Page 6 of 6 FirstFirst ... 23456
Results 126 to 145 of 145
  1. #126
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,558
    related:

    A federal judge has ordered the government to stop destroying National Security Agency surveillance records that could be used to challenge the legality of its spying programs in court.


    U.S. District Court Judge Jeffrey White’s ruling came at the request of the Electronic Frontier Foundation, which is in the midst of a case challenging NSA’s ability to surveil foreign citizen’s U.S.-based email and social media accounts.

  2. #127
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,518
    The Surveillance Engine: How the NSA Built Its Own Secret Google

    he National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified do ents obtained by The Intercept.

    The do ents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. Planning do ents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants.


    ICREACH contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden.


    Earlier revelations sourced to the Snowden do ents have exposed a mul ude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy.


    ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. A planning do ent from 2007 lists the DEA, FBI, Central Intelligence Agency, and the Defense Intelligence Agency as core members. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.


    The creation of ICREACH represented a landmark moment in the history of classified U.S. government surveillance, according to the NSA do ents.


    “The ICREACH team delivered the first-ever wholesale sharing of communications metadata within the U.S. Intelligence Community,” noted a top-secret memo dated December 2007. “This team began over two years ago with a basic concept compelled by the IC’s increasing need for communications metadata and NSA’s ability to collect, process and store vast amounts of communications metadata related to worldwide intelligence targets.”


    The search tool was designed to be the largest system for internally sharing secret surveillance records in the United States, capable of handling two to five billion new records every day, including more than 30 different kinds of metadata on emails, phone calls, faxes, internet chats, and text messages, as well as location information collected from cellphones. Metadata reveals information about a communication—such as the “to” and “from” parts of an email, and the time and date it was sent, or the phone numbers someone called and when they called—but not the content of the message or audio of the call.


    ICREACH does not appear to have a direct relationship to the large NSA database, previouslyreported by The Guardian, that stores information on millions of ordinary Americans’ phone calls under Section 215 of the Patriot Act. Unlike the 215 database, which is accessible to a small number of NSA employees and can be searched only in terrorism-related investigations, ICREACH grants access to a vast pool of data that can be mined by analysts from across the intelligence community for “foreign intelligence”—a vague term that is far broader than counterterrorism.

    http://readersupportednews.org/news-...-secret-google

    But NSA just can't seem to catch Romney-type tax evaders and their offshore criminal tax-evading dealings.



  3. #128
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,518
    posse comitatus?

    Child Pornography Case Spurs Debate on Military’s Role in Law Enforcement

    In a field office near Brunswick, Ga., a federal agent working as an undercover cybersleuth signed on to a large file-sharing network sometimes used by traders in child pornography.

    Using a law-enforcement computer program called RoundUp, the agent, Stephen D. Logan, scanned computer activity by the network’s members in the state of Washington. He located a computer offering illegal photos and videos, and downloaded three files as evidence.

    Local police took it from there, obtaining a warrant based on the distant search. The owner of the computer was convicted of possessing and distributing child pornography, and is now serving an 18-year sentence at a federal prison in Texas.


    Had Mr. Logan worked for the F.B.I., his work on the case might have seemed routine. But Mr. Logan worked for the Naval Criminal Investigative Service, and his mission that day in April 2011, he would later testify, had been to look for military service members trading in child pornography in Washington, the location of several naval bases.


    Mr. Logan’s computer surveillance could not distinguish military users from others, and the man he helped catch, Michael A. Dreyer, was a civilian. Now the case has sparked sharp debate over how much the military’s formidable investigative powers can legally contribute to civilian law enforcement.


    http://mobile.nytimes.com/2014/09/22...ment.html?_r=0



  4. #129
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,518
    This and the next post explain how and why the natsec/police-state/MIC is not in any way a Dem or Repug issue





    A hidden world, growing beyond control


    http://projects.washingtonpost.com/t...eyond-control/


    Last edited by boutons_deux; 09-22-2014 at 08:28 AM.

  5. #130
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,518
    Essay: Anatomy of the Deep State

    There is the visible government situated around the Mall in Washington, and then there is another, more shadowy, more indefinable government that is not explained in Civics 101 or observable to tourists at the White House or the Capitol. The former is traditional Washington partisan politics: the tip of the iceberg that a public watching C-SPAN sees daily and which is theoretically controllable via elections. The subsurface part of the iceberg I shall call the Deep State, which operates according to its own compass heading regardless of who is formally in power.

    Yes, there is another government concealed behind the one that is visible at either end of Pennsylvania Avenue, a hybrid en y of public and private ins utions ruling the country according to consistent patterns in season and out, connected to, but only intermittently controlled by, the visible state whose leaders we choose. My analysis of this phenomenon is not an exposé of a secret, conspiratorial cabal; the state within a state is hiding mostly in plain sight, and its operators mainly act in the light of day.

    Nor can this other government be accurately termed an “establishment.” All complex societies have an establishment, a social network committed to its own enrichment and perpetuation. In terms of its scope, financial resources and sheer global reach, the American hybrid state, the Deep State, is in a class by itself. That said, it is neither omniscient nor invincible. The ins ution is not so much sinister (although it has highly sinister aspects) as it is relentlessly well entrenched. Far from being invincible, its failures, such as those in Iraq, Afghanistan and Libya, are routine enough that it is only the Deep State’s protectiveness towards its higher-ranking personnel that allows them to escape the consequences of their frequent inep ude.


    http://billmoyers.com/2014/02/21/ana...he-deep-state/



  6. #131
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,518
    The ‘Primary Source’ Of NSA’s Spying Power Is A 33-Year-Old Executive Order By Ronald Reagan

    Newly released do ents prove the U.S. National Security Agency’s spying power overseas primarily comes from a 33-year-old executive order signed by then President Ronald Reagan.

    The American Civil Liberties Union obtained a series of internal papers from intelligence agencies including the NSA and Defense Intelligence Agency detailing how integral Reagan’s 1981 order is to the NSA’s current surveillance program. The order broadly allows the government to collect data from any company that is believed to have ties to foreign organizations. It also complicates the path forward for intelligence reforms in Congress.

    Previous reports acknowledge the order’s use as a foundation for some of the NSA’s surveillance programs such as gaining backdoor access to tech companies’ data centers. But the new do ents, which were released as part of a Freedom of Information Act lawsuitthe ACLU and other civil liberties advocates filed just before Edward Snowden’s leaks to the media, show
    Executive Order 12333 is the “primary source” authority when it comes to the NSA’s foreign spy programs.

    “Because the executive branch issued and now implements the executive order all on its own, the programs operating under the order are subject to essentially no oversight from Congress or the courts,” Alex Abdo, a staff attorney for the ACLU wrote in a blog post.

    Compared to section 215 of the Patriot Act, which would let intelligence agencies gather lists of incoming and outgoing calls from telecommunication companies, Reagan’s order has lax constraints on bulk data collection on U.S. citizens.

    As long as the communications data is stored internationally, the NSA can collect it.

    Federal law enforcement agencies can also get data stored overseas but first need a search warrant.

    After Snowden leaked details of the government’s intricate spy program in 2013, the Obama administration ended the agency’s bulk data collection program under Section 215, and Congress is drafting a new version of the USA Freedom Act. But the proposed bill, which passed the House and awaiting a vote by the Senate, offers little protections for U.S. citizens and still gives intelligence agencies leeway to collect chunks of data. The reforms also won’t address the executive order, the ACLU pointed out.

    The order is the main reason the government has been able to spy on web traffic between American companies with data centers abroad, such as Google and Yahoo.

    Now, those companies are feeling the heat from users in the U.S. and abroad. Foreign governments have been cracking down on American companies as a result of the surveillance revelations, as well as beefing up their own spy programs. The European Union is currently weighing whether or not companies like Facebook should be held accountable for their role in NSA spying. If Facebook loses the case, it could mean that any company that gave the NSA backdoor access would be bound to stringent privacy protections to continue operating on European soil.


    http://thinkprogress.org/world/2014/...gan-nsa-order/

    Thanks, Repugs and your Useful Idiot St Ronnie. The Repugs do to USA and the Cons ution lasts for decades.



  7. #132

  8. #133
    Veteran DarrinS's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Jun 2005
    Post Count
    41,654
    How's that whole "tackling the NSA" thing going?

  9. #134
    Veteran velik_m's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Jul 2005
    Post Count
    7,118
    How's that whole "tackling the NSA" thing going?
    It turned out it wasn't so much a tackle, it was more of a cuddle, but he cuddled the NSA real hard.

  10. #135
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,518
    the NSA is beyond civilian control

    eg: NSA officials Clapper, Brennan blatantly lying to Congress, breaking into the Senate's compters, and nobody punished. NSA is accountable to no one but itself.

    And St Ronnie "twelve triple3" got that ball rolling, like so many other balls he and his adminstration got rolling, and roll on today.
    Last edited by boutons_deux; 10-01-2014 at 05:16 AM.

  11. #136
    I play pretty, no? TeyshaBlue's Avatar
    My Team
    Dallas Mavericks
    Join Date
    Jun 2006
    Post Count
    13,319

  12. #137
    Veteran DarrinS's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Jun 2005
    Post Count
    41,654
    It turned out it wasn't so much a tackle, it was more of a cuddle, but he cuddled the NSA real hard.

  13. #138
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,518
    but but but ... President Bishop Gecko or President McLiar would have emasculated the NSA, right?

    Their DoJ and Repug Congress would have prosecuted Clapper and Brennan for lying to Congres.

  14. #139
    W4A1 143 43CK? Nbadan's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2001
    Post Count
    32,408
    Esidentpray Eisenhowerway iedtray otay arnway usway....ethay
    ANSAY isway uperin bentsay

  15. #140
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,558
    ACLU and others sue to stop dragnet surveillance of international communications:

    https://www.aclu.org/files/assets/wi..._complaint.pdf

  16. #141
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,558
    Ex-Yahoo employees have spoken anonymously to Motherboard about the news that Yahoo had built an "email scanner" for a US security agency, likely the Founded the alarm, only to have the company executives tell them that the US government had installed the tool.BI or the NSA. These sources -- at least one of whom worked on the security team -- say that in actuality, the NSA or FBI had secretly installed a "rootkit" on Yahoo's mail servers and that this was discovered by the Yahoo security team (who had not been apprised of it), who, believing the company had been hacked, s


    The sources in the article say that the "rootkit" was "buggy" and "poorly designed."
    http://boingboing.net/2016/10/07/yah...-an-nsa-e.html

  17. #142
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,558
    mass surveillance makes us less secure:

    Alex Stamos, Yahoo’s former information security chief who Reuters reported left the company after finding out about its cooperation with the U.S. government’s scanning mandate, is said to have taken particular issue with how poorly the scanning tool was installed. “He was especially offended that he was not looped in on the decision,” said the ex-Yahoo source. “The program that was installed for interception was very carelessly implemented, in a way that if someone like an outside hacker got control of it, they could have basically read everyone’s Yahoo mail,” something the source attributed to “the fact that it was installed without any security review.”

  18. #143
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,558

  19. #144
    my unders, my frgn whites pgardn's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Feb 2010
    Post Count
    38,217
    This is very interesting and quite muddy complex. Thanks for this.

    I read a bit about Applebaum's childhood and the guy definitely has the prerequisites to have become a bit twisted. There really is quite a complex relationship between the tech companies that do the footwork on gathering information for business purposes and the government. Both play it off like they battle each other but that's really way too easy based on what the above states.

    The layers of the types of cooperation and conflict between the giant gatherers and government is so ambiguous and tenuous it seems. Unexpected Issues arise that seem to constantly change the relationship.

    NoNo should like this article quite a bit I should think.

    This really highlights the necessity of trying to keep up. There is so much intrigue. I really feel inadequate concerning the actual mechanisms of gathering and hiding information.

  20. #145
    🏆🏆🏆🏆🏆 ElNono's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Apr 2007
    Post Count
    152,631
    Thanks for sharing, interesting read. As much of the surveillance and counter-surveillance apparatus goes, it's always difficult to know who to believe. This is no exception.

    Fortunately, what gives you privacy/freedom is crypto itself, not the characters that try to portray it or their stories, fictional or not.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •