10 votes

NSA Treasure chest of links and statments

Courtesy of trot-trot on reddit

". . . The Yahoo ruling, from 2008, shows the company argued that the order violated its users' Fourth Amendment rights against unreasonable searches and seizures. The court called that worry 'overblown.'

'Notwithstanding the parade of horribles trotted out by the petitioner, it has presented no evidence of any actual harm, any egregious risk of error, or any broad potential for abuse,' the court said, adding that the government's 'efforts to protect national security should not be frustrated by the courts.' . . ."

Source: "Secret Court Ruling Put Tech Companies in Data Bind" by Claire Cain Miller, published 13 June 2013 at http://www.nytimes.com/2013/06/14/technology/secret-court-ru...

"Top U.S. intelligence officials gathered in the White House Situation Room in March [2012] to debate a controversial proposal. Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens--even people suspected of no crime.

Not everyone was on board. 'This is a sea change in the way that the government interacts with the general public,' Mary Ellen Callahan, chief privacy officer of the Department of Homeland Security, argued in the meeting, according to people familiar with the discussions.

A week later, the attorney general signed the changes into effect. . . .

. . . Now, NCTC [National Counterterrorism Center] can copy entire government databases--flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans 'reasonably believed to constitute terrorism information' may be permanently retained.

The changes also allow databases of U.S. civilian information to be given to foreign governments for analysis of their own. In effect, U.S. and foreign governments would be using the information to look for clues that people might commit future crimes. . . ."

Source: "U.S. Terrorism Agency to Tap a Vast Database of Citizens" by Julia Angwin, published 13 December 2012, available at http://online.wsj.com/article/SB1000142412788732447830457817... or http://webcache.googleusercontent.com/search?q=cache:online....

"The Constitution in the National Surveillance State" by Jack M. Balkin: http://ssrn.com/abstract=1141524 and http://digitalcommons.law.yale.edu/fss_papers/225/

"The Processes of Constitutional Change: From Partisan Entrenchment to the National Surveillance State" by Jack M. Balkin and Sanford Levinson, published in 2006: http://digitalcommons.law.yale.edu/fss_papers/231/

"Understanding the Constitutional Revolution" by Jack M. Balkin and Sanford Levinson, published in 2001: http://digitalcommons.law.yale.edu/fss_papers/249/

"Building America's secret surveillance state" by James Bamford, published 12 June 2013: http://www.reuters.com/article/2013/06/12/us-bamford-nsa-idU...

A response by Redditor 161719 to the 7 June 2013 post by Redditor legalbeagle05 titled "I believe the government should be allowed to view my e-mails, tap my phone calls, and view my web history for national security concerns. CMV": http://www.reddit.com/r/changemyview/comments/1fv4r6/i_belie...

"Washington pushed EU to dilute data protection" by James Fontanella-Khan, published 12 June 2013, available at http://www.ft.com/intl/cms/s/0/42d8613a-d378-11e2-95d4-00144... or http://www.euro2day.gr/ftcom_en/article-ft-en/1106929/washin...

"The National Security Agency [NSA] has at times mistakenly intercepted the private email messages and phone calls of Americans who had no link to terrorism, requiring Justice Department officials to report the errors to a secret national security court and destroy the data, according to two former U.S. intelligence officials.

At least some of the phone calls and emails were pulled from among the hundreds of millions stored by telecommunications companies as part of an NSA surveillance program. . . ."

Source: "Officials: NSA mistakenly intercepted emails, phone calls of innocent Americans" by Michael Isikoff, published 7 June 2013 at http://openchannel.nbcnews.com/_news/2013/06/07/18831985-off...

"The National Security Agency's monitoring of Americans includes customer records from the three major phone networks as well as emails and Web searches, and the agency also has cataloged credit-card transactions, said people familiar with the agency's activities. . . ."

Source: "U.S. Collects Vast Data Trove: NSA Monitoring Includes Three Major Phone Companies, as Well as Online Activity" by Siobhan Gorman, Evan Perez, and Janet Hook, published 7 June 2013 at http://online.wsj.com/article/SB1000142412788732429910457852...

". . . The men and women who hack for the NSA [National Security Agency] belong to a secretive unit known as Tailored Access Operations [TAO]. It gathers vast amounts of intelligence on terrorist financial networks, international money-laundering and drug operations, the readiness of foreign militaries, even the internal political squabbles of potential adversaries, according to two former U.S. government security officials . . .

. . . The two former security officials agreed to describe the operation and its activities without divulging which governments or entities it targets. According to the former officials, U.S. cyberspies, most from military units who've received specialized training, sit at consoles running sophisticated hacking software, which funnels information stolen from computers around the world into a "fusion center," where intelligence analysts try to make sense of it all. The NSA is prohibited by law from spying on people or entities within the U.S., including noncitizens, or on U.S. citizens abroad. According to one of the former officials, the amount of data the unit harvests from overseas computer networks, or as it travels across the Internet, has grown to an astonishing 2 petabytes an hour--that's nearly 2.1 million gigabytes, the equivalent of hundreds of millions of pages of text. . . ."

Source: "How the U.S. Government Hacks the World" by Michael Riley, published 23 May 2013 at http://www.businessweek.com/articles/2013-05-23/how-the-u-do...

"Inside the NSA's Ultra-Secret China Hacking Group" by Matthew M. Aid, published 10 June 2013: http://www.foreignpolicy.com/articles/2013/06/10/inside_the_...

"NSA claims know-how to ensure no illegal spying" by Kimberly Dozier, published 10 June 2013: http://www.utsandiego.com/news/2013/jun/10/nsa-claims-know-h...

"CIA's big data mission: 'Collect everything and hang onto it forever'" by Stephen C. Webster, published 21 March 2013: http://www.rawstory.com/rs/2013/03/21/cias-big-data-mission-...

"The CIA's 'Grand Challenges' with Big Data" presented by Central Intelligence Agency (CIA) official Ira "Gus" Hunt at GigaOM Structure:Data 2013 on 20 March 2013: http://new.livestream.com/accounts/74987/events/1927733/vide...

"How the U.S. Uses Technology to Mine More Data More Quickly" by James Risen and Eric Lichtblau, published 8 June 2013: http://www.nytimes.com/2013/06/09/us/revelations-give-look-a...

"The Secret War: Infiltration. Sabotage. Mayhem. For Years Four-Star General Keith Alexander Has Been Building A Secret Army Capable Of Launching Devastating Cyberattacks. Now It's Ready To Unleash Hell." by James Bamford, published 12 June 2013: http://www.wired.com/threatlevel/2013/06/general-keith-alexa...

"How the NSA uses your telephone records" by Marc Ambinder, published 6 June 2013: http://theweek.com/article/index/245285/how-the-nsa-uses-you...

"Sources: NSA sucks in data from 50 companies" by Marc Ambinder, published 6 June 2013: http://theweek.com/article/index/245311/sources-nsa-sucks-in...

"Deep State excerpt: The NSA's expensive, Orwellian choice" by Marc Ambinder and D. B. Grady, published 13 June 2013: http://theweek.com/article/index/245573/deep-state-excerpt-t...

"US surveillance has 'expanded' under Obama, says Bush's NSA director" by Paul Lewis, Spencer Ackerman, and Nicholas Watt, published 9 June 2013: http://www.guardian.co.uk/world/2013/jun/09/us-surveillance-...

A Closer Look At American Exceptionalism: http://www.reddit.com/r/worldnews/comments/1fxg0d/nsa_prism_...

United States Of America, The "Indispensable Nation": http://www.reddit.com/r/worldnews/comments/1fxg0d/nsa_prism_...

"The History Behind The 4th Amendment" by Jason W. Swindle, Sr., published March 2013: http://www.swindlelaw.com/the-history-behind-the-4th-amendment/

"The Era of Metadata" by Peggy Noonan, published 8 June 2013: http://blogs.wsj.com/peggynoonan/2013/06/08/the-era-of-metad...

"Sen Wyden on FISA", 27 December 2012: http://www.c-spanvideo.org/clip/4266806

"The Government is Profiling You": http://civic.mit.edu/blog/schock/the-government-is-profiling... and http://techtv.mit.edu/collections/cis/videos/21814-the-gover...

William Binney, former Technical Director of the World Geopolitical and Military Analysis Reporting Group at NSA, 13 July 2012 keynote address at the HOPE (Hackers On Planet Earth) Number Nine conference in New York, New York, USA: http://archive.org/details/Hope9KeynoteByWilliamBinney

"The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)" by James Bamford, published 15 March 2012: http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/

"29C3 [29th Chaos Communication Congress] Panel: Jesselyn Radack, Thomas Drake, William Binney on whistleblowing and surveillance", 27 December 2012: http://www.youtube.com/watch?v=XDM3MqHln8U

"Giving In to the Surveillance State" by Shane Harris, published 22 August 2012: http://www.nytimes.com/2012/08/23/opinion/whos-watching-the-...

". . . A law only exists as it is interpreted by the courts. In fact, as Oliver Wendell Holmes famously put it, you could define law as nothing other than a prediction of what the courts will do. So when courts interpret the law, they are in practical effect making the law by saying what the law is.

That is why legal interpretation needs to be public -- because it has the same effect as lawmaking. When it is secret, we have in effect secret law. And secret laws don't belong in democratic systems. Countries that have them don't even have the rule of law. They have rule by law, which is a very different thing, when the law isn't supervised by the people but is rather used to manage and control them. . . ."

Source: "The Secret Law Behind NSA's Verizon Snooping" by Noah Feldman, published 6 June 2013 at http://www.bloomberg.com/news/2013-06-06/the-secret-law-behi...

"The Structure of Power in American Society" by C. Wright Mills, March 1958: http://www.csub.edu/~akebede/SOC502Mills2.pdf

"The Superclass" by David Rothkopf, 28 September 2007: http://www.youtube.com/watch?v=LHtNFZ6K0pE

"The Histomap. Four Thousand Years Of World History. Relative Power Of Contemporary States, Nations And Empires." by John B. Sparks: http://www.reddit.com/r/TrueReddit/comments/vpwwh/the_histom...

"Secret to Prism program: Even bigger data seizure" by Stephen Braun, Anne Flaherty, Jack Gillum, and Matt Apuzzo, published on 15 June 2013: http://www.seattlepi.com/news/politics/article/Secret-to-Pri...

"What do They know about you? An interview with NSA analyst William Binney" by Tim Cavanaugh, published on 10 June 2013: http://dailycaller.com/2013/06/10/what-do-they-know-about-yo... (single-page), http://dailycaller.com/2013/06/10/what-do-they-know-about-yo... (multiple-pages)

"Phones Leave a Telltale Trail" by Evan Perez and Siobhan Gorman, published on 15 June 2013, available at http://online.wsj.com/article/SB1000142412788732404950457854... or http://webcache.googleusercontent.com/search?q=cache:online....

"Bush Lets U.S. Spy on Callers Without Courts" by James Risen and Eric Lichtblau, published on 16 December 2005: http://www.nytimes.com/2005/12/16/politics/16program.html?pa...

"NSA has massive database of Americans' phone calls" by Leslie Cauley, published on 11 May 2006: http://usatoday30.usatoday.com/news/washington/2006-05-10-ns...

"Pre-9/11 records help flag suspicious calling" by John Diamond and Leslie Cauley, published on 22 May 2006: http://usatoday30.usatoday.com/news/washington/2006-05-22-ns...

"Specter: Cheney put pressure on panel" by John Diamond, published on 7 June 2006: http://usatoday30.usatoday.com/news/washington/2006-06-07-ea...

"Senators won't grill phone companies" by John Diamond, published on 7 June 2006: http://usatoday30.usatoday.com/news/washington/2006-06-06-se...

"Cheney Pushed U.S. to Widen Eavesdropping" by Scott Shane and Eric Lichtblau, published on 14 May 2006: http://www.nytimes.com/2006/05/14/washington/14nsa.html?page...

"NSA's Domestic Spying Grows As Agency Sweeps Up Data" by Siobhan Gorman, published on 10 March 2008, available at http://online.wsj.com/article/SB120511973377523845.html or http://webcache.googleusercontent.com/search?q=cache:online....

"NSA Exceeds Legal Limits In Eavesdropping Program" by Evan Perez and Siobhan Gorman, published on 16 April 2009, available at http://online.wsj.com/article/SB123985123667923961.html or http://webcache.googleusercontent.com/search?q=cache:online....

"Officials Say U.S. Wiretaps Exceeded Law" by Eric Lichtblau and James Risen, published on 15 April 2009: http://www.nytimes.com/2009/04/16/us/16nsa.html?pagewanted=all



Trending on the Web