Amash Amendment Creates New Political Coalitions
Glenn Beck Justin Amash Interview On Nsa Surveillance
Justin Amash on NSA spying: This issue is about the American people vs. Washington political elites
Glenn Beck Excoriates Michele Bachmann: ‘Shame On You,’ ‘Really, Really, Really Almost Dead To Me’
Justin Amash: No Precedent In History For NSA Spying
Daines Fights to Protect Americans from NSA Mass Data Collection
Michigan congressman aims to defund NSA surveillance program
FOX NEWS: NSA Director’s Deceptive Testimony
NSAs Keith Alexander Calls Emergency Private Briefing To Lobby Against Justin Amash Amendment Curtai
NSA Director describes PRISM-like program in 2012
Unconstitutional – Judge: FBI Requests Violate 1st Amendment – Judge Andrew Napolitano
NSA & The Mass Surveillance Society
FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying
Mark Levin – Government Surveillance – June 6, 2013 – Full Show
Full Show 6/10/13: The Rise of the Security State
Nova: The Spy Factory Full Video
Feds tell Web firms to turn over user account passwords
Secret demands mark escalation in Internet surveillance by the federal government through gaining access to user passwords, which are typically stored in encrypted form.
Read Full Post
The U.S. government has demanded that major Internet companies divulge users’ stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.
If the government is able to determine a person’s password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.
“I’ve certainly seen them ask for passwords,” said one Internet industry source who spoke on condition of anonymity. “We push back.”
A second person who has worked at a large Silicon Valley company confirmed that it received legal requests from the federal government for stored passwords. Companies “really heavily scrutinize” these requests, the person said. “There’s a lot of ‘over my dead body.'”
Some of the government orders demand not only a user’s password but also the encryption algorithm and the so-called salt, according to a person familiar with the requests. A salt is a random string of letters or numbers used to make it more difficult to reverse the encryption process and determine the original password. Other orders demand the secret question codes often associated with user accounts.
“This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?” –Jennifer Granick, Stanford University
A Microsoft spokesperson would not say whether the company has received such requests from the government. But when asked whether Microsoft would divulge passwords, salts, or algorithms, the spokesperson replied: “No, we don’t, and we can’t see a circumstance in which we would provide it.”
Google also declined to disclose whether it had received requests for those types of data. But a spokesperson said the company has “never” turned over a user’s encrypted password, and that it has a legal team that frequently pushes back against requests that are fishing expeditions or are otherwise problematic. “We take the privacy and security of our users very seriously,” the spokesperson said.
Apple, Yahoo, Facebook, AOL, Verizon, AT&T, Time Warner Cable, and Comcast did not respond to queries about whether they have received requests for users’ passwords and how they would respond to them.
Richard Lovejoy, a director of the Opera Software subsidiary that operates FastMail, said he doesn’t recall receiving any such requests but that the company still has a relatively small number of users compared with its larger rivals. Because of that, he said, “we don’t get a high volume” of U.S. government demands.
The FBI declined to comment.
Some details remain unclear, including when the requests began and whether the government demands are always targeted at individuals or seek entire password database dumps. The Patriot Act has been used to demand entire database dumps of phone call logs, and critics have suggested its use is broader. “The authority of the government is essentially limitless” under that law, Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence committee, said at a Washington event this week.
Large Internet companies have resisted the government’s requests by arguing that “you don’t have the right to operate the account as a person,” according to a person familiar with the issue. “I don’t know what happens when the government goes to smaller providers and demands user passwords,” the person said.
An attorney who represents Internet companies said he has not fielded government password requests, but “we’ve certainly had reset requests — if you have the device in your possession, than a password reset is the easier way.”
Cracking the codes Even if the National Security Agency or the FBI successfully obtains an encrypted password, salt, and details about the algorithm used, unearthing a user’s original password is hardly guaranteed. The odds of success depend in large part on two factors: the type of algorithm and the complexity of the password.
Algorithms, known as hash functions, that are viewed as suitable for scrambling stored passwords are designed to be difficult to reverse. One popular hash function called MD5, for instance, transforms the phrase “National Security Agency” into this string of seemingly random characters: 84bd1c27b26f7be85b2742817bb8d43b. Computer scientists believe that, if a hash function is well-designed, the original phrase cannot be derived from the output.
But modern computers, especially ones equipped with high-performance video cards, can test passwords scrambled with MD5 and other well-known hash algorithms at the rate of billions a second. One system using 25 Radeon-powered GPUs that was demonstrated at a conference last December tested 348 billion hashes per second, meaning it would crack a 14-character Windows XP password in six minutes.
The best practice among Silicon Valley companies is to adopt far slower hash algorithms — designed to take a large fraction of a second to scramble a password — that have been intentionally crafted to make it more difficult and expensive for the NSA and other attackers to test every possible combination.
One popular algorithm, used by Twitter and LinkedIn, is called bcrypt. A 2009 paper (PDF) by computer scientist Colin Percival estimated that it would cost a mere $4 to crack, in an average of one year, an 8-character bcrypt password composed only of letters. To do it in an average of one day, the hardware cost would jump to approximately $1,500.
But if a password of the same length included numbers, asterisks, punctuation marks, and other special characters, the cost-per-year leaps to $130,000. Increasing the length to any 10 characters, Percival estimated in 2009, brings the estimated cracking cost to a staggering $1.2 billion.
As computers have become more powerful, the cost of cracking bcrypt passwords has decreased. “I’d say as a rough ballpark, the current cost would be around 1/20th of the numbers I have in my paper,” said Percival, who founded a company called Tarsnap Backup, which offers “online backups for the truly paranoid.” Percival added that a government agency would likely use ASICs — application-specific integrated circuits — for password cracking because it’s “the most cost-efficient — at large scale — approach.”
While developing Tarsnap, Percival devised an algorithm called scrypt, which he estimates can make the “cost of a hardware brute-force attack” against a hashed password as much as 4,000 times greater than bcrypt.
Bcrypt was introduced (PDF) at a 1999 Usenix conference by Niels Provos, currently a distinguished engineer in Google’s infrastructure group, and David Mazières, an associate professor of computer science at Stanford University.
With the computers available today, “bcrypt won’t pipeline very well in hardware,” Mazières said, so it would “still be very expensive to do widespread cracking.”
Even if “the NSA is asking for access to hashed bcrypt passwords,” Mazières said, “that doesn’t necessarily mean they are cracking them.” Easier approaches, he said, include an order to extract them from the server or network when the user logs in — which has been done before — or installing a keylogger at the client.
Questions of law Whether the National Security Agency or FBI has the legal authority to demand that an Internet company divulge a hashed password, salt, and algorithm remains murky.
“This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?” said Jennifer Granick, director of civil liberties at Stanford University’s Center for Internet and Society. “I don’t know.”
Granick said she’s not aware of any precedent for an Internet company “to provide passwords, encrypted or otherwise, or password algorithms to the government — for the government to crack passwords and use them unsupervised.” If the password will be used to log in to the account, she said, that’s “prospective surveillance,” which would require a wiretap order or Foreign Intelligence Surveillance Act order.
If the government can subsequently determine the password, “there’s a concern that the provider is enabling unauthorized access to the user’s account if they do that,” Granick said. That could, she said, raise legal issues under the Stored Communications Act and the Computer Fraud and Abuse Act.
The Justice Department has argued in court proceedings before that it has broad legal authority to obtain passwords. In 2011, for instance, federal prosecutors sent a grand jury subpoena demanding the password that would unlock files encrypted with the TrueCrypt utility.
The Florida man who received the subpoena claimed the Fifth Amendment, which protects his right to avoid self-incrimination, allowed him to refuse the prosecutors’ demand. In February 2012, the U.S. Court of Appeals for the Eleventh Circuit agreed, saying that because prosecutors could bring a criminal prosecution against him based on the contents of the decrypted files, the man “could not be compelled to decrypt the drives.”
In January 2012, a federal district judge in Colorado reached the opposite conclusion, ruling that a criminal defendant could be compelled under the All Writs Act to type in the password that would unlock a Toshiba Satellite laptop.
Both of those cases, however, deal with criminal proceedings when the password holder is the target of an investigation — and don’t address when a hashed password is stored on the servers of a company that’s an innocent third party.
“If you can figure out someone’s password, you have the ability to reuse the account,” which raises significant privacy concerns, said Seth Schoen, a senior staff technologist at the Electronic Frontier Foundation.
Six Ways Congress May Reform NSA Snooping
A measure to end one NSA program was just defeated in the House by a surprisingly narrow margin. Here are other proposals on the table.
by Kara Brandeisky
Although the House defeated a measure that would have defunded the bulk phone metadata collection program , the narrow 205-217 vote  showed that there is significant support in Congress to reform NSA surveillance programs. Here are six other legislative proposals on the table.
1) Raise the standard for what records are considered “relevant”
The Foreign Intelligence Surveillance Court has reportedly adopted a broad interpretation of the Patriot Act , ruling that all the records in a company’s database could be considered “relevant to an authorized investigation.” The leaked court order compelling a Verizon subsidiary to turn over all its phone records is just one example of how the Foreign Intelligence Surveillance Court has interpreted the statute.
Both Rep. John Conyers , D-Mich., and Sen. Bernie Sanders, I-Vt. , have introduced bills requiring the government to show “specific and articulable facts” demonstrating how records are relevant. Similarly, legislation introduced by Sen. Mark Udall, D-Colo., would require any applications to include an explanation  of how any records sought are relevant to an authorized investigation.
2) Require NSA analysts to obtain court approval before searching metadata
Once the NSA has phone records in its possession, Sen. Dianne Feinstein has explained that NSA analysts may query the data without individualized court approvals , as long as they have a “reasonable suspicion, based on specific facts ” that the data is related to a foreign terrorist organization.
A bill from Rep. Stephen Lynch, D-Mass., would require the government to petition the Foreign Intelligence Surveillance Court every time an analyst wants to search telephone metadata . From there, a surveillance court judge would need to find “reasonable, articulable suspicion” that the search is “specifically relevant to an authorized investigation” before approving the application. The legislation would also require the FBI to report monthly to congressional intelligence committees all the searches the analysts made.
3) Declassify Foreign Intelligence Surveillance Court opinions
Right now, court opinions authorizing the NSA surveillance programs remain secret. Advocacy groups have brought several Freedom of Information Act suits  seeking the release of Foreign Intelligence Surveillance Court documents, but the Justice Department continues to fight them.
Several bills would compel the secret court to release some opinions. The Ending Secret Law Act — both the House  and Senate  versions — would require the court to declassify all its opinions that include “significant construction or interpretation” of the Foreign Intelligence Surveillance Act. Under current law, the court already submits these “significant” opinions to congressional intelligence committees, so the bill would just require the court to share those documents with the public.
The bills do include an exception if the attorney general decides that declassifying an opinion would threaten national security. In that case, the court would release an unclassified summary of the opinion, or — if even offering a summary of the opinion would pose a national security threat — at least give a report on the declassification process with an “estimate” of how many opinions must remain classified.
Keep in mind, before Edward Snowden’s disclosures, the Justice Department argued that all “significant legal interpretations” needed to remain classified  for national security reasons. Since the leaks, the government has said it’s now reviewing what, if any, documents can be declassified, but they said they need more time .
4) Change the way Foreign Intelligence Surveillance Court judges are appointed
Current law does not give Congress any power to confirm Foreign Intelligence Surveillance Court judges. Instead, the chief justice of the United States appoints the judges, who all already serve on the federal bench. The judges serve seven-year terms. Chief Justice John Roberts appointed all 11 judges  currently serving on the court – ten of whom were nominated  to federal courts by Republican presidents.
A bill introduced by Rep. Adam Schiff, D-Calif., would give the president the power to appoint surveillance court judges  and give the Senate power to confirm. The president would also choose the presiding judge of the surveillance court, with Senate approval.
Alternatively, Rep. Steve Cohen, D-Tenn., has offered a bill  that would let the chief justice appoint three judges and let the House Speaker, the House minority leader, the Senate majority leader, and the Senate minority leader each appoint two judges.
5) Appoint a public advocate to argue before the Foreign Intelligence Surveillance Court
Currently, the government officials petitioning the Foreign Intelligence Surveillance Court do not face an adversarial process. Surveillance targets do not have representation before the court, and they are not notified if a court order is issued for their data.
In 33 years, the surveillance court only rejected 11 of an estimated 33,900 government requests , though it the government has also modified 40 of the 1,856 applications in 2012.
Two former Foreign Intelligence Surveillance Court judges – Judge James Robertson  and Judge James Carr  – have argued that Congress should appoint a public advocate to counter the government’s arguments. Carr wrote in the New York Times, “During my six years on the court, there were several occasions when I and other judges faced issues none of us had encountered before. […]Having lawyers challenge novel legal assertions in these secret proceedings would result in better judicial outcomes.”
Sen. Richard Blumenthal, D-Conn., has promised to introduce a bill  that would provide a “special advocate” to argue on behalf of privacy rights and give “civil society organizations” a chance to respond before the surveillance court issues significant rulings.
The surveillance court can actually invite advocates to argue before the court, as the Supreme Court did when the Obama administration refused to defend the Defense of Marriage Act.
“There’s nothing in law that would prevent the FISA court from hiring an advocate as an additional advisor to the court, except the need to obtain security clearances for that advocate, which would have to be granted by the executive branch,” explained Steven Bradbury, who served as the head of the Office of Legal Counsel in the Department of Justice from 2005 to 2009.
Bradbury has argued that the surveillance court may not need a permanent public advocate because its legal advisers  already fulfill that role.
6) End phone metadata collection on constitutional grounds
The Justice Department has maintained that mass phone metadata collection is “fully consistent with the Fourth Amendment .” That reasoning is based on the 1979 Supreme Court decision Smith v. Maryland , where the Court found that the government does not need a warrant based on probable cause to collect phone records. The Court reasoned that whenever you dial a phone number, you voluntarily share that phone number with a telecom, and you can’t reasonably expect a right to privacy for information shared with third parties. As a result, the Court ruled that the collection of phone records is not a “search” and does not merit protection under the Fourth Amendment.
Sen. Rand Paul, R-Ky., has introduced a bill  declaring that the Fourth Amendment “shall not be construed to allow any agency of the United States Government to search the phone records of Americans without a warrant based on probable cause” — effectively shutting down the NSA’s phone metadata collection program.
The NSA’s New Spy Facilities are 7 Times Bigger Than the Pentagon
He works at one of the three-letter intelligence agencies and oversees construction of a $1.2 billion surveillance data center in Utah that is 15 times the size of MetLife Stadium, home to the New York Giants and Jets. Long Island native Harvey Davis, a top National Security Agency official, needs that commanding presence. His role is to supervise infrastructure construction worldwide for NSA, which is part of the Defense Department. That involves tending to logistics, military installations, as well as power, space and cooling for all NSA data centers.
In May, crews broke ground on a $792 million computing center at the agency’s headquarters near Baltimore that will complement the Utah site. Together the Utah center and Maryland’s 28-acre computer farm span 228 acres—more than seven times the size of the Pentagon.
During an interview with Government Executive in June, amid the uproar over leaked details of NSA’s domestic espionage activities, Davis describes the 200-acre Utah facility as very transparent: “Only brick and mortar.” A data center just provides energy and chills machines, he says.
About 6,500 contractors, along with more than 150 Army Corps of Engineers and NSA workers, including some with special needs, are assigned to the project. Davis perks up when he talks about the hundreds of individuals with disabilities he has steered into NSA.
But ask him why the facility is so big and what’s inside, and he is less forthcoming. “I think we’re crossing into content. It’s big because it’s required to be big,” says Davis, a 30-year veteran of the spy agency.
At NSA, secrecy is not exclusive to intelligence analysts. Every civil servant in the Installations and Logistics Directorate Davis leads has a security clearance. He earned his in the early 1980s, entering the agency with a master’s degree in business administration, experience managing inventory for a women’s apparel chain, and a yearning for a higher calling than retail.
For security reasons, some of the contractors erecting the data center don’t even know its purpose, other than the equipment needed—nothing about snooping. The 2010 public work solicitation called for a 65-megawatt center with a chiller plant, fire suppression systems, electrical generators and an uninterruptible power supply backup capacity.
Davis lets out that inside there will be supercomputers, or what NSA labels “high performance computers.” These need “different cooling and different power distributions as opposed to something you bought from Best Buy,” he says. The machines, along with whatever other technology is tucked in the facility, are slated to power on by Oct. 1.
Four years ago, the stated purpose of the megaplex near Salt Lake City was to amass foreign intelligence and warnings about hackers. Officials described it as an extension of President George W. Bush’s 2008 Comprehensive National Cybersecurity Initiative, a largely classified, cross-agency program to protect U.S. computer networks against adversaries. Today, it is evident the data plantation will not be linked to any one program. Instead, the systems inside will warehouse counterterrorism information collected in aggregate, including millions of Americans’ phone logs for five years and certain foreigners’ online messages, NSA officials confirm. Spies at other locations will decipher what’s accumulated to thwart terrorist attacks, cyber assaults, and weapons of mass destruction.
The Utah effort is the largest ongoing Defense construction project in the United States. Still, it is only three-quarters the size of the department’s largest in the world—the Medical Center Replacement Project at Rhine Ordnance Barracks, Germany.
Harvey Davis, Director of Logistics, NSA, at the agency’s Fort Meade construction site. Photo by Melissa Golden
Davis is reluctant to discuss the ratio of contractors to civil service employees in Utah—a week after The Guardian and The Washington Post have reported an NSA contractor leaked Top Secret documents. Prosecutors are pursuing former Booz Allen Hamilton employee Edward Snowden for exposing files about PRISM, the agency’s foreign Internet surveillance program, and domestic call data-monitoring while he was administering NSA data systems in Hawaii.
Compared with the 6,500 contract employees, “there is a smaller number of people on my core project management team,” Davis says. An agency official in the room adds: “We can talk in total numbers here . . . We can’t get into how many are ours, how many are theirs.”
A few days after the interview, when asked why NSA’s reliance on contractors is hush-hush, agency officials released some figures. Ten people are on Davis’ core team. About 150 employees from the Army Corps of Engineers, along with an undisclosed number of employees from the 1,000-member Installations and Logistics Directorate, are involved with the Utah project. NSA considers the total sum of agency personnel staffed to certain construction projects operational details and would not provide that statistic. A small workforce of up to 200 government and contract employees—building engineers, systems administrators and maintenance workers—will stay permanently to keep the facility running.
Davis is more eager to discuss the quality than quantity of his employees. Roughly 10 years ago, while working as an NSA human resources director, he encountered an untapped talent pool that he now draws from regularly. “The disabled population is just so thankful to have a job. They would just come in here and you’d have to actually force them to go home,” Davis says. “I have engineers that are hard of hearing, and our workforce all took sign language so they could actually communicate with one another.”
Nobody waters down security clearance exercises to facilitate special needs applicants, he adds. “Somebody who was deaf, we would do polygraph in sign language,” Davis says. “What we look for is qualifications first. We have someone developing software—working on the computers—that is blind. There is really no limitation that we have found as long we can find the skill match.” At least a dozen engineers who have disabilities work in his directorate. Grounds maintenance and snow removal contractors in Utah will be hired through SourceAmerica (formerly NISH), a nonprofit organization that fits agency needs with the skills of job seekers with disabilities.
“He has integrated this into the fabric of the company,” says Joyce A. Bender, past chair of the board of the American Association of People with Disabilities, who met Davis when he decided NSA needed more diversity. “What makes this work at any company is a passionate leader, someone in leadership, whether it’s in the private sector or a federal agency,” says Bender, a Pittsburgh-based consultant who recruits people with disabilities for work in government and industry.
Her firm refers to NSA about 200 individuals annually for positions in finance, linguistics, math and other specialties. Since 2010, about 550 candidates have been hired. “If he says, ‘I’m going to do something,’ you can count on it that he is going to do it,” Bender says of Davis. “He doesn’t sugarcoat anything. He’s very direct and to the point.”
A Leak During Construction
No matter their background or how they came to NSA, civil servants and contract employees alike all serve in silence. “That’s really the culture of this agency, and we’re really not looking for big accolades,” Davis says. “What really makes the people satisfied here is that they did the job and they did it right and they’re doing things within the appropriate manner.” The mentality is that NSA operates in the dark for the safety of Americans. Some citizens, however, argue it should operate in the sunshine a little more for the safety of democracy.
The secrecy dispute is “a distraction and a weakness that has been presented by this guy,” Snowden, who should not have seen such sensitive information in the first place, says one former NSA official. “They’ve got to do some internal homework about how to keep that data separate,” the ex-official says, adding that technical controls are not very difficult to configure. “How the heck did this guy in Hawaii gain access to all that?”
Some human rights advocates are grateful for the exposure of the agency’s surveillance methods. “Communications about millions of innocent Americans are being stored for five years in a government database—whether or not there is any reason to search our call records, and I don’t think our Constitution allows that,” says Alex Abdo, staff attorney for the American Civil Liberties Union’s National Security Project.
Even some former Pentagon officials say citizens should know NSA’s intentions for the Utah data center. “When you have this much centralization of capabilities, which in government terms can translate into real power—that and resources—it’s important that the public be able to look at these things and figure out what they are doing,” says a cyber official who recently left Defense and now works as a private contractor. The official is not involved in the project and was not authorized to speak on behalf of the department.
A 2012 article in Wired reported that NSA needs the megaplex partially because the Pentagon wants to expand the military global communications network to manage yottabytes of data. “A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude,” the article said. “Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion (500,000,000,000,000,000,000) pages of text.” NSA officials told Government Executive, however, they do not discuss such operational details.
An Open House
The contents of the NSA computer fortress might be a mystery to the public, but Davis says his project has been open to congressional and industry scrutiny.
“The military construction process by design is a very, very transparent process. We work through the Corps of Engineers,” he says. “It’s a public discourse. When we give out our request for proposal, that’s through FedBizOpps.gov.” But on the website, many of the work descriptions for that project are locked behind a firewall. NSA spokeswoman Vanee Vines says the documents are restricted because “they must be accounted for and are only for cleared defense contractors.”
Davis acknowledges the controversy over his project has taken an emotional toll. “We’ve been pressured to disclose what’s been going in the Utah Data Center for quite a while independent of the current events,” he says. “My workforce and the workforce that I work with here [in Utah] take our jobs and our responsibility very, very seriously, and for somebody to say that we’re doing something untoward is a pretty big hit on the morale here.”
No matter the outcome of the debate, the Utah computers are expected to go online within two months. This is where the MBA comes in. From choosing a site, to convincing Congress to agree with blueprints to surmounting a late-in-the-game budget chop, balancing the books is key. “Utah is a wonderful place with abundant and inexpensive power,” Davis says. “Plenty of sources of water for cooling.” NSA applied a mathematical model to select the location. The surrounding environment simplified construction. “Utah, because of the facility and the utilities, just came out far and ahead of everywhere else,” he says. “Lots of good roads. We could get the steel in. We could get the concrete in. We have lots of sand pits nearby,” he says. “We built our own cement slabs in that area. It’s pretty well offset from the road for the security that we need for the data center.”
The price tag for the project is in line with industry standards, according to NSA. “It’s actually relatively cheap and I came in under cost,” Davis says, referring to $100 million in savings gained partly by refusing to let contractors adjust the plan. Penny-pinching became mandatory when governmentwide spending cuts, known as sequestration, kicked in this year.
“One of the biggest cost drivers on a project this size is something called an engineering change proposal. They really number in the tens to hundreds in a project of this size,” but one could “count on a couple of hands the numbers of change orders that we allowed to happen,” he says. “We spent a lot of time honing the requirements tightly up front, making sure we knew what we were building, building it, and not going back and changing it later.” That’s the New York strong arm talking.
Related Posts On Pronk Palisades
| Make a Comment ( None so far )
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
~United States Constitution, Amendment IV
“He who controls the past controls the future. He who controls the present controls the past.”
“Now I will tell you the answer to my question. It is this. The Party seeks power entirely for its own sake. We are not interested in the good of others; we are interested solely in power, pure power. What pure power means you will understand presently. We are different from the oligarchies of the past in that we know what we are doing. All the others, even those who resembled ourselves, were cowards and hypocrites. The German Nazis and the Russian Communists came very close to us in their methods, but they never had the courage to recognize their own motives. They pretended, perhaps they even believed, that they had seized power unwillingly and for a limited time, and that just around the corner there lay a paradise where human beings would be free and equal. We are not like that. We know what no one ever seizes power with the intention of relinquishing it. Power is not a means; it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. The object of persecution is persecution. The object of torture is torture. The object of power is power. Now you begin to understand me.”
“Big Brother is Watching You.”
~George Orwell’s 1984
POWER IS NOT A MEANS, IT IS AN END
Maxine Waters Confirms Big Brother Database 2013 Foretells NSA Phone & Internet Spying
Glenn Beck:Govt Storing Citizen Cellphone& Internet Activity
Digital Blackwater: How the NSA Gives Private Contractors Control of the Surveillance State
Glenn Greenwald on How NSA Leaker Edward Snowden Helped Expose a “Massive Surveillance Apparatus”
“A Massive Surveillance State”: Glenn Greenwald Exposes Covert NSA Program Collecting Calls, Emails
He told you so: Bill Binney talks NSA leaks
What You Should Know About The New NSA Utah Data Center
Is Edward Snowden a Hero? A Debate With Journalist Chris Hedges & Law Scholar Geoffrey Stone
Spying On Americans By NSA Prism Collection Details – Rand Paul On Hannity
NSA is Spying on EVERYTHING you do. Phone calls and internet activity is being stored and monitored.
PRISM: Why the NSA is Mining Internet Data
Total Surveillance : N.S.A. data mining all computers, phone calls, internet, emails
CNET Update – Uproar over PRISM government surveillance
NSA Caught Spying on Americans’ Internet Use
Columnist exposes Obama surveillance
Meet Edward Snowden: NSA PRISM Whistleblower
Sky News interview w/ Julian Assange and JP Barlow RE: Prism and Edward Snowden
Complete News – Snowden leaks show NSA ‘routinely lies’ to Congress
Judge Napolitano On NSA Spying: Most Extraordinarily Broad Search Warrant Ever Issued In US History
Rand Paul Discusses The NSA’s Violation Of The Bill Of Rights On Yahoo News (6-6-13)
Rand Paul On NSA Spying: ‘I’m Going To Challenge This At The Supreme Court’ –
Ron Paul: NSA Seizing Phone Records Symptom of Failure of The State
NSA Constitutional Violations? – Judge Andrew Napolitano – Geraldo
Clever Denials Surrounding the NSA PRISM Piracy Scandal
Peter Eckersley from the Electronic Frontier Foundation stopped by to explain why Silicon Vally’s top tech companies are dancing around PRISM allegations. Interview recorded Friday June 7, 2013
NSA Surveillance – Does Obama Have ANY Credibility Left?
“In his remarks today defending the NSA programs gathering telephone records and mining Internet companies, Obama sounded a familiar refrain, saying he welcomes the “debate” over the proper balance between civil liberties and national security.”*
Obama gave a speech in defense of recently uncovered secret programs to wiretap and data-mine U.S. citizens almost indiscriminately, and Congress agrees. Do you believe his remarks that we NEED these programs? Would Obama agree with himself campaigning about his stance on civil rights? Cenk Uygur, Ben Mankiewicz, and John Iadarola discuss.
*Read more form Washington Post:
“Obama Is BIG BROTHER And He’s A LIAR!”
How PRISM Easily Gives Your Private Data Over to Big Brother
The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.
The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.”*
We’ve been assured by the president that the NSA’s PRISM program won’t affect “ordinary” U.S. citizens, but what is the criteria for deciding who gets their data mined and monitored? Cenk Uygur, Ben Mankiewicz, and John Iadarola (Host, TYT University) discuss the egregious reach of the Obama administration’s secret mass surveillance program.
*Read more from The Guardian:
Fourth Amendment Has been Suspended
The federal government is launching an expansive program dubbed “Perfect Citizen” to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program.The surveillance by the National Security Agency, the government’s chief eavesdropping agency, would rely on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack, though it wouldn’t persistently monitor the whole system, these people said.
Defense contractor Raytheon Corp. recently won a classified contract for the initial phase of the surveillance effort valued at up to $100 million, said a person familiar with the project.
An NSA spokeswoman said the agency had no information to provide on the program. A Raytheon spokesman declined to comment.
Some industry and government officials familiar with the program see Perfect Citizen as an intrusion by the NSA into domestic affairs, while others say it is an important program to combat an emerging security threat that only the NSA is equipped to provide.
“The overall purpose of the [program] is our Government…feel[s] that they need to insure the Public Sector is doing all they can to secure Infrastructure critical to our National Security,” said one internal Raytheon email, the text of which was seen by The Wall Street Journal. “Perfect Citizen is Big Brother.”
Glenn Becks “SURVEILLANCE STATE” (Must Viewing)
NSA spying on All Americans Part 1
NSA spying on All Americans Part 2
How to Protect Yourself from The NSA
NSA Whistleblower Seeks Asylum in Iceland
Former CIA Officer: Officials Considering NSA Whistleblower’s Case Potential Chinese Espionage
Judge Jeanine Slams IRS, NSA and Obama for Expanding Surveillance Program – Opening Statement
James Bamford: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center 1 of 2
James Bamford: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center 2 of 2
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
“The NSA Is Lying”: U.S. Government Has Copies of Most of Your Emails Says NSA Whistleblower
NSA whistleblower William Binney Keynote at HOPE Number Nine
U.S. v. Whistleblower Tom Drake
Tom Drake, a former NSA senior executive indicted last year for espionage after leaking to the media allegations that the nation’s largest intelligence organization had committed fraud, waste and abuse will appear in his first television interview. Scott Pelley reports.
Whistle Blower Threatened with 35 Years in Prison, Warns of Developing Tyranny
NSA Whistleblower Thomas Drake Prevails in Unprecedented Obama Admin Crackdown
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
Part 2: Former NSA Employee Thomas Drake and Jesselyn Radack on Whistleblower Crackdown
The Police – Every Breath You Take
“When in the Course of human events, it becomes necessary for one people to dissolve the political bands which have connected them with another, and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature’s God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation.
We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.–That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, –That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security. …”
The Declaration of Independence
Background Articles and Videos
Domestic Spying, Mainstream Source – NSA, Internet Spying, AT&T
Domestic Spying, Mainstream Source – NSA Copying Entire Internet
Glenn Becks “SURVEILLANCE STATE”
Barack Obama’s Surveillance Society
GLENN BECK ‘They Are Liars’
Glenn Greenwald: Challenging the US Surveillance State
2012.05.01 – GBTV – The Glenn Beck Radio Program – NSA Warning
Project Vigilant: Shadowy Spy Group Building Dossiers On Internet Users For Feds – Alex Jones Tv 3/3
Total Information Awareness – Social Networking Sites (mirror)
The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to national security, by achieving Total Information Awareness (TIA). This would be achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources including, without any requirement for a search warrant. This information would then be analyzed to look for suspicious activities, connections between individuals, and “threats”. Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.
Following public criticism that the development and deployment of these technologies could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded, and merely run under different names.
ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun. The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued after the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority. The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.
ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections. A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.
Redacted version of the DoD Inspector General audit, obtained through FOIA
A group of former NSA workers — Kirk Wiebe, William Binney, Ed Loomis, and Thomas A. Drake, along with House Intelligence Committee staffer Diane Roark (an expert on the NSA budget) — believed the operational prototype system called ThinThread was a better solution than Trailblazer, which was just a concept on paper at the time. They complained to the DoD Inspector General office in 2002 about mismanagement and the waste of taxpayer money at the NSA surrounding the Trailblazer program. In 2007 the FBI raided the homes of these people, an evolution of President Bush’s crackdown on whistleblowers and “leaks” after the New York Times disclosed a separate program (see NSA warrantless surveillance controversy). In 2010, one of the people who had helped the IG in the ensuing investigation, NSA official Thomas Andrews Drake, was charged with espionage, part of the Obama administration’s crackdown on whistleblowers and “leaks”. The original charges against him were later dropped and he pled to a misdemeanor.
The result of the DoD IG complaint was a 2004 audit report that was released under FOIA in 2011. Although highly redacted, the report contained significant criticisms of Trailblazer, and included some relatively minor criticisms of ThinThread, for example, citing a low “quality of service and support” from the ThinThread program team, a lack of documentation, a lack of a configuration management system, and a lack of a trouble ticket system. However, “The findings that led to the recommendations would not have prevented the successful deployment of THINTHREAD … the recommendations were made to improve the operational efficiency of THINTHREAD after it was deployed …”
The program would have used a technique of encrypting sensitive privacy information in order to comply with legal concerns, and would have automatically identified potential threats. The sources of the data for this program would have included “massive phone and e-mail data,” but the extent of this information is not clear. Only once a threat was discovered, would the data be decrypted for analysis by agents.
ThinThread would have bundled together four cutting-edge surveillance tools.:
- Used more sophisticated methods of sorting through massive phone and e-mail data to identify suspect communications.
- Identified U.S. phone numbers and other communications data and encrypted them to ensure caller privacy.
- Employed an automated auditing system to monitor how analysts handled the information, in order to prevent misuse and improve efficiency.
- Analyzed the data to identify relationships between callers and chronicle their contacts. Only when evidence of a potential threat had been developed would analysts be able to request decryption of the records.
Intelligence experts describe as rigorous testing of ThinThread in 1998, the project succeeded at each task with high marks. For example, its ability to sort through massive amounts of data to find threat-related communications far surpassed the existing system. It also was able to rapidly separate and encrypt U.S.-related communications to ensure privacy.
The Pentagon report concluded that ThinThread’s ability to sort through data in 2001 was far superior to that of another NSA system in place in 2004, and that the program should be launched and enhanced. ThinThread was designed to address two key challenges: One, the NSA had more information than it could digest, and, two, increasingly its targets were in contact with people in the United States whose calls the agency was prohibited from monitoring.
Trailblazer Project had more political support internally because it was initiated by Michael Hayden when he first arrived at the NSA.
NSA’s existing system for data-sorting has produced a database clogged with corrupted and useless information. The mass collection of relatively unsorted data, combined with system flaws erroneously flag people as suspect, has produced numerous false leads, draining analyst resources. NSA leads have resulted in numerous dead ends.
NSA dropped the component that monitored for abuse of records. It not only tracked the use of the database, but hunted for the most effective analysis techniques, and some analysts thought it would be used to judge their performance. Within the NSA, the primary advocate for the ThinThread program was Richard Taylor. Taylor has retired from the NSA. The strength of ThinThread’s approach is that by encrypting information on Americans, it is legal regardless of whether the country is at war.
ThinThread “was designed very carefully from a legal point of view, so that even in non-wartime, you could have done it legitimately.”
End of the project
The project was ended after successful testing by General Michael Hayden, and while the privacy elements were not retained, the analysis technology is reported to be the underlying basis of current NSA analysis techniques.
“They basically just disabled the [privacy] safeguards.” [That quote does not appear in the link]
Some anonymous NSA officials told Hosenball of Newsweek that the ThinThread program, like Trailblazer, was a “wasteful failure”.
Drake was interviewed on The Daily Show on August 6, 2012 about his charges and the program with his lawyer.
Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail. It ran over budget, failed to accomplish critical goals, and was cancelled.
NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.
The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation. The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience“.
Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens. Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.
In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000. SAIC had also hired a former NSA director to its management; Bobby Inman. SAIC also participated in the concept definition phase of Trailblazer.
The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” 
In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.” The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.
In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule. In 2006 the program was shut down, after having cost billions of US Dollars. Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.
The new project replacing Trailblazer is called Turbulence.
According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”
In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying. A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy. Drake gave info to DoD during its investigation of the matter. Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed. She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.
Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.
In 2003, the NSA IG (not the DoD IG) had declared Trailblazer an expensive failure. It had cost more than $1 billion.
In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative. Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.
In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun. Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.
In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union. None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.
In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917, part of President Barack Obama‘s crackdown on whistleblowers and “leakers”. The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.
In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.
ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS and Five Eyes). It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.
ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.
The system has been reported in a number of public sources. Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001, and by author James Bamford in his books on the National Security Agency of the United States. The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
- New Zealand
- United Kingdom
- United States of America
The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:
The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.
The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic. During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication, and could be intercepted at great distances. The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”
The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber. The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%. Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video. Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.
One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt. A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.
Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.
Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes. Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon and the speech technology developed by the Belgian firm Lernout & Hauspie. An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.
Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.
According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits. The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.
The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.” The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).
Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK. At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.
The 2001 European Parliamentary (EP) report lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:
Likely satellite intercept stations
The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:
- Hong Kong (since closed)
- Australian Defence Satellite Communications Station (Geraldton, Western Australia)
- Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)
- Misawa Air Base (Japan) Map
- GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
- Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
- Sugar Grove (West Virginia, U.S.) Map
- Yakima Training Center (Washington, U.S.) Map
- GCSB Waihopai (New Zealand)
- GCSB Tangimoana (New Zealand)
- CFS Leitrim (Ontario, Canada)
- Teufelsberg (Berlin, Germany) (closed 1992)
Other potentially related stations
The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:
Related Posts On Pronk Palisades
Related Posts on Pronk Pops
Read Full Post
| Make a Comment ( None so far )
“It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself–anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face…; was itself a punishable offense. There was even a word for it in Newspeak: facecrime, it was called.”
~George Orwell, Nineteen-Eighty-Four, page 65.
Punch Drunk, Mr. President? / Is Obama Insensitive To The Dire Realities Of The Economy & Families?
big brother is watching you,hymne d’océania
The radical socialists of the American left try to limit free speech by saying a person is engaging in “hate speech”.
This is a tactic for trying to shutup people the left in America do not agree with.
Free Speech, Hate Speech, the UN and Youtube
CNN Covers Growing Number of Hate Groups
Next the politically correct radical socialists would like you to believe that hate speech is a crime.
CNN: Hate crimes surge after Obama inauguration
Not so fast.
Part 1: Rev. Jeremiah Wright In His Own Words
Part 2: Rev. Jeremiah Wright In His Own Words
Looks like President Obama has some experience after all, twenty years of listening to Reverend Wright anti-white and anti-American views–free speech yes, a hate speech–a hate crime–you tell me?
If you do not like what I am saying, do not listen, walk away.
There is no such thing as hate speech or hate crimes in the United States of American–it is free speech.
Until now that is and if President Obama gets his war.
Seems like President Obama supports two hate crime law bills in Congress, HR 256 and HR 262.
Thought Police ‘Hate Crimes’ Prevention Act, HR 256 Hate Bill Exposed!
Freedom Under Fire: U.N. Anti-Blasphemy Resolution – With Christopher Hitchens
Who are the 57 Islamic countries?
Candidate Obama confused them with the 50 states of United States:
Just say no to the hate speech and hate crimes bills.
The next time someone says your remarks are offensive and hate speech–perform some magic:
Or if you are pressed for time, just say–Excuse Me!
If you call a “undocumented immigrant” an illegal immigrant or criminal alien you may in the future be accused of hate speech and a hate crime if the proposed hate crimes bills pass.
A Hate Crime for Calling People Illegal Aliens?
What if they Stole Your Springsteen Seats…
Bill of Rights
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.
United States Constitution
Background Articles and Videos
THE AGENDA • CIVIL RIGHTS
“…President Barack Obama has spent much of his career fighting to strengthen civil rights as a civil rights attorney, community organizer, Illinois State Senator, U.S. Senator, and now as President. Whether promoting economic opportunity, working to improve our nation’s education and health system, or protecting the right to vote, President Obama has been a powerful advocate for our civil rights.
- Combat Employment Discrimination: President Obama and Vice President Biden will work to overturn the Supreme Court’s recent ruling that curtails racial minorities’ and women’s ability to challenge pay discrimination — on Jan. 29, 2009, President Obama signed the Lilly Ledbetter Fair Pay Restoration Act of 2009, to ensure that women receive equal pay for equal work. they will also pass the Employment Non-Discrimination Act, to prohibit discrimination based on sexual orientation or gender identity or expression.
- Expand Hate Crimes Statutes: President Obama and Vice President Biden will strengthen federal hate crimes legislation, expand hate crimes protection by passing the Matthew Shepard Act, and reinvigorate enforcement at the Department of Justice’s Criminal Section.
- End Deceptive Voting Practices: President Obama will sign into law his legislation that establishes harsh penalties for those who have engaged in voter fraud and provides voters who have been misinformed with accurate and full information so they can vote.
- End Racial Profiling: President Obama and Vice President Biden will ban racial profiling by federal law enforcement agencies and provide federal incentives to state and local police departments to prohibit the practice.
- Reduce Crime Recidivism by Providing Ex-Offender Support: President Obama and Vice President Biden will provide job training, substance abuse and mental health counseling to ex-offenders, so that they are successfully re-integrated into society. Obama and Biden will also create a prison-to-work incentive program to improve ex-offender employment and job retention rates.
- Eliminate Sentencing Disparities: President Obama and Vice President Biden believe the disparity between sentencing crack and powder-based cocaine is wrong and should be completely eliminated.
- Expand Use of Drug Courts: President Obama and Vice President Biden will give first-time, non-violent offenders a chance to serve their sentence, where appropriate, in the type of drug rehabilitation programs that have proven to work better than a prison term in changing bad behavior. …”
HR 256 and HR 262 Threaten Constitutional Free Speech Rights
“All Americans need to take a close look at David’s Law (H.R. 256) and its companion bill, The David Ray Ritcheson Hate Crimes Prevention Act of 2009 (H.R. 262). These two so-called “hate crime” bills, introduced by Representative Sheila Jackson-Lee (D-TX), are Trojan horses designed to silence Constitutionally-guaranteed free speech that is not considered “politically correct” by liberals.
Similar legislation did not become law during the previous Congress because President Bush threatened to veto it. However, President Obama has pledged to sign this “hate crime” legislation if it reaches his desk. As a State Senator, Obama helped pass “hate crimes” legislation in Illinois. The White House website states that Obama is determined to pass the most pro-homosexual, free-speech destroying legislation ever to come before Congress, including expanded “hate crime” laws and legal “support for the LGBT (Lesbian, Gay, Bi-Sexual, Transgender) community.”
Obama’s hate crime agenda is modeled after European and Canadian law. An Amsterdam Court of Appeals has recently decided to prosecute Dutch lawmaker Geert Wilders for inciting hatred against Muslims. This came after Wilders made a film, Fitna, that linked the Koran to violence against Christians, Jews and even other Muslims. The film largely used footage of Muslim clerics giving speeches that incite violence. But for telling the truth, Wilders is on trial. Other nations that have adopted hate crimes legislation, like Canada, have deprived their citizens of their freedom of speech and religious expression. …”
Pelosi’s Hate Bill Strategy
By Rev. Ted Pike
“…What is Pelosi’s strategy? Several aspects can be reasonably speculated.
The present hate crimes bill now in the House Judiciary Committee, the David Ray Hate Crimes Prevention Act, is not the real federal hate crimes bill for which most Democrats lust. It is a three-page abbreviation of the 5-page hate bill which passed the House two years ago. It only grants the federal government power to invade states’ rights in law enforcement to punish violent hate crimes, not all bias crimes against persons or property.
Yet even this intrusion is unprecedented, uniting federal and local law enforcement into police state jurisdiction over violent hate crimes. It would also elevate homosexuals to special federally protected status as well as create a bias motivation justice system, enforceable from the federal level. Such bias motivation as a criterion for federal intervention would soon broaden, through judicial precedent, into a national speech crime law, as happened in Canada. HR 256 also gives the federal government the potential to punish “as a principal” those whose vehement criticism of homosexuals or other federally protected groups might “abet” (Webster: “incite”) acts of violence against them (USC Title 18, Sec. 2[a]).
Since it will erode our First Amendment free speech, disregarding the Fourteenth Amendment as well as the Tenth Amendment guaranteeing states’ sovereign rights, even the stripped-down HR 256 should be shocking enough to raise a howl of protest to Washington.
But we hear no howl of protest. …”
Closing The Borders
To Free Speech
By Harmony Grant
“…It seems unthinkable that the government could deny open debate on a subject like immigration. Yet a federal hate crimes bill before Congress will ultimately do just that-crush freedom of speech to favor “protected classes” (especially racial and religious minorities and homosexuals) and criminalize so-called “hate speech” against them. Such “hate speech” includes the most legitimate critiques of racial difference, protected religions, cultures, or behaviors-and especially immigration.
Hate crime laws-already passed in 45 of our 50 states-ride a wave of propaganda and misperception. Who isn’t against hate? Who doesn’t want to stop crime? But the reality of these laws is dark as any Orwellian tale. Hate crime laws intensify punishment for crimes motivated by bias against specially protected groups. This would be bad enough; our government representatives have no right to create more (and less) protected classes, and they certainly have no right to mine our thoughts and beliefs, then punish what they deem incorrect! But hate crime laws get even worse. In hate law countries such as Canada, they are quickly broadened to punish pure speech, even if no crime is committed.
Obama’s Dangerous Hate Crime Agenda
“…Within moments of Barack Hussein Obama, the most liberal member of the U.S. Senate, being sworn in as the President of the United States, the White House’s website was updated. It showed that President Obama is strongly in favor of hate crimes legislation and will work to see it passed. Hate Crimes will silence Christians and keep them from fulfilling their duty to God to proclaim the truth!
As a State Senator, Obama helped pass hate crimes legislation in Illinois. On his White House website Obama shows that he is determined to pass the most pro-homosexual, free-speech destroying legislation ever to come before Congress, including expanded hate crime laws, and legal “support for the LGBT (Lesbian, Gay, Bi-Sexual, Transgender) community.”
The only reason that we do not already have Federal Hate Crime Law is because of President George W. Bush’s veto. President Obama has pledged to sign Hate Crime Legislation if it reaches his desk. We must stop the legislation before President Obama can sign it! …”
Obama’s online townhall: What’s really going on? Updated: Megalomania-palooza!
By Michelle Malkin
“…At 11:30am Eastern, President Obama will conduct an “online townhall” on the economy.At this moment, the White House website reports that “92,889 people have submitted 104,079 questions and cast 3,608,538 votes.”In order to ask a question, you must register your name, e-mail, and zip code.The DNC, fresh off its failed attempt to muster grass-roots support for the president’s budget, has been aggressively advertising the townhall: …”http://michellemalkin.com/2009/03/26/obamas-online-townhall-whats-really-going-on/
The coming G20 riots & the spread of mob rule
“…My syndicated column today continues the theme I blogged about two days ago in the “Rule of the Mob” post. Keep an eye on next week’s G20 summit in London. Thousands of anti-capitalism zealots will be amassing there to intimidate and harass bankers. The vandalizing of the Scottish ex-banking executive’s home in Edinburgh is just a prelude. The protests are slated to start tomorrow and last all week; President Obama leaves for the summit on Tuesday. The images above are graphics and posters being disseminated online by protest organizers.
The anarchists are reportedly using Google Streetview and Twitter to organize riots, hang businessmen in effigy at the behest of a university professor known as “Mr. Mayhem,” call for guillotining bank execs, and — get this — target London firms that fail to turn off their lights to commemorate that moronic “Earth Hour” event I wrote about earlier this week. If shops don’t worship at the altar of environmentalism, they will be broken into: …”
Rush Limbaugh: Barack the Magic Negro – History and the Media Part 1
Rush Limbaugh: Barack the Magic Negro – History and the Media Part 2
Barack The Magic Negro Will Offend “SOME” People!
BREAKING NEWS – h r 256 and h r 262 must not pass!
H.R. 262: David Ray Ritcheson Hate Crime Prevention Act
Reverend Jeremiah Wright National Press Club pt.1
Reverend Jeremiah Wright National Press Club pt.2
Reverend Jeremiah Wright National Press Club pt.3
Reverend Jeremiah Wright National Press Club pt.4
Reverend Jeremiah Wright National Press Club pt.5
Related Posts On Pronk Palisades
Read Full Post
| Make a Comment ( 4 so far )