules Committee prohibited consideration of any amendment to the USA Freedom Act, claiming that any changes to the legislation would have weakened its chances of passage.[83] The bill had the support of the White House, Attorney General Eric Holder and Director of National Intelligence James Clapper. While civil liberties groups were divided over the support of the bill, lawmakers opposed to the Bill stated it will handicap the NSA and allow terrorist groups to prosper.[84]
Passage in Senate
The USA Freedom Act was not passed by the U.S. Senate on May 22, 2015. By a vote of 57-42, the Senate did not pass the bill that would have required 60 votes to move forward, which means that the NSA must start winding down its domestic mass surveillance program this week. The Senate also rejected, by 54-45, also short of the necessary 60 votes, a two-month extension for the key provision in the Patriot Act that has been used to justify NSA spying, which is set to expire on June 1, 2015.[85][86][87]
However, on May 31, 2015, the Senate voted 77-17 to limit debate on the act. Senate rules will allow it to be passed after the mass surveillance programs have expired.[88] Richard Burr, chair of the Senate Intelligence Committee, had three amendments he planned to offer to the bill which were likely to further increase opposition to the bill.[89] While several amendments which would strengthen the bill were not allowed to be considered, three amendments to weaken the bill, considered “poison pills”, were allowed to be considered but ultimately rejected.[90]
The bill ultimately passed the Senate 67-32 on June 2, 2015 and was signed into law.[91] “After a needless delay and inexcusable lapse in important national security authorities, my administration will work expeditiously to ensure our national security professionals again have the full set of vital tools they need to continue protecting the country,” Obama said.[92]
Story 1: Stand With Rand Against Renewal of Patriot Act and National Security Agency’s Turnkey Tyranny And Repeal of Fourth Amendment of U.S. Constitution — Videos
Amendment IV
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
CLIP: Sen. Rand Paul (R-KY) begins his remarks on Patriot Act and NSA Surveillance (C-SPAN)
Rand Paul filibusters renewal of the Patriot Act
Sen. Rand Paul ‘filibusters’ against Patriot Act – LoneWolf Sager(◑_◑)
5 Reasons To Oppose Section 215 of The Patriot Act
Hour 11: Sen. Rand Paul’s Filibuster on PATRIOT Act Extension – May 20, 2015
Rand Paul Interview On NSA Court Ruling Of Illegal Spying
Court Rules NSA Bulk Spying Illegal: New Vindication for Snowden, and Uncertainty for PATRIOT Act
Rand Paul Interview On Meet The Press
Senator Rand Paul discusses individualism, freedom, and national security on Uncommon Knowledge
HUGE WIN FOR PRIVACY! Court Rules NSA Spying Is Illegal
Lynch: NSA Surveillance Program a ‘Vital Tool’
Sen. Rand Paul Opposes PATRIOT Act Renewal
William Binney Tells RT That USA Freedom Act is a Farce
Rand Paul on Extension of the Patriot Act: 05/23/11
Rand Paul Stalling Patriot Act Extension!
Judge Andrew Napolitano Natural Rights and PATRIOT ACT Part 2 of 3
Judge Andrew Napolitano Natural Rights and The Patriot Act part 1 of 3
Liberty and Security in a Changing World
CITP/LAPA/WWS Special Event: Edward Snowden in Conversation with Bart Gellman
As Judge Rules NSA Surveillance – Almost Orwellian – Obama Prepares to Leave Spying Program Intact
AFTER OVER 10 HOURS, RAND PAUL ENDS HIS NSA ‘FILIBUSTER’
The Kentucky Republican spoke on the Senate floor until he could no longer stand. Here’s everything that happened.
BY DUSTIN VOLZ AND KAVEH WADDELL
en. Rand Paul has just wrapped a ten-and-a-half hour long speech on the Senate floor in what his office called a filibuster against the National Security Agency’s surveillance programs, as part of an apparent stand against efforts by some of his Republican colleagues to extend the Patriot Act’s expiring spy powers.
“There comes to a time in the history of nations when fear and complacency allow power to accumulate and liberty and privacy to suffer,” Paul started. “That time is now. And I will not let the Patriot Act, the most un-patriotic of acts, go unchallenged.”
“There comes to a time in the history of nations when fear and complacency allow power to accumulate and liberty and privacy to suffer,” Paul started. “That time is now. And I will not let the Patriot Act, the most un-patriotic of acts, go unchallenged.”
Paul took the podium at 1:18 p.m. and left the floor at 11:49 p.m. Here’s what happened, and what’s coming next.
12:26 a.m.: A very tired Rand Paul, off the floor, opens up.
After he walked off the Senate floor, the Kentucky senator told reporters he was “tired, voice is worn out, ready to go home.”
But Paul didn’t feel like his time and energy were for nothing. Business shoes in hand, a weary Paul said “we accomplished something by having, you know, it was kind of nice to have bipartisan support.”
Paul said that even though he didn’t last until midnight, he still believed he had slowed down the clock by a day on procedural advancement on any Patriot Act reauthorization. But an aide to Senate Majority Leader Mitch McConnell suggested the theatrics matter little. “Cloture on trade would be tomorrow either way. Patriot Act is after that,” the aide said.
Because McConnell did not file for cloture by Tuesday evening, it was already unlikely the Senate could act on the Patriot Act before the House goes on recess tomorrow, given the drawn-out parliamentary process of the upper chamber. Unless the Senate is willing to stay in town over the weekend and approve the House-passed Freedom Act, it appears increasingly likely that we are headed for a full expiration of the law’s three surveillance authorities, which sunset on June 1.
Paul, while talking to reporters, took a jab at President Obama for not ending the NSA’s bulk phone-records program unilaterally. Obama “needs to step up and be a little more of a leader in getting us out of this mess,” he said.
Noting support from Sens. Mike Lee and Ted Cruz, his presidential rival, Paul said “We’re not exactly [on] the same page but I think we’re all opponents of the bulk collection.” Both Lee and Cruz support the USA Freedom Act, while Paul says it does not go far enough.
11:49 p.m.: It’s over. Thanking his staff, Sen. Rand Paul has relinquished the floor after 10 hours and 30 minutes.
(C-SPAN)
Since Paul didn’t speak past midnight, the week’s schedule appears to remain unchanged. Earlier in the night, an aide to Senate Majority Leader Mitch McConnell said that if Paul talked into Thursday, it would hold up possible consideration of a Patriot Act extension and throw off the Senate’s calendar before breaking for recess.
11:45 p.m.: We’re winding down. After Sen. Ted Cruz’s fiery speech, a tired Paul took the podium for a final hurrah. “My voice is rapidly leaving, and my bedtime has long since past,” he said, before launching into a summary of what he’s been saying for almost 10 and a half hours. “Bulk collection must end, and I think we have the votes to end it now,” Paul said.
11:29 p.m.: At last, Ted Cruz stands with Rand. Sen. Ted Cruz joined Paul to rail against the Patriot Act late Wednesday evening, just before 11:30 p.m. Cruz is the third Republican to join Paul on the floor.
The Texas Republican praised Paul for having “altered this debate” over NSA surveillance.
Cruz presided over the Senate for a bit earlier in the evening but stepped down to the floor to join Paul’s efforts.
Cruz is running for the GOP nomination for president, as is Paul. Sen. Marco Rubio is currently presiding, meaning three Republican White House contenders are currently in the chamber. A Paul-sanctioned super PAC that is backing his presidential bid earlier mocked Cruz on Twitter for not #StandingWithRand.
Cruz began talking up the virtues of the House-passed USA Freedom Act. Though Cruz supports the bill, he is only one of five GOP co-sponsors in the Senate. Paul believes the bill does not enough, while Rubio wants to preserve the Patriot Act’s spying authorities and the NSA’s bulk data regime.
Cruz emphasized that a straight extension of the Patriot Act provisions that the NSA uses to justify its surveillance program would not be acceptable.
“It is abundantly, abundantly clear that a clean reauthorization of the Patriot Act ain’t passing this body, and it certainly ain’t passing the House of Representatives.”
Cruz spent much of his speech focusing on the personal, saying that standing on the floor with Paul and Sen. Mike Lee reminded him of The Blues Brothers and getting the band back together.
“I said many times I will go to my grave in debt to Sen. Rand Paul that the first opportunity I had to speak on the Senate floor was in support of his epic filibuster,” Cruz said.
11:25 p.m.: Rand Paul is now selling a “filibuster starter pack.” This talk-a-thon is about more than just national security, the power of government, and privacy rights. It’s also about Rand Paul and his presidential ambitions. The latest example: you can now buy yourself a “filibuster starter pack” at Paul’s online campaign store, as the senator’s Twitter account alerted followers to.
The kit is $30 and includes, per the site, a t-shirt that reads “The NSA knows I bought this Rand Paul tshirt,” a bumper sticker that says the same, just about buying a sticker, and a “Spy blocker” for your computer camara.
11:16 p.m.: Patriot Act defender Marco Rubio is now presiding over Paul’s Patriot Act takedown. Another GOP presidential candidate is now presiding over Paul’s “filibuster.” Sen. Marco Rubio of Florida took over the duties to run the floor from Sen. Ted Cruz.
Rubio has vociferously defended the NSA’s surveillance powers, once penning an op-ed calling for the permanent extension of the Patriot Act’s spy provisions.
Rubio was spotted intently reading a magazine—using a pen to go line by line—as Sen. Lee spoke from the floor. Cruz, meanwhile, took a seat to Lee’s right, indicating he may end up joining the talk-a-thon after all.
11:10 p.m.: Rand Paul’s biggest House fans join him on Senate floor. A handful of House members gathered behind Paul on the Senate floor late Wednesday to cheer him on. The gaggle included Republican Rep. Tom Massie and Democratic Rep. Earl Blumenauer, both of whom voted against the House-passed USA Freedom Act last week on grounds it does not do enough to curb NSA surveillance. Massie has long been a big political ally of Paul’s.
Paul tonight has repeatedly said he is concerned the Freedom Act needs to do more before it can earn his support.
10:43 p.m.: Mike Lee returns. The tea-party Republican from Utah has reemerged to keep the Patriot Act talk-a-thon going. Lee is one of two Republicans to speak on the floor for Paul’s “filibuster,” along with Sen. Steve Daines of Montana.
Lee is a lead sponsor of the House-passed USA Freedom Act, alongside Sen. Patrick Leahy, the top Democrat on the Judiciary Committee. Though seven Democrats have supported Paul on the floor today, Leahy is not one them.
10:25 p.m.: Cruz’s office says he was scheduled to be presiding officer. In a strange twist of fate, Sen. Ted Cruz was already on the books to preside over the Senate tonight, his office says. Many expected Cruz to support Paul during his speech.
10:15 p.m.: As promised, Wyden is back. The Oregon Democrat has returned to speak on the floor, giving Paul a much-needed break.
10:10 p.m.: Sen. Ted Cruz arrives, but not to help. After nearly nine hours, Republican Sen. Ted Cruz arrived on the floor. But he wasn’t there to stand with the long-suffering Kentucky senator—he is presiding over the nearly-empty senate.
Cruz, who, like Paul, is running for the GOP presidential nomination, is a co-sponsor of the USA Freedom Act, which would rein in parts of the NSA and effectively end its bulk collection of U.S. call data. He is one of five Republicans to cosponsor the measure. Paul has said the bill does not go far enough.
9:50 p.m.: Another Democrat arrives to stand with Rand. Sen. Richard Blumenthal of Connecticut appeared to give Paul another breather. This is the seventh Democrat to come to Paul’s assistance.
Blumenthal talked about the secrecy of the Foreign Intelligence Surveillance Court and pressed for more transparency and oversight of the judicial body, which some privacy advocates have derided as a “rubber stamp” for the NSA’s surveillance orders. Blumenthal called for an adversarial body to argue against the government before the FISA Court.
9:48 p.m.: Ron Paul is standing with his son. The Campaign for Liberty, the organization led by former Rep. Ron Paul, tweeted out a picture of Paul and his wife standing by a TV tuned to C-SPAN 2. “C4L Chairman @RonPaul and his wife Carol stand with their son Rand to end NSA spying. Do you? #StandWithRand”
9:43 p.m. Rand Paul is slowing down. Over the last twenty minutes, Paul has paused for prolonged moments, swaying back and forth as he shuffles through the papers on his desk. His voice sounds hoarse, and he has fallen silent to pop a candy into his mouth a few times. If you were wondering if talking for so long with few breaks can get physically taxing, he’s your proof.
9:03 p.m.: Wyden returns. Sen. Ron Wyden, who was the first senator to join Paul several hours ago, is now back on the floor. The Oregon Democrat discussed his concerns about so-called “backdoor search loopholes” that can be used by the intelligence community to pry into the digital communications of Americans who correspond with foreigners.
Wyden then praised Paul’s stamina and determination before pledging to return later in the evening. “I intend to rejoin my colleague before long,” Wyden said.
8:57 p.m.: After listening for hours, Sen. Cantwell speaks. Washington Democrat Maria Cantwell, who has been sitting at a desk for much of the evening—certainly longer than any other senator—stood to ask Paul about encryption technology. She follows Sens. Wyden, Heinrich, Manchin, Coons, and Tester as the sixth Democrat to speak with Paul.
8:51 p.m.: McConnell aide: If Paul talks past midnight, he will delay NSA consideration. An aide for Senate Majority Leader Mitch McConnell said late Wednesday that if Paul continues his talk-a-thon past midnight, he will succeed in delaying the Senate’s possible consideration of any Patriot Act extension, possibly into the weekend or later.
This is significant because the House is due to pack its bags and leave town tomorrow. Because the Patriot Act’s spy authorities expire on June 1, the Senate may not be able to pass any surveillance legislation in time before the lower chamber recesses until next month.
If Paul makes it past midnight, the McConnell aide said, he will delay when the Senate—which still needs to address pending trade legislation—can file cloture on any Patriot Act legislation.
Earlier Wednesday, the Obama administration said the NSA would start shutting down its phone-records dragnet this Friday in order to have it turned off completely by June 1 unless Congress figured out a way forward before then.
It is unclear if McConnell would have filed cloture today had he been given the opportunity, however. And this all may be a moot point, as it is unclear if either the Freedom Act or a short-term “clean” reauthorization has the 60 votes necessary to advance through the Senate.
8:12 p.m.: Paul: Freedom Act allows for continued spying. Paul has said he’s unhappy with the House-passed USA Freedom Act because it doesn’t go far enough to stop NSA surveillance. He outlined his gripes with the bill on the floor, saying that the liability protection it offers telephone companies is proof that it doesn’t limit the spying programs enough.
“One question I would ask, if there was anybody that would actually tell you the answer, would be: If we already gave them liability protection under the Patriot Act, why are they getting it again under the USA Freedom Act unless we’re asking them to do something new that they didn’t have permission for?” Paul asked.
“The other problem with the USA Freedom Act is: If you think bulk collection is wrong, why do they need new authorities? Why are we giving them some new authorities?” he continued.
7:55 p.m.: Paul: This is just the tip of the iceberg. Paul is under no illusions that letting portions of the Patriot Act expire would end what he calls illegal spying. While the NSA’s bulk surveillance is a high-profile target, Paul says he thinks there are many similar programs that haven’t been revealed.
“If we decide to fix bulk records and try to do something about this, I think, injustice, the main thing is we should be aware that this isn’t the only program. There’s probably a dozen programs. There’s probably another dozen we haven’t even heard of that they won’t tell any of us about,” Paul said.
“And realize that they’re not asking Congress for permission. They are doing whatever they want,” he continued. “We did not give them permission under the Patriot Act to do bulk collection of phone records. They are doing it with no authority, or inherent authority, or some other authority, because the courts have already told them that there is no authority under the Patriot Act.”
7:47 p.m.: Paul goes off on EPA overreach. To illustrate the problems that come with big government, Paul turned away from the NSA and toward the EPA, an agency much reviled among conservatives unhappy with government overinvolvement.
Paul brought up a case that saw a man and his daughter sentenced to 10 years in prison for “putting clean dirt on his own land.”
“That’s what’s happening in America. So you wonder why some of us worry about our records being snatched up? We’re worried about our own government’s run amok, that our own government’s out of control and that our own government’s not really paying attention to us,” Paul said. “To put a 70-year-old man in prison for ten years for putting clean dirt on his own land, the person that did that ought to go to jail, in fact they ought to be put in a stockade and publicly flogged and then made to pay penance for a decade for doing something so stupid.”
Paul appeared to be referring to this 2005 case. According to an EPA administrator, “the defendants destroyed valuable wetlands and victimized the residents of Big Hill Acres, who ended up with polluted homes and yards with leaking sewage.”
7:13 p.m.: Rand’s getting a lot of help, but where is Ted Cruz? Two Republicans and five Democrats have joined Paul’s extended oratorical demonstration against the Patriot Act, but one senator is so far notably absent: Ted Cruz.
Cruz, who, like Paul, is running for president, has frequently lambasted the NSA for violating Americans’ privacy rights with its sweeping surveillance programs. Cruz is also one of five GOP cosponsors of the USA Freedom Act, the reform bill that passed the House and would effectively end the NSA’s domestic phone-records dragnet.
But Cruz, who was spotted in the Capitol earlier Wednesday, has so far not appeared on the floor to lend support to Paul. Cruz’s office did not respond to multiple requests for comment asking whether the Texas senator had plans to join the “filibuster.”
6:50 p.m.: Sen. Jon Tester is here. The Montana Democrat and chairman of the Democratic Senatorial Campaign Committee is the fifth Democrat to join Paul on the Senate floor.
6:45 p.m.: Rand Paul takes on “people who believe that the inherent authorities of the president are unlimited.” Paul said the bulk collection program’s beginnings, during which it was not sanctioned by law, fell outside the bounds of a president’s authority.
“For the first several years we did bulk collection, they just did it,” Paul said. “They just said it was under the inherent authorities of the president. This should scare us because there are people who believe that the inherent authorities of the president are unlimited. That would not be a president. There would be another name for that.”
6:44: Sen. Chris Coons comes to the floor. The Delaware senator is the fourth Democrat to come to the floor.
It’s relatively rare for my colleague from Kentucky and I to come to the floor in agreement on an issue,” Coons said. “But it has happened before on exactly this issue.”
6:35 p.m.: Standing with Rand outside the Capitol. About 25 “grassroots” supporters of Rand Paul gathered outside the Capitol Wednesday to show solidarity for his stand against the Patriot Act and support his presidential campaign. Chanting “stand with Rand” and “President Paul,” the group was nearly matched by the number of journalists snapping photos of the demonstration.
Cliff Maloney, 24, organized the event on Facebook. Maloney, who works for Young Americans for Liberty, said he supports Paul because of his stances on privacy issues and ability to reach out to younger voters.
“Look at today,” Maloney said. “He’s on the Senate floor filibustering [for digital privacy rights]. And that’s something young voters care about.”
6:20 p.m.: Sen. Joe Manchin Spars with Paul over USA Freedom Act. The Democrat from West Virginia joined Paul on the floor just after 6 p.m. “My good friend, I don’t always agree with you on every issue, but when it comes to this nation’s intelligence gathering and security, we agree more than we don’t,” Manchin said.
Manchin went on to express his support for the NSA reform bill that the House passed last week. “I believe this bill, USA Freedom 2015, moves us in a positive direction, ends the bulk data collection program, and ensures that the collection of data is related to a relevant, particular terrorist investigation,” Manchin said.
When Paul took the podium again, he laid out his concerns with the act that Manchin was touting. “I want to like it, and I want to because it ends bulk collection,” Paul said. But he said the fact that the bill allows the government to search for a person’s records leaves a loophole.
“See, the big thing for me is a warrant should be individualized and I’m worried when you use the word “person” if it can be replaced with the word verizon and still collect all the records,” Paul said. The problem stems from the legal practice of treating corporations as people.
“I don’t know if they’re insurmountable, but those are a couple concerns,” Paul said.
6:02 p.m.: Sen. Steve Daines joins the fray. Montana Republican Steve Daines joined Paul’s stand against the Patriot Act shortly before 6 p.m.
“I spent more than 12 years in the technology sector before being elected to Congress,” Daines said. “I know firsthand the power that big data holds. I also know the great risks that arise when this power is abused. There is a clear and a direct threat to American civil liberties that comes from the mass collection of our personal information and our phone records.”
Daines is one of five GOP cosponsors of the reform-minded USA Freedom Act, which passed the House easily last week. Paul is not a cosponsor of the measure, which he says does not go far enough to limit the Patriot Act’s spying provisions.
It is expected nearly all Senate Democrats would vote for the Freedom Act, with Sen. Bill Nelson being the lone holdout. But it remains unclear if the bill has enough Republican support to reach a filibuster-proof 60-vote threshold, especially with Senate Majority Leader Mitch McConnell whipping against it.
5:53 p.m.: What Rand Paul wants. Paul began going into detail over the last twenty minutes about the amendments he and Sen. Ron Wyden are “most likely” to offer on legislation seeking to reauthorize the expiring provisions of the Patriot Act. Many of the amendments would push for privacy safeguards that the two civil-liberties advocates have long championed.
The first amendment, Paul said, would prohibit the government from mandating that tech firms create so-called surveillance “backdoors” in their products, which the NSA could access. “I know facebook has objected to this and fought them on this, but our amendment would say that the government just can’t do this,” Paul said.
A second amendment would “end bulk collection and replace it with nothing,” Paul said. It would close a loophole that allows back-door searches, he said, referring to the NSA’s practice of using a rule that allows it to search the foreigners’ data to capture information on U.S. citizens. The amendment would also require a “constitutional advocate” to be present in order to argue against the government in intelligence courts.
That amendment, Paul said, would also enact certain privacy protections for Americans whose digital records are held by third-party companies.
Another amendment Paul wants to introduce would make warrantless spying on Americans illegal “in non-terror” cases. He said the amendment would protect Americans against the government using a warrant intended for foreign terrorists that’s easier to obtain.
A fourth amendment would require courts to approve national security letters to “make them more like warrants,” Paul said. So-called NSLs compel companies to hand over communications data or financial records of certain users for the purposes of a national security investigation. The decades-old investigative tool that has grown in importance and frequency of use since the Patriot Act’s passage. Hundreds of thousands of letters have been used by the Justice Department since Sept. 11, 2001, and are often accompanied by gag orders.
Paul continued to tick off several other amendment ideas, including additional protections for whistleblowers, allowing for U.S. citizens to appeal surveillance orders handed down by Foreign Intelligence Surveillance Court, and implementing limitations to the Reagan-era Executive Order 12333, which some privacy advocates say allows the NSA the majority of its spying power.
5:50 p.m.: Supports of Rand to Rally in Capitol. A group of “grassroots supporters” for Paul’s efforts to block the Patriot Act will gather at 6 p.m. outside the U.S. Capitol, according to a Facebook event page. The event calls for supporters to gather on the Senate steps “on the west front side” that face the White House. Eighty-nine people have currently RSVP’d for the Stand with Rand party.
5:01 p.m.: Martin Heinrich arrives. Democratic Sen. Martin Heinrich became the second Democrat to join Paul on the floor to criticize the NSA’s mass surveillance programs.
The New Mexico senator took the opportunity to cite a recent federal appeals court decision deeming the NSA’s phone-records dragnet illegal as proof the Patriot Act’s spying provisions cannot be renewed without substantial changes akin to what the USA Freedom Act offers.
“Why on Earth, I would ask you, why on Earth would we extend a law that this court has found to be illegal?” Heinrich asked. “Now, given the overwhelming evidence that the current bulk collection program is not only unnecessary but also illegal, i think we’ve reached a critical turning point
Heinrich serves on the intelligence committee along with Sen. Ron Wyden, who spoke on the floor earlier. The two have frequently teamed up to question the intelligence community’s broad surveillance powers.
4:46 p.m.: Lee makes his case for a vote on USA Freedom. Sen. Mike Lee said he was open to amendments to his NSA reform package, the USA Freedom Act, but that it would be irresponsible for the Senate to not take up consideration with sufficient time for discussion.
“If there are those who have concerns with the legislation passed by the House of Representatives last week by a vote of 338-88, I welcome their input, I welcome any amendments they may have, I welcome the opportunity to make the bill better to make it more compatible with this or that interest,” Lee said. “We cannot continue to function by cliff. Government by cliff is a recipe for disaster.”
4:27 p.m.: Wyden out, Lee in. Sen. Mike Lee, R-Utah, joined Paul on the Senate floor to give the Kentucky senator’s vocal cords a rest. Lee has been an outspoken supporter of reforming the NSA’s surveillance programs, and is one of the co-sponsors of the USA Freedom Act. Lee acknowledged that his position is not as extreme as Paul’s—he does not support allowing the Patriot Act to expire, as Paul does—but he offered his support on the floor.
“Let me be clear at the outset that while the senator from Kentucky and I come to different conclusions with regard to the specific question as to whether we should allow section 215 of the Patriot Act to expire, I absolutely stand with the junior senator from Kentucky,” Lee said when he took the podium.
On Tuesday. Lee asked the Senate to table discussion of the trade bill to begin debating the USA Freedom Act. The move was blocked by an objection from Sen. Tom Cotton, R-Ark.
4: 17 p.m.: What do other Republican senators think of Paul’s “filibuster”? Some of Paul’s Republican colleagues attempted to downplay the significance of Paul taking over the Senate floor on Wednesday. “Oh that’ll be, you know, 12 hours, and he’ll get a lot of publicity for a day or so, but it won’t affect the process,” Sen. John McCain said Tuesday, when asked about Paul’s expected filibuster.
Republican leadership seemed relieved Paul chose to take the floor during dead time Wednesday, a move they anticipate may mean he won’t get in the way later this week when the chamber actually considers a Patriot Act extension. “I guess if he’s going to, doing it now as opposed to doing it on the weekend is maybe preferable,” Sen. John Thune told an AP reporter.
“I don’t think those inside Washington are listening very well,” Paul said during his speech, in apparent recognition of his colleagues’ unwillingness to let the NSA’s bulk call-records program lapse.
4:12 p.m.: “No Senators.” One headline that Sen. Paul wasn’t necessarily hoping for: a little bit into his speech, C-SPAN2 aired this chyron while the senator spoke:
3:46 p.m.: Backup is here, and it’s a Democrat. Sen. Ron Wyden, D-Ore., took the podium to relieve Paul more than two hours into Paul’s floor speech. Wyden is Paul’s partner in opposing a straight reauthorization of the Patriot Act, and he is the only other senator who has also promised to filibuster an extension of the NSA’s spying programs. “This will not be the last time we are back on the floor,” Wyden said as he took over for Paul.
Paul and Wyden are somewhat strange bedfellows, as Wyden has indicated he would vote for the reform package the House passed last week, known as the USA Freedom Act. Paul contends it does not go far enough. But the bipartisan pair is co-sponsoring a number of amendments they say will make the USA Freedom Act go farther in limiting the NSA’s surveillance powers.
“A number of us—myself specifically—have been concerned that the majority leader and other supporters of business as usual on bulk collection of all of these phone records would somehow try to take advantage of our current discussions and try to, in effect, sneak through a motion to extend section 215 of the USA Patriot Act,” Wyden said. “As long as the senator from Kentucky has the floor, that cannot happen.”
“My colleague from Kentucky has been an invaluable ally on this particular cause since he arrived in the Senate,” the Oregon Democrat continued.
3:41 p.m.: Hitler appears. It took a little over two hours for the first mention of Hitler during Paul’s speech. “Any time you make an analogy to horrific people in history, a Mussolini or a Hitler, people say, ‘Oh, you’re exaggerating, you’re talking about—it’s hyperbole. And maybe it is. And particularly to accuse anybody of that is a horrific analogy, and I’m not doing that,” Paul said. “But what I would say is that if you are not concerned that democracy could produce bad people, I don’t think you’re really thinking this through too much.”
3:20 p.m.: Paul goes after Graham. Paul attacked fellow Republican Sen. Lindsey Graham, R-S.C., for his characteristically hawkish views on surveillance and due process. Paul seized on Graham’s comment earlier this week about how he would deal with anyone who’s thinking about joining the Islamic State terrorist group.
“One senator said recently—i find this really hard to believe—he said, well, when they ask you for a judge, just drone them,” Paul said. “Ha ha. Same guy said when they ask you for a lawyer, tell them to shut up.”
The Background
Paul, who is a Republican candidate for president, has for weeks threatened that he would filibuster any attempt to reauthorize the Patriot Act authorities due to sunset on June 1. Although the Senate was not taking up votes Wednesday afternoon, a Paul spokesman called the speech a “filibuster” and said the Kentucky Republican “will speak until he can no longer speak.”
The timing of Paul’s speech took some observers by surprise, as the Senate has not yet moved to consider the Patriot Act and is still trudging through an ongoing fight over an international trade deal. Because Paul was not actually objecting to any specific vote, his speech does not appear to qualify as a formal filibuster.
Procedural votes could still come up later this week on the Freedom Act and McConnell’s short-term extension. But the Senate would likely need to stay through the weekend to get through the full process of voting on the opposing measures, as McConnell had not filed for cloture on either option by Tuesday.
Paul could further stall each vote and force the Senate to stay in town through the weekend. But his decision to eat up time on Wednesday likely indicates he does not want to cause party leaders that headache. Either way, the Senate almost certainly won’t resolve the matter before the House leaves town on Thursday, and an expiration of the Patriot Act’s spy provisions looks increasingly likely.
Paul opposes both McConnell’s push and the Freedom Act, which he says does not go far enough in ushering in surveillance reforms.
Paul’s stand against government surveillance comes as three provisions of the Patriot Act are due to expire on June 1, including Section 215, which the NSA uses to justify its bulk collection of U.S. call records.
(RELATED: Where the 2016 Republicans Stand on NSA Spying)
Congress has reauthorized the authorities in the past, but the current expiration is the first to occur after the Edward Snowden revelations, which began two years ago and publicly exposed for the first time the NSA’s phone dragnet.
Last week the House overwhelmingly passed a reform package called the USA Freedom Act, which would effectively end the NSA’s domestic phone records program. Instead, telephone companies would be relied on to keep the records and hand them over to the government on an as-needed basis after judicial approval is obtained from the Foreign Intelligence Surveillance Court.
But that measure has run hard into a wall in the upper chamber, where Senate Majority Leader Mitch McConnell and a number of GOP defense hawks have said it could jeopardize national security. McConnell and his flock prefer a “clean” reauthorization to the Patriot Act’s spying authorities, and have most recently pushed for a two-month extension to allow more time for debate.
Paul said his stand will force the Senate to debate the surveillance programs, which he says did not happen when the Patriot Act was first introduced in the weeks following the terrorist attacks of Sept. 11, 2001.
“The Patriot Act—I’m not sure unless we insert ourselves a at this moment that we’ll have any debate over it. It’s been set to expire for three years. We’ve known it was coming. And the question is, do we not have enough time because we just don’t care enough?”
In 2013, Paul famously spoke for 13 hours on the Senate floor on John Brennan’s nomination to run the CIA, attacking the nominee and the Obama administration for its drone policy.
Within twenty minutes of the beginning of Paul’s speech, his campaign sent an email to supporters asking for donations. “I will not rest. I will not back down. I will not yield one inch in this fight so long as my legs can stand,” the email, which was signed by Paul, read.
The campaign took a dig at senators eager to leave town for the long weekend. “It seems many of my colleagues here in the Senate care more about getting out of town for the Memorial Day break than protecting the Constitution so many American patriots have fought and died for,” the email said. “I have news for them. They are going NOWHERE.”
Quoting founding fathers and waxing philosophical on the importance of privacy, Paul called for President Obama to immediately issue an executive order to end the NSA’s surveillance programs.
(RELATED: On NSA Spying, Bernie Sanders, Not Elizabeth Warren, Is Pushing Hillary Clinton Let)
“For over a year now, he has said the program is illegal and yet he does nothing,” Paul said on the Senate floor. “He says, well, Congress can get rid of the Patriot Act. Congress can get rid of the bulk collection. And yet he has the power to do it at his fingertips.”
“He began this illegal program,” Paul continued. “The court has informed him that the program is illegal. He has every power to stop it and yet the president does nothing.”
Paul has said he would end the NSA’s surveillance programs were he elected president.
A panel appointed by President Obama to review the government’s surveillance activities has recommended significant new limits on the nation’s intelligence apparatus that include ending the National Security Agency’s collection of virtually all Americans’ phone records.
It urged that phone companies or a private third party maintain the data instead, with access granted only by a court order.
The President’s Review Group on Intelligence and Communications Technologies also recommended in a wide-ranging report issued Wednesday that decisions to spy on foreign leaders be subjected to greater scrutiny, including weighing the diplomatic and economic fallout if operations are revealed. Allied foreign leaders or those with whom the United States shares a cooperative relationship should be accorded “a high degree of respect and deference,” it said.
The panel also urged legislation that would require the FBI to obtain judicial approval before it can use a national security letter or administrative subpoena to obtain Americans’ financial, phone and other records. That would eliminate one of the tool’s main attractions: that it can be employed quickly without court approval.
The review group also would impose a ban on warantless NSA searches for Americans’ phone calls and e-mails held within large caches of communications collected legally because the program targeted foreigners overseas.
A report from the five-member Review Group on Intelligence and Communications Technologies contains 40-plus recommendations on the NSA. Read it.
Taken together, the five-
member panel’s recommendations take aim at some of the most controversial practices of the intelligence community, in particular the 35,000-employee NSA, headquartered at Fort Meade, Md. The signals intelligence agency has been in the news constantly since June, when reports based on documents leaked by former NSA contractor Edward Snowden began appearing in The Washington Post and the Guardian.
The White House released the 300-plus-page report as part of a larger effort to restore public confidence in the intelligence community, which has been shaken by the Snowden revelations.
The panel said that the NSA’s storage of phone data “creates potential risks to public trust, personal privacy, and civil liberty” and that as a general rule, “the government should not be permitted to collect and store mass, undigested, non-public personal information” about Americans to be mined for foreign intelligence purposes.
Despite the proposed constraints, panel member Michael Morell, a former deputy director of the CIA, said, “We are not in any way recommending the disarming of the intelligence community.”
The panel made 46 recommendations in all, which included moving the NSA’s information assurance directorate — its computer defense arm — outside the agency and under the Defense Department’s cyber-policy office.
“The review committee has reaffirmed that national security neither requires nor permits the government to help itself to Americans’ personal information at will,” said Elizabeth Goitein, co-
director of the Brennan Center for Justice’s Liberty and National Security Program. “The recommendations would extend significant privacy protections to Americans.”
Some intelligence professionals were dismayed. “If adopted in bulk, the panel’s recommendations would put us back before 9/11 again,” said Joel F. Brenner, a former NSA inspector general.
Former NSA and CIA director Michael V. Hayden urged senior intelligence officials to lay out the operational costs of adopting the recommendations. “The responsibility is now in the intelligence community to be ruthlessly candid with the policy leadership,” Hayden said.
Obama met Wednesday morning with the panel, whose suggestions are advisory only, and some intelligence officials predicted that the most far-reaching recommendations, including ending the government collection and storage of bulk phone data, would not be adopted. The White House has said it will announce in January which ideas it has embraced, as it concludes its internal review of surveillance activities.
The NSA’s phone-records program has prompted debate about whether the government has overreached in the effort to prevent terrorist attacks. The review panel is urging that Congress pass legislation to end the NSA’s storage of phone records — estimated by some former officials to number more than 1 trillion — “as soon as reasonably practicable.”
If the data were held by phone companies or a private third party, access to them would be permitted only with an order from the Foreign Intelligence Surveillance Court, based on reasonable suspicion that the information sought is relevant to an authorized terrorism investigation. Each phone number would require a court order.
Currently, the NSA holds for five years the phone records it gathers daily from U.S. phone companies. These “metadata” include the numbers dialed and call times and durations, but not call content or subscriber names.
The review panel is not recommending that the phone companies maintaining the data store it any longer than they do now — periods that vary from as little as six months to 10 years.
In a ruling Monday on the collection program, U.S. District Judge Richard J. Leon described the technology used to search the NSA database as “almost Orwellian.” The judge said the collection was “almost certainly” unconstitutional.
“The combination of this report plus the judge’s decision Monday makes this a big week for the cause of intelligence reform,” said Sen. Ron Wyden (D-Ore.).
Moving custodianship of the records outside the NSA would diminish the agency’s agility in detecting terrorist plots, supporters of the current arrangement say. With companies holding data for different periods and in different formats, searching across them would become complicated, they argue.
But the panel said the collection program had not proved its utility. “Our review suggests that the information contributed to terrorist investigations by the use of . . . telephony metadata was not essential to preventing attacks and could readily have been obtained in a timely manner using conventional [court] orders,” it said.
The review group urged that the public have a legal advocate before the Foreign Intelligence Surveillance Court.
Anthony D. Romero, executive director of the American Civil Liberties Union, said the recommendation to end NSA’s bulk collection “goes to the very heart of NSA dragnet surveillance.” He called it “the most necessary recommendation of the review group.”
The NSA’s information assurance directorate, which would be shifted out of the agency, protects classified government computer systems and works with industry to help them better safeguard their systems. That mission differs from the NSA’s job of breaking into systems overseas to gain intelligence, the panel said.
The suggested move, said Gregory T. Nojeim, senior counsel at the Center for Democracy and Technology, would “end NSA’s dual personality as a code-breaker and cybersecurity-enhancer. It’s good.”
But Tony Sager, a former NSA information assurance executive, said moving the defensive mission out of NSA was unwise. “The defensive mission benefits a lot from the technology and the skills of people who work on the offensive side of the house and vice versa,” he said. “They get better insight into the model of what real adversaries do.”
The panel also recommended a prohibition on the government “in any way”subverting or weakening commercial software in order to get around encryption and urged that it not undermine efforts to create encryption standards. The panel also said the government should add oversight to the use and production of “zero day” hacking tools that can be used to penetrate computer systems and, in some cases, damage or destroy them.
The security community has long been concerned that the NSA is building and buying hacking tools, but a Pentagon cyber-official, Eric Rosenbach, has said that the government discloses vulnerabilities it finds to software companies.
Matthew Blaze, a University of Pennsylvania cryptology expert, said disclosure “doesn’t mean that the government can’t or wouldn’t be able to make use of cyberattack techniques that involve exploiting computers.
Kentucky Sen. Rand Paul is filibustering the Patriot Act on the Senate floor, and it doesn’t look like he’s going to stop anytime soon.
The Republican presidential candidate took control of the floor Wednesday afternoon at 1:18 p.m., simultaneously explaining on Twitter that he is filibustering the renewal of the Patriot Act because of the National Security Agency’s program that collects bulk phone record data of American citizens.
“The government shouldn’t have the ability to get that information unless they have suspicion,” Paul said on the floor Wednesday. “Unless they have probable cause you committed a crime.”
In an campaign email to supporters, posted online by a reporter from Time magazine, Paul said: “I will not rest. I will not back down. I will not yield one inch in this fight so long as my legs can stand.”
Here’s how a Paul campaign aide described the marathon speech: “Senator Rand Paul has taken the floor of the U.S. Senate to filibuster the reauthorization of the Patriot Act. Senator Paul is a staunch defender of liberty and believes Americans have a right to privacy. The U.S. government has no place conducting these warrantless searches and should focus on gathering intelligence on suspected terrorists and foreign actors.”
On Monday, Paul previewed the filibuster, holding a press conference in Philadelphia and calling on Obama to end the NSA’s program.
“Here in front of Independence Hall, I call for the president to obey the law,” he said Monday. “The court said last week that it is illegal to collect all of your phone records, all of the time, without a warrant with your name on it. I call on the president today to immediately end the bulk collection of our phone records.”
Asked on Monday whether he would filibuster the upcoming vote on the extension of the Patriot Act, which the NSA uses to carry out the bulk collection program, Paul told reporters: “I will do everything possible. The rules are tricky in the Senate, so I don’t know what I can promise. But we will do everything possible, including filibustering the Patriot Act, to stop that.”
This isn’t Paul’s first filibuster: in 2013, he filibustered the nomination of John Brennan as director of the CIA for 13 hours, talking about drones and the Bill of Rights.
The USA PATRIOT Act is an Act of Congress that was signed into law by PresidentGeorge W. Bush on October 26, 2001. Its title is a ten-letter backronym (USA PATRIOT) that stands for “Uniting andStrengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001″.[1]
On May 26, 2011, President Barack Obama signed the PATRIOT Sunsets Extension Act of 2011, a four-year extension of three key provisions in the USA PATRIOT Act:[2]roving wiretaps, searches of business records (the “library records provision“), and conducting surveillance of “lone wolves”—individuals suspected of terrorist-related activities not linked to terrorist groups.[3]
Details
From broad concern felt among Americans from both the September 11 attacks and the 2001 anthrax attacks, Congress rushed to pass legislation to strengthen security controls. On October 23, 2001, Republican Rep. Jim Sensenbrenner introduced H.R. 3162 incorporating provisions from a previously sponsored House bill and a Senate bill also introduced earlier in the month.[4] The next day on October 24, 2001, the Act passed the House 357 to 66,[5] with Democrats comprising the overwhelming portion of dissent. The following day, on October 25, 2001, the Act passed the Senate by 98 to 1.[6]
Opponents of the law have criticized its authorization of indefinite detentions of immigrants; the permission given law enforcement officers to search a home or business without the owner’s or the occupant’s consent or knowledge; the expanded use of National Security Letters, which allows the Federal Bureau of Investigation (FBI) to search telephone, e-mail, and financial records without a court order; and the expanded access of law enforcement agencies to business records, including library and financial records. Since its passage, several legal challenges have been brought against the act, and Federal courts have ruled that a number of provisions are unconstitutional.
Many provisions of the act were to sunset beginning December 31, 2005, approximately 4 years after its passage. In the months preceding the sunset date, supporters of the act pushed to make its sunsetting provisions permanent, while critics sought to revise various sections to enhance civil liberty protections. In July 2005, the U.S. Senate passed a reauthorization bill with substantial changes to several sections of the act, while the House reauthorization bill kept most of the act’s original language. The two bills were then reconciled in a conference committee that was criticized by Senators from both the Republican and Democratic parties for ignoring civil liberty concerns.[7]
The bill, which removed most of the changes from the Senate version, passed Congress on March 2, 2006, and was signed into law by President George W. Bush on March 9 and 10, 2006.
The PATRIOT Act[8] made a number of changes to U.S. law. Key acts changed were the Foreign Intelligence Surveillance Act of 1978 (FISA), the Electronic Communications Privacy Act of 1986 (ECPA), the Money Laundering Control Act of 1986 and Bank Secrecy Act (BSA), as well as the Immigration and Nationality Act. The Act itself came about after the September 11th attacks on New York City and the Pentagon. After these attacks, Congress immediately started work on several proposed antiterrorist bills, before the Justice Department finally drafted a bill called the Anti-Terrorism Act of 2001, introduced to Congress on September 19, 2001. This was introduced to the House as the Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001, and was later passed by the House as the Uniting and Strengthening America (USA) Act (H.R. 2975) on October 12.[9] It was then introduced into the Senate as the USA Act (S. 1510)[10] where a number of amendments were proposed by SenatorRuss Feingold,[11][12][13][13] all of which were passed. The final bill, the USA PATRIOT Act was introduced into the House on October 23 and incorporated H.R. 2975, S. 1510 and many of the provisions of H.R. 3004 (the Financial Anti-Terrorism Act).[14] It was vehemently opposed by only one Senator, Russ Feingold, who was the only Senator to vote against the bill. Senator Patrick Leahy also expressed some concerns.[15]However, many parts were seen as necessary by both detractors and supporters.[16][17][18] The final Act included a number of sunsets which were to expire on December 15, 2005.
Due to its controversial nature, a number of bills – none of which were passed – were proposed to amend the USA PATRIOT Act. These included the Protecting the Rights of Individuals Act,[19] the Benjamin Franklin True Patriot Act,[20] and the Security and Freedom Ensured Act (SAFE).[21] In late January 2003, the founder of the Center for Public Integrity, Charles Lewis, published a leaked draft copy of an Administration proposal titled the Domestic Security Enhancement Act of 2003.[22] This highly controversial document was quickly dubbed “PATRIOT II” or “Son of PATRIOT” by the media and organizations such as the Electronic Frontier Foundation.[23] The draft, which was circulated to 10 divisions of the Department of Justice,[24]proposed to make further extensive modifications to extend the USA PATRIOT Act.[25] It was widely condemned, although the Department of Justice claimed that it was only a draft and contained no further proposals.[26]
Titles
Title I: Enhancing domestic security against terrorism
Title I authorizes measures to enhance the ability of domestic security services to prevent terrorism. The title established a fund for counter-terrorist activities and increased funding for the Terrorist Screening Center which is administered by the FBI. The military was authorized to provide assistance in some situations that involve weapons of mass destruction when so requested by the Attorney General. The National Electronic Crime Task Force was expanded, along with thePresident‘s authority and abilities in cases of terrorism. The title also condemned the discrimination against Arab and Muslim Americans that happened soon after the September 11 terrorist attacks. The impetus for many of the provisions came from earlier bills, for instance the condemnation of discrimination was originally proposed by Senator Tom Harkin (D–IA) in an amendment to the Combatting Terrorism Act of 2001, though in a different form. It originally included “the prayer ofCardinalTheodore McCarrick, the Archbishop of Washington in a Mass on September 12, 2001 for our Nation and the victims in the immediate aftermath of the terrorist hijackings and attacks in New York City, Washington, D.C., and Pennsylvania reminds all Americans that ‘We must seek the guilty and not strike out against the innocent or we become like them who are without moral guidance or proper direction.'”[27] Further condemnation of racial vilification and violence is also spelled out in Title X, where there was condemnation of such activities against Sikh Americans, who were mistaken for Muslims after the September 11th terrorist attack.[28]
Title II is titled “Enhanced Surveillance Procedures”, and covers all aspects of the surveillance of suspected terrorists, those suspected of engaging in computer fraud or abuse, and agents of a foreign power who are engaged in clandestine activities. It primarily made amendments to FISA, and the ECPA, and many of the most controversial aspects of the USA PATRIOT Act reside in this title. In particular, the title allows government agencies to gather “foreign intelligence information” from both U.S. and non-U.S. citizens, and changed FISA to make gaining foreign intelligence information the significant purpose of FISA-based surveillance, where previously it had been the primary purpose.[29] The change in definition was meant to remove a legal “wall” between criminal investigations and surveillance for the purposes of gathering foreign intelligence, which hampered investigations when criminal and foreign surveillance overlapped.[30] However, that this wall even existed was found by the Federal Surveillance Court of Review to have actually been a long-held misinterpretation by government agencies. Also removed was the statutory requirement that the government prove a surveillance target under FISA is a non-U.S. citizen and agent of a foreign power, though it did require that any investigations must not be undertaken on citizens who are carrying out activities protected by the First Amendment.[31] The title also expanded the duration of FISA physical search and surveillance orders,[32] and gave authorities the ability to share information gathered before a federal grand jury with other agencies.[33]
The scope and availability of wiretapping and surveillance orders were expanded under Title II. Wiretaps were expanded to include addressing and routing information to allow surveillance of packet switched networks[34]—the Electronic Privacy Information Center (EPIC) objected to this, arguing that it does not take into account email or web addresses, which often contain content in the address information.[35] The Act allowed any district court judge in the United States to issue such surveillance orders[34] and search warrants for terrorism investigations.[36] Search warrants were also expanded, with the Act amending Title III of the Stored Communications Access Act to allow the FBI to gain access to stored voicemail through a search warrant, rather than through the more stringent wiretap laws.[37]
Various provisions allowed for the disclosure of electronic communications to law enforcement agencies. Those who operate or own a “protected computer” can give permission for authorities to intercept communications carried out on the machine, thus bypassing the requirements of the Wiretap statute.[38] The definition of a “protected computer” is defined in 18 U.S.C.§ 1030(e)(2) and broadly encompasses those computers used in interstate or foreign commerce or communication, including ones located outside the United States. The law governing obligatory and voluntary disclosure of customer communications by cablecompanies was altered to allow agencies to demand such communications under U.S.C. Title 18 provisions relating to the disclosure of electronic communications (chapter 119), pen registers and trap and trace devices (chapter 206) and stored communications (121), though it excluded the disclosure of cable subscriber viewing habits.[39]Subpoenas issued to Internet Service Providers were expanded to include not only “the name, address, local and long distance telephone toll billing records, telephone number or other subscriber number or identity, and length of service of a subscriber” but also session times and durations, types of services used, communication device address information (e.g. IP addresses), payment method and bank account and credit card numbers.[40] Communication providers are also allowed to disclose customer records or communications if they suspect there is a danger to “life and limb”.[41]
Title II established three very controversial provisions: “sneak and peek” warrants, roving wiretaps and the ability of the FBI to gain access to documents that reveal the patterns of U.S. citizens. The so-called “sneak and peek” law allowed for delayed notification of the execution of search warrants. The period before which the FBI must notify the recipients of the order was unspecified in the Act—the FBI field manual says that it is a “flexible standard”[42]—and it may be extended at the court’s discretion.[43] These sneak and peek provisions were struck down by judge Ann Aiken on September 26, 2007 after a Portland attorney, Brandon Mayfield, was wrongly jailed because of the searches. The court found the searches to violate the provision that prohibits unreasonable searches in the Fourth Amendment to the U.S. Constitution.[44][45]
Roving wiretaps are wiretap orders that do not need to specify all common carriers and third parties in a surveillance court order. These are seen as important by the Department of Justice because they believe that terrorists can exploit wiretap orders by rapidly changing locations and communication devices such as cell phones,[46] while opponents see it as violating the particularity clause of the Fourth Amendment.[47][48] Another highly controversial provision is one that allows the FBI to make an order “requiring the production of any tangible things (including books, records, papers, documents, and other items) for an investigation to protect against international terrorism or clandestine intelligence activities, provided that such investigation of a United States person is not conducted solely upon the basis of activities protected by the first amendment to the Constitution.”[49] Though it was not targeted directly at libraries, the American Library Association (ALA), in particular, opposed this provision.[50] In a resolution passed on June 29, 2005, they stated that “Section 215 of the USA PATRIOT Act allows the government to secretly request and obtain library records for large numbers of individuals without any reason to believe they are involved in illegal activity.”[51] However, the ALA’s stance did not go without criticism. One prominent critic of the ALA’s stance was the Manhattan Institute‘s Heather Mac Donald, who argued in an article for the New York City Journal that “[t]he furor over section 215 is a case study in Patriot Act fear-mongering.”[52]
The title also covers a number of other miscellaneous provisions, including the expansion of the number of FISC judges from seven to eleven (three of which must reside within 20 miles (32 km) of the District of Columbia),[53] trade sanctions against North Korea and Taliban-controlled Afghanistan[54] and the employment oftranslators by the FBI.[55]
At the insistence of Republican Representative Richard Armey,[56] the Act had a number of sunset provisions built in, which were originally set to expire on December 31, 2005. The sunset provision of the Act also took into account any ongoing foreign intelligence investigations and allowed them to continue once the sections had expired.[57] The provisions that were to expire are below.
Title II sections that were to originally expire on December 31, 2005
Section
Section title
201
Authority to intercept wire, oral, and electronic communications relating to terrorism
202
Authority to intercept wire, oral, and electronic communications relating to computer fraud and abuse offenses
203(b)
Authority to share electronic, wire and oral interception information
204
Clarification of intelligence exceptions from limitations on interception and disclosure of wire, oral, and electronic communications
206
Roving surveillance authority under the Foreign Intelligence Surveillance Act of 1978.
207
Duration of FISA surveillance of non-United States persons who are agents of a foreign power
209
Seizure of voice-mail messages pursuant to warrants
212
Emergency disclosure of electronic communications to protect life and limb
214
Pen register and trap and trace authority under FISA
215
Access to records and other items under the Foreign Intelligence Surveillance Act.
217
Interception of computer trespasser communications
218
Foreign intelligence information
220
Nationwide service of search warrants for electronic evidence
223
Civil liability for certain unauthorized disclosures
225
Immunity for compliance with FISA wiretap
Title III: Anti-money-laundering to prevent terrorism
Title III of the Act, titled “International Money Laundering Abatement and Financial Anti-Terrorism Act of 2001,” is intended to facilitate the prevention, detection and prosecution of international money laundering and the financing of terrorism. It primarily amends portions of the Money Laundering Control Act of 1986 (MLCA) and the Bank Secrecy Act of 1970 (BSA). It was divided into three subtitles, with the first dealing primarily with strengthening banking rules against money laundering, especially on the international stage. The second attempts to improve communication between law enforcement agencies and financial institutions, as well as expanding record keeping and reporting requirements. The third subtitle deals with currency smuggling and counterfeiting, including quadrupling the maximum penalty for counterfeiting foreign currency.
The first subtitle tightened the record keeping requirements for financial institutions, making them record the aggregate amounts of transactions processed from areas of the world where money laundering is a concern to the U.S. government. It also made institutions put into place reasonable steps to identify beneficial owners of bank accounts and those who are authorized to use or route funds through payable-through accounts.[58] The U.S. Treasury was charged with formulating regulations intended to foster information sharing between financial institutions to prevent money-laundering.[59] Along with expanding record keeping requirements it put new regulations into place to make it easier for authorities to identify money laundering activities and to make it harder for money launderers to mask their identities.[60] If money laundering was uncovered, the subtitle legislated for the forfeiture of assets of those suspected of doing the money laundering.[61]In an effort to encourage institutions to take steps that would reduce money laundering, the Treasury was given authority to block mergers of bank holding companies and banks with other banks and bank holding companies that had a bad history of preventing money laundering. Similarly, mergers between insured depository institutions and non-insured depository institutions that have a bad track record in combating money-laundering could be blocked.[62]
Restrictions were placed on accounts and foreign banks. It prohibited shell banks that are not an affiliate of a bank that has a physical presence in the U.S. or that are not subject to supervision by a banking authority in a non-U.S. country. It also prohibits or restricts the use of certain accounts held at financial institutions.[63]Financial institutions must now undertake steps to identify the owners of any privately owned bank outside the U.S. who have a correspondent account with them, along with the interests of each of the owners in the bank. It is expected that additional scrutiny will be applied by the U.S. institution to such banks to make sure they are not engaging in money laundering. Banks must identify all the nominal and beneficial owners of any private bank account opened and maintained in the U.S. by non-U.S. citizens. There is also an expectation that they must undertake enhanced scrutiny of the account if it is owned by, or is being maintained on behalf of, any senior political figure where there is reasonable suspicion of corruption.[64] Any deposits made from within the U.S. into foreign banks are now deemed to have been deposited into any interbank account the foreign bank may have in the U.S. Thus any restraining order, seizure warrant or arrest warrant may be made against the funds in the interbank account held at a U.S. financial institution, up to the amount deposited in the account at the foreign bank.[65] Restrictions were placed on the use of internal bank concentration accounts because such accounts do not provide an effective audit trail for transactions, and this may be used to facilitate money laundering. Financial institutions are prohibited from allowing clients to specifically direct them to move funds into, out of, or through a concentration account, and they are also prohibited from informing their clients about the existence of such accounts. Financial institutions are not allowed to provide any information to clients that may identify such internal accounts.[66] Financial institutions are required to document and follow methods of identifying where the funds are for each customer in a concentration account that co-mingles funds belonging to one or more customers.
The definition of money laundering was expanded to include making a financial transaction in the U.S. in order to commit a violent crime;[67] the bribery of public officials and fraudulent dealing with public funds; the smuggling or illegal export of controlled munition[68] and the importation or bringing in of any firearm or ammunition not authorized by the U.S. Attorney General[69] and the smuggling of any item controlled under the Export Administration Regulations.[70][71] It also includes any offense where the U.S. would be obligated under a mutual treaty with a foreign nation to extradite a person, or where the U.S. would need to submit a case against a person for prosecution because of the treaty; the import of falsely classified goods;[72]computer crime;[73] and any felony violation of the Foreign Agents Registration Act of 1938.[71] It also allows the forfeiture of any property within the jurisdiction of the United States that was gained as the result of an offense against a foreign nation that involves the manufacture, importation, sale, or distribution of a controlled substance.[74] Foreign nations may now seek to have a forfeiture or judgment notification enforced by a district court of the United States.[75] This is done through new legislation that specifies how the U.S. government may apply for a restraining order[76] to preserve the availability of property which is subject to a foreign forfeiture or confiscation judgement.[77] In taking into consideration such an application, emphasis is placed on the ability of a foreign court to follow due process.[75] The Act also requires the Secretary of Treasury to take all reasonable steps to encourage foreign governments make it a requirement to include the name of the originator in wire transfer instructions sent to the United States and other countries, with the information to remain with the transfer from its origination until the point of disbursement.[78] The Secretary was also ordered to encourage international cooperation in investigations of money laundering, financial crimes, and the finances of terrorist groups.[79]
The Act also introduced criminal penalties for corrupt officialdom. An official or employee of the government who acts corruptly—as well as the person who induces the corrupt act—in the carrying out of their official duties will be fined by an amount that is not more than three times the monetary equivalent of the bribe in question. Alternatively they may be imprisoned for not more than 15 years, or they may be fined and imprisoned. Penalties apply to financial institutions who do not comply with an order to terminate any corresponding accounts within 10 days of being so ordered by the Attorney General or the Secretary of Treasury. The financial institution can be fined $US10,000 for each day the account remains open after the 10 day limit has expired.[65]
The second annotation made a number of modifications to the BSA in an attempt to make it harder for money launderers to operate and easier for law enforcement and regulatory agencies to police money laundering operations. One amendment made to the BSA was to allow the designated officer or agency who receivessuspicious activity reports to notify U.S. intelligence agencies.[80] A number of amendments were made to address issues related to record keeping and financial reporting. One measure was a new requirement that anyone who does business file a report for any coin and foreign currency receipts that are over US$10,000 and made it illegal to structure transactions in a manner that evades the BSA’s reporting requirements.[81] To make it easier for authorities to regulate and investigate anti-money laundering operations Money Services Businesses (MSBs)—those who operate informal value transfer systems outside of the mainstream financial system—were included in the definition of a financial institution.[82] The BSA was amended to make it mandatory to report suspicious transactions and an attempt was made to make such reporting easier for financial institutions.[83]FinCEN was made a bureau of the United States Department of Treasury[84] and the creation of a secure network to be used by financial institutions to report suspicious transactions and to provide alerts of relevant suspicious activities was ordered.[85] Along with these reporting requirements, a considerable number of provisions relate to the prevention and prosecution of money-laundering.[86]Financial institutions were ordered to establish anti-money laundering programs and the BSA was amended to better define anti-money laundering strategy.[87] Also increased were civil and criminal penalties for money laundering and the introduction of penalties for violations of geographic targeting orders and certain record-keeping requirements.[88] A number of other amendments to the BSA were made through subtitle B, including granting the Board of Governors of the Federal Reserve System power to authorize personnel to act as law enforcement officers to protect the premises, grounds, property and personnel of any U.S. National reserve bank and allowing the Board to delegate this authority to U.S. Federal reserve bank.[89] Another measure instructed United States Executive Directors of international financial institutions to use their voice and vote to support any country that has taken action to support the U.S.’s War on Terrorism. Executive Directors are now required to provide ongoing auditing of disbursements made from their institutions to ensure that no funds are paid to persons who commit, threaten to commit, or support terrorism.[90]
The third subtitle deals with currency crimes. Largely because of the effectiveness of the BSA, money launders had been avoiding traditional financial institutions to launder money and were using cash-based businesses to avoid them. A new effort was made to stop the laundering of money through bulk currency movements, mainly focusing on the confiscation of criminal proceeds and the increase in penalties for money laundering. Congress found that a criminal offense of merely evading the reporting of money transfers was insufficient and decided that it would be better if the smuggling of the bulk currency itself was the offense. Therefore, the BSA was amended to make it a criminal offense to evade currency reporting by concealing more than US$10,000 on any person or through any luggage, merchandise or other container that moves into or out of the U.S. The penalty for such an offense is up to 5 years imprisonment and the forfeiture of any property up to the amount that was being smuggled.[91] It also made the civil and criminal penalty violations of currency reporting cases[92] be the forfeiture of all a defendant’s property that was involved in the offense, and any property traceable to the defendant.[93] The Act prohibits and penalizes those who run unlicensed money transmitting businesses.[94] In 2005, this provision of the USA PATRIOT Act was used to prosecute Yehuda Abraham for helping to arrange money transfers for British arms dealer Hermant Lakhani, who was arrested in August 2003 after being caught in a government sting. Lakhani had tried to sell a missile to an FBI agent posing as a Somali militant.[95] The definition of counterfeiting was expanded to encompass analog, digital or electronic image reproductions, and it was made an offense to own such a reproduction device. Penalties were increased to 20 years imprisonment.[96] Money laundering “unlawful activities” was expanded to include the provision of material support or resources to designated foreign terrorist organizations.[97] The Act specifies that anyone who commits or conspires to undertake a fraudulent activity outside the jurisdiction of the United States, and which would be an offense in the U.S., will be prosecuted under 18 U.S.C.§ 1029, which deals with fraud and related activity in connection with access devices.[98]
Title IV amends the Immigration and Nationality Act of 1952 to give more law enforcement and investigative power to the United States Attorney General and to theImmigration and Naturalization Service (INS). The Attorney General was authorized to waive any cap on the number of full-time employees (FTEs) assigned to the INS on the Northern border of the United States.[99] Enough funds were set aside to triple the maximum number of Border Patrol personnel, Customs Service personnel and INS inspectors along with an additional US$50,000,000 funding for the INS and the U.S. Customs Service to improve technology for monitoring the Northern Border and acquiring additional equipment at the Canadian northern border.[100] The INS was also given the authority to authorize overtime payments of up to an extra US$30,000 a year to INS employees.[101] Access was given to the Department of State and the INS to criminal background information contained in the National Crime Information Center’s Interstate Identification Index (NCIC-III), Wanted Persons File and any other files maintained by the National Crime Information Center to determine whether visa applicants and applicants could be admitted to the U.S.[102] The Department of State was required to form final regulations governing the procedures for taking fingerprints and the conditions with which the department was allowed to use this information.[103] Additionally, theNational Institute of Standards and Technology (NIST) was ordered to develop a technology standard to verify the identity of persons applying for a United States visa.[103] The reason was to make the standard the technology basis for a cross-agency, cross-platform electronic system used for conducting background checks, confirming identities and ensuring that people have not received visas under different names.[104] This report was released on November 13, 2002,[105] however, according to NIST, this was later “determined that the fingerprint system used was not as accurate as current state-of-the-art fingerprint systems and is approximately equivalent to commercial fingerprint systems available in 1998.”[106] This report was later superseded by section 303(a) of the Enhanced Border Security and Visa Entry Reform Act of 2002.
Under subtitle C, various definitions relating to terrorism were altered and expanded. The INA was retroactively amended to disallow aliens who are part of or representatives of a foreign organization or any group who endorses acts of terrorism from entering the U.S. This restriction also included the family of such aliens.[107] The definition of “terrorist activity” was strengthened to include actions involving the use of any dangerous device (and not just explosives and firearms).[107] To “engage in terrorist activity” is defined as committing, inciting to commit or planning and preparing to undertake an act of terrorism. Included in this definition is the gathering of intelligence information on potential terrorist targets, the solicitation of funds for a terrorist organization or the solicitation of others to undertake acts of terrorism. Those who provide knowing assistance to a person who is planning to perform such activities are defined as undertaking terrorist activities. Such assistance includes affording material support, including a safe house, transportation, communications, funds, transfer of funds or other material financial benefit, false documentation or identification, weapons (including chemical, biological, or radiological weapons), explosives, or training to perform the terrorist act.[107] The INA criteria for making a decision to designate an organization as a terrorist organization was amended to include the definition of a terrorist act.[108] Though the amendments to these definitions are retroactive, it does not mean that it can be applied to members who joined an organization, but since left, before it was designated to be a terrorist organization under 8 U.S.C.§ 1189 by the Secretary of State.[107]
The Act amended the INA to add new provisions enforcing mandatory detention laws. These apply to any alien who is engaged in terrorism, or who is engaged in an activity that endangers U.S. national security. It also applies to those who are inadmissible or who must be deported because it is certified they are attempting to enter to undertake illegal espionage; are exporting goods, technology, or sensitive information illegally; or are attempting to control or overthrow the government; or have, or will have, engaged in terrorist activities.[109] The Attorney General or the Attorney General’s deputy may maintain custody of such aliens until they are removed from the U.S., unless it is no longer deemed they should be removed, in which case they are released. The alien can be detained for up to 90 days but can be held up to six months after it is deemed that they are a national security threat. However, the alien must be charged with a crime or removal proceedings start no longer than seven days after the alien’s detention, otherwise the alien will be released. However, such detentions must be reviewed every six months by the Attorney General, who can then decide to revoke it, unless prevented from doing so by law. Every six months the alien may apply, in writing, for the certification to be reconsidered.[109]Judicial review of any action or decision relating to this section, including judicial review of the merits of a certification, can be held underhabeas corpus proceedings. Such proceedings can be initiated by an application filed with the United States Supreme Court, by any justice of the Supreme Court, by any circuit judge of the United States Court of Appeals for the District of Columbia Circuit, or by any district court otherwise having jurisdiction to entertain the application. The final order is subject to appeal to the United States Court of Appeals for the District of Columbia Circuit.[109] Provisions were also made for a report to be required every six months of such decisions from the U.S. Attorney General to the Committee on the Judiciary of the House of Representatives and theCommittee on the Judiciary of the Senate.[109]
A sense of Congress was given that the U.S. Secretary of State should expedite the full implementation of the integrated entry and exit data system for airports, seaports, and land border ports of entry specified in the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (IIRIRA). They also found that the U.S. Attorney General should immediately start the Integrated Entry and Exit Data System Task Force specified in section 3 of the Immigration and Naturalization Service Data Management Improvement Act of 2000. Congress wanted the primary focus of development of the entry-exit data system was to be on the utilization of biometric technology and the development of tamper-resistant documents readable at ports of entry. They also wanted the system to be able to interface with existing law enforcement databases.[110] The Attorney General was ordered to implement and expand the foreign student monitoring program that was established under section 641(a) of the IIRIRA.[111] which records the date and port of entry of each foreign student. The program was expanded to include other approved educational institutions, including air flight schools, language training schools or vocational schools that are approved by the Attorney General, in consultation with the Secretary of Education and the Secretary of State. US$36,800,000 was appropriated for the Department of Justice to spend on implementing the program.[112]
The Secretary of State was ordered to audit and report back to Congress on the Visa waiver program specified under 8 U.S.C.§ 1187 for each fiscal year until September 30, 2007. The Secretary was also ordered to check for the implementation of precautionary measures to prevent the counterfeiting and theft of passports as well as ascertain that countries designated under the visa waiver program have established a program to develop tamper-resistant passports.[113] The Secretary was also ordered to report back to Congress on whether consulate shopping was a problem.[114]
The last subtitle, which was introduced by Senators John Conyers and Patrick Leahy, allows for the preservation of immigration benefits for victims of terrorism, and the families of victims of terrorism.[115] They recognized that some families, through no fault of their own, would either be ineligible for permanent residence in the United States because of being unable to make important deadlines because of the September 11 terrorist attacks, or had become ineligible to apply for special immigration status because their loved one died in the attacks.[116]
Title V: Removing obstacles to investigating terrorism
It allows the U.S. Attorney General to pay rewards pursuant of advertisements for assistance to the Department of Justice to combat terrorism and prevent terrorist acts, though amounts over $US250,000 may not be made or offered without the personal approval of the Attorney General or President, and once the award is approved the Attorney General must give written notice to the Chairman and ranking minority members of the Committee on Appropriations and the Judiciary of the Senate and of the House of Representatives.[117] The State Department Basic Authorities Act of 1956 was amended to allow the Department of State to offer rewards, in consultation with the Attorney General, for the full or significant dismantling of any terrorist organization[118] and to identify any key leaders of terrorist organizations.[119] The Secretary of State was given authority to pay greater than $US5 million if he so determines it would prevent terrorist actions against the United States and Canada.[120] The DNA Analysis Backlog Elimination Act was amended to include terrorism or crimes of violence in the list of qualifying Federal offenses.[121] Another perceived obstacle was to allow Federal agencies to share information with Federal law enforcement agencies. Thus, the act now allows Federal officers who acquire information through electronic surveillance or physical searches to consult with Federal law enforcement officers to coordinate efforts to investigate or protect against potential or actual attacks, sabotage or international terrorism or clandestine intelligence activities by an intelligence service or network of a foreign power.[122]
Secret Service jurisdiction was extended to investigate computer fraud, access device frauds, false identification documents or devices, or any fraudulent activities against U.S. financial institutions.[123] The General Education Provisions Act was amended to allow the U.S. Attorney General or Assistant Attorney General to collect and retain educational records relevant to an authorized investigation or prosecution of an offense that is defined as a Federal crime of terrorism and which an educational agency or institution possesses. The Attorney General or Assistant Attorney General must “certify that there are specific and articulable facts giving reason to believe that the education records are likely to contain information [that a Federal crime of terrorism may be being committed].” An education institution that produces education records in response to such a request is given legal immunity from any liability that rises from such a production of records.[124]
One of the most controversial aspects of the USA PATRIOT Act is in title V, and relates to National Security Letters (NSLs). An NSL is a form of administrative subpoena used by the FBI, and reportedly by other U.S. government agencies including the CIA and the Department of Defense (DoD). It is a demand letter issued to a particular entity or organization to turn over various records and data pertaining to individuals. They require no probable cause or judicial oversight and also contain a gag order, preventing the recipient of the letter from disclosing that the letter was ever issued. Title V allowed the use of NSLs to be made by a Special Agent in charge of a Bureau field office, where previously only the Director or the Deputy Assistant Director of the FBI were able to certify such requests.[125] This provision of the Act was challenged by the ACLU on behalf of an unknown party against the U.S. government on the grounds that NSLs violate the First and Fourth Amendments of the U.S. Constitution because there is no way to legally oppose an NSL subpoena in court, and that it was unconstitutional not to allow a client to inform their Attorney as to the order because of the gag provision of the letters. The court’s judgement found in favour of the ACLU’s case, and they declared the law unconstitutional.[126] Later, the USA PATRIOT Act was reauthorized and amendments were made to specify a process of judicial review of NSLs and to allow the recipient of an NSL to disclose receipt of the letter to an attorney or others necessary to comply with or challenge the order.[127] However, in 2007 the U.S. District Court struck down even the reauthorized NSLs because the gag power was unconstitutional as courts could still not engage in meaningful judicial review of these gags.
Title VI: Victims and families of victims of terrorism
Title VI made amendments to the Victims of Crime Act of 1984 (VOCA) in order to make changes to how the U.S. Victims of Crime Fund was managed and funded. Changes were made to VOCA to improve the speedy provision of aid to families of public safety officers by expedited payments to officers or the families of officers. Under the changes, payments must be made no later than 30 days after the officer is injured or killed in the line of duty.[128] The Assistant Attorney General was given expanded authority under section 614 of the USA PATRIOT Act to make grants to any organization that administers any Office of Justice Programs, which includes the Public Safety Officers Benefits Program.[129] Further changes to the Victims of Crime Fund increased the amount of money in the Fund, and changed the way that funds were distributed.[130] The amount available for grants made through the Crime Victim Fund to eligible crime victim compensation programs were increased from 40 percent to 60 percent of the total in the Fund. A program can provide compensation to U.S. citizens who were adversely affected overseas.Means testing was also waived for those who apply for compensation.[131] Under VOCA, the Director may make an annual grant from the Crime Victims Fund to support crime victim assistance programs. An amendment was made to VOCA to include offers of assistance to crime victims in the District of Columbia, theCommonwealth of Puerto Rico, the United States Virgin Islands, and any other U.S. territory.[132] VOCA also provides for compensation and assistance to victims of terrorism or mass violence.[133] This was amended to allow the Director to make supplemental grants to States for eligible crime victim compensation and assistance programs, and to victim service organizations, public agencies (including Federal, State, or local governments) and non-governmental organizations that provide assistance to victims of crime. The funds could be used to provide emergency relief, including crisis response efforts, assistance, compensation, training and technical assistance for investigations and prosecutions of terrorism.[134]
Title VII: Increased information sharing for critical infrastructure protection
Title VII has one section. The purpose of this title is to increase the ability of U.S. law enforcement to counter terrorist activity that crosses jurisdictional boundaries. It does this by amending the Omnibus Crime Control and Safe Streets Act of 1968 to include terrorism as a criminal activity.
Title VIII alters the definitions of terrorism, and establishes or re-defines rules with which to deal with it. It redefined the term “domestic terrorism” to broadly include mass destruction as well as assassination or kidnapping as a terrorist activity. The definition also encompasses activities that are “dangerous to human life that are a violation of the criminal laws of the United States or of any State” and are intended to “intimidate or coerce a civilian population,” “influence the policy of a government by intimidation or coercion,” or are undertaken “to affect the conduct of a government by mass destruction, assassination, or kidnapping” while in the jurisdiction of the United States.[135] Terrorism is also included in the definition of racketeering.[136] Terms relating to cyber-terrorism are also redefined, including the term “protected computer,” “damage,” “conviction,” “person,” and “loss.”[137]
New penalties were created to convict those who attack mass transportation systems. If the offender committed such an attack while no passenger was on board, they are fined and imprisoned for a maximum of 20 years. However, if the activity was undertaken while the mass transportation vehicle or ferry was carrying a passenger at the time of the offense, or the offense resulted in the death of any person, then the punishment is a fine and life imprisonment.[138] The title amends the biological weapons statute to define the use of a biological agent, toxin, or delivery system as a weapon, other than when it is used for “prophylactic, protective,bona fide research, or other peaceful purposes.” Penalties for anyone who cannot prove reasonably that they are using a biological agent, toxin or delivery system for these purposes are 10 years imprisonment, a fine or both.[139]
A number of measures were introduced in an attempt to prevent and penalize activities that are deemed to support terrorism. It was made a crime to harbor or conceal terrorists, and those who do are subject to a fine or imprisonment of up to 10 years, or both.[140] U.S. forfeiture law was also amended to allow authorities to seize all foreign and domestic assets from any group or individual that is caught planning to commit acts of terrorism against the U.S. or U.S. citizens. Assets may also be seized if they have been acquired or maintained by an individual or organization for the purposes of further terrorist activities.[141] One section of the Act (section 805) prohibited “material support” for terrorists, and in particular included “expert advice or assistance.”[142] This was struck down as unconstitutional by aU.S. Federal Court after the Humanitarian Law Project filed a civil action against the U.S. government. The court found that it violated the First and Fifth Amendments to the United States Constitution and the provision was so vague it would cause a person of average intelligence to have to guess whether they were breaking the law, thus leading to a potential situation where a person was charged for an offense that they had no way of knowing was illegal. The court found that this could potentially have the effect of allowing arbitrary and discriminatory enforcement of the law, as well as possible chilling effects on First Amendment rights.[143][144] Congress later improved the law by defining the definitions of the “material support or resources,” “training,” and “expert advise or resources.”[145]
Cyberterrorism was dealt with in various ways. Penalties apply to those who either damage or gain unauthorized access to a protected computer and then commit a number of offenses. These offenses include causing a person to lose an aggregate amount greater than US$5,000, as well as adversely affecting someone’s medical examination, diagnosis or treatment. It also encompasses actions that cause a person to be injured, a threat to public health or safety, or damage to a governmental computer that is used as a tool to administer justice, national defense or national security. Also prohibited was extortion undertaken via a protected computer. The penalty for attempting to damage protected computers through the use of viruses or other software mechanism was set to imprisonment for up to 10 years, while the penalty for unauthorized access and subsequent damage to a protected computer was increased to more than five years imprisonment. However, should the offense occur a second time, the penalty increases up to 20 years imprisonment.[146] The act also specified the development and support of cybersecurity forensic capabilities. It directs the Attorney General to establish regional computer forensic laboratories that have the capability of performing forensic examinations of intercepted computer evidence relating to criminal activity and cyberterrorism, and that have the capability of training and educating Federal, State, and local law enforcement personnel and prosecutors in computer crime, and to “facilitate and promote the sharing of Federal law enforcement expertise and information about the investigation, analysis, and prosecution of computer-related crime with State and local law enforcement personnel and prosecutors, including the use of multijurisdictional task forces.” The sum of $50,000,000 was authorized for establishing such labs.[147]
Title IX amends the National Security Act of 1947 to require the Director of Central Intelligence (DCI) to establish requirements and priorities for foreign intelligence collected under FISA and to provide assistance to the United States Attorney General to ensure that information derived from electronic surveillance or physical searches is disseminated for efficient and effective foreign intelligence purposes.[148] With the exception of information that might jeopardize an ongoing law enforcement investigation, it was made a requirement that the Attorney General, or the head of any other department or agency of the Federal Government with law enforcement responsibilities, disclose to the Director any foreign intelligence acquired by the U.S. Department of Justice. The Attorney General and Director of Central Intelligence were directed to develop procedures for the Attorney General to follow in order to inform the Director, in a timely manner, of any intention of investigating criminal activity of a foreign intelligence source or potential foreign intelligence source based on the intelligence tip-off of a member of the intelligence community. The Attorney General was also directed to develop procedures on how to best administer these matters.[149] International terrorist activities were made to fall within the scope of foreign intelligence under the National Security Act.[150]
A number of reports were commissioned relating to various intelligence-related government centers. One was commissioned into the best way of setting up theNational Virtual Translation Center, with the goal of developing automated translation facilities to assist with the timely and accurate translation of foreign intelligence information for elements of the U.S. intelligence community.[151] The USA PATRIOT Act required this to be provided on February 1, 2002, however the report, entitled “Director of Central Intelligence Report on the National Virtual Translation Center: A Concept Plan to Enhance the Intelligence Community’s Foreign Language Capabilities, April 29, 2002” was received more than two months late, which the Senate Select Committee on Intelligence reported was “a delay which, in addition to contravening the explicit words of the statute, deprived the Committee of timely and valuable input into its efforts to craft this legislation.”[152] Another report was commissioned on the feasibility and desirability of reconfiguring the Foreign Terrorist Asset Tracking Center and the Office of Foreign Assets Control of the Department of the Treasury.[153] It was due by February 1, 2002 however, it was never written. The Senate Select Committee on Intelligence later complained that “[t]he Director of Central Intelligence and the Secretary of the Treasury failed to provide a report, this time in direct contravention of a section of the USA PATRIOT Act” and they further directed “that the statutorily-directed report be completed immediately, and that it should include a section describing the circumstances which led to the Director’s failure to comply with lawful reporting requirements.”[154]
Other measures allowed certain reports on intelligence and intelligence-related matters to be deferred until either February 1, 2002 or a date after February 1, 2002 if the official involved certified that preparation and submission on February 1, 2002, would impede the work of officers or employees engaged in counterterrorism activities. Any such deferral required congressional notification before it was authorized.[155] The Attorney General was charged with training officials in identifying and utilizing foreign intelligence information properly in the course of their duties. The government officials include those in the Federal Government who do not normally encounter or disseminate foreign intelligence in the performance of their duties, and State and local government officials who encounter, or potentially may encounter in the course of a terrorist event, foreign intelligence in the performance of their duties.[156] A sense of Congress was expressed that officers and employees of the intelligence community should be encouraged to make every effort to establish and maintain intelligence relationships with any person, entity, or group while they conduct lawful intelligence activities.[150]
Title X created or altered a number of miscellaneous laws that did not really fit into the any other section of the USA PATRIOT Act. Hazmat licenses were limited to drivers who pass background checks and who can demonstrate they can handle the materials.[157] The Inspector General of the Department of Justice was directed to appoint an official to monitor, review and report back to Congress all allegations of civil rights abuses against the DoJ.[158] It amended the definition of “electronic surveillance” to exclude the interception of communications done through or from a protected computer where the owner allows the interception, or is lawfully involved in an investigation.[159] Money laundering cases may now be brought in the district the money laundering was committed or where a money laundering transfer started from.[160] Aliens who committed money laundering were also prohibited from entering the U.S.[161] Grants were provided to first responders to assist them with responding to and preventing terrorism.[162] US$5,000,000 was authorized to be provided to the Drug Enforcement Administration (DEA) to train police inSouth and East Asia.[163] The Attorney General was directed to commission a study on the feasibility of using biometric identifiers to identify people as they attempt to enter the United States, and which would be connected to the FBI’s database to flag suspected criminals.[164] Another study was also commissioned to determine the feasibility of providing airlines names of suspected terrorists before they boarded flights.[165] The Department of Defense was given temporary authority to use their funding for private contracts for security purposes.[166] The last title also created a new Act called the Crimes Against Charitable Americans Act[167] which amended the Telemarketing and Consumer Fraud and Abuse Prevention Act to require telemarketers who call on behalf of charities to disclose the purpose and other information, including the name and mailing address of the charity the telemarketer is representing.[168] It also increased the penalties from one year imprisonment to five years imprisonment for those committing fraud by impersonating a Red Cross member.[169]
Reauthorizations
The USA PATRIOT Act was reauthorized by three bills. The first, the USA PATRIOT and Terrorism Prevention Reauthorization Act of 2005, was passed by both houses of Congress in July 2005. This bill reauthorized provisions of the USA PATRIOT Act and the Intelligence Reform and Terrorism Prevention Act of 2004. It created new provisions relating to the death penalty for terrorists,[170] enhancing security at seaports,[171] new measures to combat the financing of terrorism,[172]new powers for the Secret Service,[173] anti-methamphetamine initiatives[174] and a number of other miscellaneous provisions. The second reauthorization act, theUSA PATRIOT Act Additional Reauthorizing Amendments Act of 2006, amended the first and was passed in February 2006.
The first act reauthorized all but two of the provisions of Title II that would have expired. Two sections were changed to sunset on December 31, 2009: section 206—the roving wiretap provision—and section 215, which allowed access to business records under FISA. Section 215 was amended further regardless so as to give greater judicial oversight and review. Such orders were also restricted to be authorized by only the FBI Director, the FBI Deputy Director, or the Executive Assistant Director for National Security, and minimization procedures were specified to limit the dissemination and collection of such information. Section 215 also had a “gag” provision, which was changed to allow the defendant to contact their Attorney.[175] However, the change also meant that the defendant was also made to tell the FBI who he (or she) was disclosing the order to—this requirement was removed by the USA PATRIOT Act Additional Reauthorizing Amendments Act.[176]
On Saturday, February 27, 2010, President Barack Obama signed into law legislation that would temporarily extend for one year three controversial provisions of the Patriot Act that had been set to expire:[177][178][179]
Authorize court-approved roving wiretaps that permit surveillance on multiple phones.
Allow court-approved seizure of records and property in anti-terrorism operations.
Permit surveillance against a so-called lone wolf, a non-U.S. citizen engaged in terrorism who may not be part of a recognized terrorist group.[180]
In a vote on February 8, 2011, the House of Representatives considered a further extension of the Act through the end of 2011.[181] House leadership moved the extension bill under suspension of the rules, which is intended for noncontroversial legislation and requires two-thirds majority to pass.[181] After the vote, the extension bill did not pass; 277 members voted in favor, which was less than the 290 votes needed to pass the bill under suspension of the rules.[181] Without an extension, the Act was set to expire on February 28, 2011. However, it eventually passed, 275-144.[182] The FISA Sunsets Extension Act of 2011 was signed into law February 25, 2011.
On May 26, 2011, President Barack Obama used an Autopen to sign the PATRIOT Sunsets Extension Act of 2011, a four-year extension of three key provisions in the USA PATRIOT Act while he was in France:[2]roving wiretaps, searches of business records (the “library records provision“), and conducting surveillance of “lone wolves”—individuals suspected of terrorist-related activities not linked to terrorist groups.[3] Republican leaders[183] questioned if the use of the Autopen met the constitutional requirements for signing a bill into law.[184]
As NSL provisions of the USA PATRIOT Act had been struck by the courts[126] the reauthorization Act amended the law in an attempt to make them lawful. It provided for judicial review and the legal right of a recipient to challenge the validity of the letter. The reauthorization act still allowed NSLs to be closed and all evidence to be presented in camera and ex parte.[185] Gag provisions were maintained, but were not automatic. They only occurred when the Deputy Assistant Director of the FBI or a Special Agent in Charge in a Bureau field office certified that disclosure would result in “a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person”.[186] However, should there be no non-disclosure order, the defendant can disclose the fact of the NSL to anyone who can render them assistance in carrying out the letter, or to an attorney for legal advice. Again, however, the recipient was ordered to inform the FBI of such a disclosure.[186] Because of the concern over the chilling effects of such a requirement, the Additional Reauthorization Amendments Act removed the requirement to inform the FBI that the recipient spoke about the NSL to their Attorney.[187] Later, the Additional Reauthorization Amendments Act excluded libraries from receiving NSLs, except where they provide electronic communications services.[188] The reauthorization Act also ordered the Attorney General submit a report semi-annually to the House and Senate Judiciary Committees, the House and Senate Intelligence Committees and the House Committee on Financial Services and the Senate Committee on Banking, Housing, and Urban Affairs on all NSL request made under the Fair Credit Reporting Act.[189]
Changes were made to the roving wiretap provisions of the USA PATRIOT Act. Applications and orders for such wiretaps must describe the specific target of the electronic surveillance if the identity of the target is not known. If the nature and location of each of the facilities or places targeted for surveillance is not known, then after 10 days the agency must provide notice to the court. The notice must include the nature and location of each new facility or place at which the electronic surveillance was directed. It must also describe the facts and circumstances relied upon by the applicant to justify the applicant’s belief that each new surveillance place or facility under surveillance is or was being used by the target of the surveillance. The applicant must also provide a statement detailing any proposed minimization procedures that differ from those contained in the original application or order, that may be necessitated by a change in the facility or place at which the electronic surveillance is directed. Applicants must detail the total number of electronic surveillances that have been or are being conducted under the authority of the order.[190]
Section 213 of the USA PATRIOT Act was modified. Previously it stated that delayed notifications would be made to recipients of “sneak and peek” searches in a “reasonable period”. This was seen as unreasonable, as it was undefined and could potentially be used indefinitely. Thus, the reauthorization act changed this to a period not exceeding 30 days after the date of the execution of the search warrant. Courts were given the opportunity to extend this period if they were provided good cause to do so. Section 213 states that delayed notifications could be issued if there is “reasonable cause to believe that providing immediate notification of the execution of the warrant may have an adverse result”. This was criticized, particularly by the ACLU, for allowing potential abuse by law enforcement agencies[191] and was later amended to prevent a delayed notification “if the adverse results consist only of unduly delaying a trial.”.[192] On September 26, 2007 the Sneak and Peak provisions of the USA PATRIOT ACT were struck down, however, by an Oregon US District Court in an opinion indicating the provisions gave too much power to the Executive in the face of the 4th Amendment.[193]
The reauthorization act also legislates increased congressional oversight for emergency disclosures by communication providers undertaken under section 212 of the USA PATRIOT Act.[194] The duration of FISA surveillance and physical search orders were increased. Surveillance performed against “lone wolf terrorists” under section 207 of the USA PATRIOT Act were increased to 120 days for an initial order, while pen registers and trap and trace device extensions under FISA were increased from 90 days to a year. The reauthorization act also increased congressional oversight, requiring a semi-annual report into physical searches and the use of pen registers and trap and trace devices under FISA.[195] The “lone wolf terrorist” provision (Section 207) was a sunset provision that also was to have expired, however this was enhanced by the Intelligence Reform and Terrorism Prevention Act of 2004. The reauthorization act extended the expiration date to December 31, 2009.[196] The amendment to material support law done in the Intelligence Reform and Terrorism Prevention Act[145] was also made permanent.[197] The definition of terrorism was further expanded to include receiving military-type training from a foreign terrorist organization and narcoterrorism.[198] Other provisions of the reauthorization act was to merge the law outlawing train wrecking (18 U.S.C.§ 992) and the law outlawing attacks on mass transportation systems (18 U.S.C.§ 1993) into a new section of Title 18 of the U.S. Code (18 U.S.C.§ 1992) and also to criminalize the act of planning a terrorist attack against a mass transport system.[199][200]Forfeiture law was further changed and now assets within U.S. jurisdiction will be seized for illegally trafficking in nuclear, chemical, biological or radiological weapons technology or material, if such offense is punishable under foreign law by death or imprisonment for a term exceeding one year. Alternatively, this applies if similar punishment would be so punishable if committed within the U.S.[201] A sense of Congress was further expressed that victims of terrorism should be entitled to the forfeited assets of terrorists.[202]
The USA PATRIOT Act has generated a great deal of controversy since its enactment.
Opponents of the Act have been quite vocal in asserting that it was passed opportunistically after the September 11 attacks, believing that there would have been little debate. They view the Act as one that was hurried through the Senate with little change before it was passed. (Senators Patrick Leahy and Russell Feingoldproposed amendments to modify the final revision.)[15][203][204]
The sheer magnitude of the Act itself was noted by Michael Moore in his controversial film Fahrenheit 9/11. In one of the scenes of the movie, he records Congressman Jim McDermott alleging that no Senator had read the bill[205] and John Conyers, Jr. as saying, “We don’t read most of the bills. Do you really know what that would entail if we read every bill that we passed?” Congressman Conyers then answers his own rhetorical question, asserting that if they did it would “slow down the legislative process”.[206] As a dramatic device, Moore then hired an ice-cream van and drove around Washington, D.C. with a loud speaker, reading out the Act to puzzled passers-by, which included a few Senators.[207]
However, Moore was not the only commentator to notice that not many people had read the Act. When Dahlia Lithwick and Julia Turne for Slate asked, “How bad is PATRIOT, anyway?”, they decided that it was “hard to tell” and stated:
The ACLU, in a new fact sheet challenging the DOJ Web site, wants you to believe that the act threatens our most basic civil liberties. Ashcroft and his roadies call the changes in law “modest and incremental.” Since almost nobody has read the legislation, much of what we think we know about it comes third-hand and spun. Both advocates and opponents are guilty of fear-mongering and distortion in some instances.[208]
One prime example of a controversy of the Patriot Act is shown in the case of Susan Lindauer.
Another is the recent court case United States v. Antoine Jones. A nightclub owner was linked to a drug trafficking stash house via a law enforcement GPS tracking device attached to his car. It was placed there without a warrant, which caused a serious conviction obstacle for federal prosecutors in court. Through the years the case rose all the way to the United States Supreme Court where the conviction was overturned in favor of the defendant. The court found that increased monitoring of suspects caused by such legislation like the Patriot Act directly put the suspects’ Constitutional rights in jeopardy.
The Electronic Privacy Information Center (EPIC) has criticized the law as unconstitutional, especially when “the private communications of law-abiding American citizens might be intercepted incidentally”,[209] while the Electronic Frontier Foundation held that the lower standard applied to wiretaps “gives the FBI a ‘blank check’ to violate the communications privacy of countless innocent Americans”.[48] Others do not find the roving wiretap legislation to be as concerning. Professor David D. Cole of the Georgetown University Law Center, a critic of many of the provisions of the Act, found that though they come at a cost to privacy are a sensible measure[210] while Paul Rosenzweig, a Senior Legal Research Fellow in the Center for Legal and Judicial Studies at the Heritage Foundation, argues that roving wiretaps are just a response to rapidly changing communication technology that is not necessarily fixed to a specific location or device.[211]
The Act also allows access to voicemail through a search warrant rather than through a title III wiretap order.[212] James Dempsey, of the CDT, believes that it unnecessarily overlooks the importance of notice under the Fourth Amendment and under a Title III wiretap,[213] and the EFF criticizes the provision’s lack of notice. However, the EFF’s criticism is more extensive—they believe that the amendment “is in possible violation of the Fourth Amendment to the U.S. Constitution” because previously if the FBI listened to voicemail illegally, it could not use the messages in evidence against the defendant.[214] Others disagree with these assessments. Professor Orin Kerr, of the George Washington University school of law, believes that the ECPA “adopted a rather strange rule to regulate voicemail stored with service providers” because “under ECPA, if the government knew that there was one copy of an unopened private message in a person’s bedroom and another copy on their remotely stored voicemail, it was illegal for the FBI to simply obtain the voicemail; the law actually compelled the police to invade the home and rifle through peoples’ bedrooms so as not to disturb the more private voicemail.” In Professor Kerr’s opinion, this made little sense and the amendment that was made by the USA PATRIOT Act was reasonable and sensible.[215][216]
The USA PATRIOT Act’s expansion of court jurisdiction to allow the nationwide service of search warrants proved controversial for the EFF.[217] They believe that agencies will be able to “‘shop’ for judges that have demonstrated a strong bias toward law enforcement with regard to search warrants, using only those judges least likely to say no—even if the warrant doesn’t satisfy the strict requirements of the Fourth Amendment to the Constitution”,[218] and that it reduces the likelihood that smaller ISPs or phone companies will try to protect the privacy of their clients by challenging the warrant in court—their reasoning is that “a small San Francisco ISP served with such a warrant is unlikely to have the resources to appear before the New York court that issued it.”[218] They believe that this is bad because only the communications provider will be able to challenge the warrant as only they will know about it—many warrants are issued ex parte, which means that the target of the order is not present when the order is issued.[218]
For a time, the USA PATRIOT Act allowed for agents to undertake “sneak and peek” searches.[43] Critics such as EPIC and the ACLU strongly criticized the law for violating the Fourth Amendment,[219] with the ACLU going so far as to release an advertisement condemning it and calling for it to be repealed.[220][221]
However supporters of the amendment, such as Heather Mac Donald, a fellow at the Manhattan Institute and contributing editor to the New York City Journal, expressed the belief that it was necessary because the temporary delay in notification of a search order stops terrorists from tipping off counterparts who are being investigated.[222]
In 2004, FBI agents used this provision to search and secretly examine the home of Brandon Mayfield, who was wrongfully jailed for two weeks on suspicion of involvement in the Madrid train bombings. While the U.S. Government did publicly apologize to Mayfield and his family,[223] Mayfield took it further through the courts. On September 26, 2007, Judge Ann Aiken found the law was, in fact, unconstitutional as the search was an unreasonable imposition on Mayfield and thus violated the Fourth Amendment.[44][45]
Laws governing the material support of terrorism proved contentious. It was criticized by the EFF for infringement of freedom of association. The EFF argues that had this law been enacted during Apartheid, U.S. citizens would not have been able to support the African National Congress (ANC) as the EFF believe the ANC would have been classed as a terrorist organization. They also used the example of a humanitarian social worker being unable to train Hamas members how to care for civilian children orphaned in the conflict between Israelis and Palestinians, a lawyer being unable to teach IRA members about international law, and peace workers being unable to offer training in effective peace negotiations or how to petition the United Nations regarding human rights abuses.[224]
Another group, the Humanitarian Law Project, also objected to the provision prohibiting “expert advise and assistance” to terrorists and filed a suit against the U.S. government to have it declared unconstitutional. They succeeded, and a Federal Court found that the law was vague enough to cause a reasonable person to guess whether they were breaking the law or not. Thus they found it violated the First Amendment rights of U.S. citizens, and struck it down.[143][144]
Perhaps one of the biggest controversies involved the use of NSLs by the FBI. Because they allow the FBI to search telephone, email, and financial records without a court order, they were criticized by many parties.[225][226][227][228] In November 2005, BusinessWeek reported that the FBI had issued tens of thousands of NSLs and had obtained one million financial, credit, employment, and in some cases, health records from the customers of targeted Las Vegas businesses. Selected businesses included casinos, storage warehouses and car rental agencies. An anonymous Justice official claimed that such requests were permitted under section 505 of the USA PATRIOT Act and despite the volume of requests insisted “We are not inclined to ask courts to endorse fishing expeditions”.[229] Before this was revealed, however, the ACLU challenged the constitutionality of NSLs in court. In April 2004, they filed suit against the government on behalf of an unknown Internet Service Provider who had been issued an NSL, for reasons unknown. In ACLU v. DoJ, the ACLU argued that the NSL violated the First and Fourth Amendments of the U.S. Constitution because the USA PATRIOT Act failed to spell out any legal process whereby a telephone or Internet company could try to oppose an NSL subpoena in court. The court agreed, and found that because the recipient of the subpoena could not challenge it in court it was unconstitutional.[126] Congress later tried to remedy this in a reauthorization Act, but because they did not remove the non-disclosure provision a Federal court again found NSLs to be unconstitutional because they prevented courts from engaging in meaningful judicial review.[230][231][232]
Another provision of the USA PATRIOT Act has caused a great deal of consternation amongst librarians. Section 215 allows the FBI to apply for an order to produce materials that assist in an investigation undertaken to protect against international terrorism or clandestine intelligence activities. Among the “tangible things” that could be targeted, it includes “books, records, papers, documents, and other items”.[49]
Supporters of the provision point out that these records are held by third parties, and therefore are exempt from a citizen’s reasonable expectations of privacy and also maintain that the FBI has not abused the provision.[233] As proof, then Attorney General John Ashcroft released information in 2003 that showed that section 215 orders had never been used.[234]
However, despite protestations to the contrary, the American Library Association strongly objected to the provision, believing that library records are fundamentally different from ordinary business records, and that the provision would have a chilling effect on free speech. The association became so concerned that they formed a resolution condemning the USA PATRIOT Act, and which urged members to defend free speech and protect patrons’ privacy.[235]
They urged librarians to seek legal advice before complying with a search order and advised their members to only keeping records for as long as was legally needed.[236]
Consequently, reports started filtering in that librarians were shredding records to avoid having to comply with such orders.[237][238][239]
In 2005, Library Connection, a nonprofit consortium of 27 libraries in Connecticut, known as the Connecticut Four worked with the ACLU to lift a gag order for library records, challenging the government’s power under Section 505 to silence four citizens who wished to contribute to public debate on the PATRIOT Act. This case became known as Doe v. Gonzales. In May 2006, the government finally gave up its legal battle to maintain the gag order. In a summary of the actions of the Connecticut Four and their challenge to the USA PATRIOT Act, Jones (2009: 223) notes: “Librarians need to understand their country’s legal balance between the protection of freedom of expression and the protection of national security. Many librarians believe that the interests of national security, important as they are, have become an excuse for chilling the freedom to read.”[240]
Another controversial aspect of the USA PATRIOT Act is the immigration provisions that allow for the indefinite detention of any alien who the Attorney General believes may cause a terrorist act.[109] Before the USA PATRIOT Act was passed, Anita Ramasastry, an associate professor of law and a director of the Shidler Center for Law, Commerce, & Technology at the University of Washington School of Law in Seattle, Washington, accused the Act of depriving basic rights for immigrants to America, including legal permanent residents. She warned that “Indefinite detention upon secret evidence—which the USA PATRIOT Act allows—sounds more like Taliban justice than ours. Our claim that we are attempting to build an international coalition against terrorism will be severely undermined if we pass legislation allowing even citizens of our allies to be incarcerated without basic U.S. guarantees of fairness and justice.”[241] Many other parties have also been strongly critical of the provision. Russell Feingold, in a Senate floor statement, claimed that the provision “falls short of meeting even basic constitutional standards of due process and fairness [as it] continues to allow the Attorney General to detain persons based on mere suspicion”.[242] The University of California passed a resolution condemning (amongst other things) the indefinite detention provisions of the Act,[243] while the ACLU has accused the Act of giving the Attorney General “unprecedented new power to determine the fate of immigrants … Worse, if the foreigner does not have a country that will accept them, they can be detained indefinitely without trial.”[244]
Another controversial aspect of the USA PATRIOT Act is its effect on the privacy of Canadians living in the province of British Columbia (B.C.). British Columbia’s privacy commissioner raises concerns that the USA PATRIOT Act will allow the United States government to access Canadians’ private information, such as personal medical records, that are outsourced to American companies. Although the government of B.C. has taken measures to prevent United States authorities from obtaining information, the widespread powers of the USA PATRIOT Act could overcome legislation that is passed in Canada.[245] B.C. Privacy Commissioner David Loukidelis stated in a report on the consequences of the USA PATRIOT Act, “once information is sent across borders, it’s difficult, if not impossible, to control”.[246]
In an effort to maintain their privacy, British Columbia placed amendments on the Freedom of Information and Protection of Privacy Act (FOIPPA), which was enacted as law on October 21, 2004. These amendments aim to place more firm limitations on “storing, accessing, and disclosing of B.C. public sector data by service providers.”[247] These laws only pertain to public sector data and do not cover trans-border or private sector data in Canada. The public sector establishments include an estimated 2,000 “government ministries, hospitals, boards of health, universities and colleges, school boards, municipal governments and certain Crown corporations and agencies.”[247] In response to these laws, many companies are now specifically opting to host their sensitive data outside the United States.[248]
Legal action has been taken in Nova Scotia to protect the province from the USA PATRIOT Act’s data collecting methods. On November 15, 2007 the government of Nova Scotia passed a legislation aimed to protect Nova Scotians’ personal information from being brought forward by the USA PATRIOT Act. The act was entitled “The new Personal Information International Disclosure Protection Act”. The goal of the act is to establish requirements to protect personal information from being revealed, as well as punishments for failing to do so. Justice Minister Murray Scott stated, “This legislation will help ensure that Nova Scotians’ personal information will be protected. The act outlines the responsibilities of public bodies, municipalities and service providers and the consequences if these responsibilities are not fulfilled.”[216][249] In the 1980s, the Bank of Nova Scotia was the center of an early, pre-Internet data-access case that led to the disclosure of banking records.[citation needed]
After suspected abuses of the USA PATRIOT Act were brought to light in June 2013 with articles about collection of American call records by the NSA and thePRISM program (see 2013 mass surveillance disclosures), Representative Jim Sensenbrenner, Republican of Wisconsin, who introduced the Patriot Act in 2001, said that the National Security Agency overstepped its bounds.[250] He released a statement saying “While I believe the Patriot Act appropriately balanced national security concerns and civil rights, I have always worried about potential abuses.” He added: “Seizing phone records of millions of innocent people is excessive and un-American.”[250][251]
The ultimate goal of this provision is to protect people’s right to privacy and freedom from arbitrary governmental intrusions. Private intrusions not acting in the color of governmental authority are exempted from the Fourth Amendment.
A seizure of a person, within the meaning of the Fourth Amendment, occurs when the police’s conduct would communicate to a reasonable person, taking into account the circumstances surrounding the encounter, that the person is not free to ignore the police presence and leave at his will.
Two elements must be present to constitute a seizure of a person. First, there must be a show of authority by the police officer. Presence of handcuffs or weapons, the use of forceful language, and physical contact are each strong indicators of authority. Second, the person being seized must submit to the authority. An individual who ignores the officer’s request and walks away has not been seized for Fourth Amendmentpurposes.
An arrest warrant is preferred but not required to make a lawful arrest under the Fourth Amendment. Awarrantlessarrest may be justified where probable cause and urgent need are present prior to the arrest. Probable cause is present when the police officer has a reasonable belief in the guilt of the suspect based on the facts and information prior to the arrest. For instance, a warrantlessarrest may be legitimate in situations where a police officer has a probable belief that a suspect has either committed a crime or is a threat to the public security. Also, a police officer might arrest a suspect to prevent the suspect’s escape or to preserve evidence. A warrantlessarrest may be invalidated if the police officer fails to demonstrate exigent circumstances.
There are investigatory stops that fall short of arrests, but nonetheless, they fall within Fourth Amendment protection. For instance, police officers can perform a terry stop or a traffic stop. Usually, these stops provide officers with less dominion and controlling power and impose less of an infringement of personal liberty for individual stopped. Investigatory stops must be temporary questioning for limited purposes and conducted in a manner necessary to fulfill the purpose.
An officer’s reasonable suspicion is sufficient to justify brief stops and detentions. To determine if the officer has met the standard to justify the seizure, the court takes into account the totality of the circumstances and examines whether the officer has a particularized and reasonable belief for suspecting the wrongdoing. Probable cause gained during stops or detentions might effectuate a subsequent warrantlessarrest.
The warrant requirement may be excused in exigent circumstances if an officer has probable cause and obtaining a warrant is impractical. For instance, in State v. Helmbright 990 N.E.2d 154, Ohio court held that a warrantlesssearch of probationer’s person or place of residence complies with the Fourth Amendment if the officer who conducts the search possesses “reasonable grounds” to believe that the probationer has failed to comply with the terms of his probation.
There is no general exception to the Fourth Amendmentwarrant requirement in national security cases. Warrantlesssearches are generally not permitted in exclusively domestic security cases. In foreign security cases, court opinions might differ on whether to accept the foreign security exception to warrant requirement generally and, if accepted, whether the exception should include both physical searches and electronic surveillance.
In cases of warrantlesssearches and seizures, the court will try to balance the degree of intrusion on the individual’s right to privacy and the need to promote government interests and special needs. The court will examine the totality of the circumstances to determine if the search or seizure was justified. When analyzing the reasonableness standard, the court uses an objective assessment and considers factors including the degree of intrusion by the search or seizure and the manner in which the search or seizure is conducted. V. EXCLUSIONARY RULE
Under the exclusionary rule, any evidence obtained in violation of the Fourth Amendment will be excluded from criminal proceedings. There are a few exceptions to this rule.
VI. ELECTRONIC SURVEILLANCE
In recent years, the Fourth Amendment‘s applicability in electronic searches and seizures has received much attention from the courts. With the advent of the internet and increased popularity of computers, there has been an increasing amount of crime occurring electronically. Consequently, evidence of such crime can often be found on computers, hard drives, or other electronic devices. The Fourth Amendment applies to the search and seizure of electronic devices.
Many electronic search cases involve whether law enforcement can search a company-owned computer that an employee uses to conduct business. Although the case law is split, the majority holds that employees do not have a legitimate expectation of privacy with regard to information stored on a company-owned computer. In the 2010 case of City of Ontario v. Quon (08-1332), the Supreme Court extended this lack of an expectation of privacy to text messages sent and received on an employer-owned pager.
Following the September 11, 2001 attacks on the World Trade Center and the Pentagon, Congress and the President enacted legislation to strengthen the intelligence gathering community’s ability to combat domestic terrorism. Entitled the USA Patriot Act, the legislation’s provisions aimed to increase the ability of law enforcement to search email and telephonic communications in addition to medical, financial, and library records.
One provision permits law enforcement to obtain access to stored voicemails by obtaining a basic search warrant rather than a surveillance warrant. Obtaining a basic search warrant requires a much lower evidentiary showing. A highly controversial provision of the Act includes permission for law enforcement to use sneak-and-peak warrants. A sneak-and-peak warrant is a warrant in which law enforcement can delay notifying the property owner about the warrant’s issuance. In an Oregon federal district court case that drew national attention, Judge Ann Aiken struck down the use of sneak-and-peak warrants as unconstitutional and in violation of the Fourth Amendment. See 504 F.Supp.2d 1023 (D. Or. 2007).
The Patriot Act also expanded the practice of using National Security Letters (NSL). An NSL is an administrative subpoena that requires certain persons, groups, organizations, or companies to provide documents about certain persons. These documents typically involve telephone, email, and financial records. NSLs also carry a gag order, meaning the person or persons responsible for complying cannot mention the existence of the NSL. Under the Patriot Act provisions, law enforcement can use NSLs when investigating U.S. citizens, even when law enforcement does not think the individual under investigation has committed a crime. The Department of Homeland Security has used NSLs frequently since its inception. By using an NSL, an agency has no responsibility to first obtain a warrant or court order before conducting its search of records.
NSA Whistle-blower William Binney: The Future of FREEDOM
A 36-year veteran of America’s Intelligence Community, William Binney resigned from his position as Director for Global Communications Intelligence (COMINT) at the National Security Agency (NSA) and blew the whistle, after discovering that his efforts to protect the privacy and security of Americans were being undermined by those above him in the chain of command.
The NSA data-monitoring program which Binney and his team had developed — codenamed ThinThread — was being aimed not at foreign targets as intended, but at Americans (codenamed as Stellar Wind); destroying privacy here and around the world. Binney voices his call to action for the billions of individuals whose rights are currently being violated.
William Binney speaks out in this feature-length interview with Tragedy and Hope’s Richard Grove, focused on the topic of the ever-growing Surveillance State in America.
On January 22, 2015: (Berlin, Germany) – The Government Accountability Project (GAP) is proud to announce that retired NSA Technical Director and GAP client, William “Bill” Binney, will accept the Sam Adams Associates for Integrity in Intelligence Award today in Berlin, Germany. The award is presented annually by the Sam Adams Associates for Integrity in Intelligence (SAAII) to a professional who has taken a strong stand for ethics and integrity. http://whistleblower.org/press/nsa-wh…
NSA Whistle-blower: Everyone in US under virtual surveillance, all info stored, no matter the post
Former NSA Head Exposes Agency’s Real Crimes
Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All
“Where I see it going is toward a totalitarian state,” says William Binney. “You’ve got the NSA doing all this collecting of material on all of its citizens – that’s what the SS, the Gestapo, the Stasi, the KGB, and the NKVD did.”
Binney is talking about the collection of various forms of personal data on American citizens by the National Security Agency (NSA), where he worked for 30 years before quitting in 2001 from his high-placed post as technical leader for intelligence. A registered Republican for most of his life, Binney volunteered for military service during the Vietnam War, which led to his being hired by the NSA in the early ’70s.
In 2002 – long before the revelations of Edward Snowden rocked the world – Binney and several former colleagues went to Congress and the Department of Defense, asking that the NSA be investigated. Not only was the super-secretive agency wasting taxpayer dollars on ineffective programs, they argued, it was broadly violating constitutional guarantees to privacy and due process.
The government didn’t just turn a blind eye to the agency’s activities; it later accused the whistleblowers of leaking state secrets. A federal investigation of Binney – including an FBI search and seizure of his home and office computers that destroyed his consulting business – exonerated him on all charges.
“We are a clear example that [going through] the proper channels doesn’t work,” says Binney, who approves of Edward Snowden’s strategy of going straight to the media. At the same time, Binney criticizes Snowden’s leaking of documents not directly related to the NSA’s surveillance of American citizens and violation of constitutional rights. Binney believes that the NSA is vital to national security but has been become unmoored due to technological advances that vastly extend its capabilities and leadership that has no use for limits on government power. “They took that program designed [to prevent terrorist attacks] and used it to spy on American citizens and everyone else in the world,” flatly declares Binney (33:30).
Binney sat down with Reason TV’s Nick Gillespie to discuss “Trailblazer”, a data-collection program which was used on American citizens (1:00), why he thinks the NSA had the capability to stop the 9/11 attacks (7:00), his experience being raided by the FBI in 2007 (12:50), and why former President Gerald Ford, usually regarded as a hapless time-server, is one of his personal villians (41:25).
NSA Whistle-Blower Tells All: The Program | Op-Docs | The New York Times
William Binney: NSA had 9/11 foreknowledge
NSA Whistleblower Supports 9/11 Truth – William Binney and Richard Gage on GRTV
“The NSA Is Lying”: U.S. Government Has Copies of Most of Your Emails Says NSA Whistleblower
William Edward Binney[2] is a former highly placed intelligence official with the United States National Security Agency (NSA)[3] turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. He was a high-profile critic of his former employers during the George W. Bush administration.
Binney continues to speak out during Barack Obama‘s presidency about the NSA’s data collection policies, and continues interviews in the media regarding his experiences and his views on communication intercepts by governmental agencies of American citizens. In a legal case, Binney has testified in an affidavit that the NSA is in deliberate violation of the U.S. Constitution.
Biography
Binney grew up in rural Pennsylvania and graduated with a Bachelor of Science degree in mathematics from the Pennsylvania State University in 1970. He said that he volunteered for the Army during the Vietnam era in order to select work that would interest him rather than be drafted and have no input. He was found to have strong aptitudes for mathematics, analysis, and code-breaking,[4] and served four years from 1965–1969 at the Army Security Agency before going to the NSA in 1970. Binney was a Russia specialist and worked in the operations side of intelligence, starting as an analyst and ending as Technical Director prior to becoming a geopolitical world Technical Director. In the 1990s, he co-founded a unit on automating signals intelligence with NSA research chief Dr. John Taggart.[5] Binney’s NSA career culminated as Technical Leader for intelligence in 2001. Having expertise in intelligence analysis, traffic analysis, systems analysis, knowledge management, and mathematics (including set theory, number theory, and probability),[6] Binney has been described as one of the best analysts in the NSA’s history.[7] After retiring from the NSA he founded “Entity Mapping, LLC”, a private intelligence agency together with fellow NSA whistleblower J. Kirk Wiebe to market their analysis program to government agencies. NSA continued to retaliate against them, ultimately preventing them from getting work, or causing contracts they had secured to be terminated abruptly.[8]
Whistleblowing
Binney sitting in the offices ofDemocracy Now! in New York City, prior to appearing with hosts Amy Goodman, Juan Gonzalez, and guest Jacob Appelbaum. Photo taken byJacob Appelbaum.
In September 2002, he, along with J. Kirk Wiebe and Edward Loomis, asked the U.S. Defense Department to investigate the NSA for allegedly wasting “millions and millions of dollars” on Trailblazer, a system intended to analyze data carried on communications networks such as the Internet. Binney had been one of the inventors of an alternative system, ThinThread, which was shelved when Trailblazer was chosen instead. Binney has also been publicly critical of the NSA for spying on U.S. citizens, saying of its expanded surveillance after the September 11, 2001 attacks that “it’s better than anything that the KGB, the Stasi, or the Gestapo and SS ever had”[9] as well as noting Trailblazer’s ineffectiveness and unjustified high cost compared to the far less intrusive ThinThread.[10] He was furious that the NSA hadn’t uncovered the 9/11 plot and stated that intercepts it had collected but not analyzed likely would have garnered timely attention with his leaner more focused system.[7]
After he left the NSA in 2001, Binney was one of several people investigated as part of an inquiry into the 2005 New York Times exposé[11][12] on the agency’s warrantless eavesdropping program. Binney was cleared of wrongdoing after three interviews with FBI agents beginning in March 2007, but one morning in July 2007, a dozen agents armed with rifles appeared at his house, one of whom entered the bathroom and pointed his gun at Binney, still towelling off from a shower. In that raid, the FBI confiscated a desktop computer, disks, and personal and business records. The NSA revoked his security clearance, forcing him to close a business he ran with former colleagues at a loss of a reported $300,000 in annual income. In 2012, Binney and his co-plaintiffs went to federal court to get the items back. Binney spent more than $7,000 on legal fees.[13]
During interviews on Democracy Now! in April and May 2012[14] with elaboration in July 2012 at 2600’s hacker conference HOPE[4] and at DEF CON a couple weeks later,[15]Binney repeated estimates that the NSA (particularly its Stellar Wind project[16]) had intercepted 20 trillion communications “transactions” of Americans such as phone calls, emails, and other forms of data (but not including financial data). This includes most of the emails of US citizens. Binney disclosed in an affidavit for Jewel v. NSA[17] that the agency was “purposefully violating the Constitution”.[6] Binney also notes that he found out after retiring that the NSA was pursuing collect-it-all vs. targeted surveillance even before the 9/11 attacks.
Binney was invited as a witness by the NSA commission of the German Bundestag. On July 3, 2014 the Spiegel wrote, he said that the NSA wanted to have information about everything. In Binney’s view this is a totalitarian approach, which had previously been seen only in dictatorships.[18] Binney stated the goal was also to control people. Meanwhile, he said it is possible in principle to survey the whole population, abroad and in the US, which in his view contradicts the United States Constitution. In October 2001, shortly after the 9/11 attacks, the NSA began with its mass surveillance, he said. Therefore, he left the secret service shortly afterwards, after more than 30 years of employment. Binney mentioned that there were about 6000 analysts in the surveillance at NSA already during his tenure. According to him, everything changed after 9/11. The NSA used the attacks as a justification to start indiscriminate data collection. “This was a mistake. But they still do it”, he said. The secret service was saving the data as long as possible: “They do not discard anything. If they have anything they keep it.” Since then, the NSA has been saving collected data indefinitely. Binney said he deplored the NSA’s development of the past few years, to collect data not only on groups who are suspicious for criminal or terrorist activities. “We have moved away from the collection of these data to the collection of data of the 7 billion people on our planet.” Binney said he argued even then, to only pull relevant data from the cables. Access to the data was granted to departments of the government or the IRS.[18]
In August 2014 Binney was among the signatories of an open letter by the group Veteran Intelligence Professionals for Sanity to German chancellor Angela Merkel in which they urged the Chancellor to be suspicious of U.S. intelligence regarding the alleged invasion of Russia in Eastern Ukraine.[19][20]
“An especially meritorious contribution to the security or national interests of the United States, world peace, cultural or other significant public or private endeavors.”[1]
Status
Active
Statistics
Established
1960
First awarded
1960
Distinct
recipients
unknown; an average of fewer than 11 per year since 1993 [2]
Service ribbon of the Presidential Medal of Freedom
(left: Medal with Distinction)
The Presidential Medal of Freedom is an award bestowed by the President of the United States and is—along with the comparable Congressional Gold Medal, bestowed by an act of U.S. Congress—the highest civilian award of the United States. It recognizes those individuals who have made “an especially meritorious contribution to the security or national interests of the United States, world peace, cultural or other significant public or private endeavors”.[3] The award is not limited to U.S. citizens and, while it is a civilian award, it can also be awarded to military personnel and worn on the uniform.
It was established in 1963 and replaced the earlier Medal of Freedom that was established by President Harry S. Truman in 1945 to honor civilian service duringWorld War II.
History of the award
Similar in name to the Medal of Freedom,[3] but much closer in meaning and precedence to the Medal for Merit: the Presidential Medal of Freedom is currently the supreme civilian decoration in precedence, whereas the Medal of Freedom was inferior in precedence to the Medal for Merit; the Medal of Freedom was awarded by any of three Cabinet secretaries, whereas the Medal for Merit was awarded by the president, as is the Presidential Medal of Freedom. Another measure of the difference between these two similarly named but very distinct awards is their per-capita frequency of award: from 1946 to 1961 the average annual incidence of award of the Medal of Freedom was approximately 1 per every 86,500 adult U.S. citizens; from 1996 to 2011 the average annual incidence of award of the Presidential Medal of Freedom was approximately 1 per every 20,500,000 adult U.S. citizens (so on an annualized per capita basis, 240 Medals of Freedom have been awarded per one Presidential Medal of Freedom).[2][4]
President John F. Kennedy established the current decoration in 1963 through Executive Order11085, with unique and distinctive insignia, vastly expanded purpose, and far higher prestige.[1] It was the first U.S. civilian neck decoration and, in the grade of Awarded With Distinction, is the only U.S. sash and star decoration (the Chief Commander degree of the Legion of Merit – which may only be awarded to foreign heads of state – is a star decoration, but without a sash). The Executive Order calls for the medal to be awarded annually on or around July 4, and at other convenient times as chosen by the president,[5] but it has not been awarded every year (e.g., 2001, 2010). Recipients are selected by the president, either on his own initiative or based on recommendations. The order establishing the medal also expanded the size and the responsibilities of the Distinguished Civilian Service Awards Board so it could serve as a major source of such recommendations.
Medal andaccoutrementsincluding undress ribbon, miniature, and lapel badge.
Graphical representation of the Presidential Medal of Freedom with Distinction
The badge of the Presidential Medal of Freedom is in the form of a golden star with white enamel, with a red enamel pentagon behind it; the central disc bears thirteen gold stars on a blue enamel background (taken from the Great Seal of the United States) within a golden ring. Golden American bald eagles with spread wings stand between the points of the star. It is worn around the neck on a blue ribbon with white edge stripes.
A special grade of the medal, known as the Presidential Medal of Freedom with Distinction,[6] has a larger execution of the same medal design worn as a star on the left chest along with a sash over the right shoulder (similar to how the insignia of a Grand Cross is worn), with its rosette (blue with white edge, bearing the central disc of the medal at its center) resting on the left hip. When the medal With Distinction is awarded, the star may be presented depending from a neck ribbon and can be identified by its larger size than the standard medal (compare size of medals in pictures below; President Reagan’s was awarded With Distinction).
Both medals may also be worn in miniature form on a ribbon on the left chest, with a silver American bald eagle with spread wings on the ribbon, or a golden American bald eagle for a medal awarded With Distinction. In addition, the medal is accompanied by a service ribbon for wear on military service uniform, a miniature medal pendant for wear on mess dress or civilian formal wear, and a lapel badge for wear on civilian clothes (all shown in the accompanying photograph of the full presentation set).
Gordon B. Hinckleyreceiving the Presidential Medal of Freedom from George W. Bush in 2004
Chita Rivera with President Barack Obamaprior to receiving the Presidential Medal of Freedom, August 2009
President Barack Obama talks with Stephen Hawking in the Blue Room of the White House before a ceremony presenting him and 15 others the Presidential Medal of Freedom, August 12, 2009.
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
Published on Dec 30, 2013
Through a PRISM, Darkly
Everything we know about NSA spying
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.
Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english
Glenn Becks “SURVEILLANCE STATE”
Inside the NSA
Ed Snowden, NSA, and Fairy Tales
AT&T Spying On Internet Traffic
For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”
NSA Whistle-Blower Tells All – Op-Docs: The Program
The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
He told you so: Bill Binney talks NSA leaks
William Benny – The Government is Profiling You (The NSA is Spying on You)
‘After 9/11 NSA had secret deal with White House’
The story of Whistleblower Thomas Drake
Whistleblowers, Part Two: Thomas Drake
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
Meet Edward Snowden: NSA PRISM Whistleblower
The Truth About Edward Snowden
N.S.A. Spying: Why Does It Matter?
Inside The NSA~Americas Cyber Secrets
NSA Whistleblower Exposes Obama’s Dragnet
AT&T whistleblower against immunity for Bush spy program-1/2
AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program
The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.
AT&T whistleblower against immunity for Bush spy program-2/2
Enemy Of The State 1998 (1080p) (Full movie)
Background Articles and Videos
Stellar Wind
Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]
The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]
There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]
During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]
In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.
PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1]PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.
A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]
According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]
History
Slide showing that much of the world’s communications flow through the US
Details of information collected via PRISM
PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]
PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]
The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]
According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]
Response from companies
The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]
Initial Public Statements
Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]
Slide listing companies and the date that PRISM collection began
Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]
In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13]The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]
“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]
Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]
On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]
The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]
While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]
Post-PRISM Transparency Reports
In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.
On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000” user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]
Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]
Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]
Response from United States government
Executive branch
Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]
Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]
On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]
The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]
The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]
In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]
Legislative branch
In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:
Senator John McCain (R-AZ)
June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]
Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee
June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]
Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee
June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]
Representative John Boehner (R-OH), Speaker of the House of Representatives
June 11 “He’s a traitor”[50] (referring to Edward Snowden)
Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act
June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]
Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.
June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]
Senator Mark Udall (D-CO)
June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]
Representative Todd Rokita (R-IN)
June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]
Senator Rand Paul (R-KY)
June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]
Representative Luis Gutierrez (D-IL)
June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]
Judicial branch
The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.
Applicable law and practice
On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]
After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.
If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]
If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]
Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]
The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]
Involvement of other countries
Australia
The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]
Canada
Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]
Germany
Germany did not receive any raw PRISM data, according to a Reuters report.[59]
Israel
Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.
New Zealand
In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]
United Kingdom
In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]
Domestic response
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)
The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]
Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]
In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]
In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]
The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]
On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]
International response
Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]
Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]
Protests at Checkpoint Charlie in Berlin
The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]
The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]
William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]
Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]
Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]
Russia has offered to consider an asylum request from Edward Snowden.[91]
Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]
A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]
A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]
ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.
ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]
Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.
NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.
The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]
Background
Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]
In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]
Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]
The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]
In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]
In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]
The new project replacing Trailblazer is called Turbulence.[3]
Whistleblowing
According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]
In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]
Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]
In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]
In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]
In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]
In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.
In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]
In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]
Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.
Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]
History
Slide showing that much of the world’s communications flow through the US.
Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]
NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]
Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]
Technology
According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]
Legality and FISA Amendments Act of 2008
The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]
The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]
Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]
ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]
ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]
The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:
the Government Communications Headquarters of the United Kingdom,
the National Security Agency of the United States,
the Communications Security Establishment of Canada,
the Defence Signals Directorate of Australia, and
the Government Communications Security Bureau of New Zealand.
the National SIGINT Organisation (NSO) of The Netherlands
The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]
Capabilities
The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]
The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]
One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]
Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]
Controversy
See also: Industrial espionage
Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]
Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.
Hardware
According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]
Name
The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).
Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]
Ground stations
The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:
Likely satellite intercept stations
The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:
Hong Kong (since closed)
Australian Defence Satellite Communications Station (Geraldton, Western Australia)
Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
Misawa Air Base (Japan) Map
GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
Sugar Grove (West Virginia, U.S.) Map
Yakima Training Center (Washington, U.S.) Map
GCSB Waihopai (New Zealand)
GCSB Tangimoana (New Zealand)
CFS Leitrim (Ontario, Canada)
Teufelsberg (Berlin, Germany) (closed 1992)
Other potentially related stations
The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:
Ayios Nikolaos (Cyprus – U.K.)
BadAibling Station (BadAibling, Germany – U.S.)
relocated to Griesheim in 2004[19]
deactivated in 2008[20]
Buckley Air Force Base (Aurora, Colorado)
Fort Gordon (Georgia, U.S.)
Gander (Newfoundland & Labrador, Canada)
Guam (Pacific Ocean, U.S.)
Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
Lackland Air Force Base, Medina Annex (San Antonio, Texas)
Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]
Description
Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]
The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]
The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.
Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.
Lawsuit
Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]
More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.
PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States
Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security.[7] The data mostly comes from the NSA, FBI, CIA, as well as other government sources.[7]
Carnivore: A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Apparently replaced by commercial software such as NarusInsight
Intelligence Community (IC): A cooperative federation of 16 government agencies working together, but also separately, to gather intelligence and conduct espionage
Neal Stephenson Discusses Why His Novels Haven’t Been Made Into Movies
Neal Stephenson – “We Are All Geeks Now.”
Neal Stephenson on Anathem: The genesis of the novel and its main ideas
Neal Stephenson Creates a New Language for ANATHEM
Authors@Google: Neal Stephenson
Authors Neal Stephenson visits Google’s Headquarters in Mountain View, Ca, to discuss his book “Anathem”. This event took place September 12, 2008, as part of the Authors@google series. For more info, please visit http://www.nealstephenson.com/
Anathem, the latest invention by the New York Times bestselling author of Cryptonomicon and The Baroque Cycle, is a magnificent creation: a work of great scope, intelligence, and imagination that ushers readers into a recognizable—yet strangely inverted—world.
Fraa Erasmas is a young avout living in the Concent of Saunt Edhar, a sanctuary for mathematicians, scientists, and philosophers, protected from the corrupting influences of the outside “saecular” world by ancient stone, honored traditions, and complex rituals. Over the centuries, cities and governments have risen and fallen beyond the concent’s walls. Three times during history’s darkest epochs violence born of superstition and ignorance has invaded and devastated the cloistered mathic community. Yet the avout have always managed to adapt in the wake of catastrophe, becoming out of necessity even more austere and less dependent on technology and material things. And Erasmas has no fear of the outside—the Extramuros—for the last of the terrible times was long, long ago.
Neal Stephenson is the author of seven previous novels. He lives in Seattle, Washington.
Neal Stephenson interview – Reamde
Solve for X: Neal Stephenson on getting big stuff done
Neal Stephenson: 2011 National Book Festival
2012 10 18 LTA Bookclub Neal StephensonHQ
Black Hat USA 2012 – An Interview with Neal Stephenson
Neal Stephenson, Author – Turing Festival 2013 Keynote
ASTC 2013 Keynote – A Conversation with Neal Stephenson
Stephenson studied at Boston University,[2] first specializing in physics, then switching to geography after he found that it would allow him to spend more time on the university mainframe.[3] He graduated in 1981 with a B.A. in geography and a minor in physics.[2] Since 1984, Stephenson has lived mostly in the Pacific Northwest and currently resides in Seattle with his family.[2]
Stephenson’s first novel, The Big U, published in 1984, was a satirical take on life at American Megaversity, a vast, bland and alienating research university beset by chaotic riots.[4][5] His next novel, Zodiac (1988), was a thriller following the exploits of a radical environmentalist protagonist in his struggle against corporate polluters.[4] Neither novel attracted much critical attention on first publication, but showcased concerns that Stephenson would further develop in his later work.[4]The Big U went out of print until 2001, when Stephenson allowed it to be republished after realizing that this book that he considered inferior to his others was being sold at inflated prices for used copies because of its scarcity and collectors’ value.[citation needed]
Stephenson’s breakthrough came in 1992 with Snow Crash,[5] a comic [6] novel in the late cyberpunk or post-cyberpunk tradition fusing memetics, computer viruses, and other high-tech themes with Sumerian mythology, along with a sociological extrapolation of laissez-faire capitalism and collectivism. Snow Crash can be considered to be the first expression of Stephenson’s mature style. Stephenson at this time would later be described by Mike Godwin as “a slight, unassuming grad-student type whose soft-spoken demeanor gave no obvious indication that he had written the manic apotheosis of cyberpunk science fiction.”[7] In 1994, Stephenson joined with his uncle, J. Frederick George, to publish a political thriller, Interface, under the pen name “Stephen Bury”;[8] they followed this in 1996 with The Cobweb.
Stephenson’s next solo novel, published in 1995, was The Diamond Age: or A Young Lady’s Illustrated Primer, which introduced many of today’s real world technological discoveries. Seen back then as futuristic, Stephenson’s novel has broad range universal self-learning nanotechnology, dynabooks, extensive modern technologies, robotics, cybernetics and cyber cities. Weapons implanted in characters’ skulls, near limitless replicators for everything from mattresses to foods, smartpaper, air and blood-sanitizing nanobots, set in a grim future world of limited resources populated by hard edged survivalists, an amalgamation hero is accidentally conceptualized by a few powerful and wealthy creatives, programmers and hackers.
This was followed by Cryptonomicon in 1999, a novel concerned with concepts ranging from computing and Alan Turing‘s research into codebreaking and cryptography during the Second World War at Bletchley Park, to a modern attempt to set up a data haven. It has subsequently been reissued in three separate volumes in some countries, including in French and Spanish translations. In 2013, Cryptonomicon won thePrometheus Hall of Fame Award.
The Baroque Cycle, Stephenson’s next novel, is a series of long historical novels set in the 17th and 18th centuries, and is in some respects a prequel to Cryptonomicon. It was originally published in three volumes of two or three books each – Quicksilver (2003), The Confusion (2004) and The System of the World (2004) – but was subsequently republished as eight separate books: Quicksilver, King of the Vagabonds, Odalisque,Bonanza, Juncto, Solomon’s Gold, Currency, and System of the World. (The titles and exact breakdown varies in different markets.) The System of the World won the Prometheus Award in 2005.
Following this, Stephenson published a novel titled Anathem (2008), a very long and detailed work, perhaps best described as speculative fiction. It is set in an Earthlike world (perhaps in an alternative reality), deals with metaphysics, and refers heavily to Ancient Greek philosophy, while at the same time being a complex commentary on the insubstantiality of today’s society.
In May 2010, the Subutai Corporation, of which Stephenson was named chairman, announced the production of an experimental multimedia fiction project called The Mongoliad, which centered around a narrative written by Stephenson and other speculative fiction authors.[9][10]
REAMDE, a novel, was released on September 20, 2011.[11] The title is a play on the common filename README. This thriller, set in the present, centers around a group of MMORPG developers caught in the middle of Chinese cyber-criminals, Islamic terrorists, and Russian mafia.[12]
On August 7, 2012, Stephenson released a collection of essays and other previously published fiction entitled Some Remarks : Essays and Other Writing.[13] This collection also includes a new essay and a short story created specifically for this volume.
In 2012 Stephenson launched a Kickstarter campaign for CLANG, a realistic swordfighting fantasy game. The game uses motion control to provide an immersive experience. The game will contain a distinctive world and plotline. The campaign’s funding goal of $500,000 was reached by the target date of July 9, 2012 on Kickstarter, but funding options remained open and were still taking contributions to the project on their official site.[14] The project ran out of money in September 2013.[15] This, and the circumstances around it, has angered some backers.[16] There has even been talk, among the backers, of a potential class action lawsuit.[17] The project to develop the game ended in September 2014 without the game being completed. Stephenson took part of the responsibility for the project’s failure, stating that “I probably focused too much on historical accuracy and not enough on making it sufficiently fun to attract additional investment”.[18]
In late 2013, Stephenson claimed to be working on a multi-volume work, historical novels that would “have a lot to do with scientific and technological themes and how those interact with the characters and civilisation during a particular span of history”. He expected the first two volumes to be released in mid-to-late 2014.[19] However, at about the same time, he shifted his attention to a science fiction novel, Seveneves, which was completed about a year later and will be published in May of 2015.[20]
In 2014, Stephenson was hired as Chief Futurist[21] by the Florida-based company Magic Leap. Magic Leap claims to be developing a revolutionary form of augmented reality, not too different from technologies Stephenson previously has described in his science fiction books.
Non-fiction
The science fiction approach doesn’t mean it’s always about the future;
it’s an awareness that this is different.
Stephenson has also written non-fiction. In The Beginning Was The Command Line, an essay on operating systems including the histories of and relationships between DOS, Windows, Linux, and BeOS from both cultural and technical viewpoints and focusing especially on the development of the Graphical User Interface, was published in book form in 2000.[5] Various other essays have been published in magazines such as Wired.
With the 2003 publication of Quicksilver, Applied Minds debuted The Metaweb, an online wiki annotating the ideas and historical period explored in the novel. The project was influenced by the online encyclopaedia Wikipedia, and its content included annotations from Stephenson himself.[23]
Style
In his earlier novels Stephenson deals heavily in pop culture-laden metaphors and imagery and in quick, hip dialogue, as well as in extended narrative monologues. The tone of his books is generally more irreverent and less serious than that of previous cyberpunk novels, notably those of William Gibson.
Stephenson at the Starship Century Symposium at UCSD in 2013
Stephenson’s books tend to have elaborate, inventive plots drawing on numerous technological and sociological ideas at the same time. This distinguishes him from other mainstream science fiction authors who tend to focus on a few technological or social changes in isolation from others. The discursive nature of his writing, together with significant plot and character complexity and an abundance of detail suggests a baroque writing style, which Stephenson brought fully to bear in the three-volume Baroque Cycle.[24] His book The Diamond Age follows a simpler plot but features “neo-Victorian” characters and employs Victorian-era literary conceits. In keeping with the baroque style, Stephenson’s books have become longer as he has gained recognition. For example, the paperback editions of Cryptonomicon are over eleven hundred pages long[25]with the novel containing various digressions, including a lengthy erotic story about antique furniture and stockings.
“Crunch” (1997), in Disco 2000 (edited by Sarah Champion, 1998) (“Crunch” is a chapter from Cryptonomicon)
Other fiction projects
Project Hieroglyph, founded in 2011, administered by Arizona State University’s Center for Science and the Imagination since 2012. Hieroglyph: Stories and Visions for a Better Future, ed. Ed Finn and Kathryn Cramer, which includes contributions by Stephenson, was published by William Morrow in September, 2014.
“In the Kingdom of Mao Bell“. Wired. 1994. “A billion Chinese are using new technology to create the fastest growing economy on the planet. But while the information wants to be free, do they?”
“Mother Earth Mother Board“. Wired. 1996. “In which the Hacker Tourist ventures forth across three continents, telling the story of the business and technology of undersea fiber-optic cables, as well as an account of the laying of the longest wire on Earth.”
“It’s All Geek To Me“. Op-Ed piece on the film 300 and geek culture, The New York Times, March 18, 2007.
“Atoms of Cognition: Metaphysics in the Royal Society 1715–2010,” chapter in Seeing Further: The Story of Science and the Royal Society, edited by Bill Bryson. Stephenson discusses the legacy of the rivalry between Sir Isaac Newton and Gottfried Leibniz, November 2, 2010.
“Space Stasis“. Slate. February 2, 2011. “What the strange persistence of rockets can teach us about innovation.”
Jump up^“Neal Stephenson – Biography”. ElectricInca.com. Retrieved August 7, 2010. He began his higher education as a physics major, then switched to geography when it appeared that this would enable him to scam more free time on his university’s mainframe computer.
^ Jump up to:abcBooker, M Keith; Thomas, Anne-Marie, eds. (2009). “Neal Stephenson (1959–)”. The Science Fiction Handbook. Chichester, UK ; Malden, MA: Wiley-Blackwell. p. 173. ISBN1-4051-6205-8. OCLC263498124.
^ Jump up to:abcGrassian, Daniel (2003). “From modernists to Gen Xers”. Hybrid fictions: American fiction and Generation X. Jefferson: McFarland & Co. pp. 29–30. ISBN978-0-7864-1632-5. OCLC52565833.
Interface is a near-future thriller, set in 1996, in which a shadowy coalition bent on controlling the world economy attempts to manipulate a candidate for president of the United States through the use of a computer bio-chip implanted in his brain.
In 2007, it was described by writer Cory Doctorow as an “underappreciated masterpiece”.[2]
Plot summary
The novel opens with the governor of Illinois, William Cozzano, suffering a stroke, and in a separate subplot, a trailer park inhabitant, unemployed African-American, Eleanor Richmond, discovering her husband dead after having committed suicide in their repossessed former home.
As events progress, an underground business coalition, the Network, is arranging for Cozzano to have a biochip implanted and for him to run for President of the United States. The Network is made up of a number of large fictional companies, with parallels in real business entities.
Eleanor Richmond, after publicly attacking a local cable TVPublic-access television talk show personality who was running for Senate, has since found herself working in the offices of a RepublicanColorado senator, and after an event where she accused the citizens of Colorado of being welfare queens, finds herself in the public eye as one of the candidates for Cozzano’s running mate.
The Network’s ability to perceive public opinion, skewed on the night of the vice presidential debate by a twist of fate, makes them select Richmond as vice presidential candidate, and a canny act of public relations work rescues Cozzano’s campaign, getting him elected as President.
However, Cozzano gets shot at his inauguration by a psychotic former factory worker who has somehow figured out the Network’s plans almost entirely, killing him almost instantly. Richmond ends up as the first black and first female President of the United States.
Story 1: Historic Progressive Politicians and Media Snow Job — Man-Made Computer Model Consensus Weather Forecast Busted — Never Mind — Dallas Hits 75 Degrees — Blame It On Global Warming — Give Me A Break — It Is Called Winter, Stupid — Both Weather and Climates Change — Videos
Gilda Radner Miss Emily Litella
The Global Warming Hoax Explained for Dummies
ManBearPig, Climategate and Watermelons: A conversation with author James Delingpole
The World Weather Forecast
National Weather Service apologizes for blizzard forecast miss
Brenda Lee – I’m Sorry
“I’m Sorry”
I’m sorry, so sorry
That I was such a fool
I didn’t know
Love could be so cruel
Oh-oh-oh-oh-oh-oh-oh-yesYou tell me mistakes
Are part of being young
But that don’t right
The wrong that’s been done(I’m sorry) I’m sorry
(So sorry) So sorry
Please accept my apology
But love is blind
And I was too blind toseeOh-oh-oh-oh-oh-oh-oh-yesYou tell me mistakes
Are part of being young
But that don’t right
The wrong that’s been done
Oh-oh-oh-oh-oh-oh-oh-yesI’m sorry, so sorry
Please accept my apology
But love was blind
And I was too blind to see(Sorry)
Winter Storm Juno How US reported blizzard
New York snow: Winter Storm Juno downgraded as ‘one of the largest snowstorms
Winter Storm JUNO 2015 : Blizzard for Historic New York City – RAW VIDEO Compilation
New York blizzard: Winter snow storm ‘Juno’ hits US East Coast, in pictures
A huge snowstorm has slammed into northeastern US, shutting down public transport, cancelling thousands of flights and leaving roads and streets deserted as snow blanketed an area that’s home to tens of millions of people. Authorities ordered drivers off the streets in New York and other cities like Boston in the face of a storm that forecasters warned could reach historic proportions, dumping up to three feet (up to a metre) of snow in some areas
Winter storm looms with record level snow threat; 7,700 flights canceled
Seven states on the Northeast are in watch mode as a potentially record-setting storm is churning up the coast, threatening to dump up to 3 feet of snow in parts and paralyze the region from Philadelphia to Maine.
More than 7,700 flights for Monday and Tuesday have been canceled as of Monday evening, with Boston’s Logan Airport and Providence’s T.F. Green Airport closed outright. Delays and the knock-on effects of stranded planes and lost connections will start hitting the entire nation’s air-travel system Tuesday.
Winter Storm Juno: Blizzard Warnings for New York City, Boston, Parts of 7 States; Potentially Historic Northeast Snowstorm Ahead
Millions of people in the Northeast are bracing for Winter Storm Juno, which threatens to become a major snowstorm Monday through Wednesday with the potential for blizzard conditions and more than 2 feet of snow.
The high confidence in forecast wind and snowfall led the National Weather Service to issue blizzard warnings well in advance of the storm. As of late Sunday evening, those warnings were posted from the New Jersey shore all the way to Downeast Maine, including the cities of New York City, Boston, Providence, Hartford and Portland. The warnings were scheduled to go into full force as early as noon Monday along the Jersey Shore. The aforementioned stretch of Northeast coast will be fully under blizzard warnings by sunrise Tuesday, unless some are downgraded before then. Most of the warnings are set to run through late Tuesday night.
Winter Storm Juno: A Pummeling for the History Books
The East Coast already looks like a snow globe thanks to winter storm Juno, but the worst is yet to come.
NYC Mayor Bill de Blasio said at a press conference Sunday, “This could be the biggest snowstorm in the history of this city.” The National Weather Service (NWS) and Weather Channel meteorologist Chris Dolce have both said the impending storm is “potentially historic.” So, what does historic mean, and how strong is this “potentially”? It depends on your definition, but this storm could be one for the record books, and not just in the highest-3 point-shooting-percentage-in-the-third-quarter-with-two-bench-players-on-the-court-on-a-Tuesday type of statistic.
Based on a new experimental forecast from the NWS, as of Monday morning there is an 80 percent chance that NYC will receive at least 12” of snow. Since record keeping in Central Park began in 1869, there have been 35 events exceeding a foot of snow, so 12″ wouldn’t be a big record. But there is a 62 percent chance for at least 18” of snow, and there have only been 11 events reaching that marker. Despite the seeming endlessness of last year’s winter, only one event (on February 13th and 14th) made the 12”+ snow event list for New York City. New York has only seen snowfall totals above two feet twice, first in December 1947 and more recently in February 2006.
To be recorded in official weather history, what matters most for NYC is the official snowfall in Central Park. This is where the longest period of record is for the city, so it’s what is used for most of the statistics on weather events. While the NWS is calling for 20-30″ in most areas around NYC, local bands of snow will likely cause several more inches in some places. Scientists have difficulty predicting where these bands will occur, but whether such a band forms over Central Park could be the difference between a nuisance-maker and a history-making nuisance.
Blizzard 2015 New York City, Brooklyn, Historic Northeast Blizzard
CNN’s Anderson Cooper looks at some of the biggest nor’easters to hit the East Coast.
Tens of millions of people in the Northeast hunkered down on Monday for a historic blizzard that was expected to drop more than 2 feet of snow, whipped around by winds approaching hurricane..
Blizzard 2015 Airports Begin to Close as Historic Northeast Blizzard NearsBLIZZARD ’15: THE LATEST Nearly 7000 flights have been cancelled. Amtrak has suspended Tuesday service between New.
Tens of millions of people in the Northeast hunkered down on Monday for a historic blizzard that was expected to drop more than 2 feet of snow, whipped around by winds approaching hurricane.
Meteorology 101 – UniversalClass Online Course
Jamie Cullum – What A Difference A Day Made
Dinah Washington ‘Difference-complete TV segment
Dinah Washington singing here with the Louis Jordan Band. This is the complete TV Show segment with Dinah singing ‘What A Difference A Day Made’ and ‘Making Whopee’. Louis and Ronald Reagan make the announcements and I love the way Louis calls him ‘Ronnie’! The show was dated March 8th 1960.
Gilda Radner – LIVE FROM NEW YORK!
Storm Fails To Live Up To Predictions In Some Areas As National Weather Service Meteorologist Apologizes
A howling blizzard with wind gusts over 70 mph heaped snow on Boston along with other stretches of lower New England and Long Island on Tuesday but failed to live up to the hype in Philadelphia and New York City, where buses and subways started rolling again in the morning.
Gary Szatkowski, meteorologist-in-charge at the National Weather Service in Mt. Holly, New Jersey, apologized on Twitter for the snow totals being cut back.
“My deepest apologies to many key decision makers and so many members of the general public,” Szatkowski tweeted. “You made a lot of tough decisions expecting us to get it right, and we didn’t. Once again, I’m sorry.”
Jim Bunker at the agency’s Mount Holly office said forecasters will take a closer look at how they handled the storm and “see what we can do better next time.”
In New England, the storm that arrived Monday evening was a bitter, paralyzing blast, while in the New York metro area, it was a bust that left forecasters apologizing and politicians defending their near-total shutdown on travel. Some residents grumbled, but others sounded a better-safe-than-sorry note and even expressed sympathy for the weatherman.
At least 2 feet of snow was expected in most of Massachusetts, potentially making it one of the top snowstorms of all time. The National Weather Service said a 78 mph gust was reported on Nantucket, and a 72 mph one on Martha’s Vineyard.
“It felt like sand hitting you in the face,” Bob Paglia said after walking his dog four times overnight in Whitman, a small town about 20 miles south of Boston.
Maureen Keller, who works at Gurney’s, an oceanfront resort in Montauk, New York, on the tip of Long Island, said: “It feels like a hurricane with snow.”
As of midmorning, the Boston area had 1½ feet of snow, while the far eastern tip of Long Island had more than 2 feet. Snowplows around New England struggled to keep up.
“At 4 o’clock this morning, it was the worst I’ve ever seen it,” said Larry Messier, a snowplow operator in Columbia, Connecticut. “You could plow, and then five minutes later you’d have to plow again.”
In Boston, police drove several dozen doctors and nurses to work at hospitals. Snow blanketed Boston Common, and drifts piled up against historic Faneuil Hall, where Samuel Adams and the Sons of Liberty stoked the fires of rebellion. Adjacent Quincy Market, usually bustling with tourists, was populated only by a few city workers clearing snow from the cobblestones.
As the storm pushed into the Northeast on Monday, the region came to a near standstill, alarmed by forecasters’ dire predictions. More than 7,700 flights were canceled, and schools, businesses and government offices closed.
But as the storm pushed northward, it tracked farther east than forecasters had been expecting, and conditions improved quickly in its wake. By midmorning Tuesday, New Jersey and New York City lifted driving bans, and subways and trains started rolling again, with a return to a full schedule expected Wednesday.
While Philadelphia, New York and New Jersey had braced for a foot or two of snow from what forecasters warned could be a storm of potentially historic proportions, they got far less than that. New York City received about 8 inches, Philadelphia a mere inch or so. New Jersey got up to 8 inches.
New Jersey Gov. Chris Christie defended his statewide ban on travel as “absolutely the right decision to make” in light of the dire forecast.
And New York Gov. Andrew Cuomo, who drew criticism last fall after suggesting meteorologists hadn’t foreseen the severity of an epic snowstorm in Buffalo, said this time: “Weather forecasters do the best they can, and we respond based to the best information that we have.”
In New York City, Susanne Payot, a cabaret singer whose rehearsal Tuesday was canceled, said the meager snowfall left her bemused: “This is nothing. I don’t understand why the whole city shut down because of this.”
Brandon Bhajan, a security guard at a New York City building, said he didn’t think officials had overreacted.
“I think it’s like the situation with Ebola … if you over-cover, people are ready and prepared, rather than not giving it the attention it needs,” he said
National Weather Service to evaluate work after missed call
A National Weather Service official says the agency will evaluate its storm modeling after a storm that was predicted to dump a foot or more of snow on many parts of New Jersey and the Philadelphia region delivered far less than that.
“You made a lot of tough decisions expecting us to get it right, and we didn’t. Once again, I’m sorry,” said meteorologist Gary Szatkowski of the NWS.
Jim Bunker, who leads the weather service’s observing program in the Mount Holly office, says the storm tracked a bit to the east of what forecasting models predicted.
Parts of Long Island and New England are getting slammed. But many parts of New Jersey received less than 4 inches.
Bunker says the agency will evaluate what happened to see how it can do better in the future.
Blame De Blasio and Cuomo and Christie for the Blizzard Snow Job
As politicians rushed to out-serious each other, New Yorkers were whipped into a fear frenzy.
Every modern event has a hashtag and this morning, as New York City takes stock of the #snowmageddon2015 that wasn’t, it’s turning to #snowperbole.
On Monday, as Governor Cuomo, Governor Christie, and Mayor de Blasio rushed to out-serious each other, New Yorkers were whipped into a fear frenzy. Supermarket shelves were stripped bare, photos of Whole Foods depleted of kale circulated, and people stocked up for what would likely be days (maybe weeks!) indoors.
Even as we were doing it, we acknowledged it didn’t make much sense. After all, we’re in New York City. Bodegas never close. Delivery guys on bicycles have been a constant through all previous winter storms. All New Yorkers have their stories. That time we ordered Chinese Food during the snowstorm of 1994. Swimming on Brighton Beach during Hurricane Gloria. Buying Poptarts at the corner bodega during Sandy. Driving from Manhattan to Brooklyn and back again during the blackout of 2003. Yes, those are all mine.
BLIZZARD 2015: HOW NEW YORKERS AND NEW ENGLANDERS SHARED PHOTOS
As we waited for the storm deemed “historic,” the only real history was made when the subway shut down for the first time ever in preparation for snow. The real insult came when it was reported later that the trains were indeed still running, empty, as trains needed to keep moving to clear the tracks. Citibike was shut down. Cars were banned from the roads and anyone who didn’t take heed risked being fined.
These are all symptoms of our infantilizing “do something!” culture. Everyone understands the pressure politicians feel to be seen as proactive. But this time they went way too far in the name of protecting us. It’s one thing to warn drivers that conditions are dangerous and that they go out at their own risk. It’s another to shut down all roads in the city that allegedly never sleeps.
The 11 p.m. curfew resulted in lost wages for delivery people who count on larger-than-usual tips during inclement weather. Why couldn’t they make their own decisions about working during the snow? Not everyone makes a salary the way our mayor and governor do. Many workers count on their hourly wage, and their tips, to make their rent each month.
The storm was a dud, but even if had been as severe as predicted, bringing a city like New York to a preemptive standstill makes little sense. The people who keep New York humming take the subway after 11pm and can decide for themselves whether to keep their businesses open. Preparedness doesn’t have to mean panic.
CISPA’s return? Obama seeks access to civilian communication info
Politician Uses Sony Hack Hysteria to Reintroduce CISPA – The Know
CISPA IS BACK (AGAIN) 2015
Published on Jan 15, 2015
Despite numerous defeats, CISPA is making the comeback already in 2015. This bill has been introduced as bill H.R.234 — 114th Congress (2015-2016). While experts think it is unlikely the bill will pass into the law, that is no reason not to voice your concerns. One major difference now is that the White House is no longer threatening to veto CISPA and instead is backing it. This is very troublesome and we must act now before it is too late.
For those unfamiliar with CISPA, it essentially allows all companies to share your private data with the government, other private companies, and essentially anyone they want. Companies are given financial incentives to do so and they are exempt from all prosecution for violating both your rights and privacy. This essentially makes every Privacy Policy for any private company null and void. Touted as a weapon to secure our nation from cyber threats, CISPA does nothing to protect against them and serves only to further the reach of the surveillance state we live in. It is for this reason we must remain ever vigilant and strike down every SOPA, CISPA, ACTA, or any other incarnations that threaten our civil liberties and our free and open internet.
Glenn Greenwald Slams NSA Backer Rep. Dutch Ruppersberger Over ABC Interview, Defense Industry Ties
Rep. Ruppersberger Opens Floor Debate on the Rogers/Ruppersberger Cyber Bill – CISPA
Obama Will Veto CISPA
Anonymous new message CISPA it’s back Ops shut down engage
CISPA SOPA 2.0
ALEX JONES – CISPA Another Fascist Takeover of the Internet. EMERGENCY ALERT
CISPA, the Cyber Intelligence Sharing and Protection Act, is picking up sponsors and it looks like the legislation will make it to the House floor for a vote next week. CISPA emerged from the House Intelligence Committee with an overwhelming vote of 17-1.
The bill, authored by Rep. Mike Rogers, a Michigan Republican, is supported by Google, the technology company in bed with the CIA and responsible for building the Great Firewall of China. Google is not alone in supporting CISPA. Corporate sponsors include Facebook, Microsoft, Intel, IBM, Verizon, the U.S. Chamber of Commerce and others, according to the House’s Permanent Select Committee on Intelligence.
The Electronic Frontier Foundation, long a champion of rights online, has signed on to two coalition letters urging legislators to drop their support for HR 3523. The coalition behind the privacy letter includes dozens of groups, including the ACLU, the American Library Association, the American Policy Center, the Center for Democracy and Technology, the Privacy Rights Clearinghouse, and many others, according to the EFF website.
The letter warns: CISPA creates an exception to all privacy laws to permit companies to share our information with each other and with the government in the name of cybersecurity…. CISPA’s ‘information sharing’ regime allows the transfer of vast amounts of data, including sensitive information like internet use history or the content of emails, to any agency in the government including military and intelligence agencies like the National Security Agency or the Department of Defense Cyber Command. Once in government hands, this information can be used for any non-regulatory purpose so long as one significant purpose is for cybersecurity or to protect national security.
CISPA was pushed through following public outrage over SOPA and PIPA, two sneaky attempts to undermine internet freedom earlier this year under the guise of protecting the copyrights of Hollywood and its transnational “entertainment” corporations.
CISPA is far worse than its forerunners. It would amend the the National Security Act of 1947 — legislation that created the national security state and the CIA — and centralize “information sharing” between government agencies, intelligence agencies, and the Pentagon.
Time Techland admits that, according to the Center for Democracy & Technology, CISPA threatens privacy because it “has a very broad, almost unlimited definition of the information that can be shared with government agencies and it supersedes all other privacy laws,” “is likely to lead to expansion of the government’s role in the monitoring of private communications” and “is likely to shift control of government cybersecurity efforts from civilian agencies to the military.”
In short, it is a dream bill designed specifically for the national security surveillance state. CISPA will put a legal facade on behavior the CIA and NSA have engaged in for decades. It is the culmination of years of cyber psyops and attendant propaganda designed convince the public that they must surrender their privacy.
The transfer of “cybersecurity efforts from civilian agencies to the military” is especially alarming considering the Pentagon’s aggressive response to supposed cyber attacks. In early 2011, the Pentagon said that cyber attacks constitute acts of war and will be responded to with military action.
It is imperative that you contact your representatives immediately and tell them that you strongly oppose this dangerous legislation and demand they vote against it. If CISPA is allowed to pass next week, it will be a victory for the global elite and their ongoing effort to turn the internet into the largest and most comprehensive surveillance and control mechanism in human history
Rep Mike Rogers Claims that Opponents to CISPA are 14 Year Olds
Gov’t Spying on US Citizens; Big Brother watching you-CISPA-NSA
Ruppersberger began his career as a Baltimore County Assistant State’s Attorney. He was soon promoted to the Chief of the State’s Attorney Office Investigative Division, pursuing organized crime, political corruption, and drug trafficking. He was elected to the Baltimore County Council in 1985 and again in 1989, chosen twice as council chairman. In December 1994 and again in 1998, Ruppersberger was elected Baltimore County Executive.
U.S. House of Representatives
Congressman Ruppersberger calls on Congress to create a cabinet level intelligence director on August 3, 2004.
Ruppersberger was the first Democratic freshman ever to be appointed to the House Intelligence Committee. He was named to this committee because his district is home to the National Security Agency. Since 2011, he has been this committee’s ranking Democrat. The position places Ruppersberger on the elite “Gang of Eight,” which refers to the chairs and ranking members of the House and Senate Intelligence Committees along with the Senate majority leader, Senate minority leader, House speaker and House minority leader. By law, the president must keep the Gang of Eight informed of the country’s most secret intelligence activities to maintain proper oversight.
Shock Trauma
Congressman Ruppersberger decided to run for office after a near-fatal car accident while investigating a drug trafficking case. Thanks to the dedication of doctors at the University of Maryland Shock Trauma Center, Congressman Ruppersberger survived and began campaigning for office to assist Shock Trauma after they saved his life. He remains an active supporter of the hospital, serving as vice chairman of its board of visitors. He also serves on the United States Naval Academy Board of Visitors.
Operation Hero Miles
In one of his first acts in Washington in 2003, Congressman Ruppersberger created the national “Hero Miles” program to enable patriotic Americans to donate their frequent flyer miles to wounded warriors recovering at military or Veterans Administration (VA) medical centers as well as to friends and family visiting them. In 2012, he authored legislation expanding the program to enable Americans to also donate their hotel reward points to military families. Both the “Hero Miles” and “Hotels for Heroes” programs are administered by Fisher House, a nonprofit organization that opens its homes to military families visiting their injured loved ones at hospitals across the country .[2] He won a Charles Dick Medal of Merit in 2004 for this initiative, thus becoming the last Marylander to win this award, which was previously awarded to U.S. Rep. Beverly Byron (1992), State Senator John Astle (1993), U.S. Senator Barbara Mikulski (1994), U.S. Rep. Roscoe Bartlett (1998) and State Del (now State Comptroller) Peter Franchot (1999).
CISPA
Congressman Ruppersberger, along with Michigan Republican Mike Rogers, co-sponsored the Cyber Intelligence Sharing and Protection Act, designed to increase intelligence sharing between private cyber security firms and government agencies.[3] More than 60 businesses and trade organizations submitted letters of support including the U.S. Chamber of Commerce, Time Warner, Verizon and AT&T, IBM and Intel.[4] Despite several amendments to address privacy concerns, some groups, such as the Electronic Frontier Foundation, have criticized the act for a lack of civil liberties protections, claiming that it authorizes government surveillance of private communications and allows companies to hand over large amounts of personal information on their clients without a warrant or judicial oversight, and thereby creates a cybersecurity loophole in existing privacy laws, such as the Wiretap Act and the Electronic Communications Privacy Act.[5] CISPA passed the House of Representatives on April 26, 2012.[6] It was reintroduced into the House on February 13, 2013, and passed on April 18, 2013, by a bipartisan vote of 288-127. Ninety-two Democrats supported the bill, many citing significant privacy improvements over the 2012 version. [7]
Political campaigns
Barred from a third term as County Executive, Ruppersberger opted to run for Congress in 2002 after 2nd District Congressman Bob Ehrlich made what turned out to be a successful run forgovernor. The Maryland General Assembly significantly altered the 2nd by shifting most of its share of Harford County to the 1st and 6th Districts. In its place, the legislature added a heavily Democratic portion of Baltimore City that had previously been in the 1st District. This turned the 2nd from a swing district into a strongly Democratic district. It was an open secret that the district was drawn for Ruppersberger; local media called the new district “the Dutch district.” An August 2011 editorial by The Washington Post describes the 2nd district as “curlicue territories strung together by impossibly delicate tendrils of land” and “a crazy-quilt confection drawn for the express purpose of ousting the incumbent at the time, Rep. (and later Gov.) Robert L. Ehrlich Jr., a Republican, and installing C.A. Dutch Ruppersberger, a Democrat who still holds the job.”[8] He defeated Republican opponent Helen Delich Bentley, who had represented the 2nd district from 1985 to 1995, with 55 percent of the vote. Ruppersberger has never faced another contest even that close and has been reelected five times. On April 10, 2013, the Baltimore Sun reported that Ruppersberger was considering a run for governor of Maryland in 2014.[9] In January of 2014, Ruppersberger announced that he would not run for Governor, but instead would seek reelection to the House of Representatives.[10]
This article may require cleanup to meet Wikipedia’s quality standards. The specific problem is: Need to organize old information by date and add to recent developments on 2015 bill.. Please help improve this article if you can.(January 2015)
To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes.
The Cyber Intelligence Sharing and Protection Act (CISPAH.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress)) is a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The stated aim of the bill is to help the U.S. government investigate cyber threats and ensure the security of networks against cyberattacks.[1]
The legislation was introduced on November 30, 2011, by Representative Michael Rogers (R–MI) and 111 co-sponsors.[2][3] It was passed in the House of Representatives on April 26, 2012, but was not passed by the U.S. Senate.[4] President Barack Obama‘s advisers have argued that the bill lacks confidentiality and civil liberties safeguards, and the White House said he would veto it.[5]
In January 2015 the House reintroduced the bill again.[10] The bill currently has been Referred to the Committee on Intelligence to see if it will come to the House for a vote.
Some critics saw wording included in CISPA as a second attempt to protect intellectual property after the Stop Online Piracy Act was taken off the table by Congress after it met opposition.[14]Intellectual property theft was initially listed in the bill as a possible cause for sharing Web traffic information with the government, though it was removed in subsequent drafts.[15]
CISPA is an amendment to the National Security Act of 1947, which does not currently contain provisions pertaining to cybercrime. It adds provisions to the Act describing cyber threat intelligence as “information in the possession of an element of the intelligence community directly pertaining to a vulnerability of, or threat to, a system or network of a government or private entity, including information pertaining to the protection of a system or network from either “efforts to degrade, disrupt, or destroy such system or network”.[16] In addition, CISPA requires the Director of National Intelligence to establish procedures to allow intelligence community elements to share cyber threat intelligence with private-sector entities and encourage the sharing of such intelligence.[17]
In an April 16, 2012, press release, the House of Representatives Permanent Select Committee on Intelligence announced the approval of several amendments to CISPA, including the addition of a new provision “to permit federal lawsuits against the government for any violation of restrictions placed on the government’s use of voluntarily shared information, including the important privacy and civil liberties protections contained in the bill,” the inclusion of an anti-tasking provision to “explicitly prohibit the government from conditioning its sharing of cyber threat intelligence on the sharing of private sector information with the government”, and the prevention of the government from using the information for “any other lawful purpose unless the government already has a significant cybersecurity or national security purpose in using the information”. Relevant provisions were also clarified to “focus on the fact that the bill is designed to protect against unauthorized access to networks or systems, including unauthorized access aimed at stealing private or government information”.[18] In addition, already collected cyberthreat data can also be used to investigate “the imminent threat of bodily harm to an individual” or “the exploitation of a minor,” bringing the bill into line with existing law codified by thePatriot Act and the PROTECT Our Children Act[19] in which these two conditions already allow for protected entities to share data voluntarily with the United States government, law enforcement agencies, and the National Center for Missing and Exploited Children.
Recent developments
Bill sponsors Mike Rogers and Dutch Ruppersberger, the chairman and ranking member of the House Intelligence Committee, respectively, said on April 25, 2012, that the Obama administration’s opposition is mostly based on the lack of critical infrastructure regulation, something outside of the jurisdiction of the Intelligence committee; they have also since introduced a package of amendments to the legislation that, “address nearly every single one of the criticisms leveled by the Administration, particularly those regarding privacy and civil liberties of Americans”.[20]
Due to the opposition the bill has experienced, the co-sponsors are planning to amend the bill to address many of the concerns of its opponents—including limiting its scope to a narrower definition of cyber-threats, and stating that the “theft of intellectual property” refers to the theft of research and development. In addition, there will now be penalties if private companies or the government uses data from CISPA for purposes “unrelated to cyberthreats”.[21][22]
However, Sharan Bradford Franklin, of the Constitution Project states, “Although we appreciate the Intelligence Committee’s efforts to improve the bill and willingness to engage in a dialogue with privacy advocates, the changes in its most current draft do not come close to addressing the civil liberties threats posed by the bill, and some of the proposals would actually make CISPA worse. Therefore, Congress should not pass CISPA”.[23]
Rainey Reitman, of the Electronic Frontier Foundation states, “To date, the authors of the bill have been unresponsive to these criticisms, offering amendments that are largely cosmetic. Dismissing the grave concerns about how this bill could undermine the core privacy rights of everyday Internet users, Rep. Mike Rogers characterized the growing protests against CISPA as ‘turbulence’ and vowed to push for a floor vote without radical changes.”[24]
Kendall Burman of the Center for Democracy and Technology states, “The authors of CISPA have made some positive changes recently. Unfortunately, none of the changes gets to the heart of the privacy concerns that Internet users and advocacy groups have expressed.”[25]
In April 2012, the Office of Management and Budget of the Executive Office of the President of the United States released a statement strongly opposing the current bill and recommending to veto it.[26]
On April 26, 2012, the House of Representatives passed CISPA.
On February 13, 2013, United States Representative Mike Rogers reintroduced the CISPA bill in the 113th Congress as H.R. 624.[6]
On April 18, 2013, the House of Representatives passed H.R. 624.[7] The Senate has reportedly refused to vote on the measure and is drafting competing legislation.[27]
Former Representative Ron Paul (R–TX) has publicly opposed the bill calling it “Big Brother writ large.”[36][37][38][39]
36 groups currently oppose CISPA[40] with an addition of 6 groups as of April 21.[41] The Electronic Frontier Foundation lists a growing list of opposition[42] as well as a list of security experts, academics, and engineers in opposition of the bill.[43] They also published the statement Don’t Let Congress Use “Cybersecurity” Fears to Erode Digital Rights.[44]
Opposition to CISPA includes more than 840,000 online petitioners who have signed global civic organization Avaaz.org’s petition to members of the US Congress entitled “Save the Internet from the US”.[45] Avaaz also has a petition to Facebook, Microsoft, and IBM entitled “The end of Internet privacy”, signed by more than 840,000 people.[46]
The Center for Democracy and Technology (CDT) published a statement titled “Cybersecurity’s 7-Step Plan for Internet Freedom”.[47] The CDT openly opposes the Mike Rogers bill based on these 7-step criteria.[48] The CDT has also openly supported a competing bill in the house sponsored by Representative Dan Lungren (R–CA)[49] that has yet to be reported by the committee.[50]
The Constitution Project (TCP) “believes cybersecurity legislation currently pending before Congress possess major risks to civil liberties that must be addressed before any bill is enacted into law.”[51]
The American Civil Liberties Union (ACLU) has also issued a statement opposing the bill stating, “The Cyber Intelligence Sharing and Protection Act would create a cybersecurity exception to all privacy laws and allow companies to share the private and personal data they hold on their American customers with the government for cybersecurity purposes.” As the statement continues, “Beyond the potential for massive data collection authorization, the bill would provide no meaningful oversight of, or accountability for, the use of these new information-sharing authorities.”[52]
The Sunlight Foundation states, “The new cybersecurity bill, CISPA, or HR 3523, is terrible on transparency. The bill proposes broad new information collection and sharing powers (which many other organizations are covering at length). Even as the bill proposes those powers, it proposes to limit public oversight of this work.”[53]
Cenk Uygur, from Current TV, opposed the bill highlighted one of Mike Rogers’ speech about the bill to the business community. He also attempted to summarize the bill to his audience.[54]
Demand Progress opposes CISPA, stating “The Cyber Intelligence Sharing and Protection Act, or CISPA, would obliterate any semblance of online privacy in the United States.”[55]
Reporters Without Borders states, “Reporters Without Borders is deeply concerned with the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), the cyber security bill now before the US Congress. In the name of the war on cyber crime, it would allow the government and private companies to deploy draconian measures to monitor, even censor, the Web. It might even be used to close down sites that publish classified files or information.”[57]
testPAC opposes CISPA stating “CISPA would effectively take the door off the hinge of every household in America, but lacks the tools necessary to distinguish whether there is a criminal hiding in the attic. Why surrender the core of our privacy for the sake of corporate and governmental convenience?”[58]
Mozilla, the makers of the Firefox Web-Browser, opposes CISPA stating, “While we wholeheartedly support a more secure Internet, CISPA has a broad and alarming reach that goes far beyond Internet security.”[59]
The Association for Computing Machinery believes that “More effective information sharing in support of cybersecurity is a laudable goal, but CISPA is seriously flawed in its approach to PII. Better approaches to information sharing are certainly possible if privacy goals are also considered.”[60]
IGDA, the International Game Developers Association is against this bill, urging Congress and the President to reject it saying, in part, “The version of CISPA which just emerged from the House Intelligence Committee does not address the privacy failings in the previous version, which the White House wisely rejected. The bill still retains its dangerously over-broad language, still lacks civilian control, still lacks judicial oversight, and still lacks clear limits on government monitoring of our Internet browsing information. The House should vote against it.”[61]
The Libertarian Party protested it by blacking out much of their Facebook, and encouraged others to follow suit.[62]
Anonymous, a hacktivist group, has criticized the bill and called for an “Internet blackout day” to protest the bill. The date of the blackout was April 22, 2013.[68]
Prior attempts for U.S. cybersecurity bills
Since legislation must pass the House and the Senate within the same Congress, anything introduced during the 112th or earlier Congresses has to pass both chambers again.
S. 2105 (Cybersecurity Act), reported by committee on February 15, 2012. Sponsored by SenatorJoseph Lieberman (I–CT).[70] Failing to gain enough support for passage, the bill, entitled “Cybersecurity Act of 2012”, was reintroduced on July 19, 2012 in a revised form which omitted federal imposition of security standards on IP providers, as well as including stronger privacy and civil liberties protections.[71]
House of Representatives
H.R. 3674 (Precise Act), reported by committee April 18, 2012 by Representative Dan Lungren (R–CA).[72] The bill changed as “Lungren dropped many of the critical infrastructure and DHS provisions” due to the house.[73]
Rep. Justin Amash cosponsored an amendment that would have defunded the National Security Agency’s unwarranted bulk collection of Americans’ phone data. The measure failed narrowly, but has re-energized the legislative struggle for civil liberties. Amash believes that James Clapper, the Director of National Intelligence, should be prosecuted for lying to Congress. He also says he doesn’t appreciate the “condescending” tone of New Jersey Gov. Chris Christie with respect to the debate over national security.
Glenn Beck Justin Amash Interview On Nsa Surveillance
Congress’s Abdication on NSA Oversight (U.S. Rep. Justin Amash (R-MI))
Justin Amash: President Obama Was ‘Highly Misleading’ In Claiming There’s No Domestic Spying Program
House committee passes NSA reform bill
The House Judiciary Committee passed the National Security Agency reforming “USA Freedom Act” 31-0 Wednesday. The first major piece of legislation seeking to curb the NSA’s collection of electronic information, the bill which has undergone major changes will now proceed to the full House of Representatives. It will be competing with another reform bill that is expected to be approved by the House Intelligence Committee Thursday. RT’s Sam Sacks breaks down the bill and the chances for instituting real reform.
“USA Freedom Act” Bill To Put NSA “Out Of Business”
Fox News Reporting The NSA’s Secret War Who’ The Enemy? 1 of 6
Fox News Reporting The NSA’s Secret War Who’ The Enemy Controversy Not The First Time 2 of
Fox News Reporting The NSA’s Secret War Who’ The Enemy? Controversy? 9 11 3 of 6
Fox News Reporting – The NSA’s Secret War Who’ The Enemy? – Phone Records – 4 of 6
Fox News Reporting – The NSA’s Secret War Who’ The Enemy? – Edward Snowden & Security – 5 of 6
Fox News Reporting – The NSA’s Secret War Who’ The Enemy? – Day Of Reckoning At Hand? – 6 of 6
C-SPAN Callers On The Future Of The National Security Agency (NSA)
James Bamford Says NSA “Exploiting” U.S. Citizens With Info About Their Online Porno Viewing Habits
Yesterday, C4L sent a letter to members of the House Judiciary Committee strongly opposing the Manager’s Amendment to H.R. 3361, the USA FREEDOM Act.
The original version of the act was sold to Americans as a way to rein in the NSA’s domestic surveillance programs, and it would have been a first step towards real reform of the surveillance state since 9/11.
But, that’s seldom the way Congress works. In an effort to “pass something this year,” the Judiciary Committee watered down the legislation and it passed out of the committee unanimously.
Want proof the recent changes to USA Freedom Act make it unworthy of support from civil libertarians? Mike Rogers and Dutch Ruppersberger, the NSA’s biggest cheerleaders in the House,just reported it out of their committee by voice vote.
What’s more likely, that Rogers and Ruppersberger had a change of heart on the NSA? Or that Judiciary watered down the USA FREEDOM Act enough to the point that its “reform” is devoid of any substantive changes?
The bill is now earning plaudits from the same guys who said the original version would “make America less safe,” and from the administration that never wanted you to know they were spying on you in the first place.
Read Campaign for Liberty’s letter to the Judiciary Committee below:
Six months after it was written to restrain the National Security Agency’s sweeping domestic surveillance, a privacy bill cleared a major legislative obstacle on Wednesday, even as its advocates worried that the compromises made to advance the bill have weakened its constraints on mass data collection.
The USA Freedom Act, designed to prevent the US government from collecting US phone data in bulk, passed the House Judiciary Committee by a 32 to zero bi-partisan vote, making it the first surveillance reform bill to proceed out of committee and to the House floor.
But an internal committee breakthrough on Monday that won the support of chairman Bob Goodlatte, a Virginia Republican, significantly recast the bill, softening its prohibitions on aspects of bulk collection and requiring transparency around it.
The bill’s architect, Republican James Sensenbrenner of Wisconsin, who also wrote the 2001 Patriot Act, said the bill “makes it crystal clear that Congress does not support bulk collection.”
While changes to the bill now permit the government to gather call records up to two degrees of separation away from a specific target – potentially millions of records – Sensenbrenner urged his colleagues “not to make the perfect the enemy of the good,” expressing confidence that the revamped USA Freedom Act was on “the fast track to passage.”
Supporters in and outside of Congress concede the latest compromises have left the USA Freedom Act less protective of civil liberties than it was when introduced in October. Its distinctions from a rival bill written by the leaders of the House intelligence committee, the NSA’s strongest Capitol Hill advocates, are somewhat blurred, prompting civil libertarians to become less enthusiastic of a measure they have championed as a fix to the broad NSA powers exposed by whistleblower Edward Snowden.
Representative John Conyers, a Michigan Democrat and longtime USA Freedom Act supporter, said that the new version of the bill was a “less than perfect compromise” that still makes “important, vital, substantive changes” to US surveillance.
The revised USA Freedom Act, “while still better than any other proposal on the board, is a setback from the original,” said Amie Stepanovich of Access, a human rights and digital rights advocacy group.
While the USA Freedom Act has nearly 150 House co-sponsors, and a stalled Senate companion commands 20 votes in the upper chamber, it was clear on Wednesday that the House intelligence committee will continue attempts to outmaneuvre its rival.
The chairman of the intelligence committee, until now a fervent critic of the USA Freedom Act, is now praising a bill he has long criticized, and which several congressional sources said he attempted to influence ahead of Wednesday’s vote.
Representative Mike Rogers, a Michigan Republican who is retiring this year, called the changes to the USA Freedom Act a “huge improvement,” adding in an interview with Foreign Policy magazine that the bill’s architects have “come a lot closer [and] now we’re just trying to work out the wording.”
Rogers is scheduled to mark up his alternative bill, the Fisa Transparency and Modernization Act, on Thursday, a decision USA Freedom Act supporters view as a desperation move. But on Wednesday, Rogers’ committee announced it will also mark up the USA Freedom Act on Thursday, prompting Capitol Hill speculation that Rogers will attempt to merge his bill with the Freedom Act rather than attempt to rally more votes.
House Speaker John Boehner of Ohio had earlier thrown his support behind Rogers’ bill. But now Boehner is said to be monitoring the committe process and keeping his options open. Congressional sources expected Boehner to schedule a vote on a surveillance proposal – of whatever form – as early as the week of 19 May, so the issue does not derail the annual defense budget authorization, though nothing is scheduled yet.
Both bills as originally crafted prevent the NSA from collecting US phone data in bulk, as it has done in secret since 2001, a position that President Barack Obama now embraces. The major difference between the two bills remains the role of judges in authorizing data collection. The Rogers bill permits the government to collect phone and email data absent a judges’ prior order, which the revised USA Freedom Act requires in all but emergency cases.
Additionally, the revised USA Freedom Act permits the government to get phone data two “hops,” or degrees of separation, from the target of the order, which can mean millions of call records reaped from a single court order. The legal standard for that order, for counterterrorism purposes, will be “reasonable articulable suspicion” of connection to an agent of a foreign power, the NSA’s desired framework.
Significantly, the new version of the USA Freedom Act all but stripped out a provision preventing the NSA from combing through its foreign communications dragnets for Americans’ information, something Senator Ron Wyden of Oregon dubbed the “backdoor search provision,” an absence that has deeply upset supporters. Those dragnets exist pursuant to a major 2008 piece of legislation, known as Section 702 of the Fisa Amendments Act.
Congressional sources pointed to new language tightening up prohibitions on the NSA intentionally targeting Americans’ communications at the outset as a palliative. But they conceded the absence of the backdoor search ban was a major change – one they said the NSA’s advocates fought hard for, an indication of how central the NSA considers a power it has rarely forthrightly acknowledged using. They indicated that USA Freedom Act supporters lacked the votes within the committee to pass the bill that retained the backdoor search prohibition.
An attempt by Representative Zoe Lofgren, a California Democrat, to restore the backdoor search provision failed Wednesday. Goodlatte said restoring it would “disrupt this bipartisan agreement.”
Kevin Bankston of the Open Technology Institute said he was “incredibly disappointed” at the new USA Freedom Act’s effective blessing of backdoor searches.
“Especially when we’re expecting the government’s own surveillance watchdog, the Privacy and Civil Liberties Oversight Board, to issue a report on just that issue within a month or so, closing the door to reform on Section 702 of the Fisa Amendments Act would be premature,” Bankston said in a statement.
But the Judiciary Committee restored a provision initially struck from the original USA Freedom Act permitting increased transparency for companies receiving surveillance orders for their customers’ data, the absence of which had alarmed supporters.
The language, added back to the bill Wednesday by Representative Suzan Delbene of Washington, had been cut in order to codify a January deal the Justice Department reached with phone and Internet companies allowing them to list received orders only in bands of 1,000 and with a time lag. Congressional sources said companies lobbied hard to restore transparency language.
The Obama administration has withheld endorsement of either bill in public, confusing supporters. But in recent weeks, its guidance to Capitol Hill on surveillance reform included a requirement for up-front judicial authorization for data requests, which only the USA Freedom Act possesses.
“At this stage, I think I’d just say we will be watching closely as these bills go through the process,” said Caitlin Hayden, a White House spokeswoman said shortly before the vote.
Hours after the vote, Hayden issued a statement welcoming the USA Freedom Act as “a very good first step”:
“In March the president laid out his proposal to reform Section 215, and called upon Congress to act quickly to pass implementing legislation. We applaud the House Judiciary Committee for approaching this issue on a bipartisan basis. The Judiciary Committee passed bill is a very good first step in that important effort, and we look forward to House Permanent Select Committee on Intelligence action on it tomorrow,” Hayden said.
Section 215 of the Patriot Act is the provision cited by the NSA and blessed by the secret Fisa Court for bulk data collection.
Some legislators, distressed by the changes to the USA Freedom Act, are considering a different option for surveillance reform.
As amended, the USA Freedom Act would push back the expiration of Section 215 to the end of 2017, when Section 702 is set to expire. The current expiration is 1 June of next year. Some legislators are already whispering that allowing Section 215 to expire wholesale in 2015 is a preferable reform.
But Representative Jerrold Nadler of New York, a Democrat, said the USA Freedom Act was “the first, best and perhaps only chance in a decade” to constrain widespread surveillance.
“This is our chance. We have to seize it,” Nadler said on Wednesday.
Patrick Leahy, the Vermont Democrat who sponsored the USA Freedom Act in the Senate, hailed the committee vote, but said he was concerned that the text does not reform the Federal Bureau of Investigation’s national-security letters and makes insufficient changes on transparency and to the Fisa Court.
“I will continue to push for those reforms when the Senate Judiciary Committee considers the USA Freedom Act this summer,” Leahy said in a statement.
The USA Freedom Act, formally titled the Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-Collection and Online Monitoring Act, is a bill that was introduced in both houses of the U.S. Congress on October 29, 2013.
The USA Freedom Act[9] would end the bulk collection of Americans’ metadata, end the secret laws created by the FISA court, and introduce a “Special Advocate” to represent public and privacy matters.[10][11][12] Other proposed changes include limits to programs like PRISM, which “incidentally” retains Americans’ Internet data,[13] and greater transparency by allowing companies such as Google and Facebook to disclose information about government demands for information.[14]
Representative Jim Sensenbrenner, who introduced the bill, stated that its purpose was:
To rein in the dragnet collection of data by the National Security Agency (NSA) and other government agencies, increase transparency of the Foreign Intelligence Surveillance Court (FISC), provide businesses the ability to release information regarding FISA requests, and create an independent constitutional advocate to argue cases before the FISC.[10][15]
According to the bill’s sponsors, their legislation would amend Section 215 of the Patriot Act to ensure that any phone records obtained by the government were essential in an investigation that involved terrorism or espionage, thereby ending bulk collection,[16] while preserving “the intelligence community’s ability to gather information in a more focused way.”[17] A May 2014 amended version of the bill would also extend thecontroversial USA PATRIOT Act through the end of 2017.[18] The Electronic Privacy Information Center (EPIC) has criticized the Patriot Act as unconstitutional, especially when “the private communications of law-abiding American citizens might be intercepted incidentally”.[19]
The bill is made up of several titles: FISA business records reforms, FISA pen register and trap and trace device reforms, FISA acquisitions targeting persons outside the United States reforms, Foreign Intelligence Surveillance Court reforms, Office of the Special Advocate, National Security Letter reforms, FISA and National Security Letter transparency reforms, and Privacy and Civil Liberties Oversight Board subpoena authority.[20]
Background
Many members of Congress believed that in the wake of the Snowden disclosures, restoration of public trust would require legislative changes.[21] More than 20 bills have been written since the disclosures began with the goal of reining in government surveillance powers.[13]
Sensenbrenner, who introduced the USA PATRIOT Act (H.R. 3162) in 2001 following the September 11 terrorist attacks to give more power to US intelligence agencies, and who has described himself as “author of the Patriot Act”,[22] declared that it was time to put the NSA’s “metadata program out of business”. With its bulk collection of Americans’ phone data, Sensenbrenner asserted that the intelligence community “misused those powers”, had gone “far beyond” the original intent of the legislation, and had “overstepped its authority”.[21][23]
An opinion piece by Leahy and Sensenbrenner, published in Politico, described the impetus for proposed changes,[24] saying:
The intelligence community has failed to justify its expansive use of [the FISA and Patriot Act] laws. It is simply not accurate to say that the bulk collection of phone records has prevented dozens of terrorist plots. The most senior NSA officials have acknowledged as much in congressional testimony. We also know that the FISA court has admonished the government for making a series of substantial misrepresentations to the court regarding these programs. As a result, the intelligence community now faces a trust deficit with the American public that compromises its ability to do its job. It is not enough to just make minor tweaks around the edges. It is time for real, substantive reform.[17]
Markup in House Judiciary Committee
In May 2014, the U.S. House Judiciary Committee posted a “Manager’s Amendment” on its website. Title VII of the Amendment read “Section 102(b)(1) of the USA Patriot Improvement and Reauthorization Act of 2005 (50 U.S.C. 1805 note) is amended by striking “June 1, 2015” and inserting “December 31, 2017”, extending the controversial USA PATRIOT Act through the end of 2017.[25] The Electronic Privacy Information Center(EPIC) has criticized the Patriot Act as unconstitutional, especially when “the private communications of law-abiding American citizens might be intercepted incidentally”.[19] James Dempsey, of the CDT, believes that the Patriot Act unnecessarily overlooks the importance of notice under the Fourth Amendment and under a Title III wiretap,[26] while the American Library Association became so concerned that they formed a resolution condemning the USA PATRIOT Act, and which urged members to defend free speech and protect patrons’ privacy against the Act.[27]
The Guardian wrote “civil libertarians on the Judiciary Committee had to compromise in order to gain support for the act. Significantly, the government will still be able to collect phone data on Americans, pending a judge’s individualized order based on ‘reasonable articulable suspicion‘ – a standard preferred by the NSA – of wrongdoing, and can collect call records two degrees or ‘hops’ of separation from the individual suspected”.[5] Kara Brandeisky of ProPublica said “some worry that the bill does not unequivocally ban bulk collection of American records. Again, a lot depends on how the Foreign Intelligence Surveillance Court interprets the statute”.[28]
The Electronic Frontier Foundation (EFF) stated it remained “concerned that this bill omits important transparency provisions found in the USA FREEDOM Act, which are necessary to shed light on surveillance abuses”. In addition, the EFF said it believed “this bill should do more to address mass surveillance under Section 702 of Foreign Intelligence Surveillance Amendments Act, a section of law used to collect the communications of users worldwide”.[30] The Open Technology Institute commented “several other key reforms—such as provisions allowing Internet and phone companies to publish more information about the demands they receive, which OTI and a coalition of companies and organizations have been pressing for since last summer—have been removed, while the bill also provides for a new type of court order that the President has requested, allowing for continuous collection by the government of specified telephone records.”[31]
Despite the criticism from civil liberties groups, Mike Rogers, a defender of the NSA‘s surveillance practices and the chairman of the House Intelligence Committee, praised the amendments. Rogers, who had his own bill which would codify the NSA’s surveillance practices in to law, called the proposed amendments a “huge improvement”. Foreign Policy wrote “any compromise to the Judiciary bill risks an insurrection from civil libertarians in Congress. Michigan Republican Justin Amash led such a revolt last year when he offered an NSA amendment to a defense appropriations bill that would have stripped funding for the NSA’s collection program.” “Just a weakened bill or worse than status quo? I’ll find out,” Representative Amash said.[32]
After passage of the marked up bill, USA Freedom Act co-author and Senate Committee on the Judiciary Chairman Patrick Leahy commented that he “remain concerned that the legislation approved today does not include some of the important reforms related to national security letters, a strong special advocate at the FISA Court, and greater transparency. I will continue to push for those reforms when the Senate Judiciary Committee considers the USA FREEDOM Act this summer.”[8]
Reaction
The Act has bipartisan support, evenly split between Democrats and Republicans. As of May 8, 2014, it had 150 co-sponsors in the House[1] and 21 in the Senate.[2] Viewed as one of the most comprehensive of the similar bills introduced since the NSA leaks, the USA Freedom Act has support or qualified support from a diverse range of groups such as the ACLU, Mozilla, and the NRA.[13][33]
Representative Justin Amash, author of the narrowly-defeated Amash Amendment, a proposal that would have de-funded the NSA, backed the legislation. “It’s getting out of control” he commented, “[Courts are issuing] general warrants without specific cause…and you have one agency that’s essentially having superpowers to pass information onto others”.[23]
According to Deputy Attorney General James Cole, even if the Freedom Act becomes law, the NSA could continue its bulk collection of American’s phone records. He explained that “it’s going to depend on how the [FISA] court interprets any number of the provisions” contained within the legislation.[16]Jennifer Granick, Director of Civil Liberties at Stanford Law School, stated:
The Administration and the intelligence community believe they can do whatever they want, regardless of the laws Congress passes, so long they can convince one of the judges appointed to the secretive Foreign Intelligence Surveillance Court (FISC) to agree. This isn’t the rule of law. This is a coup d’etat.[16]
Opponents of global surveillance have called for the bill to be strengthened. The Electronic Frontier Foundation (EFF) released a statement saying “we consider this bill to be a floor, not a ceiling”. The ACLU wrote that “although the USA Freedom Act does not fix every problem with the government’s surveillance authorities and programs, it is an important first step and it deserves broad support.”[34][35]
International human rights groups remain somewhat skeptical of specific provisions of the bill. For example, Human Rights Watch expressed its concern that the “bill would do little to increase protections for the right to privacy for people outside the United States, a key problem that plagues U.S. surveillance activities. Nor would the bill address mass surveillance or bulk collection practices that may be occurring under other laws or regulations, such as Section 702 of the FISA Amendments Act or Executive Order 12333. These practices affect many more people and include the collection of the actual content of internet communications and phone calls, not just metadata”.[36] Zeke Johnson, Director of Amnesty International‘s Security and Human Rights Program, agreed that “any proposal that fails to ban mass surveillance, end blanket secrecy, or stop discrimination against people outside the U.S. will be a false fix”.[37]
Section 102(b)(1) of the USA PATRIOT Improvement and Reauthorization Act of 2005 (50 U.S.C. 1805 note) is amended by striking ‘‘June 1, 2015’’ and inserting ‘‘December 31, 2017’’.
As amended, the USA Freedom Act would push back the expiration of Section 215 to the end of 2017, when Section 702 is set to expire. The current expiration is 1 June of next year. Some legislators are already whispering that allowing Section 215 to expire wholesale in 2015 is a preferable reform.
The program’s existence was publicly revealed in July 2013 by Edward Snowden in The Sydney Morning Herald and O Globo newspapers, though the codename is mentioned in earlier articles, and like many other codenames can also be seen in job postings, and in the online resumes of employees.[2][3]
XKeyscore is a complicated system and various authors have different interpretations about its actual capabilities. Edward Snowden and Glenn Greenwald explained XKeyscore as being a system which enables almost unlimited surveillance of anyone anywhere in the world, while NSA said that usage of the system is limited and restricted.
According to The Washington Post and national security reporter Marc Ambinder, XKeyscore is an NSA data-retrieval system which consists of a series of user interfaces, backend databases, servers and software that selects certain types of data and metadata that the NSA has already collected using other methods.[4][5]
According to Snowden and Greenwald
On January 26, 2014, the German broadcaster Norddeutscher Rundfunk asked Edward Snowden in its TV interview: “What could you do if you would use XKeyscore?” and he answered:[1]
“You could read anyone’s email in the world, anybody you’ve got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you’re tracking: you can follow it as it moves from place to place throughout the world. It’s a one-stop-shop for access to the NSA’s information.”
“…You can tag individuals… Let’s say you work at a major German corporation and I want access to that network, I can track your username on a website on a form somewhere, I can track your real name, I can track associations with your friends and I can build what’s called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.”
According to The Guardian’s Glenn Greenwald, low-level NSA analysts can via systems like XKeyscore “listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it’s all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst.”[6]
He added that the NSA’s databank of collected communications allows its analysts to listen “to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future”.[6]
In an official statement from July 30, 2013, the NSA said there is no “unchecked analyst access to NSA collection data. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks.” The NSA also states that there are “stringent oversight and compliance mechanisms built in at several levels. One feature is the system’s ability to limit what an analyst can do with a tool, based on the source of the collection and each analyst’s defined responsibilities.”[7]
The agency defended the program, stressing that it was only used to legally obtain information about “legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests. […] XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system. […] These types of programs allow us to collect the information that enables us to perform our missions successfully — to defend the nation and to protect U.S. and allied troops abroad.”[8]
Workings
Slide from a 2008 NSA presentation about XKeyscore, showing a worldmap with the locations of XKeyscore servers
Slide from a 2008 NSA presentation about XKeyscore, showing the query hierarchy
An NSA presentation about XKeyscore from 2008 says that it’s a “DNI Exploitation System/Analytic Framework”. DNI stands for Digital Network Intelligence, which means intelligence derived from internet traffic.[9] In an interview with the German Norddeutscher Rundfunk, Edward Snowden said about XKeyscore: “It’s a front end search engine”.[10]
Data sources
XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects data, like “US and allied military and other facilities as well as US embassies and consulates” in many countries around the world.[11][12][13] Among the facilities involved in the program are four bases in Australia and one in New Zealand.[12]
According to an NSA presentation from 2008, these XKeyscore servers are fed with data from the following collection systems:[14]
F6 (Special Collection Service) – joint operation of the CIA and NSA that carries out clandestine operations including espionage on foreign diplomats and leaders
FORNSAT – which stands for “foreign satellite collection”, and refers to intercepts from satellites
Third party – foreign partners of the NSA such as the (signals) intelligence agencies of Belgium, Denmark, France, Germany, Italy, Japan, the Netherlands, Norway, Sweden, etc.
From these sources, XKeyscore stores “full-take data”, which are indexed by plug-ins that extract certain types of metadata (like phone numbers, e-mail addresses, log-ins, and user activity) and index them in metadata tables, which can be queried by analysts. XKeyscore has been integrated with MARINA, which is NSA’s database for internet metadata.[9]
However, the system continuously gets so much Internet data that it can be stored only for short periods of time. Content data remain on the system for only three to five days, while metadata is stored for up to 30 days.[16] A detailed commentary on an NSA presentation published in The Guardian in July 2013 cites a document published in 2008 declaring that “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”[17]
Capabilities
Slide from a 2008 NSA presentation about XKeyscore, showing the differences between the various NSA database systems
For analysts, XKeyscore provides a “series of viewers for common data types”, which allows them to query terabytes of raw data gathered at the aforementioned collection sites. This enables them to find targets that cannot be found by searching only the metadata, and also to do this against data sets that otherwise would have been dropped by the front-end data processing systems. According to a slide from an XKeyscore presentation, NSA collection sites select and forward less than 5% of the internet traffic to the PINWALE database for internet content.[16]
Because XKeyscore holds raw and unselected communications traffic, analysts can not only perform queries using “strong selectors” like e-mail addresses, but also using “soft selectors”, like keywords, against the body texts of e-mail and chat messages and digital documents and spreadsheets in English, Arabic and Chinese.[9]
This is useful because “a large amount of time spent on the web is performing actions that are anonymous” and therefore those activities can’t be found by just looking for e-mail addresses of a target. When content has been found, the analyst might be able to find new intelligence or a strong selector, which can then be used for starting a traditional search.[9]
Besides using soft selectors, analysts can also use the following other XKeyscore capabilities:[9][18]
Look for the usage of Google Maps and terms entered into a search engine by known targets looking for suspicious things or places.
Look for “anomalies” without any specific person attached, like detecting the nationality of foreigners by analyzing the language used within intercepted emails. An example would be a German speaker in Pakistan. The Brazilian paper O Globo claims that this has been applied to Latin America and specifically to Colombia, Ecuador, Mexico and Venezuela.[11][19]
Detect people who use encryption by do searches like “all PGP usage in Iran”. The caveat given is that very broad queries can result in too much data to transmit back to the analyst.
Track the source and authorship of a document that has passed through many hands.
Most of these things cannot be detected by other NSA tools because they operate with strong selectors (like e-mail and IP addresses and phone numbers) and the raw data volumes are too high to forward them to other NSA databases.[9]
In 2008, it was planned to add a number of new capabilities in the future, like:
The NSA slides published in The Guardian during 2013 claimed that XKeyscore had played a role in capturing 300 terrorists by 2008.[9] This claim could not be substantiated as the redacted documents do not cite instances of terrorist interventions.
A 2011 report from the NSA unit in Griesheim (Germany) says that XKeyscore made it easier and more efficient to target surveillance. Previously, analysis often accessed data they were not interested in. XKeyscore allowed them to focus on the intended topics, while ignoring unrelated data. XKeyscore also proved to be an outstanding tool for tracking active groups associated with the Anonymous movement in Germany, because it allows for searching on patterns, rather than particular individuals. An analyst is able to determine when targets research new topics, or develop new behaviors.[20]
To create additional motivation, the NSA incorporated various features from computer games into the program. For instance, analysts who were especially good at using XKeyscore could acquire “skilz” points and “unlock achievements.” The training units in Griesheim were apparently successful and analysts there had achieved the “highest average of skilz points” compared with all other NSA departments participating in the training program.[20]
Usage by foreign partners of the NSA
Germany
Excerpt of an NSA document leaked by Edward Snowden that reveals the BND‘s usage of the NSA’s XKeyscore to wiretap a German domestic target
According to documents Der Spiegel acquired from Snowden, the German intelligence agencies BND (foreign intelligence) and BfV (domestic intelligence) were also allowed to use the XKeyscore system. In those documents the BND agency was described as the NSA’s most prolific partner in information gathering.[21] This led to political confrontations, after which the directors of the German intelligence agencies briefed members of the German parliamentary intelligence oversight committee on July 25, 2013. They declared that XKeyscore has been used by the BND since 2007 and that the BfV uses a test version since 2012. The directors also explained that this program is not for collecting data, but only for analyzing them.[22]
Sweden
As part of the UKUSA Agreement, a secret treaty was signed in 1954 by Sweden with the United States, the United Kingdom, Canada, Australia and New Zealand for the purpose of intelligence collaboration and data sharing.[23] According to documents leaked by Snowden, the National Defence Radio Establishment (FRA) has been granted access to XKeyscore.[24]
Activists protest Sen. Feinstein’s ‘hypocritical’ support of NSA surveillance
Justice Department to investigate CIA spying on Senate
Dianne Feinstein: CIA Is Spying on the Senate
Feinstein: CIA Spied on Senate Committee
Feinstein: CIA has been spying on Senate computers
“Giving Hypocrisy a Bad Name”: NSA-Backing Senate Intel Chair Blasts CIA for Spying on Torture Probe
Is the CIA Spying on the Senate? | The Rubin Report
NSA Spying On Americans Sen Rand Paul O’Reilly Wake Up America!
America The Great Satan Sen-Feinstein Defends NSA Spying!!!
White House completely blindsided by WaPo report showing NSA spied on Americans – broke privacy regs
“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying
NSA Whistleblowers: “All U.S. Citizens” Targeted By Surveillance
How the Government Tracks You: NSA Surveillance
CIA Spies on Senate Staffers: A Troubling Pattern Is Reinforced
Senator Dianne Feinstein—who traditionally isastalwartdefender of the intelligence community—came out swinging against them this week. While on the floor of the Senate, she laid bare a two year long struggle concerning CIA spying on Senate Intelligence Committee staffers investigating CIA’s early 2000s torture and enhanced interrogation techniques. The spying by CIA crosses a line when it comes to Congressional oversight of the intelligence community. And it’s an emblem of the extreme imbalance between the power of Congress and the power of the intelligence community. If the intelligence community thinks they can act in such a way towards the people who are supposed to oversee them, what else do they think they can do?
How Did This Happen?
According to Senator Feinstein, the spying occurred in a facility provided by CIA to Senate Intelligence staffers. As part of the investigation, CIA agreed to not interfere with the facility or with the Senate Intelligence staff’s computers. After the staffers found a smoking gun document (an internal CIA review) that contradicted CIA’s own conclusions, the staffers—just like with previous documents—transferred it back to their own facility in the Senate. Soon after, the CIA found out about the possession and deleted files on the Senate staffers’ computers not once, but twice. Over 800 documents were deleted. Staffers do not know what those deleted documents contained.
The Oversight Regime Must Be Fixed
Senator Feinstein’s speech is the first step to ensuring Congressional oversight prevails, but the Department of Justice, which is currently conducting an investigation, should not be the only entity to review the details. The latest breach of trust by the intelligence community must spur Congress to exert their oversight powers and begin a full investigation into these actions and the oversight regime at-large.
These are pressing topics. It’s clear that the lack of oversight was a key factor in many of the egregious intelligence activities we learned about from the documents provided by Edward Snowden. The intelligence community evaded answering questions fully, or providing key documents to the intelligence committees. CIA spying is more proof that the oversight regime needs an overhaul. First and foremost, the American people—and Congress—need an oversight regime that works.
A Long Term Pattern
Some people are aghast at CIA’s actions. Details about the spying are sparse; however, it seems CIA may be guilty—at the minimum—of obstruction laws. But we’ve seen this before from the intelligence community. And we don’t have to draw from examples in the 1960s and 70s when the intelligence community was spying on Martin Luther King Jr. or anti-Vietnam activists. All we have to do is look at the past decade.
After the attacks on September 11, it took years for Senator Jay Rockefeller—then the chairman of the Senate Intelligence Community—to get a briefing and key documents for the entire committee about intelligence community actions. More recently, we saw obfuscation by the intelligence community in 2009 when it misled the FISA court. And just last year, the Director of National Intelligence, General James Clapper, lied to Congress about collecting data on innocent Americans. We also know members of Congress describe intelligence briefings as a game of 20 questions. Despite CIA’s original cooperation, it seems clear CIA did not want the Senate staffers to conduct a full investigation.
It should be obvious to anyone that these actions paint a picture—and confirm a pattern—of out-of-control intelligence agencies. The American public is losing a tremendous amount of trust in the intelligence community—trust that is necessary for the intelligence community to conduct its job. But it’s even more dangerous to the government body that is supposed to oversee the intelligence community: Congress.
Congress Must Act
Senator Feinstein’s concern over CIA spying on her staff should extend to a concern about NSA’s collection of all Americans’ calling records. Both actions are examples of intelligence community overreach and abuse of their authorities. There are serious problems when the stalwart defender of the intelligence community takes to the Senate floor to discuss problems with the committee’s oversight.
Beyond Senator Feinstein, Congress must retake its oversight role. For far too long has the intelligence community run roughshod over the intelligence committees. Time and time again, we’ve seen the inability for the intelligence community to grapple with the behemoth of the intelligence community. This must stop. An investigation should be carried out not only into CIA spying, but into the oversight regime as a whole, the classification system, and the egregious actions by the intelligence community—including the activities of NSA. All of these topics are core problems concerning the inability for the Senate Intelligence Committee to be fully briefed—or even grasp—intelligence community actions. This week may have been a loss for Congressional oversight, but members of Congress must reassert their power. Their duty to serve as representatives of the American people demand it.
Rand Paul on alleged CIA-Senate hacking: ‘This cannot happen in a free country’
By Joel Gehrke
Heads should roll at the CIA if Senate Intelligence Committee Chairman Dianne Feinstein, D-Calif., proves that intelligence officers hacked her staff’s computers as part of a dispute over a committee report on waterboarding, Sen. Rand Paul, R-Ky., told reporters.”There’s an incredible arrogance to me that the CIA thinks they can spy on a committee that is providing oversight for the CIA, and I think it’s a real, very serious constitutional breach,” Paul said outside the Senate chamber on Thursday. “This cannot happen in a free country.”Feinstein took to the Senate floor Tuesday to allege that “the CIA just went and searched the committee’s computers.” CIA director John Brennan denied Feinstein’s allegations, telling NBC, “The CIA was in no way spying on [the committee] or the Senate.” That denial has some lawmakers withholding judgement on the matter, at least for now.House Minority Leader Nancy Pelosi, D-Calif., praised Feinstein. “I tell you, you take on the intelligence community, you’re a person of courage, and she does not do that lightly,” Pelosi said during her weekly press briefing Thursday morning. “Not without evidence — when I say evidence, [I mean] documentation of what it is that she is putting forth.”
A behind-the-scenes battle between the CIA and Congress erupted in public Tuesday as the head of the Senate Intelligence Committee accused the agency of breaking laws and breaching constitutional principles in an alleged effort to undermine the panel’s multi-year investigation of a controversial interrogation program.Chairman Dianne Feinstein (D-Calif.) accused the CIA of secretly removing documents, searching computers used by the committee and attempting to intimidate congressional investigators by requesting an FBI inquiry of their conduct — charges that CIA Director John Brennan disputed within hours of her appearance on the Senate floor.
Video
Sen. Dianne Feinstein (D-Calif.) questioned whether a CIA search of congressional records might have undermined government oversight during a Senate floor speech Tuesday.
If true, “this is Richard Nixon stuff,” one senator says.
//
<:ARTICLE>Feinstein described the escalating conflict as a “defining moment” for Congress’s role in overseeing the nation’s intelligence agencies and cited “grave concerns” that the CIA had “violated the separation-of-powers principles embodied in the United States Constitution.”Brennan fired back during a previously scheduled speech in Washington, saying that “when the facts come out on this, I think a lot of people who are claiming that there has been this tremendous sort of spying and monitoring and hacking will be proved wrong.”
The dueling claims exposed bitterness and distrust that have soared to new levels as the committee nears completion of a 6,000-page report that is expected to serve as a scathing historical record of the agency’s use of waterboarding and other brutal interrogation methods on terrorism suspects held at secret CIA prisons overseas after the attacks of Sept. 11, 2001.
Displaying flashes of anger during her floor speech, Feinstein said her committee would soon deliver the report to the White House and push for declassification of a document that lays bare “the horrible details of the CIA program that never, never, never should have existed.”
The latest dispute is in some ways a proxy for a deeper conflict over that document. The CIA and the committee are at odds over many of the report’s conclusions about the effectiveness of the interrogation program, but they are battling primarily over tension that surfaced during the investigation.
Feinstein’s remarks provided the most detailed account of that investigation, describing an arrangement in which the CIA set up a secret facility in Northern Virginia with computers where committee investigators were promised unfettered access to millions of operational cables, executive memos and other files on the interrogation program.
The disagreement between Feinstein and Brennan centers on whether agency employees or committee staff members — or both — abused their access to that shared network to gain an upper hand.
Feinstein implied that the CIA sabotaged the committee’s efforts from the outset, loading a massive amount of files on computers with no index, structure or ability to search. “It was a true document dump,” she said.
Over a period of years, investigators pored over more than 6.2 million classified records furnished by the CIA, using a search tool that agency technical experts agreed to install. But U.S. officials said the committee gained access to a set of documents that the agency never intended to share, files that were generated at the direction of former director Leon E. Panetta as part of an effort to take an inventory of the records being turned over to Feinstein’s panel.
The two sides have engaged in heated exchanges in recent days over the nature of those files and how they were obtained.
Referring to them as the “Panetta internal review,” Feinstein insisted that committee staff members discovered the documents during an ordinary search of the trove. She said they are particularly valuable because in tracking the flow of documents, CIA employees in some cases drew conclusions about their contents that match the subsequent interpretations made by committee staff members.
Jeremy Bash, Panetta’s former chief of staff, said Tuesday that that was never the director’s intent. Panetta “did not request an internal review of the interrogation program,” he said. “He asked the CIA staff to keep track of documents that were being provided. . . . He asked that they develop short summaries of the material, so that we would know what was being provided.”
Meanwhile, a letter that Brennan distributed to the CIA workforce on Tuesday raised questions about Feinstein’s claims and her awareness of how and when the committee obtained what she is calling the Panetta review files.
The letter, which Brennan sent to Feinstein on Jan. 27 and which was attached to a message he sent the workforce, recounts a meeting they had weeks earlier to discuss the matter. During that meeting, Feinstein said she didn’t know that the committee already had copies of the Panetta review. Brennan pushed her to explain why the panel had recently requested the files when they were already in its possession.
“You informed me that you were not aware that the committee staff already had access to the materials you had requested,” Brennan wrote, according to a copy obtained by The Washington Post. Brennan urged Feinstein to work with the agency to determine how the committee had obtained the documents, a request she ultimately rejected, officials said.
The CIA began to suspect that the panel had obtained those files this year after lawmakers referred to the supposed “internal review” publicly. U.S. officials said CIA security personnel then checked the logs of the computer system it had set up for the committee, and found that the files had been moved to a part of the network that was off-limits to the CIA.
“They did something to get those documents,” said a U.S. official briefed on the matter. A security “firewall was breached. They figured out a work-around to get it.” The official declined to elaborate.
Feinstein said the review documents were “identified using the search tool provided by the CIA” but she was careful not to say precisely how they were obtained. “We don’t know whether the documents were provided intentionally by the CIA, unintentionally by the CIA, or intentionally by a whistleblower,” she said.
She acknowledged, however, that committee investigators made hard copies of those files and whisked them away to its offices on Capitol Hill, in part because the committee had previously seen cases in which more than 900 pages of records disappeared from the database with no explanation.
Feinstein expressed outrage that the CIA referred the matter to the FBI. “There is no legitimate reason to allege to the Justice Department that Senate staff may have committed a crime,” she said, describing the move as a “potential effort to intimidate this staff, and I am not taking it lightly.”
She also noted that the referral was made by Robert Eatinger, the CIA’s acting general counsel, who previously served as the top lawyer for the department that ran the CIA’s secret prisons, and who “is mentioned by name more than 1,600 times in our study.”
Feinstein, who has been a staunch supporter of other CIA programs including its drone campaign, said the agency may have violated Fourth Amendment protections against unreasonable searches, as well as laws against domestic surveillance.
Although Republicans on the committee initially voted in favor of opening the investigation, GOP members abandoned the effort after it began and none has voted to endorse it.
Sen. Marco Rubio (R-Fla.), a member of the intelligence panel, told Bloomberg News that the dispute is “more complicated than what’s being put out there by Senator Feinstein or others. . . . I don’t think anyone has a clean hand and I think it’s important for the full truth to come out. I think people may be surprised to learn that, in this case, there were no good guys and maybe two or three bad ones.”
Brennan said he had ordered the CIA’s inspector general to review the agency’s conduct. The inspector general, in turn, has issued a separate referral seeking a Justice Department review.
Asked whether he would resign if the CIA was found to be in the wrong, Brennan said he would let the president decide his fate. “If I did something wrong, I will go to the president,” the director said. “He is the one who can ask me to stay or to go.”
WikiLeaks: US trying to ‘criminalize journalism’ over Snowden leaks
Seeing The Secret State: Six Landscapes [30c3]
Through a PRISM, Darkly – Everything we know about NSA spying
The NSA’s Prism Data Collection System Exposed
Prism NSA National Security Program Revealed
HOW AGENCIES SPY IN DIGITAL AGE BBC NEWS
Glenn Greenwald Piers Morgan On XKEYSCORE. Greenwald
XKeyscore- A New Level of Invasive NSA Data Spying
Lawmakers ‘Disturbed and Angered’ After Classified Briefing Reveals Extent of Snowden Defense Leaks
Leading members of the House Armed Services Committee emerged from a classified briefing on the Edward Snowden leaks Wednesday afternoon “shocked” at the amount of information he reportedly leaked beyond the NSA surveillance programs.
Rep. Mac Thornberry (R-Texas), chairman of the Armed Service panel’s Intelligence, Emerging Threats and Capabilities Subcommittee and also a member of the House Intelligence Committee, said the briefing on the defense consequences of Snowden’s leaks was “very highly classified,” and therefore details couldn’t be discussed.
Thornberry did say that lawmakers “left the briefing disturbed and angered” after hearing that the leaks by the former Booz Allen Hamilton employee “went well beyond programs associated with the NSA and data collection.”
He characterized the leaks as so severe that they “compromise military capability and defense of the country” and “could cost lives” — while they “will certainly cost billions to repair.”
“His actions were espionage, plain and simple,” Thornberry said.
Armed Services Chairman Buck McKeon (R-Calif.) read his statement rather than making comments on the fly “because of the seriousness of this issue and the sensitivity” of the information they’d just heard.
“Ed Snowden isn’t a whistleblower; he’s a traitor,” McKeon said.
No matter what opinion people hold of the data collection programs, he added, people should be “shocked and outraged to find that a substantial amount of the information has nothing to do with the NSA.”
“He’s given our enemies an edge and put American lives at risk,” said the chairman.
McKeon said Americans should “demand” that Snowden be “brought to justice” and not be extended any sort of deal by the government.
Story 1: Got Google Glass — Explorer 2.0 With New Form Factor — Department of Homeland Security Questions You! — Videos
I used Google Glass
Google Glasses (how it works)
How Guys Will Use Google Glass
Google Glass Review
Google Glass Cracked
CNET Top 5 : Best uses for Google Glass
Introduction to Google Glass
Google Glass Hacked?
Google Glass Explorer Edition: Explained!
Explorer Story: Patrick Jackson [through Google Glass]
Google Glass Explorer Edition 2.0 Unboxing and First Impressions
Amazing Google Glasses Demonstration at Google I/O 2012
GOOGLE GLASS FOR KIDS!
GOOGLE GLASS SUCKS!
Introducing Google Nose
Google Glasses Project
Motion Picture Association of America
“TITS and GLASS”: Porn Blocked from Google Glass
WTF- Porn App Coming Soon On Google Glass
Google Glass Bans PORN
Police Wearing Google Glass-type System to Record Encounters
Story 1: Got Google Glass — Explore 2.0 With New Form Factor — Department of Homeland Security Questions You! — Videos
AMC movie theater calls “federal agents” to arrest a Google Glass user
By: Julie Strietelmeier
A long time Gadgeteer reader contacted me today through Google Hangouts to tell me that he had a story that he thought I’d be interested in reading. He then forwarded me a long email with a story from a very good friend of his. It was such a surprising story that I asked if I could have permission to post it here on The Gadgeteer. I ended up communicating with the author of the story and have posted it here for everyone to read…
I have been using Google Glass for about 2 months now, and about 2 weeks ago I got prescription lenses for the glasses. So in the past two weeks I was wearing Google Glass all the time. There were no stories to write about, until yesterday (1/18/2014).
I went to AMC (Easton Mall, Columbus, OH) to watch a movie with my wife (non- Google Glass user). It is the theater we go to every week, so it has probably been the third time I’ve been there wearing Google Glass, and the AMC employees (guy tearing tickets at the entrance, girl at the concession stand) have asked me about Glass in the past and I have told them how awesome Glass is with every occasion.
Because I don’t want Glass to distract me during the movie, I turn them off (but since my prescription lenses are on the frame, I still wear them). About an hour into the movie (Jack Ryan: Shadow Recruit), a guy comes near my seat, shoves a badge that had some sort of a shield on it, yanks the Google Glass off my face and says “follow me outside immediately”. It was quite embarrassing and outside of the theater there were about 5-10 cops and mall cops. Since I didn’t catch his name in the dark of the theater, I asked to see his badge again and I asked what was the problem and I asked for my Glass back. The response was “you see all these cops you know we are legit, we are with the ‘federal service’ and you have been caught illegally taping the movie”.
I was surprised by this and as I was obviously just having a nice Saturday evening night out with my wife and not taping anything whether legally or illegally, I tried to explain that this is a misunderstanding. I tried to explain that he’s holding rather expensive hardware that costed me $1500 for Google Glass and over $600 for the prescription glasses. The response was that I was searched and more stuff was taken away from me (specifically my personal phone, my work phone – both of which were turned off, and my wallet). After an embarrassing 20-30 minutes outside the movie theater, me and my wife were conducted into two separate rooms in the “management” office of Easton Mall, where the guy with the badge introduced himself again and showed me a different ID. His partner introduced herself too and showed me a similar looking badge. I was by that time, too flustered to remember their names (as a matter of fact, now, over 30 hours later I am still shaking when recounting the facts).
What followed was over an hour of the “feds” telling me I am not under arrest, and that this is a “voluntary interview”, but if I choose not to cooperate bad things may happen to me (is it legal for authorities to threaten people like that?). I kept telling them that Glass has a USB port and not only did I allow them, I actually insist they connect to it and see that there was nothing but personal photos with my wife and my dog on it. I also insisted they look at my phone too and clear things out, but they wanted to talk first. They wanted to know who I am, where I live, where I work, how much I’m making, how many computers I have at home, why am I recording the movie, who am I going to give the recording to, why don’t I just give up the guy up the chain, ’cause they are not interested in me. Over and over and over again.
I kept telling them that I wasn’t recording anything – my Glass was off, they insisted they saw it on. I told them there would be a light coming out the little screen if Glass was on, and I could show them that, but they insisted that I cannot touch my Glass for the fear “I will erase the evidence against me that was on Glass”. I didn’t have the intuition to tell them that Glass gets really warm if it records for more than a few minutes and my glasses were not warm. They wanted to know where I got Glass and how did I came by having it. I told them I applied about 1000 times to get in the explorer program, and eventually I was selected, and I got the Glass from Google. I offered to show them receipt and Google Glass website if they would allow me to access any computer with internet. Of course, that was not an option. Then they wanted to know what does Google ask of me in exchange for Glass, how much is Google paying me, who is my boss and why am I recording the movie.
Eventually, after a long time somebody came with a laptop and an USB cable at which point he told me it was my last chance to come clean. I repeated for the hundredth time there is nothing to come clean about and this is a big misunderstanding so the FBI guy finally connected my Glass to the computer, downloaded all my personal photos and started going though them one by one (although they are dated and it was obvious there was nothing on my Glass that was from the time period they accused me of recording). Then they went through my phone, and 5 minutes later they concluded I had done nothing wrong.
I asked why didn’t they just take those five minutes at the beginning of the interrogation and they just left the room. A guy who claimed his name is Bob Hope (he gave me his business card) came in the room, and said he was with the Movie Association and they have problems with piracy at that specific theater and that specific movie. He gave me two free movie passes “so I can see the movie again”. I asked if they thought my Google Glass was such a big piracy machine, why didn’t they ask me not to wear them in the theater? I would have probably sat five or six rows closer to the screen (as I didn’t have any other pair of prescription glasses with me) and none of this would have happened. All he said was AMC called him, and he called the FBI and “here are two more passes for my troubles”. I would have been fine with “I’m sorry this happened, please accept our apologies”. Four free passes just infuriated me.
Considering it was 11:27pm when this happened, and the movie started at 7.45, I guess 3 and a half hours of my time and the scare my wife went through (who didn’t know what was going on as nobody bothered to tell her) is worth about 30 bucks in the eyes of the Movie Association and the federal militia (sorry, I cannot think of other derogatory words). I think I should sue them for this, but I don’t have the time or the energy to deal with “who is my boss – they don’t want me, they want the big guy” again, so I just spilled the beans on this forum, for other to learn from my experience.
I guess until people get more familiar with Google Glass and understand what they are, one should not wear them to the movies. I wish they would have said something before I went to the movies, but it may be my mistake for assuming that if I went and watched movies two times wearing Glass with no incident the third time there won’t be any incident either. As for the federal agents and their level of comprehension… I guess if they deal with petty criminals every day, everybody starts looking like a petty criminal. Again, I wish they would have listened when I told them how to verify I did nothing illegal, or at least apologize afterwards, but hey… this is the free country everybody praises. Somewhere else might be even worse.
Crazy huh? His story read like something out of the Jack Ryan movie that he and his wife had gone to see. Are there any other Google Glass users out there that have been treated badly just for your wearable tech? If not, are you reconsidering wearing a pair to the next movie you attend?
Update (01/21/14):
Wow, this article has completely blown up our web server due to the traffic. I just wanted to follow up with a few comments and info. First of all, I’m not a journalist, I’m a tech geek writer. Posting this article has given me a good learning lesson though, which I’ll use if I ever post a similar article in the future.
I have been criticized for not citing my sources and following up with the theater to verify that the story was true. I didn’t feel the need at the time because the person who gave me the story is a long time Gadgeteer reader and works in law enforcement. I felt 100% confident the story was not a hoax. I did however call the theater in question and tried to get in touch with someone there for a comment. My calls went unanswered.
After the article was posted. Rob Jackson of Phandroid posted his take on the article and asked me for the author’s contact info. With the author’s permission, I forwarded that info and Rob followed up with some questions and answers that he posted on his site. Take a look for more info on this story:
I just received info from the author with regards to the agents that questioned him:
For the sake of having all the facts right.
I have been trying to find out who the agents that “interviewed” me at
AMC were, so I asked help from a guy I know at FBI. I worked with this
guy in the past when I was employed at a webhosting company. He did
some digging, and he tells me the “federal agents”
talking to me were DHS.
Update #3:
The title of the article has been changed to reflect the recent update from the author that it was actually the DHS (Department of Homeland Security) who detained him and not the FBI as he originally thought.
Update #4:
The story has been confirmed. I just received this email from the author:
Julie, Rob.
I spoke with a reporter from Columbus Dispatch, who obtained a
statement from DHS and forwarded it to me. Here it is:
From: Walls, Khaalid H [mailto:Khaalid.H.Walls@ice.dhs.gov]
Sent: Tuesday, January 21, 2014 1:16 PM
To: Allison Manning
Subject: ICE
H Ally,
Please attribute the below statement to me:
On Jan. 18, special agents with ICE’s Homeland Security Investigations
and local authorities briefly interviewed a man suspected of using an
electronic recording device to record a film at an AMC theater in
Columbus. The man, who voluntarily answered questions, confirmed to
authorities that the suspected recording device was also a pair of
prescription eye glasses in which the recording function had been
inactive. No further action was taken.
Khaalid Walls, ICE spokesman
Khaalid Walls
Public Affairs Officer
U.S. Immigration and Customs Enforcement (ICE)
Google Glass at the movies gets man interrogated
A man wearing Google Glass in an Ohio movie theater says the FBI pulled him out and accused him of recording the movie with his device.
There are enemies of the state, and then there are enemies of Jack Ryan.
A Google Glass wearer has told an extraordinary story of going to his local movie theater in Ohio and allegedly being accosted by the FBI for wearing his device.
Google Glass wearers, beware.(Credit: Federal Bureau of Investigations)
He was, he said, wearing Google Glass. His wife accompanied him, Glass-less.
What allegedly transpired was macabre. He wrote that it was not the first time he’d worn Glass to that theater.
However, an hour into the movie: “A guy comes near my seat, shoves a badge that had some sort of a shield on it, yanks the Google Glass off my face and says ‘follow me outside immediately.'”
Outside, he said, was a group of policemen. T.U. says that the man who dragged him out explained he was from the “federal service.”
What was the Glass-wearer’s alleged crime? He was, he said, being accused of recording the movie on his device.
He wrote:
I tried to explain that he’s holding rather expensive hardware that costed me $1500 for Google Glass and over $600 for the prescription glasses. The response was that I was searched and more stuff was taken away from me (specifically my personal phone, my work phone – both of which were turned off, and my wallet).
T.U. insisted that he wasn’t recording anything. The Glass was off. He wasn’t believed.
I kept telling them that I wasn’t recording anything — my Glass was off, they insisted they saw it on. I told them there would be a light coming out the little screen if Glass was on, and I could show them that, but they insisted that I cannot touch my Glass for the fear ‘I will erase the evidence against me that was on Glass’
T.U. said that he was happy for his Google Glass to be hooked up to a laptop to prove there was nothing recorded on it.
He wrote:
The FBI guy finally connected my Glass to the computer, downloaded all my personal photos and started going though them one by one (although they are dated and it was obvious there was nothing on my Glass that was from the time period they accused me of recording). Then they went through my phone, and 5 minutes later they concluded I had done nothing wrong.
Finally, T.U. said that the FBI left and a man from the “Movie Association” entered and told him that they’d had trouble with people recording at that theater. He says he was offered free movie passes to see the Jack Ryan movie again.
In the comments section of her piece, the Gadgeteer’s Julie Strietelmeier insisted: “I talked to the author and know his friend who has frequented The Gadgeteer for years. I believe them and the story.”
I have contacted AMC in an attempt to confirm that the substance of this story is true and will update, should I hear. It will be interesting to see if an anti-Google Glass stance is, indeed, AMC policy.
This is merely the latest incident in which Google Glass has caused consternation. Some bars and restaurants have banned wearers. Only last week, software developer Cecilia Abadie won her case against a ticket for driving while Glassing. Just as T.U. claimed, she said hers was turned off.
T.U. seemed merely relieved that the ordeal — which he said lasted more than three hours — was over. Still, he said he wished someone had told him that wearing Glass at the movie theater wasn’t allowed.
As for the “federal service,” he wasn’t impressed with their alleged lack of understanding about Google Glass. He wrote: “I guess if they deal with petty criminals every day, everybody starts looking like a petty criminal.”
Google Glass is becoming anything but petty.
Google Glass moviegoer detained for hours on suspicion of piracy
A man attending a movie on Saturday at an AMC theater in Columbus, Ohio was pulled from a theater, detained, and questioned for over two hours by US Dept. of Homeland Security special agents tasked with fighting piracy – all for wearing Google Glass.
The man, who asked to remain anonymous, said that about an hour into a 19:45 EST showing of ‘Jack Ryan: Shadow Recruit,’ a man who flashed an official-looking badge “yank[ed] the Google Glass” off his face, asking him to exit the theater. The man was attending the film with his wife at the AMC theater at Easton Town Center.
Two officers then ordered him to hand over his wallet and both his work and personal cell phones, according to tech site The Gadgeteer. The man said he was questioned for 20 or 30 minutes on why he was attempting to record the film. Because he had recently added prescription lenses to his Google Glass, the 35-year-old man wore them into the movie. The device has a voice-activated computer and does have an attached camera.
“I said, ‘Want me to prove I’m not recording the movie? It’s very easy,’” the man told the Columbus Dispatch on Tuesday. He said he indicated to the agents that Google Glass has a USB port where the device can be reviewed. “There’s nothing but pictures of my wife and my dog on it,” he told the agents.
The agents declined, electing to detain and question the man in a downstairs “management” office for around two hours, repeatedly asking the same questions again and again. The man says he was asked who he was working for, how many computers he had at home, why he had attempted to record the film, and “why don’t I just give up the guy up the chain.” The agents, of the US Immigration and Customs Enforcement (ICE), finally reviewed the device to see there was no material of interest. He was allowed to leave just after 23:00 EST, with two free movie passes.
The Columbus Dispatch learned the agents were from ICE’s Homeland Security Investigations unit, which is tasked with combating piracy and counterfeit goods.
ICE spokesman Khaalid Walls said the unit and local authorities “briefly interviewed a man suspected of using an electronic recording device to record a film.”
“The man, who voluntarily answered questions, confirmed to authorities that the suspected recording device was also a pair of prescription eye glasses in which the recording function had been inactive. No further action was taken,” Walls said in a statement.
An AMC spokesman said the Motion Picture Association of America (MPAA) was at the same theater last weekend when the man wearing Google Glass was pointed out. An MPAA representative flagged the man thought to be recording the film for the Department of Homeland Security.
“While we’re huge fans of technology and innovation, wearing a device that has the capability to record video is not appropriate at the movie theater,” AMC’s Ryan Noonan said.
The MPAA said in a statement that it has not seen any reason to believe that Google Glass poses a threat that could lead to film piracy.
The man said he acquired Google Glass in November during Google’s exclusive offer, known as the Explorer program. He and around 30,000 others have paid US$1,500 to test-run the device before it is released to the public later this year. In addition, the prescription lenses cost him $600.
He said he regrets wearing Glass to a movie, despite having done so in the recent past at the same theater without issue.
“I realize it’s stupid to have a device with a camera pointed at the screen,” he said. “But I didn’t even think of it, because I don’t use Google Glass to record other people.”
oogle promises that Glass, its new augmented reality eyepiece, will open up a new world of hands-free computing — a way to search, translate, record video, and take photographs without having to press buttons or rummage through pockets to retrieve a smartphone or tablet.
There are lots of potential applications. To start things off, Google lists cooking, cycling, skiing, golf, and firefighting — physical activities where holding a device is impractical if not impossible. But really, it was only a matter of time before people began using it for sex.
The first attempt, an app called Tits and Glass, allowed Glass users to stream pornographic images to their headset. The app was promptly banned from Google’s app store, but was recently reinstated.
Now a new app for Glass developed by Lebanese product design student Sherif Maktabi and called Sex with Google Glass lets couples use the wearable technology to record their intimate activities, and — if both partners are wearing a headset — even see sex through their partner’s eyes by streaming the view from their respective devices.
The app is controlled through groan-worthy voice commands. For example, saying “Ok Glass, it’s time” begins the recording process. Once sex is over, recording is ended by the voice command “Ok Glass, pull out.” Video can be replayed for up to five hours before being automatically deleted from the app.
Frankly, I think the idea of having sex while watching a stream from the perspective of your partner sounds narcissistic at best, and mildly disturbing at worst, so I highly doubt that this feature will become immensely popular. And putting a barrier of technology between partners may prove a turnoff and intimacy killer for many.
But Glass as a tool to easily record or stream homemade porn? There is probably a big market for this kind of thing.
Concerns about morals or privacy aside, it’s important to remember that porn is a big driver of technology adoption. The adult film industry has been at the forefront of technology for years, at least since it picked VHS over Betamax. Technological innovations pioneered by the porn industryinclude online payment systems, streaming video and video chat, DVD, and HD video formats.
It’s hard to say at this point if augmented reality computing will usurp smartphones, tablets, and laptops, or if it will remain a niche activity. But if augmented reality computing like Google Glass is really going to take off and become a market leader, it should be expected that sex and porn will be a key driver of adoption. The fact that some people are already using Google Glass for sex paints a rosy picture for the technology in the longer term.
The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.
While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.
The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.
Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”
“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
No Domestic Use Seen
There is no evidence that the N.S.A. has implanted its software or used its radio frequency technology inside the United States. While refusing to comment on the scope of the Quantum program, the N.S.A. said its actions were not comparable to China’s.
“N.S.A.’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”
Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.’s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
President Obama is scheduled to announce on Friday what recommendations he is accepting from an advisory panel on changing N.S.A. practices. The panel agreed with Silicon Valley executives that some of the techniques developed by the agency to find flaws in computer systems undermine global confidence in a range of American-made information products like laptop computers and cloud services.
Embracing Silicon Valley’s critique of the N.S.A., the panel has recommended banning, except in extreme cases, the N.S.A. practice of exploiting flaws in common software to aid in American surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants.
Richard A. Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the group’s reasoning in an email last week, saying that “it is more important that we defend ourselves than that we attack others.”
“Holes in encryption software would be more of a risk to us than a benefit,” he said, adding: “If we can find the vulnerability, so can others. It’s more important that we protect our power grid than that we get into China’s.”
From the earliest days of the Internet, the N.S.A. had little trouble monitoring traffic because a vast majority of messages and searches were moved through servers on American soil. As the Internet expanded, so did the N.S.A.’s efforts to understand its geography. A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
That map suggests how the United States was able to speed ahead with implanting malicious software on the computers around the world that it most wanted to monitor — or disable before they could be used to launch a cyberattack.
A Focus on Defense
In interviews, officials and experts said that a vast majority of such implants are intended only for surveillance and serve as an early warning system for cyberattacks directed at the United States.
“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” a senior official, who compared it to submarine warfare, asked in an interview several months ago.
“That is what the submarines do all the time,” said the official, speaking on the condition of anonymity to describe policy. “They track the adversary submarines.” In cyberspace, he said, the United States tries “to silently track the adversaries while they’re trying to silently track you.”
If tracking subs was a Cold War cat-and-mouse game with the Soviets, tracking malware is a pursuit played most aggressively with the Chinese.
The United States has targeted Unit 61398, the Shanghai-based Chinese Army unit believed to be responsible for many of the biggest cyberattacks on the United States, in an effort to see attacks being prepared. With Australia’s help, one N.S.A. document suggests, the United States has also focused on another specific Chinese Army unit.
Documents obtained by Mr. Snowden indicate that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers. When the Chinese place surveillance software on American computer systems — and they have, on systems like those at the Pentagon and at The Times — the United States usually regards it as a potentially hostile act, a possible prelude to an attack. Mr. Obama laid out America’s complaints about those practices to President Xi Jinping of China in a long session at a summit meeting in California last June.
At that session, Mr. Obama tried to differentiate between conducting surveillance for national security — which the United States argues is legitimate — and conducting it to steal intellectual property.
Obamacare Delay – Critics – THE BIG QUESTION: Is Obama A President Or A King? – The Kelly File
ObamaCare: Three Years of Broken Promises
Henry Chao: 30-40% of HealthCare.gov Still Needs To Be Built
DHS Cannot Provide Answers Regarding the Security of Healthcare.gov
Obamacare Website Healthcare.gov Crashes During Secretary Kathleen Sebelius’ Visit
Pelosi taken apart by David Gregory on false Obamacare promises
Dennis Miller-special Nancy Pelosi
11-13-13 “ObamaCare Implementation: The Rollout of HealthCare.gov” Pt. I
11-13-13 “ObamaCare Implementation: The Rollout of HealthCare.gov” Pt. 2
11-13-13 “ObamaCare Implementation: The Rollout of HealthCare.gov” Pt. 3
Megyn Kelly Outraged Obama Lied about Americans being able to keep coverage, shows proof
Megyn Kelly Interviews Charles Krauthammer on Obamacare Outrage – Kelly File – 10/30/13
More Than a Website
Health Site Is Improving But Likely to Miss Saturday Deadline
By
Louise Radnofsky and Spencer E. Ante
Despite recent progress at HealthCare.gov, a raft of problems will remain beyond the Obama administration’s Saturday deadline to make the troubled federal insurance website work.
The news isn’t all bad: Users say the site looks better, pages load faster, and more people are getting through to sign up for health plans.
But technical problems still affect HealthCare.gov’s ability to verify users’ identities and transmit accurate enrollment data to insurers, officials say. The data center that supports the site faces continuing challenges, and tools for processing payments to insurers haven’t been built.
Technical staff in Washington have been racing up to the end-of-November deadline. In their last public pronouncement on the effort, three days before the deadline, officials said they had much to do to get the site into a condition where it functions smoothly for a majority of users.
The success of the White House’s signature domestic initiative is riding on the technicians’ ability to fix the site, as well as the rest of the federal technology supporting enrollment. Across the nation, that effort is being eyed hopefully by supporters of the law, since the site is the centerpiece of the effort to overhaul American health care and extend coverage to millions of people.
Those hopes were deflated by a series of blows for the administration right up until Nov. 30, and the site continued to experience outages, both planned and unplanned, in the week leading up to the deadline.
The Wall Street Journal reported on Wednesday that the administration was planning to change its Web-hosting provider from Verizon Communications Inc. VZ -0.62%Verizon Communications Inc. U.S.: NYSE $49.62 -0.31 -0.62% Nov. 29, 2013 1:00 pm Volume (Delayed 15m) : 4.30M AFTER HOURS $49.79 +0.17 +0.34% Nov. 29, 2013 4:42 pm Volume (Delayed 15m): 611,247 P/E Ratio 65.29 Market Cap $141.91 Billion Dividend Yield 4.27% Rev. per Employee $651,745 11/27/13 H-P Will Replace Verizon for W… 11/20/13 Investors Tell AT&T, Verizon t… 11/18/13 Supreme Court Declines to Hear…More quote details and news »VZ in Your Value Your Change Short position subsidiary Terremark to Hewlett-Packard Co. in the spring, a complex transition that could introduce new challenges and take months; and the same day, the administration said it was shelving for a year any attempts to operate an online exchange for small businesses. On Wednesday, Verizon declined to comment on its clients.
Officials mixed optimism with caution. “November 30th does not represent a relaunch of HealthCare.gov,” said Julie Bataille, a spokeswoman for the government’s Centers for Medicare and Medicaid Services, which operates the site. “It is not a magical date. There will be times after November 30th when the site, like any website, does not perform optimally.”
For the fix-it drive that began in late October, the administration tapped former White House adviser Jeff Zients and QSSI, a unit of UnitedHealth Group, to act as the new lead contractor, establishing a 24-hour “war room” operations center to coordinate contractors who previously weren’t working well together. Since then, officials have focused on fixing the kinds of wrinkles that were most obvious to users.
They have reported success in speeding up the response time of the system, lowering it from an average of eight seconds at launch to less than one second for most users. They say they have eliminated a host of glitches in the software so that pages now load incorrectly less than 1% of the time. And they say they have added “visual cues” to help users navigate the system more easily.
Technicians have been racing to add new computer server, storage and database capacity to the website, hoping to get the site ready to withstand 50,000 simultaneous users by Sunday, as was originally intended, said people familiar with the work. “I think we are close,” said one.
Some people involved with enrollment say they have seen a notable uptick in recent weeks. Maine Community Health Options, a nonprofit plan based in Lewiston, Maine, now is getting “hundreds of enrollments” a day, rather than the dozens it saw trickling in earlier this month, said Chief Executive Kevin Lewis.
But problems with the performance of the site’s databases, storage and servers and their interaction with each other continue to slow the site or make it unavailable for short periods, according to government officials and contractors working on the project.
Explore how America’s health-care overhaul will affect you on this first-person adventure. CLICK THE IMAGEto start interactive experience.
Karen Egozi, CEO of the Epilepsy Foundation of Florida, which has trained nearly 50 people to help others enroll, said the performance of the website has improved in recent weeks but suffers from unpredictable glitches. On Nov. 19, Secretary of Health and Human Services Kathleen Sebelius visited a medical center in Miami and watched a member of Ms. Egozi’s staff help a couple fill out an application. The website failed, in front of a local TV camera crew.
On the weekend of Nov. 23 and 24, Ms. Egozi said her navigators were able to sign up a few people. But on Nov. 25, she said the site was down for a little while. “Sometimes, similar to when the secretary was here, the site does not let us through to the next section,” she said. “It was not working today, but yesterday it worked well.”
One source of early problems: The government had bought web-hosting services from Terremark subsidiary that initially gave it a highly virtualized system of servers shared by other groups within the Medicare center, rather than a dedicated group of computer servers for HealthCare.gov. Plans are in place to replace the Verizon unit with H-P this spring.
HHS also didn’t initially contract for a backup website or monitoring tools like those used by sophisticated consumer sites, according to people familiar with the matter.
The website still has no separate backup copy, but it did replace the virtual database with dedicated hardware, and bought and installed monitoring software.
Meanwhile, the site has a backlog of users who encountered problems in its first weeks of operation. Some appear to be locked out from the early stages unless they can get their account deleted. Others are stuck at the next big stage, persuading the federal government of their identity and their income so their application for tax credits can be processed.
Yannette Castellano waits to talk to a navigator about health-care options available under the Affordable Care Act, at the North Shore Medical Center, on Nov. 19 in Miami. AP
Guy Dicharry of Los Lunas, N.M., said he had been in limbo at the identity-verification stage since Oct. 5, despite giving the site personal information several times so it can confirm his income. He hasn’t heard back about a paper application submitted Nov. 1.
“This has been botched and is not getting fixed. If it’s not fixed, I’ll be ringing in 2014 as a newly uninsured person. I suspect that is the opposite of what the ACA was supposed to achieve,” said Mr. Dicharry, who described himself as a supporter of the Affordable Care Act. Because of their age and income, Mr. Dicharry and his wife stand to gain valuable subsidies toward the cost of coverage, but only if he buys it through the website.
Ronald Gallagher of Paradise Valley, Ariz., said he had been helping his daughter shop for coverage. After 16 hours over four days starting Oct. 1, they were told her identity was verified and she could pick a plan. But when they logged in to the website, it said her application was “In Progress.”
After failing to get help from a call center, father and daughter filled out an application over the phone in early November, but they still haven’t received a letter telling what insurance plans she qualifies for. “So far, nothing the government has done has worked,” Mr. Gallagher said.
Even when people successfully enroll, insurers say they sometimes get incorrect data. Ms. Bataille, the government spokeswoman, said officials have seen “marked improvements” in the information transmitted to insurers but “we know there are still issues that remain.” An HHS official also said that there had been improvements in identity verification, but that the agency knew it wasn’t fully fixed.
Mr. Lewis of Maine Community Health Options also worried about a larger volume of applicants, especially since insurers have now been told to find ways to process applications that come in from people as late as Dec. 23 in time for their coverage to begin Jan. 1, rather than a previous Dec. 15 deadline.
If “there’s an avalanche on that last date, I don’t know if the system will be able to support all that,” he said.
TRUTH about EBT SYSTEM / FOOD STAMPS SHUTDOWN – Are you PREPARED for SOCIAL UNREST & MARTIAL LAW?
Cab Driver, Woman Speak Out About Food Stamp, EBT Card Fraud
Get an EBT card
Food Stamps EBT Shut Down Declined
Link EBT) STOPPED FULL CARTS ALL OVER STORES ALL OVER AMERICA, Government SHUT DOWN NWO on the WAY,
Background Articles and Videos
Eat Your Last Meal!!! EBT, WIC,& FOOD STAMPS TO END in exchange for MICROCHIPPING TO BEGIN!!
People in Ohio, Michigan and 15 other states found themselves unable to use their food stamp debit-style cards on Saturday, after a routine test of backup systems by vendor Xerox Corp. resulted in a system failure.
At about 9 a.m. Saturday, reports from across the country began pouring in that customers’ EBT cards were not working in stores.
At 2 p.m., an EBT customer service representative told CBS Boston that the system was currently down for a computer system upgrade.
Xerox spokeswoman Jennifer Wasmer released further details later in the afternoon in an emailed statement.
“While the electronic benefits system is now up and running, beneficiaries in the 17 affected states continue to experience connectivity issues to access their benefits. Technical staff is addressing the issue and expect the system to be restored soon,” Wasmer said. “Beneficiaries requiring access to their benefits can work with their local retailers who can activate an emergency voucher system where available. We appreciate our clients’ patience while we work through this outage as quickly as possible.”
Wasmer said the affected states also included Alabama, California, Georgia, Iowa, Illinois, Louisiana, Massachusetts, Maryland, Mississippi, New Jersey, Oklahoma, Pennsylvania, Texas and Virginia.
U.S. Department of Agriculture spokeswoman Courtney Rowe said the outage is not related to the government shutdown.
Shoppers left carts of groceries behind at a packed Market Basket grocery store in Biddeford, Maine, because they couldn’t get their benefits, said fellow shopper Barbara Colman, of Saco, Maine. The manager put up a sign saying the EBT system was not in use. Colman, who receives the benefits, called an 800 telephone line for the program and it said the EBT system was down due to maintenance, she said.
“That’s a problem. There are a lot of families who are not going to be able to feed children because the system is being maintenanced,” Colman said. She planned to reach out to local officials. “You don’t want children going hungry tonight because of stupidity,” she said.
Colman said the store manager promised her that he would honor the day’s store flyer discounts next week.
Ohio’s cash and food assistance card payment systems went down at 11 a.m., said Benjamin Johnson, a spokesman for the Ohio Department of Job and Family Services. Ohio’s cash system has been fixed, but he said that its electronic benefits transfer card system is still down. Johnson said Xerox is notifying retailers to revert to the manual system, meaning customers can spend up to $50 until the system is back online. Recipients of the state’s supplemental nutrition assistance program, or SNAP, should call the 800 number on the back of their card, and Xerox will guide them through the purchase process.
Illinois residents began reporting problems with their cards — known as LINK in that state — on Saturday morning, said Januari Smith, spokeswoman for the Illinois Department of Human Services.
Smith said that typically when the cards aren’t working retailers can call a backup phone number to find out how much money customers have available in their account. But that information also was unavailable because of the outage, so customers weren’t able to use their cards.
“It really is a bad situation but they are working to get it fixed as soon as possible,” Smith said. “We hope it will be back up later today.”
In Clarksdale, Miss. — one of the poorest parts of one of the poorest states in the nation — cashier Eliza Shook said dozens of customers at Corner Grocery had to put back groceries when the cards failed Saturday because they couldn’t afford to pay for the food. After several hours, she put a sign on the front door to tell people about the problem.
“It’s been terrible,” Shook said in a phone interview. “It’s just been some angry folks. That’s what a lot of folks depend on.”
Mississippi Department of Human Services director Rickey Berry confirmed that Xerox, the state’s EBT vendor, had computer problems. He said he had been told by midafternoon that the problems were being fixed.
“I know there are a lot of mad people,” Berry said.
Sheree Powell, a spokeswoman for the Oklahoma Department of Human Services, started receiving calls around 11:30 a.m. about problems with the state’s card systems. More than 600,000 Oklahomans receive SNAP benefits, and money is dispersed to the cards on the first, fifth and 10th days of every month, so the disruption came at what is typically a high-use time for the cards.
Oklahoma also runs a separate debit card system for other state benefits like unemployment payments. Those cards can be used at ATMs to withdraw cash. Powell said Xerox administers both the EBT and debit card systems, and they both were down initially.
Like Ohio’s Johnson, Powell said that Oklahoma’s cash debit card system has since been restored, but the EBT cards for the SNAP program were still down. Powell said Oklahoma’s Xerox representative told them that the problems stemmed from a power failure at adata center, and power had been restored quickly.
“It just takes a while to reboot these systems,” she said, adding that she did not know where the data center was located.
The federal EBT website was unavailable due to the government shutdown.
National Security Agency Is Still Massively Collecting All Your Communications — The USA Freedom Act Is At Best A Baby Step Towards Restoring Your Fourth Amendment Constitutional Rights — Fire Your Representatives For Betraying Their Oath Of Office — NSA Turnkey Tyranny Totalitarian Targeting of American People — Videos
Posted on June 12, 2015. Filed under: American History, Articles, Blogroll, Books, British History, Business, College, Communications, Computers, Computers, Constitution, Corruption, Data Storage, Defense Intelligence Agency (DIA), Documentary, Economics, Education, European History, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, government, government spending, history, Illegal, Immigration, Investments, Islam, Law, Legal, liberty, Life, Links, media, Middle East, Money, National Security Agency (NSA), National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Press, Psychology, Radio, Radio, Rants, Raves, Regulations, Resources, Systems, Tax Policy, Taxation, Taxes, Technology, Terrorism, Video, War, Weapons, Welfare, Wisdom, Writing | Tags: 2 June 2015, America, articles, Audio, Betraying Their Oath Of Office, Bill Binney, Breaking News, Broadcasting, capitalism, Cartoons, Charity, Citizenship, Clarity, Classical Liberalism, Collectivism, Commentary, Commitment, Communicate, Communication, Concise, Convincing, Courage, Culture, Current Affairs, Current Events, economic growth, economic policy, Economics, Education, Edward Snowden, Evil, Experience, Faith, Family, Filibuster, First, fiscal policy, Fourth Amendment Constitutional Rights, free enterprise, freedom, freedom of speech, Friends, Give It A Listen, God, Good, Goodwill, Growth, Hope, Individualism, Knowledge, liberty, Life, Love, Lovers of Liberty, monetary policy, MPEG3, National Security Agency, News, NSA, NSA Turnkey Tyranny, NSA WHISTLEBLOWER, Opinions, ourth Amendment Constitutional Rights, Peace, Photos, Podcasts, Political Philosophy, Politics, prosperity, Radio, Rand Paul, Raymond Thomas Pronk, Representative Republic, Republic, Resources, Respect, rule of law, Rule of Men, Show Notes, Spying of American People, Talk Radio, The Pronk Pops Show, The Pronk Pops Show 476, Truth, Tyranny, U.S. Constitution, United States of America, USA Freedom Act, Videos, Virtue, War, Wisdom |
The Pronk Pops Show Podcasts
Pronk Pops Show 476 June 2, 2015
Pronk Pops Show 475 June 1, 2015
Pronk Pops Show 474 May 29, 2015
Pronk Pops Show 473 May 28, 2015
Pronk Pops Show 472 May 27, 2015
Pronk Pops Show 471 May 26, 2015
Pronk Pops Show 470 May 22, 2015
Pronk Pops Show 469 May 21, 2015
Pronk Pops Show 468 May 20, 2015
Pronk Pops Show 467 May 19, 2015
Pronk Pops Show 466 May 18, 2015
Pronk Pops Show 465 May 15, 2015
Pronk Pops Show 464 May 14, 2015
Pronk Pops Show 463 May 13, 2015
Pronk Pops Show 462 May 8, 2015
Pronk Pops Show 461 May 7, 2015
Pronk Pops Show 460 May 6, 2015
Pronk Pops Show 459 May 4, 2015
Pronk Pops Show 458 May 1, 2015
Pronk Pops Show 457 April 30, 2015
Pronk Pops Show 456: April 29, 2015
Pronk Pops Show 455: April 28, 2015
Pronk Pops Show 454: April 27, 2015
Pronk Pops Show 453: April 24, 2015
Pronk Pops Show 452: April 23, 2015
Pronk Pops Show 451: April 22, 2015
Pronk Pops Show 450: April 21, 2015
Pronk Pops Show 449: April 20, 2015
Pronk Pops Show 448: April 17, 2015
Pronk Pops Show 447: April 16, 2015
Pronk Pops Show 446: April 15, 2015
Pronk Pops Show 445: April 14, 2015
Pronk Pops Show 444: April 13, 2015
Pronk Pops Show 443: April 9, 2015
Pronk Pops Show 442: April 8, 2015
Pronk Pops Show 441: April 6, 2015
Pronk Pops Show 440: April 2, 2015
Pronk Pops Show 439: April 1, 2015
Pronk Pops Show 438: March 31, 2015
Pronk Pops Show 437: March 30, 2015
Pronk Pops Show 436: March 27, 2015
Pronk Pops Show 435: March 26, 2015
Pronk Pops Show 434: March 25, 2015
Pronk Pops Show 433: March 24, 2015
Pronk Pops Show 432: March 23, 2015
Pronk Pops Show 431: March 20, 2015
Pronk Pops Show 430: March 19, 2015
Pronk Pops Show 429: March 18, 2015
Pronk Pops Show 428: March 17, 2015
Pronk Pops Show 427: March 16, 2015
Pronk Pops Show 426: March 6, 2015
Pronk Pops Show 425: March 4, 2015
Pronk Pops Show 424: March 2, 2015
Story 1: National Security Agency Is Still Massively Collecting All Your Communications — The USA Freedom Act Is At Best A Baby Step Towards Restoring Your Fourth Amendment Constitutional Rights — Fire Your Representatives For Betraying Their Oath Of Office — NSA Turnkey Tyranny Totalitarian Targeting of American People — Videos
USA Freedom Act passed by Senate and signed by President Obama, limiting NSA surveillance
Freedom Act Changes NSA Rules For Data Collection
Senate Passes USA Freedom Act, Stops NSA Phone Data Gathering Special Report 1st Segment
Bill Binney: We Are A Gov’t With A Country
Freedom Act: Edward Snowden speaks out on surveillance reform
Politics Panel: Cowards! The Freedom Act is Passed
William Binney’s Heartfelt Plea to the American People
Operation “Toto” Pulling Back The Curtain: Full NSA Interview
William Binney Tells RT That USA Freedom Act is a Farce
NSA Whistleblower William Binney: The Future of FREEDOM
Bill Binney: ‘21 recommendations on fixing NSA sent to US president last year’
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
Rand Paul Causes A Vicious Senate Cat Fight Over Patriot Act
Rand Paul’s Freedom Act Filibuster
Senate Approves USA Freedom Act, Obama Signs It, After Amendments Fail
The Senate has approved the USA Freedom Act, which will alter the way U.S. agencies conduct surveillance and gather data. A final vote on the bill came late Tuesday afternoon, after amendments to the bill failed.
Update at 9:30 p.m. ET: Obama’s Signature
Following an expedited enrollment process, President Obama signed the bill into law late Tuesday.
Enactment of this legislation will strengthen civil liberty safeguards and provide greater public confidence in these programs,” Obama said in a statement after the vote. “I am gratified that Congress has finally moved forward with this sensible reform legislation.”
Update at 4:30 p.m. ET: The Bill Has Passed
In the final tally of the vote, 67 senators were in favor of the measure and 32 against. The legislation needed a simple majority to pass.
Last November, the Freedom Act failed in the Senate after not receiving enough support to avoid a filibuster. Its critics say the act doesn’t go far enough to curtail surveillance programs that can access huge databases of information about Americans.
Sen. Rand Paul, R-Ky., voted against the measure today, as he did last fall. Also voting against the bill Tuesday was independent Sen. Bernie Sanders, who is seeking the Democratic presidential nomination.
The lead sponsor of the bill in the House, Rep. Jim Sensenbrenner, R-Wis., promises it will “rein in the dragnet collection of data” by the NSA and others, and “increase transparency of the Foreign Intelligence Surveillance Court.”
Calling today’s passage “a milestone,” ACLU Deputy Legal Director Jameel Jaffer says, “This is the most important surveillance reform bill since 1978, and its passage is an indication that Americans are no longer willing to give the intelligence agencies a blank check.”
Our original post continues:
The vote comes two days after controversial provisions of the Patriot Act expired because the Senate was unable to “overcome parliamentary maneuvers by Sen. Rand Paul,” as Eyder reported Sunday night, “and let three controversial provisions of the Patriot Act expire at midnight.”
The House of Representatives approved the Freedom Act on May 13. The legislation would remain in effect until Dec. 15, 2019.
“We worked for two years across the aisle and across the Capitol,” said Sen. Patrick Leahy, a champion of the bill. He said it would bring much-needed reform to America’s intelligence-gathering.
Leahy and his chief ally on the bill, Sen. Mike Lee, R-Utah, spent their Tuesday in the Senate fighting against amendments to the USA Freedom Act that were put forth — and defeated.
Tuesday’s vote on the Freedom Act comes less than a month after a federal appeals court ruled that the National Security Agency’s practice of collecting bulk data about Americans’ phone calls violates the Constitution.
Before the vote, a displeased Majority Leader Sen. Mitch McConnell criticized the policies of President Obama and said that the Freedom Act weakens America’s ability to protect itself. He also cited an AP article that called the turn of events in the surveillance and spying field as “a victory for Edward Snowden,” the former NSA contractor who released secret information about U.S. spying in June of 2013 (Snowden discussed the Patriot Act Tuesday).
After McConnell spoke, Minority Leader Sen. Harry Reid responded by saying that if McConnell is worried about making America look weaker, “he should look in the mirror.”
Reid accused the majority leader of trying to deploy distractions from the real issues and said that McConnell had also implicitly criticized the House of Representatives.
“I don’t think any of us,” Reid said, “need a lecture on why we’re less secure today.”
http://www.npr.org/sections/thetwo-way/2015/06/02/411534447/senateis-poised-to-vote-on-house-approved-usa-freedom-act
With or Without the Patriot Act, Here’s How the NSA Can Still Spy on Americans
June 1, 2015, Jason M. Breslow
While it may only be temporary, the National Security Agency on Monday lost its authority to collect Americans’ phone records in bulk after the Senate failed to extend provisions of the Patriot Act authorizing the controversial domestic surveillance program.
For now, the stall in the Senate means the NSA can’t collect any newly created telephone records. Under the now-lapsed Section 215 of the Patriot Act, the NSA gathered metadata such as who called whom, the time the call was placed and how long the conversation lasted.
Also lapsed are provisions of the law that allowed for wiretap orders on “lone wolf” terrorism suspects; that permitted roving wiretaps that follow suspects from device to device as they change phones; and that compelled businesses to turn over records deemed relevant to a national security investigation.
But these Patriot Act provisions represent just one component of the NSA surveillance capabilities exposed in 2013 by former NSA contractor Edward Snowden.
Under an entirely separate law, the 2008 FISA Amendments Act, the government still has the authority to access the communications of users of popular Internet sites such as Facebook, Google, Microsoft and Yahoo. Section 702 of the law, which does not expire until 2017, gives the government the ability to collect the content of an Internet user’s actual communications — not just metadata.
The law is geared towards non-citizens outside of the U.S., but as privacy advocates argue, it is inevitable that the communications of U.S. citizens and those of non-citizens lawfully living in the U.S. are swept up by the program.
“The phone records program under Section 215 is really just one piece of a much larger puzzle,” said Stephen Vladeck, a professor of law at the American University Washington College of Law. “They’re targeted at non-citizens but the way the technology works there is just no way for the vacuum cleaner to distinguish between the particles of dirt.”
An even older and more obscure Regan-era law, Executive Order No. 12333, provides U.S. intelligence with nearly identical surveillance capabilities to intercept overseas communications, Vladeck said, with the same implications for privacy.
“The way the government is intercepting communications under these authorities,” said Vladeck, referring to Section 702 and Executive Order 123333, “it cannot tell at the point of collection whether the actual sender or recipient is or is not a U.S. citizen.”
Also unaffected by the sunset of Section 215 is the use of National Security Letters, which since 9/11 have helped to dramatically expand the government’s ability to collect information about Americans directly from phone companies and Internet providers. Any FBI office can issue one, without a court’s review and with a gag order. In the past 10 years, more than 300,000 National Security Letters have been issued, according to the Electronic Frontier Foundation, and until 2013, no major Internet or phone company is known to have questioned the constitutionality of one.
Meanwhile, it’s not clear that all surveillance conducted under the Patriot Act has officially come to a close. As The New York Times noted, all three aspects of the law that expired Monday “contained a so-called grandfather clause that permits their authority to continue indefinitely for any investigation that had begun before June 1.”
Of course, by the end of the week, that may not matter. After having failed to extend the expiring Patriot Act provisions on Sunday, the Senate appears poised to pass a House bill, the USA Freedom Act, that would restore the lapsed Patriot Act powers into law. The one critical difference in the new law is that bulk phone records would stay in the hands of phone companies, rather than with the government.
Related Film: United States of Secrets
In this two-part, Peabody Award-winning series, FRONTLINE explores how the U.S. government came to monitor and collect the communications of millions of people around the world — and here at home — and the lengths to which officials tried hide the massive surveillance from the public.
https://www.youtube.com/watch?v=bYcNWMoas_E
USA Freedom Act
The USA Freedom Act is a law which was originally introduced in both houses of the U.S. Congress on October 29, 2013. Following the expiration of several provisions of the Patriot Act, the act was passed on June 2, 2015.[3][4] The title of the act is a ten-letter backronym (USA FREEDOM) that stands for “Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and OnlineMonitoring Act.”
When the bill was re-introduced in the 114th Congress (2015-2016), it was described by the bill sponsors as “a balanced approach”[5] while being questioned for extending the Patriot Act through the end of 2019.[6]Supporters of the bill said that the House Intelligence Committee and House leadership[7] would insist on reauthorizing all Patriot Act powers except bulk collection under Section 215 of the Patriot Act[8]. Critics assert that mass surveillance of the content of Americans’ communication will continue under Section 702 of FISA which does not expire until 2017[9][10] and Executive Order 12333[9][11] due to the “unstoppable surveillance-industrial complex”[12] despite the fact that a bipartisan majority of the House had previously voted to close backdoor mass surveillance.[7]
Purpose
According to supporters of the USA Freedom Act, the USA Freedom Act[13][full citation needed] was meant to end the bulk collection of Americans’ metadata by the NSA, end the secret laws created by the FISA court, and introduce a “Special Advocate” to represent public and privacy matters.[14][15][16] However, the USA Freedom Act does allow the bulk collection of Americans’ metadata by phone companies, which is then accessible by the NSA; it also does not address other laws which have purportedly challenged Americans’Fourth Amendment rights.[17] Other proposed changes included limits to programs like PRISM, which retains Americans’ Internet data,[18] and greater transparency by allowing companies such as Google andFacebook to disclose information about government requests for information.[19]
113th Congress (2013-2014)
The House version, introduced by Representative Jim Sensenbrenner as HR 3361,[20] was referred to theUnited States House Judiciary Subcommittee on Crime, Terrorism, Homeland Security and InvestigationsJanuary 9, 2014,[21] and the Senate version,[22] introduced by Senator Patrick Leahy, was read twice and referred to the Senate Committee on the Judiciary.[21] An amended version out of the House Judiciary Committee contained many provisions raising concerns among civil libertarians[23] including an extension of the controversial USA PATRIOT Act through the end of 2017.[24][25] After considering the bill throughout 2014,[25] theSenate voted on November 18, 2014, to end further discussion of the measure during the 113th United States Congress.[26]
The bill comprised several titles: FISA business records reforms, FISA pen register and trap and trace device reforms, FISA acquisitions targeting persons outside the United States reforms, Foreign Intelligence Surveillance Court reforms, Office of the Special Advocate, National Security Letter reforms, FISA and National Security Letter transparency reforms, and Privacy and Civil Liberties Oversight Board subpoena authority.[27]
Purpose
Representative Jim Sensenbrenner, who introduced the bill, stated that its purpose was:
According to the bill’s sponsors, their legislation would have amended Section 215 of the Patriot Act to ensure that any phone records obtained by the government were essential in an investigation that involved terrorism or espionage, thereby ending bulk collection,[8] while preserving “the intelligence community’s ability to gather information in a more focused way.”[29]
Background
Many members of Congress believed that in the wake of the Snowden disclosures, restoration of public trust would require legislative changes.[30] More than 20 bills have been written since the disclosures began with the goal of clarifying government surveillance powers.[18]
Sensenbrenner, who introduced the USA PATRIOT Act (H.R. 3162) in 2001 following the September 11 terrorist attacks to give more power to US intelligence agencies, and who has described himself as “author of the Patriot Act,”[31] declared that it was time to put the NSA’s “metadata program out of business.” With its bulk collection of Americans’ phone data, Sensenbrenner asserted that the intelligence community “misused those powers,” had gone “far beyond” the original intent of the legislation, and had “overstepped its authority.”[30][32]
An opinion piece by Leahy and Sensenbrenner, published in Politico, described the impetus for proposed changes,[33]saying:
Markup in House Judiciary Committee
In May 2014, the U.S. House Judiciary Committee posted a “Manager’s Amendment” on its website. Title VII of the Amendment read “Section 102(b)(1) of the USA Patriot Improvement and Reauthorization Act of 2005 (50 U.S.C. 1805 note) is amended by striking “June 1, 2015” and inserting “December 31, 2017,” extending the controversial USA PATRIOT Act through the end of 2017.[34] The Electronic Privacy Information Center (EPIC) has criticized the Patriot Act as unconstitutional, especially when “the private communications of law-abiding American citizens might be intercepted incidentally”.[35] James Dempsey, of the CDT, believes that the Patriot Act unnecessarily overlooks the importance of notice under the Fourth Amendment and under a Title III wiretap,[36] while the American Library Associationbecame so concerned that they formed a resolution condemning the USA PATRIOT Act, and which urged members to defend free speech and protect patrons’ privacy against the Act.[37]
The Guardian wrote “civil libertarians on the Judiciary Committee had to compromise in order to gain support for the act. Significantly, the government will still be able to collect phone data on Americans, pending a judge’s individualized order based on ‘reasonable articulable suspicion‘ – a standard preferred by the NSA – of wrongdoing, and can collect call records two degrees or ‘hops’ of separation from the individual suspected.”[23] Kara Brandeisky of ProPublica said, “some worry that the bill does not unequivocally ban bulk collection of American records. Again, a lot depends on how the Foreign Intelligence Surveillance Court interprets the statute.”[38]
The National Journal wrote “one tech lobbyist noted concern that a provision that would have allowed companies to disclose to customers more information about government data requests has been dropped. In addition, an external special advocate that would oversee the Foreign Intelligence Surveillance Court would no longer be selected by the Privacy and Civil Liberties Oversight Board. Instead, the court’s judges would designate five ‘amicus curiae‘ who possess appropriate security clearances.”[39]
The Electronic Frontier Foundation (EFF) stated it remained “concerned that this bill omits important transparency provisions found in the (original 2013) USA FREEDOM Act, which are necessary to shed light on surveillance abuses”. In addition, the EFF said it believed “this bill should do more to address mass surveillance under Section 702 of Foreign Intelligence Surveillance Amendments Act, a section of law used to collect the communications of users worldwide.”[40]The Open Technology Institute commented “several other key reforms—such as provisions allowing Internet and phone companies to publish more information about the demands they receive, which OTI and a coalition of companies and organizations have been pressing for since last summer—have been removed, while the bill also provides for a new type of court order that the President has requested, allowing for continuous collection by the government of specified telephone records.”[41]
Despite the criticism from civil liberties groups, Mike Rogers, a defender of the NSA‘s surveillance practices and the chairman of the House Intelligence Committee, praised the amendments. Rogers, who had his own bill which would codify the NSA’s surveillance practices in to law, called the proposed amendments a “huge improvement.” Foreign Policy wrote “any compromise to the Judiciary bill risks an insurrection from civil libertarians in Congress. Michigan Republican Justin Amashled such a revolt last year when he offered an NSA amendment to a defense appropriations bill that would have stripped funding for the NSA’s collection program.” “Just a weakened bill or worse than status quo? I’ll find out,” Representative Amash said.[42]
After the marked up bill passed the House Judiciary Committee USA Freedom Act co-author and Senate Committee on the Judiciary Chairman Patrick Leahycommented that he “remain concerned that the legislation approved today does not include some of the important reforms related to national security letters, a strong special advocate at the FISA Court, and greater transparency. I will continue to push for those reforms when the Senate Judiciary Committee considers the USA Freedom Act this summer.”[25]
Passage in House of Representatives
The House of Representatives passed on May 22, 2014 the USA Freedom act by 303 votes to 121.[43] Because the House version was weakened by lawmakers loyal to the intelligence establishment it lost support of important House Judiciary members like Republicans Darrell Issa, Ted Poe and Raul Labrador and Democrat Zoe Lofgren who previously voted for the act.[44] “The result is a bill that will actually not end bulk collection, regrettably,” said Rep. Zoe Lofgren who voted against the bill.[45] The act would shift responsibility for retaining telephonic metadata from the government to telephone companies. Providers like AT&T and Verizon would be required to maintain the records and let the NSA search them in terrorism investigations when the agency obtains a judicial order or in certain emergency situations.[46] The USA Freedom Act demands that the NSA get approval for a search from the Foreign Intelligence Surveillance Court before demanding that the telecoms hand over metadata. However, no “probable-cause” Fourth Amendment standard is required to access the database[45] While an allowable search under the original USA Freedom Act was defined as “a term used to uniquely describe a person, entity, or account”, but under the House version a database search inquiry is now allowed if it is “a discrete term, such as a term specifically identifying a person, entity, account, address, or device.”[45] Provisions that were dropped from the bill included requirements to estimate the number of Americans whose records were captured under the program, and the creation of a public advocate to challenge the government’s legal arguments before the Foreign Intelligence Surveillance Court.[47][48]
The passed House version[49] was criticised by U.S. senators, tech firms like Google, Apple, Microsoft, Facebook and Twitter, as well as civil liberties groups.[44][45][46][47][50] Senator Sen. Patrick Leahy, chair of the Senate Judiciary Committee and lead Democratic author of the Freedom Act, criticized the House version by saying in a statement: “Today’s action in the House continues the bipartisan effort to restore Americans’ civil liberties. But I was disappointed that the legislation passed today does not include some of the meaningful reforms contained in the original USA Freedom Act. I will continue to push for these important reforms when the Senate judiciary committee considers the USA Freedom Act next month.”[50] And Senator Ron Wyden stated he was “gravely concerned that the changes that have been made to the House version of this bill have watered it down so far that it fails to protect Americans from suspicionless mass surveillance.”[50]Major U.S. tech firms like Google, Apple, Microsoft, Facebook, and Twitter joined together in the Reform Government Surveillance coalition which called the House version a move in the wrong direction. The Reform Government Surveillance released a statement on June 5, stating: “The latest draft opens up an unacceptable loophole that could enable the bulk collection of Internet users’ data … While it makes important progress, we cannot support this bill as currently drafted and urge Congress to close this loophole to ensure meaningful reform.”[51] Mark Jaycox, a legislative analyst with the Electronic Frontier Foundation, said: “The bill is littered with loopholes. The problem right now, especially after multiple revisions, is that it doesn’t effectively end mass surveillance.”[44][44] Zeke Johnson, director ofAmnesty International USA’s security and human rights program, accusing the House for failing to deliver serious surveillance reform said: “People inside and outside the U.S. would remain at risk of dragnet surveillance. The Senate should pass much stronger reforms ensuring greater transparency, robust judicial review, equal rights for non-U.S. persons, and a clear, unambiguous ban on mass spying. President Obama need not wait. He can and should implement such safeguards today.” The White House however endorsed the bill. “The Administration strongly supports House passage of H.R. 3361, the USA Freedom Act. … The Administration applauds and appreciates the strong bipartisan effort that led to the formulation of this bill, which heeds the President’s call on this important issue,” the White House said in a statement.[51] “The bill ensures our intelligence and law enforcement professionals have the authorities they need to protect the Nation, while further ensuring that individuals’ privacy is appropriately protected when these authorities are employed. Among other provisions, the bill prohibits bulk collection through the use of Section 215, FISA pen registers, and National Security Letters.”[46][52]
Civil rights groups and scholars said the new language allowing the NSA to search meta data handed over from telephone companies was vague and perhaps would allow the NSA to ensnare the metadata of broad swaths of innocent people in violation of their constitutional rights. “In particular, while the previous bill would have required any request for records to be tied to a clearly defined set of ‘specific selection terms,’ the bill that just passed leaves the definition of ‘specific selection terms’ open. This could allow for an overly broad and creative interpretation, which is something we’ve certainly seen from the executive branch and the FISA Court before,” said Elizabeth Goitein, a co-director of the Brennan Center’s Liberty and National Security Program.[45] “The new definition is incredibly more expansive than previous definitions … The new version not only adds the undefined words “address” and “device,” but makes the list of potential selection terms open-ended by using the term “such as.” Congress has been clear that it wishes to end bulk collection, but given the government’s history of twisted legal interpretations, this language can’t be relied on to protect our freedoms,” said the Electronic Frontier Foundation in a press release.[51][53]
Defeat in the Senate
Negotiations among intelligence agencies, the White House, lawmakers and their aides, and privacy advocates in the summer of 2014 led to a modified bill (S. S.2685)[54] in the U.S. Senate. This bill version addressed most privacy concerns regarding the NSA program that collects records of Americans’ phone calls in bulk and other issues.[55]
Under the bill the NSA would no longer collect those phone records. Instead, most of the records would have stayed in the hands of the phone companies, which would not have been required to hold them any longer than they already do for normal business purposes, which in some cases is 18 months. The bill would require the NSA to request specific data from phone companies under specified limits i.e. the NSA would need to show it had reasonable, articulable suspicion that the number it is interested in is tied to a foreign terrorist organization or individual. The proposed legislation would still have allowed analysts to perform so-called contact chaining in which they trace a suspect’s network of acquaintances, but they would been required to use a new kind of court order to swiftly obtain only those records that were linked, up to two layers away, to a suspect — even when held by different phone companies. It would also require the federal surveillance court to appoint a panel of public advocates to advance legal positions in support of privacy and civil liberties, and would expand company reporting to the public on the scope of government requests for customers’ data. This USA Freedom Act version thus gained the support of the Obama Administration, including the director of national intelligence and attorney general, as well as many tech companies including Apple, Google, Microsoft and Yahoo as well as a diverse range of groups, including the National Rifle Association and the American Civil Liberties Union.[26][55]
Following the 2014 Congressional elections, the Senate voted on November 18, 2014, to block further debate of the measure during the 113th United States Congress. Fifty-four Democrats and four Republicans who supported consideration failed to muster the 60 votes required.[56] Senator Patrick Leahy, who drafted the bill, blamed its defeat on what he called fear-mongering by opponents, saying, “Fomenting fear stifles serious debate and constructive solutions.” Senator Mitch McConnell, the Republican leader, argued that the NSA’s bulk collection of Americans’ metadata was a vital tool in the fight against terrorism. “This is the worst possible time to be tying our hands behind our backs,” he said.[26]
114th Congress (2015-2016)
The USA Freedom Act was re-introduced in the House Judiciary Committee and Senate Judiciary Committee in late April 2015 based upon a modified version of the one which failed in the Senate in the 113th Congress.
The 2015 USA Freedom Act[57] version is described by its sponsors as “a balanced approach that would ensure the NSA maintains an ability to obtain the data it needs to detect terrorist plots without infringing on Americans’ right to privacy.”[5] Human rights groups believed the bill’s transparency and court oversight provisions are less robust than would have been required in a previous version of the bill, with more limited reporting requirements and a more narrowly defined role for external court advocates.[58]
The bill received a mixture of reaction, ranging from support from national security and computer trade groups, skepticism or moderate objection from civil liberties groups, to outright opposition from former NSA whistle blowers. The editorial board of the New York Times ran an editorial against the bill which “will be weakened further in the Senate by the majority leader” and advised readers to “get used to the protections of your civil liberties being minimally viable”.[59]
Passage out of House Judiciary Committee
The bill passed out of the House Judiciary Committee on April 30, 2015.[60] The proposed bill would end the NSA’s bulk collection under Section 215 by requiring the government to seek records from companies using a “specific selection term” that identifies a specific person, account or address and “is used to limit . . . the scope” of records sought. The term may not be a phone or Internet company.[5]
Amendments to strengthen the bill were voted down during Committee markup. One would have offered a constitutional advocate and failed by voice vote,[61] while another would have offered protection for whistle blower complaints.[62] Representative Jordan unsuccessfully argued for another amendment with the following dialog, “It’s not a vote to blow up the deal. It’s a vote for the Fourth Amendment. Plain and simple. All the Gentleman says in his amendment is, if you’re going to get information from an American citizen, you need a warrant.”[63] The bill ultimately received 25 votes in support (64%), 12 abstentions (31%), and 2 in opposition (5%).[64]
House Judiciary Chairman Bob Goodlatte said “the USA Freedom Act reforms our nation’s intelligence-gathering programs to ensure they operate in a manner that reflects core American values … We urge both the House and Senate to move expeditiously on this legislation so that we rein in government overreach and rebuild trust with the American people”.[65]
Representative Ted Poe was one member to vote against the bill. “Between the Committee vote and the House floor the bill was changed and it now confused what should have been clarified. The version of the USA Freedom Act that passed the House today leaves room for different interpretations, potentially giving NSA the ability to continue to act outside the intent of Congress and the Constitution. I could not support a bill that may allow abuses of the fourth amendment to continue,” he said.[66]
Reaction
National security and trade groups
The Center for National Security supports the USA Freedom Act introduced on April 28, 2015 to end bulk collection of Americans’ telephone metadata under the so-called “section 215” program.[67]
The Software Alliance sponsored the legislation saying “in reforming government surveillance practices, it is critical that legislation strikes the right balance between securing our nation and its citizens and improving privacy protections for the public. The FISA reforms in the USA FREEDOM Act will help restore trust in both the US government and the US technology sector.”[68]
The ITIC said “the USA Freedom Act, H.R. 2048, builds on the foundation laid by the House Judiciary Committee last Congress and the result is a bill that strengthens privacy protections while maintaining the interests of national security.”[69]
Civil liberties advocates
The final USA Freedom Act is perceived as containing several concessions to pro-surveillance legislators meant to facilitate its passage.[6][70] The watered down version of the USA Freedom Act that passed the House of Representatives in 2015 has been widely criticized by civil liberties advocates and its original supporters amongst house members for extending the Patriot Act Mass surveillance programs without meaningful restraints, undermining the original purpose of the bill. [71]
“This bill would make only incremental improvements, and at least one provision-the material-support provision-would represent a significant step backwards,” ACLU deputy legal director Jameel Jaffer said in a statement. “The disclosures of the last two years make clear that we need wholesale reform.” Jaffer wants Congress to let Section 215 sunset completely and wait for a better reform package than endorse something half-baked[72], saying that “unless that bill is strengthened, sunset would be the better course.”[73] The ACLU had previously written of the 2013 version that “although the USA Freedom Act does not fix every problem with the government’s surveillance authorities and programs, it is an important first step and it deserves broad support.”[74][75]
Representative Justin Amash, author of the narrowly defeated Amash Amendment, a proposal that would have de-funded the NSA bulk-collection program, backed the 2013 legislation, but not the final 2015 version[76]. “It’s getting out of control,” he commented. “[Courts are issuing] general warrants without specific cause…and you have one agency that’s essentially having superpowers to pass information onto others”.[32]
According to Deputy Attorney General James Cole, even if the Freedom Act becomes law, the NSA could continue its bulk collection of American’s phone records. He explained that “it’s going to depend on how the [FISA] court interprets any number of the provisions” contained within the legislation.[8]Jennifer Granick, Director of Civil Liberties at Stanford Law School, stated:
International human rights groups remain somewhat skeptical of specific provisions of the bill. For example, Human Rights Watch expressed its concern that the “bill would do little to increase protections for the right to privacy for people outside the United States, a key problem that plagues U.S. surveillance activities. Nor would the bill address mass surveillance or bulk collection practices that may be occurring under other laws or regulations, such as Section 702 of the FISA Amendments Act or Executive Order 12333. These practices affect many more people and include the collection of the actual content of internet communications and phone calls, not just metadata”.[77] Zeke Johnson, Director of Amnesty International‘s Security and Human Rights Program, agreed that “any proposal that fails to ban mass surveillance, end blanket secrecy, or stop discrimination against people outside the U.S. will be a false fix”.[11]
Members of the anti-surveillance Civil Liberties Coalition are dismissing the USA Freedom Act in support of the Surveillance State Repeal Act, a far more comprehensive piece of legislation in the House that completely repeals the Patriot Act, as well as 2008’s FISA Amendments Act.[72] A group of 60 organizations called Congress to not stop at ending the NSA’s bulk collection of telephone information under the USA PATRIOT Act, but to also end the FISA Amendments Act and Executive Order 12333 mass surveillance programs and restore accountability for bad actors in the Intelligence Community.[9]
The Center for Democracy and Technology endorses the bill, but it points out that it doesn’t limit data retention for information collected on people who turn out to have no connection to a suspect or target, and emphasizes that this is not an omnibus solution.[72] The group argued the bill had to be supported because “the Senate will weaken the USA FREEDOM Act right before the sunset deadline, forcing the House to accept a weaker bill”.[78]
“This bill purports to ban certain acts under narrow authorities, but it doesn’t ban those behaviors outright. Nor does it increase meaningful oversight of the NSA,” said David Segal, executive director of Demand Progress, who wants Section 215 to expire. The group said “a vote for a bill that does not end mass surveillance is a vote in support of mass surveillance.”[79]
“Companies are provided monetary incentive to spy and share that information with the government and blanket liability once they do under USA Freedom — even if that breaks that law,” said Sascha Meinrath, the director of X-lab, an independent tech policy institute previously associated with New America. “Once companies receive that, they’ll have almost no reason to weigh in on meaningful surveillance reform.”[79] “In a way, it’s kind of like PRISM,” the program revealed by Snowden where major tech companies turned over the content of online communications to the NSA, said longtime independent surveillance researcher Marcy Wheeler. “It pushes things to providers: Everyone gets immunity, but it doesn’t add to the privacy.”[79]
“We think of the USA Freedom Act as yesterday’s news,” said Shahid Buttar of the Bill of Rights Defense Committee, “and we’re interested in forcing the [intelligence] agencies into a future where they comply with constitutional limits.” “If passed, it’ll be the only step,” predicted Patrick Eddington of the Cato Institute, a former House staffer, since the next expiration date for a major piece of surveillance legislation is 31 December 2017.[80]
Following the law’s passage on June 2, 2015, ACLU deputy legal director Jameel Jaffer claimed that “This is the most important surveillance reform bill since 1978, and its passage is an indication that Americans are no longer willing to give the intelligence agencies a blank check.”[81]
Former whistleblowers
Former NSA crypto-mathematician William Binney, who worked three decades at the agency, says the Freedom Act – widely seen as having the best chance of any surveillance-limiting proposal – “won’t do anything” if it passes. “Why do you think NSA [and other intelligence agencies] support it?” he says.[12][12]
Drake, a former NSA senior executive prosecuted unsuccessfully under the Espionage Act before pleading guilty to a misdemeanor in 2011, calls the bill the “Free-dumb Act 2.0,” and says he sees it as a ploy by government officials “to keep the status quo in place.” He also says the fixation on the call record program in public debate is unfortunate, because NSA Internet surveillance is far broader and more invasive. “It’s a shiny, shiny bright spot, [but] there’s a whole lot more being collected,” he says, including a “staggering” amount of American communications. Drake believes support from the Obama administration for the Freedom Act is motivated in part by a desire to hobble lawsuits against the call record program, three of which are pending with appeals courts and may lay the groundwork for a major Supreme Court privacy ruling.[12]
Wiebe, formerly a senior analyst at the NSA, says the anticipated Freedom Act likely will be “more of the same” and is “not going to change anything” in a meaningful way. Like Drake, he has no hope for meaningful reform and doesn’t believe efforts to lobby Congress would work. “We’ve tried,” he says. “It makes no difference.” He believes well-funded government contractors and powerful, “co-opted” lawmakers who lead key committees make up a virtually unstoppable surveillance-industrial complex.[12]
House Passage
The USA Freedom Act passed the U.S. House of Representatives on May 13, 2015.[82] The bill received broad support in the House, with 338 votes for the bill and 88 against it. It was passed without any amendments to the House Judiciary version because the House Rules Committee prohibited consideration of any amendment to the USA Freedom Act, claiming that any changes to the legislation would have weakened its chances of passage.[83] The bill had the support of the White House, Attorney General Eric Holder and Director of National Intelligence James Clapper. While civil liberties groups were divided over the support of the bill, lawmakers opposed to the Bill stated it will handicap the NSA and allow terrorist groups to prosper.[84]
Passage in Senate
The USA Freedom Act was not passed by the U.S. Senate on May 22, 2015. By a vote of 57-42, the Senate did not pass the bill that would have required 60 votes to move forward, which means that the NSA must start winding down its domestic mass surveillance program this week. The Senate also rejected, by 54-45, also short of the necessary 60 votes, a two-month extension for the key provision in the Patriot Act that has been used to justify NSA spying, which is set to expire on June 1, 2015.[85][86][87]
However, on May 31, 2015, the Senate voted 77-17 to limit debate on the act. Senate rules will allow it to be passed after the mass surveillance programs have expired.[88] Richard Burr, chair of the Senate Intelligence Committee, had three amendments he planned to offer to the bill which were likely to further increase opposition to the bill.[89] While several amendments which would strengthen the bill were not allowed to be considered, three amendments to weaken the bill, considered “poison pills”, were allowed to be considered but ultimately rejected.[90]
The bill ultimately passed the Senate 67-32 on June 2, 2015 and was signed into law.[91] “After a needless delay and inexcusable lapse in important national security authorities, my administration will work expeditiously to ensure our national security professionals again have the full set of vital tools they need to continue protecting the country,” Obama said.[92]
http://en.wikipedia.org/wiki/USA_Freedom_Act
The Pronk Pops Show Podcasts Portfolio
Listen To Pronk Pops Podcast or Download Show 473-476
Listen To Pronk Pops Podcast or Download Show 464-472
Listen To Pronk Pops Podcast or Download Show 455-463
Listen To Pronk Pops Podcast or Download Show 447-454
Listen To Pronk Pops Podcast or Download Show 439-446
Listen To Pronk Pops Podcast or Download Show 431-438
Listen To Pronk Pops Podcast or Download Show 422-430
Listen To Pronk Pops Podcast or Download Show 414-421
Listen To Pronk Pops Podcast or Download Show 408-413
Listen To Pronk Pops Podcast or Download Show 400-407
Listen To Pronk Pops Podcast or Download Show 391-399
Listen To Pronk Pops Podcast or Download Show 383-390
Listen To Pronk Pops Podcast or Download Show 376-382
Listen To Pronk Pops Podcast or Download Show 369-375
Listen To Pronk Pops Podcast or Download Show 360-368
Listen To Pronk Pops Podcast or Download Show 354-359
Listen To Pronk Pops Podcast or Download Show 346-353
Listen To Pronk Pops Podcast or Download Show 338-345
Listen To Pronk Pops Podcast or Download Show 328-337
Listen To Pronk Pops Podcast or Download Show 319-327
Listen To Pronk Pops Podcast or Download Show 307-318
Listen To Pronk Pops Podcast or Download Show 296-306
Listen To Pronk Pops Podcast or Download Show 287-295
Listen To Pronk Pops Podcast or Download Show 277-286
Listen To Pronk Pops Podcast or Download Show 264-276
Listen To Pronk Pops Podcast or Download Show 250-263
Listen To Pronk Pops Podcast or Download Show 236-249
Listen To Pronk Pops Podcast or Download Show 222-235
Listen To Pronk Pops Podcast or Download Show 211-221
Listen To Pronk Pops Podcast or Download Show 202-210
Listen To Pronk Pops Podcast or Download Show 194-201
Listen To Pronk Pops Podcast or Download Show 184-193
Listen To Pronk Pops Podcast or Download Show 174-183
Listen To Pronk Pops Podcast or Download Show 165-173
Listen To Pronk Pops Podcast or Download Show 158-164
Listen To Pronk Pops Podcast or Download Show 151-157
Listen To Pronk Pops Podcast or Download Show 143-150
Listen To Pronk Pops Podcast or Download Show 135-142
Listen To Pronk Pops Podcast or Download Show 131-134
Listen To Pronk Pops Podcast or Download Show 124-130
Listen To Pronk Pops Podcast or Download Shows 121-123
Listen To Pronk Pops Podcast or Download Shows 118-120
Listen To Pronk Pops Podcast or Download Shows 113 -117
Listen To Pronk Pops Podcast or Download Show 112
Listen To Pronk Pops Podcast or Download Shows 108-111
Listen To Pronk Pops Podcast or Download Shows 106-108
Listen To Pronk Pops Podcast or Download Shows 104-105
Listen To Pronk Pops Podcast or Download Shows 101-103
Listen To Pronk Pops Podcast or Download Shows 98-100
Listen To Pronk Pops Podcast or Download Shows 94-97
Listen To Pronk Pops Podcast or Download Shows 93
Listen To Pronk Pops Podcast or Download Shows 92
Listen To Pronk Pops Podcast or Download Shows 91
Listen To Pronk Pops Podcast or Download Shows 88-90
Listen To Pronk Pops Podcast or Download Shows 84-87
Listen To Pronk Pops Podcast or Download Shows 79-83
Listen To Pronk Pops Podcast or Download Shows 74-78
Listen To Pronk Pops Podcast or Download Shows 71-73
Listen To Pronk Pops Podcast or Download Shows 68-70
Listen To Pronk Pops Podcast or Download Shows 65-67
Listen To Pronk Pops Podcast or Download Shows 62-64
Listen To Pronk Pops Podcast or Download Shows 58-61
Listen To Pronk Pops Podcast or Download Shows 55-57
Listen To Pronk Pops Podcast or Download Shows 52-54
Listen To Pronk Pops Podcast or Download Shows 49-51
Listen To Pronk Pops Podcast or Download Shows 45-48
Listen To Pronk Pops Podcast or Download Shows 41-44
Listen To Pronk Pops Podcast or Download Shows 38-40
Listen To Pronk Pops Podcast or Download Shows 34-37
Listen To Pronk Pops Podcast or Download Shows 30-33
Listen To Pronk Pops Podcast or Download Shows 27-29
Listen To Pronk Pops Podcast or Download Shows 17-26
Listen To Pronk Pops Podcast or Download Shows 16-22
Listen To Pronk Pops Podcast or Download Shows 10-15
Listen To Pronk Pops Podcast or Download Shows 01-09
Read Full Post | Make a Comment ( None so far )