Carnivore,  Einstein,  Tempest,  and  Echelon

Carnivore and Echelon were apparently developed and implemented in the 1990s, long before 9/11/2001 and long before the current debate over wiretaps and domestic surveillance.

Much of the information on this page is obsolete by now, and the technology that was used has most likely been replaced by something more effective, with another name.  But it is interesting to know that the federal government has been working on the idea of monitoring every electronic communication — nationwide if not worldwide — for at least 20 years.

Subsections:
Einstein
Carnivore
Tempest
Echelon
Fusion centers
TrapWire
Heartbleed
Domestic surveillance
The U.S. spies on its allies
Edward Snowden
Snowden II
Other government threats to your privacy

On other nearby pages:
Snitch on your neighbor
The Department of Justice vs Apple Computer
The USA Patriot Act
Carnivore / Echelon Trigger Words
The local police have been given too much authority
Commercial and Industrial Threats to Privacy
License plate readers and toll tag readers




Einstein

Einstein is a more recent development than either Carnivore or Echelon, but like the other two, Einstein has stayed out of the mainstream press.  Among other things, the system will monitor visits from Americans — and foreigners — visiting .gov Web sites.

I think I can tell already where Einstein is headed:  it will make it more difficult — if not hazardous — for someone to compile a list like this, just to explore and document the width and depth of the overgrown federal government.

Snort
Einstein sounds a lot like a program called Snort, which is available at no cost.  So whatever amount Uncle Sam spent on Einstein was probably a complete waste of money.

US government's $6bn super firewall doesn't even monitor web traffic.  The US government's firewall, named Einstein, is not as smart as its name would suggest. [...] Among the extraordinary pieces of information to emerge are the fact that the system — which has cost $5.7 b[illio]n to develop — does not monitor web traffic for malicious content, just email.  It can't uncover malware on a system and it doesn't monitor cloud services either.  The system also carries out only signature-based threat assessment and intrusion detection i.e. it's a dumb terminal waiting to be told what to find rather than looking for unusual activity.  And that means it is wide open to zero-day attacks.  If that wasn't enough, the department behind the system — the Department of Homeland Security (DHS) — hasn't included anything to measure the system's own performance so it doesn't even know if it's doing a good job or not.  And it is failing to ask for or share information with other agencies, effectively making it blind.

Every day, we have to prove we have 'nothing to hide'.  For this writer, the political effect of 9/11 was immediate, personal and direct.  Six days before the towers came down, the European Parliament had passed 25 recommendations for securing domestic and international satellite communications from the Anglo-American surveillance system known as Echelon.  I had uncovered and first reported on the Echelon network in 1988.  It took a decade more for its significance to become widely known, mainly because of further investigation and revelations by New Zealand investigator Nicky Hager in his book Secret Power.  Although now widely mis-described in web chat as a generalised surveillance octopus, Echelon's purpose and hardware was quite specific.

FBI wants widespread monitoring of 'illegal' Internet activity.  The FBI on Wednesday [4/23/2008] called for new legislation that would allow federal police to monitor the Internet for "illegal activity."  The suggestion from FBI Director Robert Mueller, which came during a House of Representatives Judiciary Committee hearing, appears to go beyond a current plan to monitor traffic on federal-government networks.  Mueller seemed to suggest that the bureau should have a broad "omnibus" authority to conduct monitoring and surveillance of private-sector networks as well.  The surveillance should include all Internet traffic, Mueller said, "whether it be .mil, .gov, .com — whichever network you're talking about."

Einstein  is the network monitoring tool used by the United States federal government's Department of Homeland Security (DHS).  Einstein is used to automatically monitor and analyze Internet traffic when it moves in and out of federal computer networks, filtering packets at the perimeter. … Participating agencies have used Einstein in network gateways since 2004.  In conjunction with the Trusted Internet Connection (TIC) initiative launch in 2008, DHS mandated that all federal agencies must use Einstein.

Congress worries that .gov monitoring will spy on Americans.  A new Bush administration plan to capture and analyze traffic on all federal government networks in real time is generating privacy worries from congressional Democrats and Republicans alike.  At a hearing convened here Thursday by the U.S. House of Representatives Homeland Security Committee, politicians directed pointed questions to Department of Homeland Security officials about their plans to expand an existing "intrusion detection" system known as Einstein.

Doubletalk alert:
Visiting a web site is not an intrusion.

Einstein keeps an eye on agency networks.  DHS officials named the program Einstein because they think their monitoring program is smart.  Since 2004, Einstein has monitored participating agencies' network gateways for traffic patterns that indicate the presence of computer worms or other unwanted traffic.  By collecting traffic information summaries at agency gateways, Einstein gives US-CERT analysts and participating agencies a big-picture view of bad activity on federal networks.

Einstein and U.S. cybersecurity.  At a hearing last week on Capitol Hill, officials faced close, skeptical questioning about the program, an intrusion detection system that will automatically monitor and analyze Internet traffic into and out of federal computer networks in real time — allowing officials at the Department of Homeland Security to scan for anomalies that might represent hackers or other intruders trying to gain access or steal data.

House legislators rip Bush's Cyber Initiative plan.  The initiative is a long-range plan to upgrade the security of the federal government's networks and comprises a number of separate proposals, most notably an overhaul and expansion of the government's intrusion detection system, known as Einstein.  Currently, Einstein is simply a passive traffic-monitoring system that records basic data such as the originating IP address of a packet, its size and where the packet came from and where it is headed.



Carnivore

Carnivore is an e-mail wiretap system being developed and used by the FBI to read messages being circulated amongst suspected criminals and terrorists... and everybody else.  There is a great deal of concern being expressed nationwide, and not just by privacy fanatics, because it is likely that such eavesdropping occurs before there is any other evidence that the affected individuals have done anything illegal.  It would be much less of an issue were it not for a little technicality called the Fourth Amendment.  The FBI is relying on the public (and the mainstream news media) to ignore charges such as the ACLU's statement that Carnivore represents "an unprecedented power grab that threatens the privacy of all Americans."

There is good news about Carnivore, however.  Recently I attended a meeting of local computer security experts (legitimate professionals, really, not the guys at the 2600 meeting) and the moderator of the program offered his opinion that "Carnivore is not very effective."

If you really think somebody is reading your email — or if you think Facebook and Twitter (or the FBI) are scanning every account — looking for trigger words or anything else, ˙ɯǝɥʇ ɹoɟ ʇlnɔᴉɟɟᴉp ʇᴉ ǝʞɐW
It won't do any good to write your email in tiny letters.
D0N7 JU57 L4Y 0U7 Y0UR M3554635 1N PL41N 73X7 F0R 3V3RY0N3 T0 533.
EVENT HESLI GHTES TRESI STANC EMIGH TMAKE THEML OOKEL SEWHE REFOR ANEAS IERTA RGET.
Gur crbcyr jub jnag gb gnxr njnl lbhe evtugf ner zbfgyl choyvp fpubby fghqragf jub ner pbzcyrgryl onssyrq ol phefvir jevgvat, nanybt pybpxf, naq ebgnel-qvny cubarf.  Gurl jbhyq arire svther guvf bhg.
QnV0IGlmIHlvdSBoYXZlIHRvIGVzY2FsYXRlIHlvdXIgb2JmdXNjYXRpb24gdG8gdGhpcyBsZXZlbCwgaXQgbWlnaHQgYmUgdGltZSB0byB1c2UgcmVhbCBlbmNyeXB0aW9uIHRvb2xzLg==

Decryption of the following message is left to the reader as an exercise:

|.  .|  ||       |  ..|  .|       .|.  .  ...
.|  ||.  ..  |  ..|  .|.       .||.  .|  .|.  ..  .  ...
|.|.  ..|  ||       .||.  .|.  |||  |..|  ..  ||  |||
.|  .|.  |..  .  |  .|.|.|
You never even saw this message, did you?

If you really are paranoid, encrypt everything.


Don't be fooled:  DCS1000 is still a "Carnivore" at heart.  After a flurry of controversy over the FBI's Carnivore system for intercepting e-mail, the feds have moved promptly to address concerns — by renaming it "DCS1000".

DCS1000:  The Device Formerly Known as Carnivore:  Despite some reports indicating that the name is an acronym for "data collection system," an FBI spokesperson told Reuters that it "doesn't stand for anything."

Carnivore changes name, enters witness protection program:  Carnivore, the FBI's controversial Internet communications monitoring system, is undergoing a makeover.  First, the FBI is going to pull out its teeth, and re-christen Carnivore DCS1000, which, in our esteem, is just a little too close to HAL2000…

FBI axes Carnivore, eats investment.  The FBI has abandoned its custom-built Internet surveillance technology, dubbed Carnivore, and is now using commercial software to eavesdrop on computer network traffic during investigations of suspected criminals, terrorists and spies.  In addition, it's asking Internet service providers to conducting wiretaps on targeted customers, when necessary. … The FBI didn't disclose how much it had spent on Carnivore, but outside experts estimate expenditures at somewhere between $6 illion and $15 million.

Carnivore  was an Internet surveillance system developed for the U.S. Federal Bureau of Investigation (FBI) so that they could monitor the electronic transmissions of criminal suspects.  Critics, however, charged that Carnivore did not include appropriate safeguards to prevent misuse and might violate the constitutional rights of the individual.  The Electronic Privacy Information Center (EPIC) reported in early 2005 that the FBI had replaced Carnivore with other, unspecified surveillance software from commercial sources.  Such software usually includes a packet sniffer.

FBI retires its Carnivore.  FBI surveillance experts have put their once-controversial Carnivore Internet surveillance tool out to pasture, preferring instead to use commercial products to eavesdrop on network traffic, according to documents released Friday [1/14/2005].

FBI Abandons Web Surveillance Technology.  The FBI has effectively abandoned its custom-built Internet surveillance technology, once known as Carnivore, designed to read e-mails and other online communications among suspected criminals, terrorists and spies, according to bureau oversight reports submitted to Congress.

[That's a misleading headline.  The FBI hasn't abandoned their web surveillance technology, they have just changed to another make and model of software.]

 Read this:   Feds raid orchid-grower's home:  George Norris said he believes his troubles may stem from the US Fish and Wildlife Service's use of CARNIVORE, a government system that can tap into computer e-mails.  "They showed me page three of a five-page e-mail from several years ago where I was being offered smuggled plants," he said.  "They did not show me pages four and five, which were my answer to this fellow, telling him we would not buy any such plants that were undocumented.  This was so old that I don't even remember this e-mail.

 Editor's Note:   Please see the George Norris subsection on this page for more details on this case.

Inside DCSNet, the FBI's Nationwide Eavesdropping Network.  The $10 million DCS-3000 client, also known as Red Hook, handles pen-registers and trap-and-traces, a type of surveillance that collects signaling information — primarily the numbers dialed from a telephone — but no communications content.  DCS-6000, known as Digital Storm, captures and collects the content of phone calls and text messages for full wiretap orders.  A third, classified system, called DCS-5000, is used for wiretaps targeting spies or terrorists.

FBI turns to broad new wiretap method.  Instead of recording only what a particular suspect is doing, agents conducting investigations appear to be assembling the activities of thousands of Internet users at a time into massive databases, according to current and former officials.  That database can subsequently be queried for names, e-mail addresses or keywords. … "What they're doing is even worse than Carnivore," said Kevin Bankston, a staff attorney at the Electronic Frontier Foundation who attended the Stanford event.  "What they're doing is intercepting everyone and then choosing their targets."

FBI's Carnivore-lies may have blown bin Laden inquiry.  Fundamental design flaws in the FBI's infamous Carnivore packet sniffer have led to the destruction of evidence related to a suspect possibly involved in Osama bin Laden's Al Qaeda network which had been obtained legally under a Foreign Intelligence Surveillance Act warrant, the watchdog group EPIC has learned.

Carnivore  is a surveillance tool for data networks.  At the heart of the project is CarnivorePE, a software application that listens to all Internet traffic (email, web surfing, etc.) on a specific local network.  Next, CarnivorePE serves this data stream to interfaces called "clients."  These clients are designed to animate, diagnose, or interpret the network traffic in various ways.  Use CarnivorePE to run Carnivore clients from your own desktop, or use it to make your own clients.

Echelon:  The US government has long conducted extensive eavesdropping overseas, as part of the National Security Agency's foreign intelligence collection activities.  This foreign surveillance occurs outside the normal limitations of the Constitution.  With the globalization of communications, the overseas snooping activities of the US and its allies have attracted renewed attention and concern.

Congress Passes "Roving Wiretaps," Expands Surveillance Authority.  Oct 1998, in a closed-door manuever, controversial "roving wiretap" provisions were added to the Intelligence authorization bill and passed by the Congress.  Prevoiusly, wiretapping law allowed tapping of a particular person's phones.  The new provisions dramatically expanded current authority by allowing taps on any phone used by, or "proximate" to, the person being tapped — no matter whose phone it is.  Such a broad law invites abuse.  In 1996, the full House of Representatives had rejected these provisions after an open and vigorous debate.  But in 1998, behind closed doors, a conference committee added the provisions to the important Intelligence Authorization Conference Report.

Does Technology Threaten Our Privacy, Morality and Freedom of Religious Expression?  Two new powerful multi-billion dollar eavesdropping tools originally invented to spy on the Russians have now been turned on the American people.  [They're talking about Echelon and Tempest, although Carnivore is also discussed.]

Carnivore page at COTSE dot net,  which is apparently a privacy-enhanced email service.

Carnivore, Altivore, Echelon:  In terms of privacy concerns as well as raw technological power, Carnivore looks like a toy compared to Echelon.  Echelon is almost certainly the world's most sophisticated network monitoring system and, if rumors are to be believed, anyone who feels uncomfortable with the secrecy surrounding Carnivore should feel downright paranoid where Echelon is concerned.

Where Carnivore Lives:  The FBI has already employed Carnivore in a number of cases.  By law, the details of these investigations have generally not been released publicly.  The only ISP positively identified as cooperating with such an investigation, in fact, is Earthlink.

Independent Technical Review of the Carnivore System:  Carnivore is a software-based Internet Protocol (IP) packet sniffer that can select and record a defined subset of the traffic on the network to which it is attached.  Packets can be selected based on IP address, protocol, or, in the case of email, on the user names in the TO and FROM fields.  In limited cases, packets can be selected based on their content.  Packets can be recorded 'in their entirety (full mode) or recording can be limited to addressing information (pen mode), i.e., IP addresses and usermames.

Why Carnivore Is Bad For You:  The FBI can hardly be trusted to conduct their investigations with proper handling and precision, but even if they could, Carnivore/DCS1000 will end up hurting innocent people.  The amount of guesswork involved in a sweeping search like the type Carnivore/DCS1000 does insures that many "dead ends" and "bad leads" will be pursued.  What this means is that the FBI will inevitably end up investigating (including search, seizure, intimidation, prosecution, etc.) innocent people.

Confounding Carnivore:  How to Protect Your Online Privacy.  Ever since the FBI confirmed the existence of their Internet wiretapping device — a device which they named Carnivore — cyberprivacy activists have been up in arms.  Carnivore promised to be their worst nightmare:  a technology that could track and record every email sent, every Web page browsed, every chat room visited.

Carnivore, Altivore, Echelon:  Three big names in the world of network monitoring.  In terms of privacy concerns as well as raw technological power, Carnivore looks like a toy compared to Echelon.  Echelon is almost certainly the world's most sophisticated network monitoring system and, if rumors are to be believed, anyone who feels uncomfortable with the secrecy surrounding Carnivore should feel downright paranoid where Echelon is concerned.

Carnivore, Sniffers, and You:  The Carnivore network diagnostic tool (sniffer) may be peeking at your email.  This article offers the scoop on the FBI's latest crime-fighting tool.

Sniffer — A Definition:  Network sniffers monitor data without altering its content.  Sniffers are now commonly used by governments, corporations, by hackers, and by students.

FBI's Carnivore hunts in a pack.  Carnivore, the FBI's controversial e-mail snooping program, is part of covert surveillance triad known inside the bureau as the "DragonWare Suite," according to recently declassified documents.  The documents also outline how the DragonWare Suite is more than simply an e-mail snooping program:  It's capable of reconstructing the Web surfing trail of someone under investigation.

FBI Statement for the Record on the Carnivore Diagnostic Tool

The Backdoor, the Rogue Agent, and the Mishap:  the Hidden Dangers of Carnivore.  This paper is intended to provide convincing reasons, beyond the 4th Amendment argument, why Carnivore is a law enforcement tool that we all should reject.

The preceding article appears at a web site called Stop Carnivore Now.

Carnivore FAQ  (Sample:  It is important to note that Carnivore is a passive wiretap.  It does not interfere with communication.  Some news reports falsely claim that Carnivore interposes itself into the stream, first grabbing data, then passing it along.

The Legal Authorities of the National Security Agency:  U.S. Representative Bob Barr asserts, "While Americans remain solidly in support of a strong foreign intelligence gathering capability, they are not willing to do so at the expense of their domestic civil liberties."

Colleges Protest Call to Upgrade Online Systems.  The federal government, vastly extending the reach of an 11-year-old law, is requiring hundreds of universities, online communications companies and cities to overhaul their Internet computer networks to make it easier for law enforcement authorities to monitor e-mail and other online communications.

Carnivore and Reno:  Janet Reno's answers to questions about Carnivore in her weekly press conferences at the Justice Department.

Clinton Favors Computer Snooping:  The Clinton administration wants to be able to send federal agents armed with search warrants into homes to copy encryption keys and implant secret back doors onto computers.

Congress, Privacy Rights Activists Blast Carnivore:  Fears that the FBI is going too far with its technological invasions of communications systems were hardly soothed when Dr. Donald M. Kerr, the director of the FBI's laboratory division revealed what the bureau plans for the future.

FBI Shows Off Carnivore:  FBI officials defended Carnivore by telling hand-picked media representatives that the system is necessary "because some smaller ISPs do not have the capability to provide the data that law enforcement needs quickly," the Washington Post reported.

Feds Deny Asking ISPs to Watch E-mails:  Last month, the European Union passed a resolution that would require all ISPs to store for up to seven years e-mail message headers, Web-surfing histories, chat logs, pager records, phone and fax connections, passwords, and more.  Already, Germany, France, Belgium, and Spain have drafted laws that comply with the directive.  Technology experts say the U.S. federal government may try to do the same thing using the vast law enforcement allowances provided under the USA Patriot Act.

Carnivore:  Interview with Rep. Bob Barr (R - Ga.):  When the FBI launched its latest crime-fighting project, known by the name Carnivore, a lot of people worried that this new system could be dangerous - not for crooks, but for innocent people.

Outside Review of Carnivore Planned:  The Justice Department is moving swiftly to get an independent evaluation of the FBI's Carnivore e-mail intercept system, even as the system is denounced by congressional Republicans and civil libertarians as a threat to privacy on the Internet.

 Excellent!   The Fourth Amendment and Carnivore:  The Carnivore system appears to exacerbate the over collection of personal information by collecting more information than it is legally entitled to collect under traditional pen register and trap and trace laws.

Now It's Carnivore 2.0 ... Even 3.0:  The Federal Bureau of Investigation is now describing its Carnivore software that peeks into e-mail accounts without individual computer users' being aware as just "the tip of the iceberg."

White House Wants Cyber-Snoop Rules:  The Clinton-Gore administration will propose legislation putting e-mail surveillance on legal footing akin to phone taps — but leaving the FBI's "Carnivore" spying intact.

FBI: Federal Bureau of Intrusion?  "Carnivore" sifts through all online communications, such as e-mail or website traffic looking for illegal activity.  The problem is that it collects all communications, legal and illegal, thus violating the privacy of citizens who are just innocently and legally conversing online with family or friends or who happen to be surfing the Net.

More DOJ Delays in Carnivore Investigation

Carnivore FOIA: A Justice Department Joke

EPIC Carnivore FOIA Documents

GOP Wants to Pull Carnivore's Teeth:  What has upset so many people who use the Internet to communicate is the new high-tech FBI device — called "Carnivore" because it finds the "meat" of e-mail messages.  It enables law enforcement officials to sort through every bit of everybody's e-mail messages to find those of questionable legality.

Testimony of Robert Corn-Revere, April 6, 2000:  "I believe it is vital for Congress now to examine the Fourth Amendment implications of electronic surveillance on the Internet and the World Wide Web.  As the United States Supreme Court explained in 1997, the Internet is a unique and wholly new medium of worldwide human communication."

Some of the technical aspects of Carnivore:  Recent press reports have disclosed the existence of an FBI Internet wiretap device, known as "Carnivore".  This is troubling for many reasons, not the least of which is that it is unclear just what the software and hardware does or how it works.  In the U.S., there are serious legal restrictions on the use of wiretaps by police agencies.  The Supreme Court has consistently held that wiretaps qualify as searches under the Fourth Amendment.

Government Privacy Violators:  These days it's hard to find a politician without some plan to impose new privacy regulations on business.  The physicians should first try to heal themselves.  Our various levels of government have a long and undistinguished record of disrespecting our personal privacy.

Report Says Carnivore Is Tame; Critics Skeptical:  The FBI developed Carnivore in 1997 to monitor the activities of suspects who communicate using e-mail, much the way the agency uses wiretaps and pen registers to monitor telephone calls and capture caller information.  Privacy advocates have expressed concern the tool is too powerful, too invasive and a potential danger to civil liberties.

Carnivore - E-mail Invasion "I hope that you will research this subject more.  Contact your ISP and urge them to refuse to accept Carnivore on their system.  It is not a question of whether you have anything to hide.  Your right to privacy is at stake.  If this is allowed it can only snowball."

Help Kill the Carnivore!:  Carnivore is a hardware-software device that the FBI secretly developed at its lab in Quantico, Va. Almost immediately after the existence of this project was disclosed in a July 11 Wall Street Journal article, public outrage began to mount.

Ashcroft to Chew On Carnivore:  John Ashcroft, President Bush's pick for attorney general, says he'll take a long, hard look at Carnivore if he gets the job.  [January 2001]

FBI Drags its Heels on Carnivore Papers:  Get a court order to monitor a specific POP mailbox — but don't skim all the messages hoping to find something interesting.

Putting a Leash on Carnivore:  House Majority Leader Dick Armey, R-Texas, says Internet surveillance can undermine "the minimum expectation that individuals have that their personal electronic communications will not be examined by law enforcement devices unless a specific court warrant has been issued.'

Why Carnivore/DCS1000 Is Bad For You:  Here are some reasons why Carnivore/DCS1000 is bad for America, and, more specifically, bad for you.  [For example,] it's Unconstitutional.

ACLU Slams Biased Review Team Thumbs-Up for Carnivore

EPIC Sues to See Carnivore Code:  The Electronic Privacy Information Center has accused the FBI of sandbagging its requests for documents pertaining to the FBI's Carnivore e-mail snooping system.

Congress Isn't Swallowing Carnivore:  Officials from the FBI and the U.S. Department of Justice faced a skeptical — and at times downright hostile — House Judiciary Committee during an oversight hearing on the constitutional issues raised by the FBI's Carnivore electronic monitoring program.

A kinder, gentler Carnivore?  Any organization agreeing to review Carnivore is forbidden from publishing any independent comments about the program.

Armey of One Takes on Carnivore:  One year after hearings in which the Clinton Administration vigorously defended the FBI's email-tapping Carnivore surveillance system, Rep. Dick Armey, R-Texas, is asking the new attorney general to reopen the debate.

Carnivore Panel Called Insiders' Stacked Deck:  "This Department of Justice proposal has confirmed my fears," Armey said.  "This important issue deserves a truly independent review, not a whitewash."

FBI Gives a Little on Carnivore:  The FBI says it will conduct a privacy audit of a controversial surveillance system, but the agency won't release key information about how Carnivore works.

Privacy Eaten Away by Carnivore:  It seems that we, the American public should trust the FBI to look at only those email messages that directly have a bearing on a particular investigation and completely ignore all other email messages, no matter how inflammatory they may seem.

Will Crypto Feast on Carnivore?  Do you encrypt your email before you send it?  Probably not.  Most electronic mail traverses the Internet as unscrambled, easy-to-read packets of text.

ACLU: Law Needs Carnivore Fix:  An FBI spokesman said the notion that it would look at more emails than the agency is entitled to under the law is a misunderstanding of the system's purpose and operation.

U.S. to Track Crypto Trails:  Over 2,450,000 telephone conversations were legally intercepted in 1999, according to government statistics.

Carnivore Eats Your Privacy:  critics say the practice of intercepting the network traffic of all users, even for a brief period of time, could run afoul of federal privacy laws and even the U.S. Constitution's prohibition on unreasonable searches and seizure.

Carnivore Can Read Everything.  "We've been led to believe that the purpose of Carnivore is to filter and pinpoint the particular communications that the FBI is authorized to obtain.  If that's true, then why are they testing the system's ability to store and archive everything?"

Letter to Reps. Canady and Watt:  The ACLU urges the heads of the Constitution Subcommittee of the House Judiciary Committee to take action on Carnivore.

Invasion of Your Privacy Has Just Begun:  'Carnivore, the most recent example of FBI snooping software, is reported to be able to scoop up all of targeted individuals' Internet traffic, including e-mail.  Carnivore is only one project aimed at destroying America's privacy.  In fact, the FBI under the Clinton administration developed an entire series of hardware and software devices intended to monitor U.S. citizens.'

New documents disclose extent of FBI's Web surveillance: The FBI records show the agency used its controversial Carnivore system 13 times between October 1999 and August 2000 to monitor Internet communications, and a similar device, Etherpeek, another 11 times."

Numerous other Carnivore links

Feds Fail to Protect Privacy of E-mail:  The federal government has yet to implement a Supreme Court decision protecting your e-mail privacy.  That has prompted House Majority Leader Dick Armey to fire off a letter to Attorney General John Ashcroft urging that the court be obeyed and that your privacy be protected.  Zeroing in on the FBI's 'Carnivore' program, the high court said devices that allow police technology to erode the privacy guaranteed in the Fourth Amendment is unconstitutional.

Urge Congress to Stop the FBI's Use of Privacy-Invading Software:  In traditional wiretaps, the government is required to minimize its interception of non-incriminating - or innocent - communications. But Carnivore does just the opposite by scanning through tens of millions of emails and other communications from innocent Internet users as well as the targeted suspect.

Mueller Noncommittal on Carnivore:  FBI Director Robert Mueller has refused to commit to an independent review of the agency's Carnivore surveillance system.

House leader wants investigation of 'Carnivore':  A powerful house lawmaker asked the FBI to re-examine the extent to which its e-mail sniffing tool, "Carnivore," infringes on privacy.

Feds Fail to Protect Privacy of E-mail:  The federal government has yet to implement a Supreme Court decision protecting your e-mail privacy.  That has prompted House Majority Leader Dick Armey to fire off a letter to Attorney General John Ashcroft urging that the court be obeyed and that your privacy be protected.  Zeroing in on the FBI's "Carnivore' program, the high court said devices that allow police technology to erode the privacy guaranteed in the Fourth Amendment is unconstitutional.

Invasion of Your Privacy Has Just Begun Carnivore, the most recent example of FBI snooping software, is reported to be able to scoop up all of targeted individuals' Internet traffic, including e-mail.  Carnivore is only one project aimed at destroying America's privacy.  In fact, the FBI under the Clinton administration developed an entire series of hardware and software devices intended to monitor U.S. citizens.

The trouble with 'deep packet inspection'.  The data is already dismal when it comes to people peeking at your Internet travels.  Twenty percent of U.S. companies hire employees specifically to snoop at employee e-mail and 41 percent perform some kind of e-mail monitoring, according to a survey published earlier this year by Proofpoint.  Two-thirds of companies monitor Web surfing, and 12 percent even monitor outside blog activity.  Even if your company doesn't watch you as a matter of policy, employees might be sneaking a peek anyway.

Spooks told to get used to encrypted VoIP.  A British security firm has urged the government not to impose heavy-handed interception regulations on VoIP providers, ahead of the forthcoming consultation on communications data.  Cellcrypt, based in London, develops and sells a smartphone application that allows companies to make encrypted VoIP calls internationally.  The software can be pushed to handsets over the air, offering near-instant voice security for workers in the field.

Senate Panel to Probe Allegations NSA Illegally Wiretapped American Phone Calls, E-Mails.  Senate Intelligence Committee Chairman Dianne Feinstein says she will investigate indications of new wiretap violations by the National Security Agency.  The Justice Department confirmed Wednesday [4/15/2009] that it had reined in the NSA's wiretapping activities in the United States after finding out the agency had improperly accessed American phone calls and e-mails.

N.S.A.'s Intercepts Exceed Limits Set by Congress.  The National Security Agency intercepted private e-mail messages and phone calls of Americans in recent months on a scale that went beyond the broad legal limits established by Congress last year, government officials said in recent interviews.

This was written in 1999:
The Echelon attack.  Internet activists last week tried to overwhelm National Security Agency eavesdroppers by flooding the Echelon spy system with fabricated messages about terrorist plots and bombs.  The idea never posed a real threat to the NSA, but the electronic protest helped raise awareness of the fact that the government is snooping on every man, woman and child in the country through this system.



Tempest

Electronic voting machines vs Tempest technology.  Tempest is a code word for electromagnetic snooping.  It's usual for military electronics to be "Tempest hardened" in order to shield them from high-tech spying, disruptive interference, and EMPs.  It isn't an exaggeration these days to consider an election to be a military target.  In any case, a non-Tempest-hardened voting machine is likely to leak emissions that give a suitably-equipped passer-by the details of each voter's preferences.

The Complete, Unofficial TEMPEST Information Page:  One-stop shopping for TEMPEST information.

Cell phones as TEMPEST analyzers.  Professor Yuval Elovici, head of Ben Gurion University's Cyber Security Lab, has demonstrated software that allows a cell phone to spy on the activities of a nearby computer even though there is no connection between the phone and the computer.

Soft Tempest:  Hidden Data Transmission Using Electromagnetic Emanations.  It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations.  The authors discuss techniques that enable the software on a computer to control the electromagnetic radiation it transmits.  This can be used for both attack and defense.

Tempest  was the name of a classified (secret) U.S. government project to study (probably for the purpose of both exploiting and guarding against) the susceptibility of some computer and telecommunications devices to emit electromagnetic radiation (EMR) in a manner that can be used to reconstruct intelligible data.  Tempest's name is believed to have been a code name used during development by the U. S. government in the late 1960s, but at a somewhat later stage, it became an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions.

The Complete, Unofficial TEMPEST Information Page.  The general principle is that computer monitors and other devices give off electromagnetic radiation.  With the right antenna and receiver, these emanations can be intercepted from a remote location, and then be redisplayed (in the case of a monitor screen) or recorded and replayed (such as with a printer or keyboard).

Compromising emanations:  eavesdropping risks of computer displays.  (8 Megabyte PDF)

The Complete, Unofficial TEMPEST Information Page


Echelon

This section is about Project Echelon, [1] [2] [3] [4] [5] [6] [7] which is a government eavesdropping system along the lines of Carnivore, but on a world-wide scale.

What is Echelon?  "Only in a 'police state' is the unrestricted interception of communications permitted by government authorities."

Skype Users Beware:  Big Brother May Be Listening.  [Scroll down]  Immediately after the bust, the European Commission opened an investigation.  Alain Brun, the head of data protection at the Commission, told reporters, "The suspect [i.e., Clinton staffer] worked at the U.S. National Security Agency, where he learned of an agreement between Skype and Echelon to enable a 'spy' mode on all Skype products."  What has yet to be explained is:  What did Hillary Clinton's staffer need this information for?  And where has this former Clinton staffer gone?

Inside Echelon:  During the 1980s, the NSA developed a "fast data finder" microprocessor that was optimally designed for this purpose.  It was later commercially marketed, with claims that it "the most comprehensive character-string comparison functions of any text retrieval system in the world".  A single unit could work with "trillions of bytes of textual archive and thousands of online users, or gigabytes of live data stream per day that are filtered against tens of thousands of complex interest profiles."

ECHELON:  America's Secret Global Surveillance Network.  In the greatest surveillance effort ever established, the US National Security Agency has created a global spy system, codename ECHELON, which captures and analyzes virtually every phone call, fax, email and telex message sent anywhere in the world.

Echelon  is an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications.  Monitored transmissions are said to include up to 3 billion communications daily, including all the telephone calls, e-mail messages, faxes, satellite transmissions, and Internet downloads of both public and private organizations and citizens worldwide.

Echelon  is a term associated with a global network of computers that automatically search through millions of intercepted messages for pre-programmed keywords or fax, telex and e-mail addresses.  Every word of every message in the frequencies and channels selected at a station is automatically searched.

Echelon:  Someone Is Listening.  Every phone call you make, every email or fax you send may be monitored — and probably is.  Surprise!  It's our own government.

ECHELON  is a term associated with a global network of computers that automatically search through millions of intercepted messages for pre-programmed keywords or fax, telex and e-mail addresses.  Every word of every message in the frequencies and channels selected at a station is automatically searched.

Echelon Exists, and You're Busted.  Don your tinfoil hats, folks, because the hush-hush NSA project ECHELON just had a little light shined on it.

A Most Unusual Collection Agency.  During the Cold War there were hundreds of secret remote listening posts spread around the globe.  From large stations in the moors of Scotland and mountains of Turkey that were complete with golf ball-like structures called "radomes" to singly operated stations in the barren wilderness of Saint Lawrence Island between Alaska and Siberia that had only a few antennae, these stations constituted the ground-based portion of the United States Signals Intelligence (SIGINT) System or "USSS."

Carnivore, Altivore, Echelon:  In terms of privacy concerns as well as raw technological power, Carnivore looks like a toy compared to Echelon.  Echelon is almost certainly the world's most sophisticated network monitoring system and, if rumors are to be believed, anyone who feels uncomfortable with the secrecy surrounding Carnivore should feel downright paranoid where Echelon is concerned.

Somebody's listening.  American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system.  According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century.  Identified for the moment as Project P415, the system will be run by the US National Security Agency.

Echelon's Architect:  Echelon now has a big brother.  Meet Bruce McIndoe, lead architect for Echelon II, the 'most productive intelligence program' in history.

The Echelon attack.  Internet activists [in October 1999] tried to overwhelm National Security Agency eavesdroppers by flooding the Echelon spy system with fabricated messages about terrorist plots and bombs.  The idea never posed a real threat to the NSA, but the electronic protest helped raise awareness of the fact that the government is snooping on every man, woman and child in the country through this system.

Exposing The Global Surveillance System.  Designed and coordinated by NSA, the ECHELON system is used to intercept ordinary e-mail, fax, telex, and telephone communications carried over the world's telecommunications networks.  Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed primarily for non-military targets:  governments, organizations, businesses, and individuals in virtually every country.  It potentially affects every person communicating between (and sometimes within) countries anywhere in the world.

My parents were spies.  I grew up just outside RAF Chicksand (at the time an American base, despite the "RAF").  It's most distinctive feature was a giant double circle antenna we used to call "The Elephants Cage" which didn't appear on any maps.  It was common local knowledge amongst kids that it was part of a global spy network and if you ever said "bomb" on the phone it would start taping you.  Hence whenever using the phone we used to say "bomb" a lot.  Don't ask me where we got this from, but it looks like it's turned out to be at least partially true.

Echelon:  Someone is Listening:  A huge information resource on Echelon.

Somebody's listening:  This network of monitoring stations is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting.

Echelon Watch:  The goal of EchelonWatch is not to disband legitimate intelligence operations but to insist that they be subject to proper oversight.

Echelon Research Resources: Huge collection of articles and links.

Echelon — Rights Violation in the Information Age:  Now that the cold war is over, covert agencies around the world are increasingly turning their SIGINT assets, most notably a vast global electronic spy system known as Echelon, against civilian targets.  It's enough to give any decent rights-respecting individual nightmares.

Echelon:  Big brother without a cause?  Critics accuse the United States' intelligence community and its English-speaking partners of waging what is in effect a new Cold War.  At stake are international contracts worth billions of dollars, and at the disposal of the spymasters is an intelligence gathering system of immense power.

Report Downplays Echelon Effect.  A global surveillance system known as Echelon does exist and has the ability to eavesdrop on telephone calls, faxes and e-mail messages, a European Parliament committee has concluded.

Q&A:  What you need to know about Echelon.  Civil rights groups who monitor Echelon say it can be used to intercept almost any electronic communication, be it a phone conversation, mobile phone call, e-mail message, fax transmission, net browsing history, or satellite transmission.  The wildest estimates of its capabilities report that it can sift through up to 90% of all internet traffic.

Echelon Panel Calls It a Day:  "I think it's very good that the report states clearly that Echelon exists, so the work we've done is not in vain."

Echelon excesses:  There is a strong belief in intelligence circles that Brian Regan may have been the first spy nabbed by "Echelon," the highly classified information gathering and dissemination network operated by the U.S. National Security Agency and its global partners.

They're Listening to Your Calls:  Echelon monitors phones, E-mail, and radio signals.

E-mail users warned over spy network:  Computer users across Europe should encrypt all their e-mails, to avoid being spied on by a UK-US eavesdropping network, say Euro-MPs.

US spy system under attack:  The Echelon system, originally set up during the Cold War, is known to be capable of intercepting private telephone conversations, faxes and e-mails worldwide.

Louder Call for Echelon Probe:  Fresh outrage in Japan over alleged U.S. satellite-based spying, coupled with European pressure on the same subject, could add urgency to calls for Congress to engage in a serious investigation of the so-called Echelon system.



England leads the way

DARPA to begin mysterious 'Project GANDALF'.  The Gandalf program is an advanced technology and development and demonstration program that is seeking solutions to … radio frequency (RF) geolocation and emitter identification using specific emitter identification (SEI) for specific signals of interest.  The ultimate goal of the Gandalf program is to enable a set of handheld devices to be utilized to perform RF geolocation and SEI on RF signals of interest to the Gandalf program.  The specific goals and performance objectives associated with RF geolocation and SEI for the Gandalf system are classified.

Big British Brother:  [The National Post's] editorial board traditionally has argued that, in the post-9/11 age, law-enforcement and security services should enjoy broad powers to investigate and apprehend terrorists.  But even we are appalled by a British proposal, revealed over the weekend, to monitor the telephone, cellphone, text message, e-mail and Web surfing activity of every citizen in the U. K. in the name of homeland security.

'Black box' will store all traffic on Net.  Fears were growing today over government plans to store details of all internet traffic in the UK using new "black box" technology.  Home Office officials have told senior telecommunications figures of proposals to use the Interception Modernisation Programme to retain raw data of every phonecall, email and internet visit, which would be transferred to a database controlled by the Government.  The information would be used to fight terrorism and serious crime.

Every phone call, email or website visit 'to be monitored'.  The proposals will give police and security services the power to snoop on every single communication made by the public with the data then likely to be stored in an enormous national database.  The precise content of calls and other communications would not be accessible but even text messages and visits to social networking sites such as Facebook and Twitter would be tracked.



Fusion Centers

13 Ways The American Police State Squanders Your Tax Dollars.  [#13]  $1.4 billion for fusion centers.  These fusion centers, which represent the combined surveillance and intelligence efforts of federal, state, and local law enforcement, have proven to be exercises in incompetence, often producing irrelevant, useless, or inappropriate intelligence, while spending millions of dollars on "flat-screen televisions, sport utility vehicles, hidden cameras, and other gadgets."

Has the Dept. of Homeland Security become America's standing army?  Data collecting agencies spread throughout the country, aided by the National Security Agency, fusions centers — of which there are at least 78 scattered around the U.S. — constantly monitor our communications, collecting and cataloguing everything from our internet activity and web searches to text messages, phone calls and emails.  This data is then fed to government agencies, which are now interconnected:  the CIA to the FBI, the FBI to local police.  Despite a budget estimated to be somewhere between $289 million and $1.4 billion, these fusion centers have proven to be exercises in incompetence, often producing irrelevant, useless or inappropriate intelligence, while spending millions of dollars on "flat-screen televisions, sport utility vehicles, hidden cameras and other gadgets."

NSA Utah data center
We know the whereabouts of the "lost" IRS emails.  Access to any of those records can be had with a simple directive from the President of the United States.  The facility where the records are stored, along with the private emails, text messages, google searches and 20 trillion domestic phone calls since 2001 is owned and operated by America's National Security Agency which, among other things, is responsible for the monitoring of American citizens and storing any and all digital interactions captured on private and public telecommunications lines.  The NSA's most advanced intelligence monitoring facility is located at Camp Williams and is called the "Utah Data Center."  If the emails ever existed, whether they were deliberately wiped or accidentally lost, the National Security Agency undoubtedly has a digital record of them.

More about Lois Lerner's very convenient computer crash.

Fusion Centers: Expensive and Dangerous to Our Liberty.  A domestic surveillance system established after the terrorist attacks of September 11 collects and shares intelligence on a mass scale about "the everyday activities of law-abiding Americans, even in the absence of reasonable suspicion," according to a new report. [...] "Until 9/11, police departments had limited authority to gather information on innocent activity, such as what people say in their houses of worship or at political meetings," the report explains.  "Police could only examine this type of First Amendment-protected activity if there was a direct link to a suspected crime.  But the attacks of 9/11 led law enforcement to turn this rule on its head."

New NSA data center reported plagued by meltdowns.  A huge new data-storage facility for U.S. spying is plagued by chronic electrical surges that have prevented the center's opening, documents and officials say.

NSA hunger demands 29 petabytes of data a day.  As the National Security Agency (NSA) spying furore rumbles on, the agency has claimed to be looking at only 0.00004 percent of the world's total internet traffic.  In a document on the nsa.gov website, the agency said that the internet carries 1,826 Petabytes of information per day, and that its activity "touches" 1.6 percent of that data — approximately 29 petabytes, or 29 million gigabytes, of data each day.  Of that number, the agency says 0.025 percent is selected for review.

Information Fusion Centers and Privacy.  Fusion Centers are intelligence databases that collect information on ordinary citizens.

America Under Barack Obama.  [Scroll down slowly]  McCarthy's regime was ended by Senators who realized that he had gone too far.  What we have now may be more insidious.  What we have now in America is a surveillance society.  We have no idea how much the government knows and how much the CIA even knows about average citizens.  The government is not supposed to be doing this in this country.  They listen in on our phone calls.  I am not exaggerating because I have studied this a long time.  You have to be careful about what you do, about what you say, and that is more dangerous than what was happening with McCarthy, but the technology the government now possesses is so much more insidious.

Information Sharing and Fusion Centers:  Many State and major urban areas have established information fusion centers to coordinate the gathering, analysis, and dissemination of law enforcement, homeland security, public-safety, and terrorism information.  As of September 1, 2007, over 66 of these centers are operating or are being established in States and localities across the country.

Federal Support For and Involvement In State and Local Fusion Centers.  The Subcommittee investigation found that DHS-assigned detailees to the fusion centers forwarded "intelligence" of uneven quality — oftentimes shoddy, rarely timely, sometimes endangering citizens' civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism.  The Subcommittee investigation also found that DHS officials' public claims about fusion centers were not always accurate.  For instance, DHS officials asserted that some fusion centers existed when they did not.

Explosive findings about DHS operations in congressional report.  An explosive 141-page investigative report was quietly released just after midnight by the U.S. Senate Permanent Subcommittee on Investigations, Committee on Homeland Security and Governmental Affairs is an indictment of the practices and procedures of the U.S. Department of Homeland Security. [...] Of the 386 unclassified reports reviewed during this investigation, only 94 were found to relate "in some way" to potential terrorist activity, or the activities of a known or suspected terrorist.  Of those 94 reports, the usefulness of those reports were deemed as "questionable."

DHS Fusion Centers Spend Much, Learn Little, Mislead a Lot.  A network of 77 "fusion" intelligence centers, set up around the country under the auspices of the federal Department of Homeland Security, has over the past decade uncovered little information that could be useful in defending the nation against terrorism.  It also created numerous reports on the legal, everyday of activities of ordinary Americans, according to a Senate report released Tuesday.

Senate Permanent Subcommittee on Investigations Federal Support for Fusion Centers Report.  The Subcommittee investigation found that DHS-assigned detailees to the fusion centers forwarded "intelligence" of uneven quality — oftentimes shoddy, rarely timely, sometimes endangering citizens' civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism.

Report: Napolitano misled Congress on terrorism 'fusion' centers.  Homeland Security Secretary Janet A. Napolitano repeatedly misled lawmakers about one of her department's signature initiatives, the special centers where state and local police share information about terrorism with their federal counterparts, a key lawmaker who helped author a damning report on the project said in an interview Thursday [10/4/2012].  A bipartisan report from the Senate Permanent Subcommittee on Investigations states that Ms. Napolitano and her department failed to report to Congress serious problems with the so-called "fusion center" program.

Nothing is Private Under the False Flag of Terrorism.  In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA's Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range.  This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data.  They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.  The facility has the technological ability to record and analyze every communication in the world.  From emails to phone calls to text messages to chats; nothing is private anymore.

This is an original compilation, Copyright © 2024 by Andrew K. Dart



TrapWire

Smile for Those Surveillance Cameras, Trapwire is Watching You.  Bloggers and a myriad of other independent media sources are abuzz with news of Wikileaks latest revelation, but you probably won't hear much about it in the main stream media, at least for now.  The topic of discussion is a facial recognition and surveillance system being used across the country by the name of Trapwire. [...] And perhaps this system would not appear so ominous were it not for the Obama administration's determination to use the National Defense Authorization Act against American citizens without the benefit of due process.  Trapwire was developed by Abraxas, a Northern Virginia company staffed with elite from America's intelligence community.  Former senior intelligence officials who run Abraxas have developed a super-sophisticated surveillance system that makes most modern facial recognition technology seem antiquated.  And according to messages hacked from over 5 million emails by Anonymous, the capabilities and scope of Trapwire have largely gone unnoticed by America at large.  Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally, encrypted, and immediately delivered to Abraxas' fortified central database center at an unidentified location for use by a variety of government and private intelligence concerns.

TrapWire Training Courses Reveal Possible Purpose for its Creation.  TrapWire is a massive and technologically advanced surveillance system that has the capacity to keep nearly the entire population of this country under the watchful eye of government 24 hours a day.  Using this network of cameras and other surveillance tools, the federal government is rapidly constructing an impenetrable, inescapable theater of surveillance, most of which is going unnoticed by Americans and unreported by the mainstream media.

Stratfor emails reveal secret, widespread TrapWire surveillance system.  Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence.  It's part of a program called TrapWire and it's the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America's intelligence community.

Everything You Need to Know About TrapWire.  [Scroll down]  There is certainly something to worry about in the pervasive post-9/11 mentality that TrapWire represents:  The obsession with preventing terrorist attacks through constitutionally dubious profiling and surveillance.  But TrapWire on its own doesn't seem to be anywhere near the level of, say, the NSA's warantless wiretapping program.

Unravelling TrapWire.  [Scroll down]  One thing that makes TrapWire a particularly interesting company is that its president, chief of operations and director of business development are all former employees of the Central Intelligence Agency. [...] Abraxas Corporation, the company that originally created TrapWire under its subsidiary Abraxas Applications, also has significant ties to the CIA.  The company was founded by Richard "Hollis" Helms in 2001, two years after he left the CIA where he had worked for nearly 30 years.

Trapwire: It's Not the Surveillance, It's the Sleaze.  Ever since WikiLeaks began releasing a series of documents about the surveillance system Trapwire, there's been a panicked outcry over this supposedly all-seeing, revolutionary spy network.  In fact, there are any number of companies that say they comb through video feeds or suspicious activity reports in largely the same way that Trapwire claims to do.  What's truly extraordinary about Trapwire was how it was marketed by the private intelligence firm Stratfor, whose internal e-mails WikiLeaks exposed.

Trapwire: Big Brother Now Monitors Your Every Move.  The latest Wikileaks data-dump reveals that the government now has the ability to grab video from far-flung surveillance cameras located in stores, casinos and other businesses around the country.  It uses sophisticated facial recognition software to identify people of interest captured by the ubiquitous cameras numbering in the millions.  The software, Trapwire, is a significant breakthrough for the surveillance state.

Wikileaks reveals "TrapWire," a government spy network that uses ordinary surveillance cameras.  According to documents leaked on Wikileaks, a company run by ex-CIA agents has created a piece of technology, called TrapWire, that siphons data from surveillance cameras in stores, casinos, and other businesses around the country.  TrapWire then analyzes this data for, well, people of interest.  Are we living in a total surveillance state without even realizing it?



Heartbleed:
Is it a bug or a feature?

Stories on this subject are all over the map.  The government denies knowing about it until just recently.  Others say the government has been using it as a tool and a weapon for years.  If even half of the material on this page is true, I'm inclined to believe the non-government sources.

Obama administration denies knowing about Heartbleed before this month.  The Obama administration is denying that the National Security Agency or any other part of the government knew about a flaw in the way that many websites send sensitive information, known as the Heartbleed bug, before it was discovered earlier this month.

The NSA denies it knew of the Heartbleed bug.  The NSA is disavowing its knowledge of the Heartbleed security vulnerability after a Bloomberg report suggested that the spy agency had exploited it for at least two years.  "NSA was not aware of the recently identified vulnerability in OpenSSL, the so-called Heartbleed vulnerability, until it was made public in a private-sector cybersecurity report," NSA spokesperson Vanee Vines told The [Washington] Post.  "Reports that say otherwise are wrong."  The White House and the Office of the Director of National Intelligence echoed that statement Friday, saying neither the NSA nor any other part of the U.S. government knew about Heartbleed before April 2014.

Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say.  Stepping into a heated debate within the nation's intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday.  But Mr. Obama carved a broad exception for "a clear national security or law enforcement need," the officials said, a loophole that is likely to allow the N.S.A. to continue to exploit security flaws both to crack encryption on the Internet and to design cyberweapons.

NSA Said to Exploit Heartbleed Bug for Intelligence for Years.  The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said.  The agency's reported decision to keep the bug secret in pursuit of national security interests threatens to renew the rancorous debate over the role of the government's top computer experts.

How the NSA shot itself in the foot by denying prior knowledge of Heartbleed vulnerability.  The National Security Agency has eyes and ears everywhere.  At least, so we thought.  In 2012, during a classified but widely-known operation at Fort Meade, MD, government crypotographers and developers downloaded the OpenSSL source code, as it does with dozens of other software published on the Web.  The operation's objective was to find weaknesses in the library and exploit those vulnerabilities as part of wider efforts by the intelligence agency to conduct mass-scale surveillance.  After the code was downloaded and compiled, the developers were soon able to pinpoint a programming flaw in the code, which would have allowed the agency to collect usernames and passwords far quicker, more efficiently, and at a lower cost than its bulk data collection programs, notably its fiber cable tapping operation named Upstream.



Domestic surveillance

It is amazing to me that the people who seem to be most outraged by "domestic spying" are the same people who want the government to keep getting bigger and more powerful every year.

It is naïve to expect complete privacy when talking on the phone.  The chances are pretty good that your phone conversations are just between you and the person you called, but there are no guarantees.  When you use a cordless phone or a cell phone, you are talking on a two-way radio, and your expectations should be appropriately lower.

But a list of the phone numbers you have called is a long way from a wiretap.  Long-distance phone carriers have been keeping lists like that for years.  And if it will help catch and convict dangerous criminals, why not let the three-letter agencies sift through the records?  And the answer is simple:  When the feds have put away all the mass-murderers and terrorists, they'll keep looking for smaller and smaller fish in the sea of phone records, especially with people like Hillary Clinton and Janet Reno at the highest levels of the government.  For example, if your brother-in-law is arrested for selling marijuana, and then the police discover that you have called his house about a hundred times (for various reasons), you could have a big problem.

Incidentally, if you are really concerned about "domestic spying", you should think twice about putting a toll road access tag on your car.

There was a flurry of new information about domestic surveillance in June, 2013, related to an information leak by a young man named Edward Snowden.  He now has his own subsection, located here.  In the section immediately below, there are still several excerpts that mention Mr. Snowden, but the focus is not specifically on him.

Related topics:
Commercial and Industrial Threats to Privacy
License plate readers and toll tag readers

The car bomb in Nashville, Tennessee, December 25, 2020



Overviews of domestic surveillance:


More About Intelligence Agencies (CIA/DNI) Spying.  Because of the excessive secrecy surrounding CIA operations, little is known about its domestic activities.  In its 1947 charter, the CIA was prohibited from spying against Americans, in part because President Truman was afraid that the agency would engage in political abuse.  But the law didn't stop the CIA from spying on Americans.  During the 1960s, in clear violation of its statutory mission to co-ordinate foreign intelligence operations only, the CIA ventured into the domestic spying business through "Operation Chaos," in which it spied on as many as 7,000 Americans involved in the peace movement.

Every Tragedy Caused by Government Is Done with the Best of Intentions.  President Bush's "war on terror" in response to the worst attack on U.S. soil since Pearl Harbor not only led to two of the longest wars in U.S. history without producing clear-cut long-term victories but also initiated a mass surveillance state that is now used against Americans by the FBI, NSA, and U.S. military to target constitutionally protected political beliefs.

Reassessing Orwell to Understand Our Times.  Orwell's Big Brother has become a reality in the NSA's tracking and recording all email, text and telephone communication in the United States.  But Big Brother has a new dimension with social media and consumer giants, Google, Facebook, and Amazon, knowing almost everything about people's preferences through their artificial intelligence peering into peoples' "telescreen" computers and smartphones.

Squeaky clean, huh?  Obama forgot about these 25 scandals.  [#16] NSA Spying on Americans:  In June 2013, former NSA contractor Edward Snowden revealed the U.S. government was collecting an enormous amount of data on millions of Americans with the cooperation of telecommunication companies and European governments.  The director of national intelligence, James Clapper, had testified to Congress just the opposite, the year before.  When Snowden's revelations became public, Clapper said he had misspoken, not lied.  Obama claimed laws and safeguards prevent the NSA from collecting information without a warrant, but WND has reported many sources, including a Democrat congressman, said that is not true.

10 Ways Big Government Harms You.  [#1] Big government invades your privacy.  Unfortunately the NSA spying scandal is not a singular event nor is the fundamental issue going to be resolved by a simple changing of NSA policy by the President, the courts, or the congress.  The bigger government becomes the more its appetite increases to monitor what its citizens are doing, what they are saying and even what they are thinking.  From Sun Tzu to Julius Caesar, from FDR to Barack Obama, political leaders have been keeping track of their citizenry for centuries.  The problem heightens as the government gets larger because as big government tries to control more, it is increasingly susceptible to dissent and subversion.  A sense of paranoia develops that feeds upon itself.  Leaders inside the expanding state have reason to believe that somebody is fomenting rebellion against their rule.

The surveillance state is here, and to stay.  If great Washington scandals come in threes, as disasters are said to do, we're there.  First there was Watergate, regarded as the granddaddy of them all.  A third-rate burglary at the Watergate Hotel grew to a scandal big enough to cashier a president.  This was followed a decade later by Iran-Contra, an attempt by Reagan administration rogues to exploit trouble in one country to fix a problem in another, and now there's what may be the most far-reaching scandal of all.  The administration of Barack Obama, eager to advance the interests of Hillary Clinton, who was to be the front for his otherwise constitutionally forbidden third term, sought court approval to spy on a suspected colluder with Russians, and in doing so advanced the surveillance state that will now spy on everybody.

What Touches Classified is Classified.  In the three thousand years of the history of espionage and of criminal investigations, a primary element has been the practice of reading other peoples' mail.  Wiretapping, steaming open envelopes, forging letters to get an incriminating response — these are ploys of reality as well as fiction.  Google and AT&T are said to have helped the National Security Administration scan our emails for code words and other data.  Who we write to in itself can help reveal what we are up to.  Your mail is being monitored.

Government Plays a Dangerous Game with Mass Surveillance.  The Fourth Amendment was designed to guard against the harms government invasions of privacy wreak on a free people.  It protects our homes and our private conversations, including those online, because these are where we should feel most protected from government interference.  Absent a warrant or an emergency, it has no right to violate this reasonable expectation of privacy.  Unfortunately, that's not the America we live in today.

Here Are The Major Scandals That Took Place When Robert Mueller Was FBI Director.  [#3] NSA Warrantless Surveillance (2001-2013):  illegal collection of domestic phone records and internet communications that were sent or received by US citizens, in violation of Fourth Amendment protections against warrantless search and seizure, followed by potential perjury committed by Director of National Intelligence James Clapper, who denied the practices under oath; the 2013 Snowden revelations proved that the 2004 story about Comey and Mueller stopping illegal surveillance practices meant absolutely nothing in reality[.]

Surveillance.  On any given day, the average American going about his daily business will be monitored, surveilled, spied on and tracked in more than 20 different ways, by both government and corporate eyes and ears.  With all branches of the government stridently working to maintain its acquired powers, and the private sector marching in lockstep, The Rutherford Institute is sounding the alarm in an effort to warn the American people about the ubiquitous surveillance state.  Whether you're walking through a store, driving your car, checking email, or talking to friends and family on the phone, you can be sure that some government agency, whether the NSA or some other entity, is listening in and tracking your behavior.  This doesn't even begin to touch on the corporate trackers that monitor your purchases, web browsing, Facebook posts and other activities taking place in the cyber sphere.

Getting Rid of Comey Is Only the Start.  Numerous times during its history, the FBI has taken a keen interest in veterans groups after they come back from overseas.  In some instances the bureau has gone as far as raiding the homes of veterans who espouse unpopular political beliefs.  If the brave men and women who risk their lives defending Americans' sacred liberties aren't safe from FBI overreach can the average citizen feel safe?  No, they cannot.  Partnering with local law enforcement agencies the FBI has created physical infrastructure to listen in on calls across the country, without a warrant, or probable cause.  Local communities from coast to coast are under constant surveillance, many without even realizing it.  Even if you manage to live in an area where the FBI is not partnering with local authorities to listen in on your phone calls, which is unlikely, you may still be targeted if you utilize social media.  A striking case which laid bare the FBI's understanding of its own power came when they publically demanded that Apple create a "backdoor" for its consumer products which would allow them to break into anyone's phone at any given time.  The audacity of a government agency demanding that a company make its products less safe rightfully enraged the public, but many soon forgot after the crisis was averted.

10 Conspiracy Theories That Turned Out To Be True.  [#10] The US Government Illegally Spies On Its Own Citizens:  Even after it was revealed that the NSA has been illegally eavesdropping on us and collecting our cell phone metadata for over a decade, people still hedged on the meaning of it.  Yes, they are analyzing our transmissions, but it's under the auspices of national security.  "In a post 9/11 world" certain liberties must be sacrificed for the sake of security, right?  It turns out that is patently untrue.  Not only is there no evidence that the NSA has protected us from terrorism, there is growing evidence that it makes us more vulnerable.  Thanks to revelations about the NSA and their Prism project, we know that the scope of the NSA's eavesdropping is even beyond what we originally believed.

10 More Crazy Conspiracy Theories That Became Conspiracy Facts.  [#10] CIA monitors U.S. citizens via their smart devices:  Early in 2017, the organization Wikileaks began releasing their first post-2016 election cables with a series of explosive data dumps regarding the CIA's cyber hacking abilities and exploits.  It is called Vault 7.  Updated serially in "Year Zero," "Dark Matter," "Marble," "Grasshopper," "HIVE," "Weeping Angel," and "Scribbles," the documents show the unprecedented collection of cyber vulnerabilities, exploits, and hacking abilities consolidated within the agency that many believe constitute wide-ranging breaches of civil liberties.  Chief among these breaches is domestic surveillance and extrajudicial cyberhacking, which the Wikileaks documents confirm are taking place in an abundance of forms.

The Illusion of Freedom:  The Police State Is Alive and Well.  [Scroll down]  In fact, the American police state has continued to advance at the same costly, intrusive, privacy-sapping, Constitution-defying, relentless pace under President Trump as it did under President Obama. [...] The surveillance state hasn't stopped spying on Americans' communications, transactions or movements.  On any given day, whether you're walking through a store, driving your car, checking email, or talking to friends and family on the phone, you can be sure that some government agency, whether it's your local police, a fusion center, the National Security Agency or one of the government's many corporate partners, is still monitoring and tracking you.

The chickens have come home to roost.  In our misguided efforts to keep the country safe, we have neglected to keep it free.  We have enabled a deep state to become powerful enough to control a powerful president.  We have placed so much data and so much power in the hands of unelected, unaccountable, opaque spies that they can use it as they see fit — even to the point of committing federal felonies.  Now some have boasted that they can manipulate and thus control the president of the United States by selectively revealing and concealing what they know about anyone, including the president himself.  This is a perilous state of affairs, brought about by the maniacal passion for surveillance spawned under George W. Bush and perfected under Barack Obama — all with utter indifference to the widespread constitutional violations and permanent destruction of personal liberties.

Obama Says He's Had A Scandal-Free Administration.  Here Are 11 of His Scandals.  [#5] The NSA conducted mass surveillance against American citizens without a warrant.  Thanks to leaking from former government contractor Edward Snowden, it was revealed that the National Security Agency had been conducting mass surveillance against American citizens — a clear violation of the Fourth Amendment.  In 2015, the NSA eventually ended their bulk data collection of phone records.

September 11: Remembering Lives and Liberties Lost 15 Years Ago.  [The attacks on 9/11/2001] changed our country in ways that have significantly undermined our cherished liberties.  The indignity of imposing TSA security theater at airports is the least of it.  Security checkpoints are everywhere requiring citizens to show ID and undergo screenings by metal detectors in order to enter practically all public and many private buildings.  But even worse are the secret erosions of our rights as citizens not to be surveilled by our government.  We now know that the federal government is engaged in pervasive unconstitutional domestic spying on essentially all Americans.  The monetary costs of "Homeland Security" are estimated to run about $75 billion per year.  The "black budget" of the federal government's "intelligence community" exceeds $52 billion annually.  The percentage of it that is spent on spying on Americans is not clear, but is certainly billions, if not tens of billions.  Since the September 11 atrocities, 94 Americans have been killed in domestic attacks by violent jihadists, which are the kind of attacks against which our elaborate security apparatus purports to protect us.

This Is Not Your Government.  So, here we are: the government regularly and with specific intent violates the 4th Amendment.  What are you going to do about it?  They are listening to your phone calls, reading your emails, scanning your Facebook and other social media sites, all in the name of deterring terrorism, but they cannot even stop something like San Bernardino or Orlando.  We have traded liberty for security and every warning we have ever been given has been ignored and the consequences are being suffered.  It is common knowledge that the government is monitoring all of these aspects of our lives and it is met with a shrug.

There Will Be No Second American Revolution:  The Futility Of An Armed Revolt.  [Scroll down]  Even government agencies with largely administrative functions such as the Food and Drug Administration, Department of Veterans Affairs, and the Smithsonian have been acquiring body armor, riot helmets and shields, cannon launchers and police firearms and ammunition.  In fact, there are now at least 120,000 armed federal agents carrying such weapons who possess the power to arrest.  Rounding out this profit-driven campaign to turn American citizens into enemy combatants (and America into a battlefield) is a technology sector that is colluding with the government to create a Big Brother that is all-knowing, all-seeing and inescapable.  It's not just the drones, fusion centers, license plate readers, stingray devices and the NSA that you have to worry about.  You're also being tracked by the black boxes in your cars, your cell phone, smart devices in your home, grocery loyalty cards, social media accounts, credit cards, streaming services such as Netflix, Amazon, and e-book reader accounts.

The FBI Has Quietly Collected 434,000 Iris Scans Of US Citizens.  Working together with local police departments, U.S. Border Patrol, and the Pentagon, the FBI has discreetly amassed 434,000 iris scans.  The surveillance technology, used primarily by airports and private security companies, was pitched in 2013 as a way to help police departments catch criminals in a safer and more efficient manner.  At that point, the FBI already had 30,000 scans and was looking to coordinate with local and national agencies to develop a searchable database of scans taken by police departments across the nation.  The iris scan, which can be taken from a distance and requires no physical contact, was to be taken upon arrest and submitted whether charges were pressed or not.

U.S. Defense Contractor To Blanket Earth With New Surveillance Technology.  Google has received vast criticism for its Google Earth, Google Maps and Google Streetview systems that have essentially removed the inherent right to privacy and transferred it to the whim of corporate terms and conditions.  However, this would seem to pale in comparison to what is being announced from the largest U.S. defense contractor, Lockheed Martin, working in tandem with commercial space imagery vendor, DigitalGlobe.  According to Lockheed, they are making final preparations for a next-generation global imaging satellite called DigitalGlobe WorldView-4.  If all remains according to plan, the new satellite will be launched into orbit from Vandenberg Air Force Base as early as September 15, 2016.

Engineered Chaos And Fear The New Norm In America As Many Assume The "Reality" Of Staged Events.  There was a time when there was actually a sense of normality all around us and there was a sense of justice and accountability at the government level even if it was mostly the perception of it. [...] There was even a time when you could comfortably plan on traveling pretty much anywhere in the world, especially here in the United States for business or pleasure without having to deal with the prospect of "terrorism" or another psyop mass shooting, terror truck drivers, snipers or lockdowns.  You also didn't have to worry about a violent police state, checkpoints, surveillance cameras, killer robots, government spying and 24/7 fear, death and destruction being put out by the mainstream media news.  There was a sense of order, in other words, that many of us still remember and we remember exactly what it felt like.  Obviously you can't miss something or yearn for the days you've never experienced.  This disconnect that the younger generation has to what some may refer to the good old days is important in the grand scheme of things because this chaos is all they know and it is a grand example of learned helplessness.  For the first time in modern American history we have a generation that doesn't know what order, calmness and peace looks like.

A Week in the Life of the American Police State.  The following incidents constitute a typical week in the life of the American police state.  [#1] Not content with merely spying on our emails and phone calls, the NSA wants to spy on thermostats, refrigerators, and pacemakers.  [#2] Reinforcing fears about how easily surveillance technology can be abused by government officials, local police in California are using money acquired through asset forfeiture to buy surveillance equipment that was then used to blackmail city council members.  [#3] Small-town police departments continue to militarize their forces, acquiring military equipment such as BearCat armored vehicles and SWAT teams at an alarming rate.  [#4] According to the Government Accountability Office, the majority of people in the government's criminal face-recognition database have never committed a crime. [...] [#7] The Second Circuit Court of Appeals recently ruled that as long as the government shows "good faith," it can search your digital files as much as it wants.  [#8] The FBI and other government agencies have been hiding cameras in city utility poles in order to carry out warrantless, covert surveillance on Americans.

Fruit of the Poisonous Tree.  Roy Olmstead had been convicted for bootlegging on the basis of words he used in overheard telephone conversations.  Because he had used a phone at his place of work that the government had tapped without breaking and entering his workplace, the high court ruled — despite the fact that the government had not obtained a warrant — that he had no right to privacy.  [Justice Louis] Brandeis dissented.  Over time, the Brandeis dissent became the law.  The Fourth Amendment, which protects the privacy of all in our "persons, houses, papers, and effects," was interpreted to cover telephone conversations and eventually emails and text messages.  So today, if the government wants information contained in those communications, it needs to obtain a search warrant, which the Fourth Amendment states can only be given by a judge — and only upon a showing of probable cause of evidence of a crime contained in the communications it seeks.

The NSA doesn't even know how many Americans it's spying on.  The National Security Agency (NSA), which is behind some of the world's most sophisticated mass surveillance operations, can't say how many Americans it's spying on in these endeavors.  That's not because it's a secret, though that might be a reason too.  It's because the agency's operations are so vast that it can't even figure out the number.

Saint or Sinner, Government Eyes Are Watching Every Move You Make.  We now find ourselves in the unenviable position of being monitored, managed and controlled by our technology, which answers not to us but to our government and corporate rulers.  Consider that on any given day, the average American going about his daily business will be monitored, surveilled, spied on and tracked in more than 20 different ways, by both government and corporate eyes and ears.  A byproduct of this new age in which we live, whether you're walking through a store, driving your car, checking email, or talking to friends and family on the phone, you can be sure that some government agency, whether the NSA or some other entity, is listening in and tracking your behavior.

It's Time to Put an End to the NSA's Bulk Collection of Americans' Metadata.  The authors of our Bill of Rights included the Fourth Amendment because they knew that one of the best protections against tyranny is to limit the government's power to search its citizens.  Specifically, the Framers wanted to ensure that the federal government could not issue broad general warrants that would empower the executive branch to indiscriminately rummage through the private lives of American citizens — in other words, to spy on them.  Unfortunately, that is exactly what the National Security Agency is doing today.

Advisor: Obama, NSA use internet to silence critics like Tea Party.  The Obama administration is expanding its online data search of Americans to find potential civil unrest — like the 2010 Tea Party movement — and squash it before they take root, a prominent financial advisor has warned clients.  David John Marotta compared the administration's efforts to those used by former FBI Director J. Edgar Hoover against his critics and 1960s activists.  Targeting activists isn't anything new.  J. Edgar Hoover made it his life's work.  What has changed is the vigor with which the government has assumed its own activism against certain groups, he said.

50 Things Barack Obama Has Done Wrong:  [#15]  The NSA has spied on Americans under Obama.  [#16]  Under Obama, the CIA spied on the Senate.

What the Future of Government Surveillance Looks Like.  [Scroll down]  These partnerships make no sense when the primary goal of intelligence is government vs. government espionage, but are obvious and appropriate when the primary goal is global surveillance of the population.  So while the German government expresses outrage at the NSA's surveillance of the country's leaders, its BND continues to partner with the NSA to surveil everyone else.  The endgame of this isn't pretty:  It's a global surveillance network where all countries collude to surveil everyone on the entire planet.

Agents performing warrantless searches are the hallmark of totalitarianism.  When Edward Snowden revealed the nature and extent of the domestic spying that the government unleashed upon us post-9/11 and made us all aware of its use of the Patriot Act to do so, the authors of the Patriot Act expressed outrage and anger.  What was the government doing?  The government was secretly gathering data on all of us and using warrants that were not based on probable cause and that did not specifically describe the place to be searched or the person or thing to be seized.  When members of Congress realized that they, too, were being spied upon, the outrage grew.  That outrage and anger metastasized into a new law enacted earlier this year, called the USA Freedom Act, which took effect this week.  That law, its supporters have argued, will tame the National Security Agency into constitutional compliance and keep its 60,000 agents and contractors out of our private affairs.  In fact, it is now worse.

The Truth About USA Freedom.  [Scroll down]  The proponents of the NSA's warrantless domestic spying program also vastly oversell its effectiveness.  The program was still in operation when terrorists struck Paris and had expired just four days before the San Bernardino attacks.  If this program was so essential, why did it not stop these attacks?  Furthermore, just as Obama can't identify a single mass shooting that his gun control proposals would have stopped, supporters of warrantless domestic spying can't point to a single attack the NSA's domestic program prevented.

Obama: yes we scan
CISA Is Now The Law: How Congress Quietly Passed The Second Patriot Act.  Why was the CISA included in the omnibus package, which just passed both the House and the Senate?  Because any "nay" votes [...] would also threaten the entire budget of the federal government.  In other words, it was a question of either Americans keeping their privacy or halting the funding of the US government, in effect bankrupting the nation.  And best of all, the rushed bill means there will be no debate.  The bottom line as OTI's Robyn Green said, "They've got this bill that's kicked around for years and had been too controversial to pass, so they've seen an opportunity to push it through without debate.  And they're taking that opportunity."  The punchline:  "They're kind of pulling a Patriot Act."  And when Obama signs the $1.1 trillion Spending Bill in a few hours, as he will, it will be official:  the second Patriot Act will be the law, and with it what little online privacy US citizens may enjoy, will be gone.


Related topic:  The Department of Justice vs Apple Computer, a case in which the government is attempting to compel a cell phone manufacturer to unlock the encryption in a dead terrorist's cell phone — and all other phones in that product line.





Domestic surveillance news and opinion This is an original compilation, Copyright © 2024 by Andrew K. Dart


SSCI Chairman Mark Warner Lies About FISA-702 Fundamentals.  This statement by Senate Intelligence Committee Chairman Mark Warner is so fraudulent in narrative construct it's almost ridiculous. "SEN. WARNER: Let's remember what 702 is.  It is the ability for the United States government to surveil, listen in, on non-Americans foreigners who are abroad."  Absolutely nothing about this statement is accurate.  Foreigners do not have U.S constitutional protection.  All foreign communications can be intercepted without issue, without FISA.  FISA-702 authority only pertains to Americans.  The term "702" is specifically referencing private communication with/by an American.  [Video clip]

Congressional Testimony On Section 230 Was So Wrong That It Should Be Struck From The Record.  A few months ago, we wondered if Wired had fired its entire fact-checking staff because it published what appeared to be a facts-optional article co-authored by professional consistently wrong Jaron Lanier and an academic I'd not come across before, Allison Stanger.  The article suggested that getting rid of Section 230 "could save everything."  Yet the article was so far off-base that it was in the "not even wrong" category of wrongness.  I'm not going to review all the reasons it was wrong.  You can go back to my original article for that, though I will note that the argument seemed to suggest that getting rid of Section 230 would both lead to better content moderation and, at the same time, only moderation based on the First Amendment.  Both of those points are obviously wrong, but the latter one is incoherent.

Down with Big Brother:  Warrantless Surveillance Makes a Mockery of the Constitution.  The government long ago sold us out to the highest bidder.  The highest bidder, by the way, has always been the Deep State. [...] Just as the USA Patriot was perverted from its stated intent to fight terrorism abroad and was instead used to covertly crack down on the American people (allowing government agencies to secretly track Americans' financial activities, monitor their communications, and carry out wide-ranging surveillance on them), Section 702 has been used as an end-run around the Constitution to allow the government to collect the actual content of your conversations (phone calls, text messages, video chats, emails and other electronic communication) without a warrant.  Now intelligence officials are pushing to dramatically expand the government's spying powers, effectively giving the government unbridled authority to force millions of Americans to spy on its behalf.  Basically, the Deep State wants to turn the American people into extensions of Big Brother.

Speaker Mike Johnson Believes "History Will Judge Well" Extending Warrantless Searches and Giving Ukraine Unlimited Funds.  Many of the most professional political class in Washington DC just flat out believe the echo-chambering bubble created by the intelligence apparatus inside the beltway. [...] They are so detached from comprehending anything adverse to their worldview, they genuinely believe what they are saying is factually accurate and true.  It's not; all of it is total nonsense, but the pressure from the intelligence apparatus is so strong and encompassing, these politicians cannot fathom it's wrong.  To be sure, there are some like Mitch McConnell, Chuck Schumer, John Cornnyn, [sic] John Thune etc. the UniParty leadership, that know the IC narrative is completely false; they know what they are doing is corrupt and wrong, but they dare not challenge the administrative state apparatus that controls them.  However, in the case of Johnson and others like Scalise, he really doesn't know.  He's a believer in this fraud.

Congress Passes FISA-702 Extension, Allowing Warrantless Document Searches and Electronic Surveillance of Americans.  The Fourth Amendment to the United States Constitution says:  "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."  Late last night, early this morning (after midnight), the United States Senate passed a FISA reauthorization bill that directly and specifically violates every tenant of the 4th Amendment.

Senate reauthorizes warrantless spy powers just after midnight deadline.  The Senate passed a controversial extension of the federal government's warrantless spying powers just after a midnight deadline on Friday over objections from Democrats and Republicans who opposed the incidental collection of US citizens' data as part of the authority.  In a 60-34 vote, Democrats and Republicans voted to reauthorize Title VII of the Foreign Intelligence Surveillance Act (FISA) until 2026, sending the legislation to President Biden's desk for a signature.  The White House issued a statement in strong support of the legislation, called the Reforming Intelligence and Securing America Act, before it passed the House last week in a 273-147 bipartisan vote.  The FISA authority was set to expire on April 19, which proponents had warned would end critical intelligence-gathering efforts through a provision known as Section 702.

Speaker Johnson Caves on Spying on Americans Without Warrants.  Unfortunately, Speaker Johnson is caving again.  He goes from giving in on spending bills, and possibly the border, to warrants for FISA.  Some Republicans voted warrantless FISA down.  They insisted on the warrants since the Intelligence agencies have abused them over and over.  They even spied on President Trump and his campaign.  FISA expires next week.  In this clip, he sounds too easily swayed.  The GOP can't lose him since they have a barely negligible majority; hopefully, he will do well in fundraising.  We can't count on Republicans.  [Tweet with video clip]

Supercharged Spying Provision Buried In "Terrifying" FISA 702 Reauthorization.  On Monday, the House finalized procedural business on a bill to reauthorize the nation's warrantless surveillance powers under the Foreign Intelligence Surveillance Act (FISA), which Sen. Ron Wyden (D-OR) called "one of the most dramatic and terrifying expansions of government surveillance authority in history." [...] I'll explain how this new power works.  Under current law, the government can compel "electronic communications service providers" that have direct access to communications to assist the NSA in conducting Section 702 surveillance.  In practice, that means companies like Verizon and Google must turn over the communications of the targets of Section 702 surveillance.  (The targets must be foreigners overseas, although the communications can — and do — include communications with Americans.)  Through a seemingly innocuous change to the definition of "electronic communications surveillance provider," an amendment offered by House intel committee (HPSCI) leaders and passed by the House vastly expands the universe of entities that can be compelled to assist the NSA.  If the bill becomes law, any company or individual that provides ANY service whatsoever may be forced to assist in NSA surveillance, as long as they have access to equipment on which communications are transmitted or stored — such as routers, servers, cell towers, etc.

Lawmakers, Privacy Experts Sound Alarm on Most 'Terrifying Expansions of Government Surveillance' in History in Spy Powers Bill.  Lawmakers and privacy experts on both sides of the political spectrum are sounding the alarm on a provision in a spy powers reform bill that one senator described as one of the "most terrifying expansions of government surveillance" in history.  Eighty-six House Republicans last Friday voted for the Reforming Intelligence and Securing America Act (RISAA), a bill that would reauthorize Section 702 of the Foreign Intelligence Surveillance Act (FISA).  Section 702 is a government surveillance authority that is meant to target foreign adversaries, but often surveils Americans' communications without a warrant.

86 Republicans Vote To Allow Warrantless Spying Of Americans With FISA.  Eighty-six House Republicans voted against an amendment to the FISA reauthorization bill, which would have added a warrant requirement to prevent the U.S. government from spying on Americans without their knowledge.  FISA, the Foreign Intelligence Surveillance Act, recently grabbed headlines nationwide after conservatives pointed to the intelligence community's illegal surveillance of the then-candidate Donald Trump's campaign during the 2016 election.  This surveillance, authorized by FISA, has been criticized for its role in perpetuating the "Russiagate" narrative against Trump's presidency.  House Republicans believed the amendment, introduced by Republican Arizona Rep. Andy Biggs, would serve as a guardrail against the intelligence community's abuse of power.  Among the Republicans who voted for the legislation without the inclusion of Biggs' amendment are Speaker Mike Johnson, Majority Leader Steve Scalise, Majority Whip Tom Emme and Texas Rep. Dan Crenshaw.

K-12 Public Schools' Digital Policies Are Ripe for Persecuting Conservative Students.  Many of the district's students and parents are unaware that Fairfax County Public Schools offers administrators, counselors, and teachers a program called Lightspeed Systems.  It is essentially an unrestricted power for multiple school employees to surveille students' computer screens in real time.  While his classmates were taking their test, the teacher was spending her time figuratively watching over the student's shoulder to see what he was reading.  Lightspeed is a new program in Fairfax County Public Schools and its use has not been codified into the district's Acceptable Use Policy.  An Acceptable Use Policy in a K-12 educational setting outlines guidelines and expectations for the appropriate use of technology resources within the school community.  It serves as a framework to ensure that students, teachers, staff, and other stakeholders understand their rights and responsibilities when using digital devices, networks, and online services.

FISA Reform Failed Because The Whole Point Of Section 702 Is To Spy On Americans.  A group of 19 Republican lawmakers on Wednesday [4/10/2024] joined with Democrats to block a bill that would have reauthorized the federal government's spying authority with a few minor tweaks.  At issue is Section 702 of the Foreign Intelligence Surveillance Act, which allows warrantless surveillance of foreigners but is also routinely used to spy on American citizens.  As it stands now, the law, which is set to expire April 19, allows U.S. intelligence agencies to spy on foreign nationals based overseas, but it also lets the FBI comb through the massive amounts of data the intelligence community collects and gather information about American citizens.  These are known as "backdoor searches," and an unlikely coalition of conservative Republicans and left-wing Democrats want to change how these searches are conducted.  Specifically, they want to require that the FBI obtain a warrant before searching Section 702 data for information about Americans — a reasonable reform.  The intelligence community, and the members of the House Intelligence Committee over whom they have influence, oppose this.  Why?  The most straightforward answer is that the main purpose of the intelligence community's surveillance programs isn't to spy on terrorists or foreign adversaries overseas, it's to spy on American citizens.  So of course the intelligence community opposes FISA reforms that would make it harder to spy on Americans.

Congress Is Lying to You About FISA.  The first lesson we're going to learn is that a lot of powerful people in the Congress are liars.  They lie without shame, in fact, with pride.  And they do so at the behest of or because of blackmail instituted by the intel agencies.  And at the head of that list would be the chairman of the House intel committee, Mike Turner of Ohio.  We're going to play a clip from Mike Turner of Ohio saying exactly the opposite of what is true here.  Is Mike Turner reassuring you that face, it would never, under the face of law, the U.S. government would never be allowed to spy on you without a war, because that's unconstitutional.  It never happened.  It never will happen.

'Almost Orwellian': Feds black out nearly all emails about trucker surveillance proposal.  A Department of Transportation component slammed the brakes following semi-furious opposition to its proposal for "on demand" law enforcement surveillance of commercial vehicles a year and a half ago.  It took another six months to turn over the records after a FOIA lawsuit to compel their release, a day before they were due in court Thursday, with no indication yet from FMCSA when it would release a final rule.  The Federal Motor Carrier Safety Administration had internal conversations about those public comments over several months, including via personal email, at the same time it was stalling a Freedom of Information Act request for its communications about the "constitutional implications" of the electronic-tracking advance notice of proposed rulemaking (ANPRM).

Oakland [is] Installing Hundreds of Police Cameras.  Liberals [are] Outraged.  It seems as if the closure of In-N-Out Burger in Oakland, California was a bridge too far.  Crime was already out of control in Oakland, particularly retail theft and carjacking.  Now Governor Gavin Newsom and Mayor Sheng Thao are finally ready to do something about it.  Or at least they're going to throw some money at the problem and give the appearance of doing something.  The Governor announced yesterday that they have entered into a contract with Flock Safety to install nearly 500 security cameras around the city.  The cameras will primarily monitor vehicular traffic.  Unfortunately, the usual list of anti-police suspects immediately showed up to complain about a rising police state, racism, and all the rest of the accusations we typically hear any time anyone tries to do something about crime.

How smart cars exposed the dark side of driving.  Starting at just under $49,000, the Cadillac XT6 is billed as a marriage of "luxury, speed, power and handling" in promotional brochures.  The seven-seater SUV boasts a sunroof, heated front seats, a surround sound speaker system and a reported top speed of 132 miles per hour.  It is also — like many other cars today — essentially a computer on wheels, full of technology and sensors that constantly monitor performance and watch out for hazards.  While that sounds like a good thing, for Romeo Chicco it has turned into a nightmare.  Three months ago, when the American motorist was trying to renew his car insurance, he discovered his vehicle had been spying on him.  Worse still, it had passed on his information to insurance providers, which were now seeking to nearly double his premium.

Google and Meta Function as Extensions of the US Intelligence Community.  Name redacted has published an expose on X exposing the enormity of government censorship and the willing subjugation of America's largest tech companies.  For those of us censored and suspended for years, we hardly knew or understood the enormity of what the individual was up against.

Feds are now hunting down Americans who simply viewed "certain" YouTube videos.  We've all cracked jokes about how our "Google searches" might one day land us behind bars, not realizing we were pretty much on the nose.  Welcome to Biden's version of 1984.  A recent report reveals that if you tuned into certain YouTube videos last year, the feds are now curious about who you are.  A US federal court has ordered Google to reveal the identities of tens of thousands of viewers who watched specific videos within a set period.  Let freedom ring, right?  Day by day, it feels like we're inching closer to a North Korea-style surveillance state, and it doesn't seem like it's going to ease up.  Securing the White House in 2024 is critical, but even then, we have to wonder:  have we crossed a point of no return?

If you watched certain YouTube videos, investigators demanded your data from Google.  If you've ever jokingly wondered if your search or viewing history is going to "put you on some kind of list," your concern may be more than warranted.  In now unsealed court documents reviewed by Forbes, Google was ordered to hand over the names, addresses, telephone numbers, and user activity of Youtube accounts and IP addresses that watched select YouTube videos, part of a larger criminal investigation by federal investigators. [...] Privacy experts, however, are worried about the kind of precedent the court's order creates, citing concerns over the protections of the first and fourth amendments.  "This is the latest chapter in a disturbing trend where we see government agencies increasingly transforming search warrants into digital dragnets," executive director of the Surveillance Technology Oversight Project Albert Fox-Cahn told the publication.  "It's unconstitutional, it's terrifying, and it's happening every day."

Google Has Been Ratting Out YouTube Viewers to the Feds.  You really need to keep an eye on the Department of Injustice these days because you never know what they're up to.  The latest example comes to us from Forbes this week.  It involves Google and a collection of YouTube videos that have attracted the attention of the feds.  It's not just the creators of the videos who are of interest, however.  Forbes uncovered warrants showing that the FBI had demanded user data on everyone who watched particular videos.  We're talking about tens of thousands of viewers in some cases.  It remains unclear how many of these cases resulted in Google turning over the user's data, but it's almost certainly a non-zero number.  The company has yet to offer specifics about compliance, but they claim to be making changes that will make it more difficult for user data to be vacuumed up on a massive scale in that fashion.

Did someone mention Google?

The FBI's Otherwise Illegal Activity.  How deeply is law enforcement interfering in the daily lives of American citizens?  For example, it was recently reported that the FBI labeled Americans who "support the biological basis for sex and gender distinction as potential domestic terrorists."  Then what?  What does the FBI, and those who cooperate with the FBI, do to such Americans?  Does the FBI label FBI employees who support biology as potential terrorists?  Or, is the FBI saying that no FBI employees support the biological basis for sex and gender distinction?  The FBI and local police keep their specific actions, methods, and technologies mostly secret; thus, one cannot say with certainty what occurs after the FBI labels a person as a potential domestic terrorist.  Americans might study the history of the FBI and local police cooperating with the FBI for hints about what might occur after being labeled as a potential domestic terrorist.

Elon Musk's SpaceX Building Global Satellite Surveillance Network for U.S. Intelligence Agency.  According to a recent Reuters report, Elon Musk signed a $1.8 billion contract in 2021 with the National Reconnaissance Office (NRO) to launch a system of orbiting surveillance satellites.  According to the report, "if successful, the sources said the program would significantly advance the ability of the U.S. government and military to quickly spot potential targets almost anywhere on the globe." [...] Knowing that for a period of about ten years beginning in 2012, USG/DHS essentially operated inside the platform of Twitter for the purposes of controlling public opinion, I find it very challenging to believe the relationships with DHS, FBI, HHS and USIC — along with the Pentagon and State Dept, just ended after Musk purchased the platform.  One could make a compelling argument the purchase of Twitter held an ancillary benefit and protected the USIC from revelations that would not be controlled by any other process.  Long before the "Twitter Files" were released under tight controls, the structure of Jack's Magic Coffee shop was increasingly visible.  Beyond the Twitter Files, the COVID-19 pandemic revealed just how much control the government held over the platform.  A $1.8 billion USG contract buys a lot of symbiosis and influence.

New America:  Guilty Until Further Notice.  This article continues a discussion on the U.S. government's use of neuroscience and directed energy to develop weapons which can secretly affect the brain and body from a remote location without requiring surgically implanted neural technologies.  Government scientists during the Obama-Biden Administration described plans for large remote surveillance systems which determine a person's intentions, potentially including surveilling and affecting brain activity.  Importantly, U.S. government scientists suggested the remote detection of covert intent technologies and their planned "larger systems of systems" could have dual uses in the civilian economy, including "crowd control, antidrug and anticrime operations, border security, and ensuring the security of government and private personnel and property."  Emphasis should be on the use of remote and secret technologies for "anticrime operations" in the previous quotation; the U.S. government suggested using remote and secret technologies which potentially affect the human brain and/or body to prevent crime, not necessarily to solve crimes already committed.

FBI Colludes With Banks in Fascist-style Surveillance Operations.  Last Thursday, the Select Subcommittee on the Weaponization of the Federal Government held a three-hour hearing on a congressional investigation into how the FBI worked with big banks to surveil Americans — all without warrants, and much without reasonable suspicion.  This type of collusion between private companies and government is the core of fascism as defined by Benito Mussolini.  [Video clip]

Alaska high court rules against warrantless ariel surveillance of private ciitizen.  Alaska law enforcement agencies do not have the right to conduct aerial surveillance of private property with high powered telephoto technology without first obtaining a search warrant.  This was the March 8 ruling of the Alaska Supreme Court in the case, State of Alaska v.  John William McKelvey.  Back in 2012 the Alaska State Troopers received a tip that McKelvey had a grow operation on his property located in rural Fairbanks.  After initially flying over the property and taking photos with a telephoto lens, the Troopers then obtained a search warrant.  The central issue in this case concerned the validity of the search warrant and whether the Troopers' use of aerial photos violated the Fourth Amendment of the U.S. Constitution and the Alaska Constitution's rights to privacy and freedom from unreasonable searches.  According to the Alaska Supreme Court's ruling, the State Constitution protects Alaskans from law enforcement aerial surveillance by requiring a warrant prior to taking pictures of private property from the sky.

Canadian vending machines were secretly using facial recognition software; nobody would have known except for a display error.  A vending machine at the University of Waterloo malfunctioned and displayed a rather worrisome error to the users.  No one was aware that the vending machines, which sold snacks like chocolate bars and chips, were using facial recognition software.  'We wouldn't have known if it weren't for the application error.  There's no warning here,' said River Stanley, a fourth-year student, who investigated the machines for an article in the university publication, mathNEWS.  As news of the facial recognition software error spread around campus, students started covering a small hole on the machines where it was suspected that the camera was housed.  Stanley said.

The Benefits of Hardship.  While the Patriot Act broadened the toolkit for tracking down foreign threats, its nefarious use as a domestic surveillance weapon took a sledgehammer to Americans' privacy. [...] In the wake of 9/11, President Bush and Vice President Dick Cheney erected an unconstitutional infrastructure that could be used to spy on Americans' communications and financial transactions.  They enlarged the welfare state, created whole new departments and agencies, increased debts and deficits, expanded federal intrusion into local education and family life, and squandered a great deal of goodwill both at home and abroad.  Instead of championing conservative principles and constitutional governance, the Bush-Cheney White House championed American empire abroad, while sacrificing rights and freedoms at home.

The Day They Turned the Spies on Us.  Mike Benz, a former State Department official, argues that over the decades since World War II the U.S. has developed a huge intelligence system to spy and spread propaganda and influence elections in foreign countries.  In about 2016 the U.S. government converted these intelligence systems elections to spy and censor and manipulate elections right here in the U.S. [...] The idea that the government is spying on us right here at home would be nothing but a conspiracy theory but for The Twitter Files.  If nothing else, Matt Taibbi & Co. clearly showed that the intelligence community was directing traffic during the late COVID unpleasantness through direct communication with social media companies and the disinformation/misinformation/malinformation ideology of the nation's Cybersecurity & Infrastructure Security Agency. [...] It's not just Trump.  It's the entire populist nationalist movement that has to be stopped.  Because?  You can understand the point of view of the global ruling class.

IRS Official Tells O'Keefe Media Group Reporter That the IRS uses AI to Spy on Americans' Bank Accounts.  O'Keefe Media Group has infiltrated the IRS!  According to Alex Mena, an IRS official with the criminal investigations unit in New York, who met with O'Keefe Media Group's undercover journalist, the IRS uses artificial intelligence technology to spy on American citizens and company bank accounts without a warrant or evidence to uncover what they consider fraud.  According to the source, the IRS is "going after the small people" and "destroying people's lives."  All of the agents are "like robots," said Mena.  This is quite ironic, as The Gateway Pundit recently reported that O'Keefe Media Group exposed the No Mas Muertes (No More Deaths) organization, a nonprofit and ministry of the Unitarian Universalist Church of Tucson, for smuggling illegal immigrants from the border in Arizona.  This 501(c)(3) organization holds a tax-exempt status for hundreds of thousands of dollars in donations, but the IRS is targeting innocent Americans!

Congress Aims to Extend Warrantless Surveillance for the Foreseeable Future.  Late last year, Congress extended Section 702 of the Foreign Intelligence Surveillance Act (FISA) and, in doing so, secured "the nation's warrantless surveillance powers" until April 2024.  With that month fast approaching, House Republicans have unveiled a new package to reauthorize those same powers, within limits.  As the Hill reports, the new package "focus[es] on more reforms at the FBI to address misuse of the powerful spy tool," but the deal does not include requirements for a warrant, which is "deemed a red line for the intelligence community but nonetheless a top priority for privacy advocates in Congress."  The new measure "would severely limit the number of FBI personnel who can query the database, forcing more oversight from some 550 supervisors or lawyers before agents can tap into the database to gain information on Americans."  The bill aims to "protect members of Congress or other high-profile officials" by requiring consent before a "defensive briefing."  The FBI will be required to "notify a member of Congress, with some limitation, if they have been queried in the 702 database."

Treasury Dept. Admits to Using Political Search Terms to Surveil Citizens' Bank Transactions.  On Friday, the U.S. Department of the Treasury confirmed, in a letter to Senator Tim Scott (R-SC), that the Treasury has been using political watchwords in searches during surveillance of the financial transactions of American citizens.  Senator Scott is the ranking Republican on the Senate Banking Committee. [...] The Department of the Treasury is arguably in violation of the Fourth Amendment in this process, as they are flying in the face of the people's rights "...to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures." [...] None of that was applied here; it looks an awful lot like the Treasury Department indulged in a fishing expedition, seeking anyone who was even tangentially related to the January 6th, 2021, hooliganism at the Capitol.

Yellen dodges on whether Treasury Department moved to surveil Americans' legal purchases.  Treasury Secretary Janet Yellen sidestepped questions about whether her department ordered surveillance of consumer purchases and transactions.  Yellen was asked Tuesday during a hearing whether the Treasury Department instructed financial institutions to monitor legal purchases for signs of "extremism," as claimed in a House Judiciary Committee letter last month.  "Has Treasury — including FinCEN or federal banking agencies like the Fed, FDIC, OCC — instructed financial institutions to search Americans' legal transactions in attempts to surveil their purchases?"  Republican Missouri Rep. Ann Wagner asked Yellen.  "Well, we received the letter from you, I believe, on this topic, and we intend to investigate and to respond," Yellen responded.

San Francisco Police Spent 193 Hours Over 3 Months Watching Private Surveillance Footage.  In 2022, the San Francisco Board of Supervisors passed an ordinance that would allow the city's police department to access footage from private security cameras under certain circumstances.  A new city report sheds light on just how much the police have used the privilege.  Between 2021 and 2022, news reports depicted a wave of "smash-and-grab" retail thefts across California.  San Francisco Mayor London Breed complained that city policy did not allow police to access security camera footage during emergency situations. "Where there were multiple robbery crews hitting multiple stores, [police] couldn't even access those cameras, which is ridiculous," Breed said in December 2021.  "There is a balance to be had, I know," she noted.  "But right now, if our officers cannot use cameras during a mass looting event, then that policy is out of balance."

How Much Government 'Bio-Surveillance' Is Okay?  Throughout history, tyrannical governments have taken freedoms from their citizens openly.  In a country such as America, though, government employees might try to take away freedoms and leisure somewhat secretly, or disguised as something good.  An example might be U.S. federal laws on "biosurveillance," which allow for "real-time, all-hazards biosurveillance capabilities" and collection of data on humans and threats to humans.  Such laws on using real-time biosurveillance capabilities for "all-hazards," which apparently means what it says — every type of potential harm to humans — have multiple potential interpretations.  Could some interpretations be used by government employees to support the use of some of the most intrusive technologies possible?  For example, could biosurveillance laws support the use of radio wave surveillance technologies (types of radar) that "see into" homes and have been used by the FBI?

Annoyed With Clear, the Company That Fast-Tracks Its Customers Through Airports?  Like some 10 million others, I am a member of TSA PreCheck, the federal program through which Americans can access faster airport security lines while keeping their shoes on and their laptops in their bags as they pass through the scanner.  Applying for TSA Pre, as it's often called, requires providing fingerprints and undergoing a background check, as well as paying $78 every five years.  When TSA Pre first rolled out in 2013, its efficiency suggested genuine progress.  But that feels like a long time ago.  At Virginia's Dulles Airport recently, I idled in a lengthy TSA Pre queue as the handful of people in another line to my left got far speedier service.  This was thanks to Clear Secure, a publicly traded company.  Clear Secure's identity-verification product, CLEAR, is entirely separate from TSA Pre; its members typically pay over $100 per year to have their retinas and fingerprints scanned at airports.  After a member's identity is confirmed, Clear Secure workers usher them straight to a TSA agent, ahead of everyone else.

Reaction to the article above:
CLEAR wants to scan your face at airports.  Privacy experts are worried.  In case it's not obvious, CLEAR is a scam, a way to pay extra money to cut ahead in the TSA line and slow everyone else down.  It has nothing to to do with improved security or simplified processes (that's TSA precheck), just pay to go ahead of the proles:  [Link to the article above]  Having said that, the face scanning genie left the bottle quite a long time ago.  I have NEXUS, which is similar to Global Entry, get approved as a low risk traveler so you can go through immigration faster.

NSA Purchases Internet Metadata To Spy on You Without a Warrant.  The National Security Agency (NSA) is the latest intelligence agency spying on Americans without a warrant by buying access to their data.  That revelation comes from a letter released last week from Sen. Ron Wyden (D-Ore.) to Director of National Intelligence Avril Haines.  "As you know," Wyden wrote, "U.S. intelligence agencies are purchasing personal data about Americans that would require a court order if the government demanded it from communications companies."  Now, Wyden writes, the snoop in question is the NSA, which is "buying Americans' domestic internet metadata."  Such information "can reveal which websites they visit and what apps they use," according to a press release from Wyden's office.

Biden regime expanding intrusive facial recognition scans to all 430 'federalized' airports.  Joe Biden's Transportation Security Administration is moving forward with plans to expand facial-recognition technology at 430 U.S. airports despite the fact that a bill has been introduced with bipartisan support calling for the government to end the invasive policy of stealing the biometric data of millions of airport passengers.  The TSA announced it will install enhanced Credential Authentication Technology (CAT) devices at the airports, an upgrade from previous units used in a pilot program at nearly 30 U.S. airports.  "TSA uses facial recognition algorithms developed by top-performing vendors," the agency says in its press release.  This is a system powered by artificial intelligence.  In the press release, TSA makes it sound like it is willing to jump through any hoop to protect passengers' privacy, when we know this is an outright lie.  In another document, Homeland Security, under which TSA is a sub agency, admits they are collecting personally identifiable data on people at airports.

Houston Man Files Lawsuit After Being Arrested When Facial Recognition Misidentified Him as a Robber.  At a time when technology increasingly intersects with law enforcement practices, the story of Harvey Eugene Murphy provides a cautionary tale about the potential pitfalls of using various technologies that can lead to injustice.  Murphy has filed a lawsuit against Sunglass Hut's parent company after a store's facial recognition program falsely identified him as a robber.  As a result, he was arrested and jailed, which led to him being sexually assaulted.

Study: Thousands of Companies Are Monitoring Every Facebook User.  A recent study by Consumer Reports, in collaboration with The Markup, has unveiled the extensive scale of data tracking aimed at Facebook users.  Some users in the study were tracked by as many as 7,000 companies.  A recent study from Consumer Reports engaged 709 volunteers who provided archives of their Facebook user data.  Astonishingly, Consumer Reports discovered that 186,892 different companies transmitted data about these users to Facebook.  On average, data from each participant was shared by 2,230 companies, with some users' data being shared by over 7,000 companies.  This examination highlighted a lesser-known form of tracking known as server-to-server tracking, where personal data is transferred directly from a company's servers to Meta's servers, alongside the more visible method involving Meta tracking pixels on company websites.

Biden's Financial Crimes Unit Hunted MAGA Americans.  Rep. Jim Jordan, Chair of the Weaponization Committee, notified Noah Bishoff, former Director of a division of the Financial Crimes Enforcement Network (FinCEN), that they wanted to interview him about his hunt for terrorists in bank transactions involving MAGAs, Trump, religious items, and small arms.  After January 6, 2021, FinCEN is accused of distributing materials of "typologies" of persons they wanted financial information on.  They were looking for terms like "Trump" and "MAGA" in Zelle payment messages.  They warned financial institutions of "extremism" indicators that include "transportation charges, such as bus tickets, rental cars, or plane tickets, for travel to areas with no apparent purpose" or "the purchase of books (including religious texts) and subscriptions to other media containing extremist views."  The letter continued: "In other words, FinCEN urged large financial institutions to comb through the private transactions of their customers for suspicious charges on the basis of protected political and religious expression."  They even looked for terms like "Small Arms, Sporting and Recreational Goods and Supplies, Cabela's, Dick's Sporting Goods, among many others.

Alarming Surveillance:  Government May Have Tracked Your Transactions at These Common Stores.  The House Judiciary GOP had some troubling questions they posed on X.  [Tweet]  "Shop at Bass Pro Shop recently?  How about Cabela's?  Bought a bible?  If so, the federal government may be coming after YOU."  House Judiciary Committee Chair Jim Jordan explained in a troubling letter to Noah Bishoff, the former Director of the Office of Stakeholder Integration and Engagement in the Strategic Operations Division of the Financial Crimes Enforcement Network (FinCEN) in the Treasury Department.  [Tweet]  They also looked at other things like "'transportation charges, such as bus tickets, rental cars, or plane tickets, for travel areas with no apparent purpose" and "the purchase of books (including religious texts) and subscriptions to other media containing extremist views."  What qualifies as "extremist views" here?  As Jordan said, the government seemed to be looking into potentially protected political and religious expression.

Feds Used J6 To Conduct Mass Surveillance On Bank Transactions Flagged With Terms Like 'Trump,' 'MAGA': Jim Jordan.  Federal law enforcement instructed financial institutions to use search terms such as "MAGA" and "Trump" when searching private transactions, Republican Ohio Rep. Jim Jordan said Wednesday.  Jordan, chairman of the House Judiciary Committee and Select Subcommittee on Weaponization, wrote a letter describing how the federal government flagged terms like "MAGA" and "Trump" to see if those phrases were used by Americans when they conducted financial transactions following the Jan. 6th Capitol riot.  The letter is addressed to Noah Bishoff, former Director of the Office of Stakeholder Integration and Engagement in the Strategic Operations Division of the Financial Crimes Enforcement Network (FinCEN).  The letter was first reported by Fox News.

The Deepest Part of the Swamp [is] The FBI.  [Scroll down]  The CIA possessed a device for surveillance and meddling in elections.  The computer and its software were called Hammer and Scorecard.  The CIA has no charter to be used for domestic objectives; therefore, it is illegal to use it for domestic purposes.  Never-the-less, In February 2009, the Obama administration commandeered The Hammer and Scorecard.  Notwithstanding, onetime director of the FBI, Robert Mueller, spent $5 million to fund the expansion of the Hammer to be used to spy on Americans and 'other' domestic purposes, according to whistleblower Dennis Montgomery.

Your Vehicle Is Spying On You, And Now They're Going To Start Installing ChatGPT In New VW Models.  Be careful what you say while you are driving your vehicle, because you are being watched.  Today, we live in a giant surveillance prison in which virtually everything that we do is being monitored, tracked, recorded and analyzed.  In this day and age, you should just assume that nothing that you do is ever private.  When I was much younger, if I really wanted to have a private conversation with someone I thought that taking a long drive with that person was a great way to do that.  But those days are long gone.

Lobstermen Sue State Agency for Mandating Installation of 24-Hour Electronic Location Monitoring System on Their Boats.  A group of five Maine lobstermen are suing Maine Department of Marine Fisheries (MDMR) Commissioner Patrick Keliher over new rules mandating that all federally permitted lobster boats be equipped with a 24-hour electronic location monitoring system.  These mandated devices — provided by the MDMR — identify a vessel's location every sixty seconds while in motion and once every six hours when stationary.  Using one of these devices, a boat's position is able to be accurately determined within 100 meters, or 328.1 feet.

The Editor says...
[#1] How many "electronic location monitoring system[s]" exist, other than GPS?  If you're talking about GPS, just say so.  [#2] An inexpensive GPS receiver can determine its position within two or three meters.  The estimated accuracy of 100 meters was probably provided by the State of Maine, in an effort to mask the state's surveillance accuracy.  [#3] There is no need to ask why the State of Maine wants to track the position of every fishing boat.  If they implement this rule without objection, the system will be expanded to track every boat.  Then it will expand to include every truck, then every car and motorcycle, and eventually every person.  Insidious government programs always start small and expand incrementally.

The Beneficial Ownership Information Reporting rule and the surveillance state.  The 2021 National Defense Authorization Act created the Beneficial Ownership Information (BOI) reporting rule to ostensibly target money laundering.  Beginning January 1, 2024, the Act mandates U.S. companies, regardless of size, to register their beneficial and controlling owners with the Treasury's Financial Crimes Enforcement Network (FinCEN).  FinCEN claims the corporate ownership database will be used exclusively to identify anonymous shell companies involved in money laundering and terrorist activities.  Once again, like the Patriot Act, it grants surveillance powers violating the Constitution.  There is no provision for judicial oversight to protect individual rights as if that ever mattered.

147 Worthless Republicans Vote to Reauthorize FISA Program So DOJ-FBI Can Spy on President Trump Again.  147 worthless Republicans voted on Thursday to reauthorize the FISA program abused by the FBI to spy on candidate and then President Donald Trump the entire time he was in office.  No one was ever jailed for the injustice, and the FBI, of course, hid this illegal act from the American public.  According to Rep. Eli Crane, "FISA 702 is a violation of the 4th Amendment.  Additionally, this bill continues to entangle us in forever wars abroad and even managed to abandon heroes from Northern Arizona, including the Navajo Nation, that sacrificed for our country during WWII."  [Tweet]  According to Rep. Matt Rosendale, "FISA Section 702 has allowed the FBI to spy on U.S. citizens more than 278,000 times without a warrant!  FISA should not be combined with our national defense, and it is UNACCEPTABLE that the D.C. Cartel is bypassing regular order to jam Members by forcing them to vote on two unrelated bills in one vote."

Pharmacies Providing Medical Info to Law Enforcement w/o Warrant.  A Senate Finance Committee inquiry has found that the country's biggest pharmacies are handing over customer medical records to law enforcement agencies without requiring warrants.  Senate Finance Committee Chair Ron Wyden, D-Ore., revealed this in a Tuesday letter to Health and Human Services Secretary Xavier Becerra, raising concerns about the situation.  "All of the pharmacies surveyed stated that they do not require a warrant prior to sharing pharmacy records with law enforcement agents, unless there is a state law that dictates otherwise."  Wyden said in the letter, referencing Amazon, Cigna, Optum Rx, Walmart, Walgreens Boots Alliance, CVS Health, The Kroger Company and Rite Aid Corporation.  "Those pharmacies will turn medical records over in response to a mere subpoena, which often do not have to be reviewed or signed by a judge prior to being issued."

The Perversion of FISA and FISC.  When Congress passed The Foreign Intelligence Surveillance Act of 1978, it sought to provide judicial and congressional oversight of foreign intelligence surveillance activities while maintaining the secrecy necessary to effectively monitor national security threats.  In theory, FISA sets out procedures for physical and electronic surveillance and collection of foreign intelligence information.  Initially, FISA addressed only electronic surveillance, but was significantly amended to include programs monitoring Internet communications, trap and trace devices, physical searches, and business records.  This bill also set-up the United States Foreign Intelligence Surveillance Court (FISC).  This is a special U.S. Federal court that holds nonpublic sessions to consider issuing search warrants under FISA.  Proceedings before the FISC are ex parte.  "Ex parte" means that the government is the only party present.  So individuals being tried in Foreign Intelligence Surveillance Court are not even aware that they are being judged and they have no right to an attorney.  This includes US citizens who may have had information gathered up in the FISA net.  These are often large data sweeps through their Internet communications monitoring, AI/machine learning — algorithmic searches as well as trap and trace devices.  FISA violations occur at a rate of more than 4,000 per year and these illegal data collection practices and warrants must end.

46 Deep State Officials Including Rosenstein, Clapper and Morell Urge Congress to Expand Domestic Surveillance.  For those confused.  There are two bills to modify the FISA702 reauthorization in the House.  (1) HR 6611 from the House Intel Committee and (2) HR 6570 from the House Judiciary Committee.  The intel committee bill expands domestic surveillance authority under the modifications; the judiciary committee bill requires the DOJ to get a search warrant before they can look at the incidental collection of American citizens.  Both bills came out of committee and were scheduled for a floor vote tomorrow, which has been cancelled due to public outcry (good job).  Speaker Mike Johnson initially planned to let both bills get voted tomorrow and the bill with the most votes advances to the Senate.

Who, other than the FBI, would have any use for such data, AND the ability to steal it?
23andMe confirms hackers stole ancestry data on 6.9 million users.  On Friday, genetic testing company 23andMe announced that hackers accessed the personal data of 0.1% of customers, or about 14,000 individuals.  The company also said that by accessing those accounts, hackers were also able to access "a significant number of files containing profile information about other users' ancestry."  But 23andMe would not say how many "other users" were impacted by the breach that the company initially disclosed in early October.  As it turns out, there were a lot of "other users" who were victims of this data breach:  6.9 million affected individuals in total.  In an email sent to TechCrunch late on Saturday, 23andMe spokesperson Katie Watson confirmed that hackers accessed the personal information of about 5.5 million people who opted-in to 23andMe's DNA Relatives feature, which allows customers to automatically share some of their data with others.  The stolen data included the person's name, birth year, relationship labels, the percentage of DNA shared with relatives, ancestry reports and self-reported location.

The Editor says...
I never report my location, and yet my web browser seems to have a pretty good idea of where I live.

CIA Google Spent $26 Billion To Hide This Phone Setting From You.  There's a setting on your phone and web browser that Google is desperate to keep you from discovering.  How desperate?  In 2021 alone, Google paid Apple, Samsung and others $26.3 billion to keep it buried.  That's more money each year than McDonald's makes selling burgers.  This setting affects who gets to track your location and watch what you look up online.  It affects the usefulness of the information you see and how much of your screen is taken up by ads.

CIA Spying Lawsuit: Do Americans Have Privacy Rights When Abroad?  The Dissenter Newsletter, which posts about cases of whistleblowers and their struggle against governments and corporations, stood out for its first-hand reporting when its journalist Kevin Gosztola reported the update on last year's story of a lawsuit brought against the CIA and its former director Mike Pompeo.  Last year, the lawsuit by two American journalists along with a couple of attorneys against the CIA and its former head Mike Pompeo made headlines in some major media outlets.  The four Americans claimed that CIA under Pompeo spied on them when they visited Wikileaks publisher Julian Assange in 2017 and 2018 at the Ecuadorian embassy in London, where Assange had been granted asylum.  A video of an attorney representing the plaintiffs serving Pompeo the lawsuit papers at an event made rounds on Twitter/X in November 2022.  [Tweet]

Special Counsel Jack Smith Demands X/Twitter Give Info on All Americans Who Interacted with Donald Trump.  Special Counsel Jack Smith, in a search warrant sent to X, formerly Twitter, requested a vast swathe of information about the account of former President Donald J. Trump, as well as information on the millions of accounts that interacted with it — even those that liked a tweet by Trump in the timeframe of October 2020 to January 2021.  The heavily redacted search warrant requests a list of all users who liked or retweeted posts from Trump between October 2020 and January 2021, including "all associated logs and metadata," which could cover location data.  This extraordinarily expansive request would result in data on millions of American users being turned over to the DOJ.

Special Counsel Jack Smith Requested Details of All Donald Trump Twitter Followers.  In response to a media lawsuit for information being withheld by the DOJ, a heavily redacted search warrant was revealed.  Within the warrant issued to Twitter-Xcorp, Special Counsel Jack Smith demanded the information on every account that engaged with the Donald Trump Twitter account.  The ridiculously overbroad warrant and demand for information, was initially fought by Twitter; however, it appears the courts ultimately demanded compliance and Twitter acquiesced.  That is a stunning amount of information included in the search warrant. [...] While the release of the warrant is initially surprising, it should not come as a great surprise to know the Biden government wants to generate a list of what they would consider subversives to the interests of the state.  Previously, the Obama/Biden administration, through the DOJ, used the IRS to assemble a list of people and entities against their interests.  Once that revelation came to light, as a result of a whistleblower, the Obama/Biden administration then began a process of using the NSA database to monitor political opposition.  Ultimately, that led to the targeting of candidate Donald Trump in 2016 and the later targeting of President Trump after his inauguration.

FBI tells Newsweek that Trump supporters are enemies of the state and must be secretly tracked, monitored, investigated.  According to an October 4 report in Newsweek, "the federal government believes that the threat of violence and major civil disturbance around the 2024 U.S. presidential election is so great that it has quietly created a new category of extremists that it seeks to track and counter:  Donald Trump's army of MAGA followers."  Notice the term "army."  There's a sinister purpose behind that word.  The government, in cooperation with its corporate partners at Newsweek, are trying to paint a picture of an organized military force ready to go to war with Trump as its leader.  As a member of the conservative movement in America, I can tell you that it is the most unorganized, disjointed and fragmented movement in the country.  It is not in any way monolithic and as such poses no threat to the government or anyone else.  But this is who our government has targeted for monitoring and tracking.  They're not worried about the Chinese men of military age pouring over the open border at a rate of 2,000 to 4,000 per month under Biden.  They're not worried about Iranian sleeper cells.  NO, they're worried about American citizens on the Trump team who want to see their candidate in the White House.

Biden's DOJ Targets Trump Supporters on Twitter — Demands List of All Users Who Retweeted, Liked, or Mentioned President Trump's Twitter Account.  Political hitman Jack Smith ordered Twitter-X to turn over information on President Trump's popular Twitter account during his continued fishing expedition into President Trump.  Jack Smith and the Biden DOJ also demanded information on all Twitter-X users who retweeted President Trump, liked President Trump's tweets, or mentioned President Trump's account in their tweets.  Merrick Garland is going to target all of the Trump supporters in their continued witch hunt against President Donald Trump.  This is what tyranny looks like.

Hemisphere, an 'invasive' surveillance program, has tracked trillions of phone records for Americans each year.  Congress is demanding answers from the Biden administration about a secret spying program that tracks more than a trillion phone records from innocent and unsuspecting Americans each year.  The under-the-radar system, known as Data Analytical Services or 'Hemisphere,' has been in operation for over a decade.  It allows federal, state, and local law enforcement agencies to tap into the phone records of U.S. citizens who have not been accused of any crime.  Under the Hemisphere program the White House Office of National Drug Control Policy (ONDCP) pays phone service provider AT&T to hand over phone records as far back as 1987.

DEA's Domestic Surveillance 'Mission Creep'.  Normally, when Americans see a story mentioning the Drug Enforcement Administration (DEA), they expect it to deal with the nation's endless (and futile) war on drugs.  And most of the time, the news about or coming from the DEA concerns illicit drug trafficking, arrests, and prosecutions.  But during the 2020 national protests against the murder of George Floyd by Minneapolis police, the DEA got publicity for another mission its leadership generally doesn't want to discuss:  domestic surveillance.  On June 2, 2020, BuzzFeed News reporters Jason Leopold and Anthony Cormier broke the story that the Justice Department (DOJ) had authorized the DEA to go outside of its normal legal boundaries of drug enforcement.  The DEA was authorized "to enforce any federal crime committed as a result of protests over the death of George Floyd."  The mission included "covert surveillance," according to the DEA memo obtained by BuzzFeed.  That authority was supposed to expire after two weeks, but after pursuing litigation using the Freedom of Information Act (FOIA), an investigation by the Cato Institute has thus far failed to confirm that the DEA's covert surveillance operations were, in fact, terminated by mid-June 2020.

Oh... so that's who those guys are.
Air Marshals National Council Director Reveals Marshalls Are Quietly Following Every Person Who Flew to DC Around January 6, 2021.  Sonya Labosco, Director of the Air Marshalls National Council said Air Marshalls are quietly following Americans who flew into the DC area around January 6, 2021.  Labosco said Air Marshalls are no longer going after terrorists or the bad guys because they are now stalking and following every single person who flew into the DC area around January 2021 even if they did not go to the US Capitol.  "We're not flying right now.  The only missions that we are doing are 'Quiet Skies' missions and those are missions that are following the January 2021 people," Labosco said.  "So we're either on the border for illegal immigrants or we're following folks from January 2021.  We're not doing our regular missions where we're out there looking for the bad guys so for now most flights you're not gonna have Air Marshalls."  The Fox News host was stunned: "What do you mean that you're following January 2021 people?  What does that mean?  Labosco said their primary mission is to stalk every single person who flew into the DC area even if they never went to the Capitol and were never charged with any crimes.  "That means our primary mission is a little group called 'quiet skies' — it's a mission called quiet skies that we're following people that flew into the national capital region in January 2021 and they did not have to go to the Capitol or the rally and you've been put on a specific list that TSA has now assigned Air Marshalls to follow these people who have not had any type of criminal investigation — they haven't committed a crime, but yet three years later we are following the same individuals day in and day out," Labosco said.

Surveillance Tech Companies Are Writing Press Releases For Cops.  Worse, News Agencies Are Publishing Them.  There's nothing new about cop shops letting their tech providers write their press releases for them.  Law enforcement officers love power but often think nothing of surrendering their autonomy to the providers of the snooping tools.  For years, Harris Corporation — the maker of Stingray devices — told cops what they could or couldn't say about their use of the tech, tying them up (often with the help of the FBI) with non-disclosure agreements.  Ring — the biggest name in front-door surveillance — has given cops cameras to hand out in exchange for expanding its customer base and allowing Ring to man the PR front.  And there's nothing new about so-called journalists acting as stenographers for cops.  When something happens that suggests police misconduct, some journalists do nothing more than publish PD press releases and/or seek comment only from law enforcement PR reps or police union representatives.

NY Gov Admits Out Loud to Social Media Surveillance, Government Will "Reach Out" if They Catch You Using "Hate Speech".  Big Sister is now watching.  George Orwell predicted a future of a dystopian surveillance state where words are monitored, unacceptable speech is censored, and a person's existence can be denied for ideological thought crimes.  Unfortunately, we are now in a time where acceptable speech is decided by both elected and unelected bureaucrats over what is permitted online.  New York Gov. Kathy Hochul announced Monday that the state is "very focused" on collecting data from social media platforms as part of an effort to counter online "negativity" and "hate speech" after a rise in antisemitic attacks.  [Tweet]

The U.S. Government is Secretly Stealing Newborn Babies DNA — Is This Tied to Creating a Biometric Digital ID?  A lawsuit has been filed by the Institute for Justice over a state program in New Jersey that has been obtaining, and secretly holding onto, blood from newborn babies.  The Institute for Justice explained in a press release it is representing two sets of parents in the case.  The state claims it can use the DNA from the babies' blood samples for any reason, without informed consent from parents.  The case charges that state law in New Jersey demands that when babies are born, blood be taken and tested for various diseases.  This same demand exists in all states.  But, according to the attorneys representing the parents, what makes New Jersey different is that, "after the testing is over, New Jersey's Department of Health keeps the leftover blood for 23 years.  The state does not ask parents for their consent to keep their babies' blood, failing to even inform parents that it will hold on to the residual blood.

Senate Republicans Launch Investigation Into Justice Department for Spying on Congressional Staffers.  Every time we think we're done with the Justice Department's Spygate and Russia collusion controversy, it pulls us back in.  It appears that at this point, we are the political versions of Michael Corleone, who can't seem to escape what is one of the most egregious scandals in American political history.  Republicans on the Senate Judiciary Committee are reportedly delving deeper into allegations that the Justice Department conducted a number of covert surveillance operations on congressional staffers during the period when the agency was embroiled in the Trump-Russia investigation hoax.

Keep Your Head on a Swivel.  [Scroll down]  Neither the FBI nor the larger Intelligence Community is motivated by the prospect of saving American lives.  Why would the U.S. government see Americans as expendable?  The most straightforward answer is that it does not serve the American people but is instead interested exclusively in expanding its own powers.  What 9/11 confirmed for the Intelligence Community is that even its worst failures can be used to institute unconstitutional laws, such as the Patriot Act, that serve to broaden government authority.  In the subsequent two decades, the federal government has created a complex surveillance system that enables it to spy on every citizen of the United States.  Not only has freedom been foolishly traded for the promise of security, but also that promise proved to be a lie.

House GOP Crafting Major FISA Reform to Block Snooping on Americans' Phone Records Without Warrants.  House Judiciary Committee Republicans are pressing ahead with sweeping reforms to the government's FISA surveillance powers that among other things would would prohibit the FBI from searching through Americans' phone records without a court-approved warrant.  The effort is on track to be wrapped up by the end of the year when several Patriot Act powers expire.  Republicans and Democrats are coming together on this matter in rare bipartisan cooperation, lawmakers told Just the News. [...] Jordan said he was focused on what is known as the Section 702 system "where they can create this database" of phone communications metadata that currently can be searched by agents without a warrant.

Your smart speaker data is used in ways you might not expect.  Smart speakers offer amazing convenience — from playing your favorite tunes to re-ordering toilet paper — with only a simple voice command.  But that convenience can come with a steep cost in privacy that many consumers aren't even aware they're paying.  We've all had the uncanny experience of searching for something on the internet and then suddenly ads for that very thing are popping up everywhere we look online.  It's no coincidence, said Umar Iqbal, an assistant professor of computer science and engineering at the McKelvey School of Engineering at Washington University in St.  Louis.  "My collaborators and I uncovered that Amazon uses smart speaker interaction data to infer user interests and then uses those interests to target personalized ads to the user," Iqbal said.  "That's something that Amazon was not upfront about before our research."

The Creepy All-Seeing Eye of 'Geofencing'.  As worshippers gathered at the Calvary Chapel in 2020, they were being watched from above.  Satellites were locking in on cellphones owned by members of the nondenominational Protestant church in San Jose, California.  Their location eventually worked its way to a private company, which then sold the information to the government of Santa Clara County.  This data, along with observations from enforcement officers on the ground, was used to levy heavy fines against the church for violating COVID-19 restrictions regarding public gatherings.  "Every Sunday," Calvary's assistant pastor, Carson Atherly, would later testify, the officers "would serve me a notice of violation during or after church service."  Calvary is suing the county for its use of location data, a controversial tool increasingly deployed by governments at all levels — notably in relation to the U.S. Capitol riot on Jan. 6, 2021.  While enabling law enforcement to more easily identify potential offenders, the practice, called "geofencing," has also emerged as a cutting-edge privacy issue, raising constitutional issues involving warrantless searches and, with Calvary Chapel, religious liberty.

UK government keeping files on teaching assistants' and librarians' internet activity.  The government has been monitoring the social media accounts of "dozens" of ordinary teaching staff, including teaching assistants, and is keeping files on posts that criticise education policies, the Observer has learned.  Two weeks ago, this newspaper revealed how the Department for Education is monitoring the social media activity of some of the country's leading education experts.  Now evidence has emerged that the monitoring is much more widespread, covering even the lowest paid members of staff.  Ordinary teaching and support staff said this weekend that they were "gobsmacked" and angry after discovering that the department had files on them.  Many outraged educators have rushed to submit subject access requests [SARs] compelling the DfE to release any information it holds under their name, after discovering there were files up to 60 pages long about their tweets and comments challenging government policy or the schools inspectorate, Ofsted.

State governments collect the DNA of nearly every newborn baby in the U.S..  Most new parents have no idea that by the time they leave the hospital with their newborn, a sample of their child's blood has already been sent to the state government.  Depending on the state, the government may store and use their child's blood for anywhere from months to indefinitely — and not only is it legal, it's actually mandated by law.  Each American state has its own newborn screening program through which healthcare professionals who deliver babies are required to collect a blood sample in order to test for rare genetic or metabolic diseases.  Only in two states, Maryland and Minnesota, are healthcare practitioners even required to obtain parental consent.  Wyoming law technically requires parents' "written consent," but is worded vaguely enough that in practice, it amounts to a system that must be opted-out of rather than opted into.

22 Years of Blowback from the USA Patriot Act.  [Scroll down]  Allowing the government to spy on the citizenry will not reduce acts of terrorism, but it will result in a watched, submissive, surveillance society.  Not only did the USA Patriot Act normalize the government's mass surveillance powers, but it also dramatically expanded the government's authority to spy on its own citizens without much of any oversight.  Thus, a byproduct of this post 9/11-age in which we live, whether you're walking through a store, driving your car, checking email, or talking to friends and family on the phone, you can be sure that some government agency is listening in and tracking your behavior.  This doesn't even begin to touch on the corporate trackers that monitor your purchases, web browsing, Facebook posts and other activities taking place in the cyber sphere.  We have all become data collected in government files.

The Cult of Our Betters.  [Scroll down]  The most closely held freedom to destroy is your privacy.  That threatens them.  They know and understand that they cannot succeed without knowing your innermost secrets.  If control is desired, there must be perfect knowledge about those you wish to enslave.  Individual privacy is a dagger to the heart of COOB.  To that end, governments allow and partner with large tech companies to collect and monetize data on their subscribers.  How many understand that virtually all the big mega-media companies read all your mail and rob you of your privacy, even mining your contacts simultaneously?  That allows them to create individually accessible data points defining your life in over two hundred searchable metrics, which can be bought for the right price or used to support secret government FISA Court warrants.  It can also be for an international warrant, a Justice Department warrant, or even your local prosecutor.  Remember, your information is commercial property for sale to any number of companies and groups, and your control or ability to opt out is limited in practice.

Surveillance at School Expands Through Alliance of Administrators and Tech Companies.  Millions of American children are being insensibly softened to the boundless scope of a federal surveillance state.  From hallway cameras to cameras in classrooms, American children from age 4 or 5 to 18 grow up under the never-blinking eye of the federal government.  Additionally, they are told that but for this monitoring they would be at greater risk of violence at school.  This will result in Generation Z regarding federal surveillance as no more noticeable than a cloud on a rainy day.  It is this desensitization that has drawn the attention of a new report on the growth of the schoolhouse surveillance state and the effect such an atmosphere will have on this generation.

Previously secret Homeland Security report on illegal use of smartphone location data now public.  A Homeland Security report on the illegal use of smartphone location data by multiple government agencies — including the US Secret Service — has now been made public.  The report concludes that three separate US agencies broke the law by breaching privacy protections. [...] We've known for at least three years that the US Secret Service and other government agencies were purchasing smartphone location data harvested from a wide range of apps. [...] US Customs and Border Protection was identified as another agency purchasing this data.  The questionable legality of this was raised at the time, by Democratic Senator Ron Wyden, who said that it violated the 4th Amendment.

FBI Quietly Created New Category of Extremism Ahead of 2024 Election to Include Trump-MAGA Supporters.  The FBI is beyond repair.  As the 2024 election season heats up the FBI has created a new terrorism category to include Trump supporters.  This is taking place at the same time the Biden regime is targeting President Trump with over 91 indictments on bogus criminal acts in several states.  And it occurs as the demented President screams about MAGA during his public speeches. [...] FBI whistleblower Steve Friend weighed in on the latest admission by the Deep State.  Steve Friend calls for the indictment and arrest of every single FBI and DOJ executive who took part in this scam and to abolish the FBI!  "Glad to see Newsweek reporting that everything I blew the whistle about is accurate.  The FBI used January 6th to manipulate and artificially boost its domestic terrorism stats."

Fifth Circuit to DHS: Shut down Big Brother.  Looks like another federal court doesn't support the idea that Homeland Security's writ includes America's "cognitive infrastructure."  In a unanimous ruling yesterday, the Fifth Circuit expanded bars on the Biden administration's Big Brother censorship activities, blocking the Cybersecurity and Infrastructure Security Agency (CISA) from any speech-policing communication with private-sector media platforms.  This comes from a further review of Missouri v Biden, which the Supreme Court will also take up in an ill-advised appeal by the administration to an earlier ruling: [...]

Homeland Security Publishes Guidance for Using Artificial Intelligence as Tool for Surveillance, Monitoring and Tracking of American Citizens.  You might ask, why is the Dept of Homeland Security (DHS) in the business of conducting widescale surveillance, monitoring and tracking of American citizens.  Unfortunately, if you are asking that question, then you likely don't know the first, fourth and fifth amendment to the U.S. constitution were usurped by the 2001 Patriot Act.  George W Bush and Dick Cheney created the domestic surveillance system under the auspices of DHS and the Office of the Director of National Intelligence.  Barack Obama and Joe Biden then took that DHS surveillance system and modified the dials (Justice Dept., FBI) so the surveillance only applied to their ideological enemies. [...] I find it very interesting the DHS memo was issued on August 8th, but only published for the general public yesterday.  July and August were when I first identified AI spider crawls were already underway.

Your Car Reports on Your Activities, Even Those in the Back Seat.  While you've got your eye on the road, your car has its spyware on you — and is reporting your every move back to Detroit, Tokyo, or Stuttgart.  According to a new study by the Mozilla Foundation, "cars are the worst product category" the organization has ever reviewed for privacy, collecting and reporting "how fast you drive, where you drive, and what songs you play in your car," and even whatever details they can glean about your sex life.

Almost all major businesses now use monitoring software to track workers' keystrokes and web searches.  Most businesses now use monitoring software to track workers' activity while on the clock, a new study has shown - with several such as JPMorgan tracking and penalizing employees even while in the office.  In a survey of some 1,000 business leaders across the country, ResumeBuilder.com found 96 percent of respondents working at organizations with either a remote or hybrid workforce said their firms used some form of employee-monitoring software.  Only 10 percent of those companies were doing so before the pandemic, the survey found - as firms like Google, Amazon, and Meta continue to commit to crackdowns for not spending sufficient time in their offices.

Globalists Resurrect Roman Censor to Police Public Morals.  Western governments embrace widespread censorship today because they have gained tremendous leverage over our property.  They do not need to conduct a census or inspect our farms to determine the size of our homes or the numbers of our various livestock.  They simply conduct warrantless searches of our financial transactions, recorded debts, and digitized savings — while monitoring our movements and business activities.  They do not need to formally assess our qualification for certain honors.  They simply conduct warrantless searches of our phone calls, text messages, emails, and social media histories to determine whether we are "worthy" of receiving State-bestowed group privileges or social-credit-score-enabled ranks.  They do not need to chastise us for breaching "woke" public morals.  They simply "cancel" us from the online public square and deny us access to the digital infrastructure connecting the modern world.

U.S. government to deploy surveillance software to detect 'problematic sentiment and emotion'.  The U.S. Customs and Border Protection (CBP), under the umbrella of the Department of Homeland Security (DHS), has purportedly partnered with AI tech firm Fivecast to deploy social media surveillance software that, according to its proprietor, can detect "problematic" emotions of social media users and subsequently report them to law enforcement for further action. [...] What could go wrong?  If the government is going to utilize surveillance software to more precisely ascertain our sentiments and emotions on social media, and then determine if they are "problematic," how else will it use it?  What other methods will it deploy to keep us from stepping out of line?  And who determines what is "problematic," anyway?

Don't Look Up! 'Orwellian' AI Traffic Cameras Raise Privacy Concerns.  Existing traffic cameras set up across America to find speeding and red light scofflaws are being replaced by smarter, artificial intelligence-fueled versions equipped with upgraded software that for the first time gives the government the ability to monitor behavior inside of private vehicles, raising the alarm of privacy advocates.  "The public should be rightly concerned," Electronic Frontier Foundation Senior Policy Analyst Matthew Guariglia told The Epoch Times.  "Congress has completely abdicated their responsibility to protect people's privacy."  The Biden administration's 2022 $2.2 trillion infrastructure legislation has led to a dramatic rise in new traffic cameras after federal guidance issued after the bill became law allowed many states to invest in surveillance equipment.  Previously, transportation funds allocated to states were limited to fund infrastructure projects, such as repairing roadways and bridges, with the spending of federal funds for cameras only permitted for school zones.  However, the Biden administration authorized states to utilize up to 10 percent of the bill's $15.6 billion highway safety funds to purchase cameras and other "automated traffic enforcement" tools — and many did just that.

New York Police to Use Drones to Monitor Backyard Labor Day Parties.  Kaz Daughtry, the assistant NYPD Commissioner made the announcement during a security briefing on J'ouvert, an annual Caribbean festival.  Daughtry's plan to use police drones to monitor backyard barbecues got immediate backlash from civil liberties groups.  "It's a troubling announcement and it flies in the face of the POST Act," said Daniel Schwarz, a privacy and technology strategist at the New York Civil Liberties Union, referring to a 2020 city law that requires the NYPD to disclose its surveillance tactics, according to AP.  "Deploying drones in this way is a sci-fi inspired scenario."

NYC migrant shelter neighbor says he's 'a prisoner in my own neighborhood,' after cops install surveillance cameras outside his house.  A Staten Island man who lives next door to a controversial school-turned-migrant shelter says cops seem more focused on keeping tabs on residents than the site as police beefed up security in the area Tuesday.  Scott Herkert, 53, told The [New York] Post he was baffled as he watched city workers install surveillance cameras outside his house Tuesday — rather than the shelter at the former St.  John Villa Academy in Arrochar that has already sent hundreds of ticked-off locals to the street in protest.  "I'm in a fishbowl," he said.  "I don't recognize my country anymore.  They're doing things in secret, and now I'm the one under a microscope for standing up for what I worked hard for."  "I'm a prisoner in my own neighborhood now," Herkert added.

Biden Admin Sought Power to Spy on TikTok Users, Moderate Content.  In yet another sign of the Biden Administration's determination to control, censor, and spy on American social media users, the draft of a proposed deal between Chinese-owned TikTok and the Biden administration shows the latter requesting extraordinary authority over the platform.  The proposed deal, outlined in a 100-page draft obtained by Forbes, would give the U.S. government the power to examine TikTok's servers with no notice — something that could potentially allow the government to spy on American users.

U.S. Government Now Using AI to [Interpret] 'Sentiment and Emotion' in Social Media Posts.  Customs and Border Protection (CBP), under the umbrella of the Department of Homeland Security (DHS), has reportedly been partnering with an AI tech firm called Fivecast to deploy social media surveillance software that, according to its proprietor, purportedly detects "problematic" emotions of social media users and subsequently reports them to law enforcement for further action.

California Church Sues Government Over Alleged 'Spying' on Worshippers.  On Tuesday, a California church that had previously been ordered to pay over $1.2 million in fines to the state government filed a lawsuit in federal court, claiming that the local government spied on its worshippers.  Fox News reports that the Calvary Chapel San Jose, led by Pastor Mike McClure, alleges that officials in Santa Clara County utilized the Colorado-based company SafeGraph to engage in "an invasive and warrantless geofencing operation to track residents" without their knowledge.  The lawsuit was filed on the church's behalf by the advocacy group Advocates for Faith & Freedom.  "Geofencing" refers to a location-based tool that is often used by the government to track someone through their cell phone data.  In this case, the lawsuit alleges, the local government spied on cell phones located in the vicinity of the church to determine who were regular church-goers.

Citibank Subpoenaed For Providing Biden DOJ With Private Customer Information After J6.  House Judiciary Committee Chairman Jim Jordan (R-OH) issued a subpoena to Citibank over allegations that the company provided private information of customers involved in the January 6 Capitol Hill protests to the weaponized Department of Justice.  The subpoena came after Jordan declared the bank was not cooperating with the Committee's requests to turn over crucial documentation. "The Committee and Select Subcommittee have obtained evidence showing that at least one major financial institution provided the FBI with private financial data without legal process," Jordan wrote to Sunil Garg, CEO of Citibank North America.  "Bank of America (BoA) provided the FBI — voluntarily and without any legal process — with a list of individuals who made transactions in the Washington, D.C., metropolitan area with a BoA credit or debit card between January 5 and January 7, 2021."  Jordan's letter also stated that individuals who previously bought a firearm with a BoA product were moved to the top of that list — regardless of the time or place of the firearm purchase.  The Committee alleges that the bank shared individuals' private information regarding their accounts with the FBI despite having no criminal past.

Utah and Oregon Now Require GPS Trackers on EVs in Lieu of Registration Fee, Tax Drivers by the Mile.  State governments have historically generated revenue to maintain roads, traffic lights, and the like by adding a tax at the pump.  Owing to the federal government-prodded transition to electric vehicles (EVs) to combat something called "climate change," states stand to lose out on this source of revenue as EVs obviously don't require gasoline to operate.  Utah's novel solution is to charge a "per-mile fee" for EVs with a government GPS tracker attached to monitor movement. [...] For a little added Orwellianism, the DriveSync® app also assigns a "driving score" based on how fast the slave citizen accelerates, brakes, corners turns, and drives.  The app records bad driving behavior and shows it to the slave citizen on a digital map.

The Editor says...
The same tracking system can also tell the government where you go, and how many times you've been there before.  In fact, that information might be the main idea, not the tax revenue.  Of course, your cell phone tells them where you are, too, because you never go anywhere without it, do you?

Devin Nunes:  David Weiss is Another John Durham Protective Silo - The Deep State Operation Tracks Back to Obama Weaponizing Intel and DOJ.  This interview segment is almost as if Devin Nunes reads here.  The former House Intel Committee chairman outlines the appointment of David Weiss as another DC silo creation similar in construct to John Durham.  Obviously, Nunes is correct.  Additionally, as Nunes accurately outlines the entire weaponization process traces back to when Barack Obama took office and unleashed the apparatus of the intelligence agencies to target domestic political opposition.  At the same time, Obama's AG Eric Holder created the DOJ National Security Division and then weaponized surveillance under the auspices of FARA and FISA Courts to target one side of the political dynamic.  [Video clip]  Elevator Speech:
  [#1]   The Patriot Act turned the intel surveillance radar from foreign searches for terrorists to domestic searches for terrorists.
  [#2]   Obama/Biden then redefined what is a "terrorist" to include their political opposition.

The Stifling Effect Of Living In A Surveillance State Like The USA.  How different would the script of your life be if you knew your every word might end up as part of some government dossier?  How much could you embrace freedom and focus on having fun, sowing your wild oats, finding your passion, or risking failure to pursue some crazy dream if you were constantly wondering what some government bureaucrat with the power to throw you in prison or destroy your business or take away your kids might think?  And that's true even if you didn't do anything illegal.  And that's the problem.  Since 2013's Snowden revelations, we've known the government is actively collecting reams of data on virtually all of us.  Back then, even the NY Times called it a "Threat to Democracy."  The government, against virtually the entire Bill of Rights, was and currently is looking at everything Americans do.

Woman Sues City For Arresting Her While Pregnant Based On False Facial Recognition.  A woman sued the city of Detroit following her arrest while eight months pregnant based on an alleged false facial recognition match, according to several reports.  Porcha Woodruff, 32, filed the lawsuit in the U.S. District Court for the Eastern District of Michigan, alleging wrongful arrest, The New York Times (NYT) reported.  Woodruff was arrested for robbery and carjacking back in February while eight months pregnant and getting her two daughters ready for school, per The NYT.  Woodruff, a licensed aesthetician and nursing school student, reportedly asked the officers, "Are you kidding?" given her state of pregnancy.  The carjacking victim had reportedly picked up a woman on the street and had sex with her in a liquor store parking lot.  Afterwards, the victim allegedly gave up his car at gunpoint at a gas station to a man who was allegedly waiting to pick up the same woman, The NYT noted.

America and the Common Characteristics of Authoritarian Regimes.  [#13] The Omnipresent State:  The regime wants to ensure that it is present and can monitor every aspect of the citizenry.  It could be a dietary restriction, that sounds innocuous.  It could be the monitoring of communications or financial transactions citing a terror threat.  This often leads to self-censorship on the part of citizens.  The regimes of Iran, Singapore, China, Singapore, the UAE, Vietnam, and Yemen have invasive surveillance policies.

Home Office secretly backs facial recognition technology to curb shoplifting.  Home Office officials have drawn up secret plans to lobby the independent privacy regulator in an attempt to push the rollout of controversial facial recognition technology into high street shops and supermarkets, internal government minutes seen by the Observer reveal.  The covert strategy was agreed during a closed-door meeting on 8 March between policing minister Chris Philp, senior Home Office officials and the private firm Facewatch, whose facial recognition cameras have provoked fierce opposition after being installed in shops.  In a development that ignores critics who claim the technology breaches human rights and is biased, particularly against darker-skinned people, minutes of the meeting appear to show Home Office officials agreeing to write to the Information Commissioner's Office (ICO) advocating the merits of facial recognition technology in tackling "retail crime".

NSA Reportedly Opposes Congress' Attempts to Curb Its Spying on US Citizens.  US National Security Agency (NSA) officials have been making attempts to thwart an effort by American lawmakers to effectively prevent the agency from tracking US citizens domestically without a warrant.  The amendment in question, brought forth by House Representatives Warren Davidson and Sara Jacobs, would essentially bar US agencies such as the NSA and the Defense Intelligence Agency from "purchasing data that would otherwise require a warrant, court order, or subpoena" to procure, according to a US media outlet that first reported on this matter.  The amendment has already been approved by the House during the consideration of the National Defense Authorization Act (NDAA), though it remains to be seen which policies are going to be included in the Senate version of this bill, the media outlet points out.

FBI Carried Out Warrantless Monitoring on Man Who Posted Guns for Sale on Facebook.  A Texas man who posted on Facebook that he was selling his own guns was placed under warrantless surveillance by the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF).  The ATF investigated the man, found no evidence, yet gave his information to the FBI to monitor him for at least six months.  According to internal documents reviewed by The Epoch Times, two ATF special agents interviewed the Hispanic man who admitted to "advertising" his personal firearms for sale on Facebook.  He stated that he had a "habit" of purchasing new guns, tinkering with them, losing interest, and subsequently selling them.  The man told the agents that he never made a profit.  "I kept waiting for the part where ATF identified something illegal, and it never came," Eric Olson, a lawyer for Gun Owners of America (GOA) told The Epoch Times.

This AI Watches Millions Of Cars Daily And Tells Cops If You're Driving Like A Criminal.  In March of 2022, David Zayas was driving down the Hutchinson River Parkway in Scarsdale.  His car, a gray Chevrolet, was entirely unremarkable, as was its speed.  But to the Westchester County Police Department, the car was cause for concern and Zayas a possible criminal; its powerful new AI tool had identified the vehicle's behavior as suspicious.  Searching through a database of 1.6 billion license plate records collected over the last two years from locations across New York State, the AI determined that Zayas' car was on a journey typical of a drug trafficker.  According to a Department of Justice prosecutor filing, it made nine trips from Massachusetts to different parts of New York between October 2020 and August 2021 following routes known to be used by narcotics pushers and for conspicuously short stays.  So on March 10 last year, Westchester PD pulled him over and searched his car, finding 112 grams of crack cocaine, a semiautomatic pistol and $34,000 in cash inside, according to court documents.  A year later, Zayas pleaded guilty to a drug trafficking charge.

The Editor says...
If all they're doing to capturing drug dealers, few others will object to this system.  But we've seen how this goes.  The Patriot Act was supposed to be a tool to detect and thwart Islamic terrorist attacks, but now it's a tool for spying on political opponents.  Don't give tools like this to the local cops without some oversight on the ways they use those tools.

Millions of cars daily analyzed by artificial intelligence for 'suspicious' behavior.  Dystopian surveillance is here and providing a growing market for tech entrepreneurs.  Police agencies are daily using artificial intelligence to identify "suspicious" patterns of behavior in millions of random cars caught on surveillance cameras connecting with databases of ownership, and enabling searches and arrests.  In an era with politicized law enforcement, what could go wrong? [...] [A recent] article describes the growing number of companies providing AI-powered systems of surveillance that can be hooked up to not just traffic and police cameras, but to private surveillance cameras that opt in to the system.  Connect all of these cameras to public and private databases, and we have a recipe for police to repress political opposition that even Big Brother himself couldn't dare dream of.  Imagine cops knowing that you're headed in the direction of a rally for, say, Donald Trump and that you rarely drive that way.

A Specific Type of Continuity.  As we have exhaustively outlined on these pages, the outcome of the Patriot Act was to create a system where every American was now viewed by our federal government through the prism of the citizen being a potential terrorist threat.  The federal government aligned all of our institutions and systems accordingly.  DHS was created to monitor American behavior, the TSA was created to scan American travelers, and the FBI was enhanced with resources to conduct surveillance despite our Fourth Amendment protections within our Constitution.  Instead of the U.S. Govt protecting U.S. citizens from foreign threats, the Patriot Act changed the mission of government to protect itself from potential citizen threats.  In essence, We the People became the suspects, and all of the constitutional viewpoints within the FBI and Dept of Justice were modified to create monitoring systems.

Is the FBI illegally spying on private homes and buildings?  Members of Congress recently questioned the FBI Director about, among other things, surveillance of Americans.  Congress reportedly described such surveillance as illegal.  It is not clear if Congress is aware that the FBI might not care if FBI employees do illegal things.  (It is also not clear if Congress really cares whether FBI employees do illegal things, but that is a different subject.)  The FBI apparently allows itself (and others, [...]) to commit crimes which are described as "otherwise illegal activity."

Fighting back against Smart Cities.  So-called "smart city" technology includes ultra-high resolution, internet-connected cameras, license-plate readers, facial-recognition scanners and speakers.  It will set the framework for digital eyes and ears to spy on citizens 24/7, uploading personal data in real time to be perused and analyzed by law enforcement, financial decision-makers and other third-party stakeholders. [...] The tools of the surveillance state, however, are not just being installed in major cities and international airports.  Kootenai County in North Idaho is also up against a smart city plan.  And the city of Jackson, Wyoming, last week became the latest to install AI-powered mass surveillance cameras. [...] The purpose is not to save lives but to control behavior and effectively cripple Americans' longstanding freedom of movement.  The long-term plan is to entirely automate all transportation, using driverless cars, kill switches and social-credit scoring systems to define and limit the extent to which individuals are allowed to travel.  Essentially, all transportation will be public transportation.

We're All Suspects Under the Government's Precrime Program.  We're all being targeted now.  We're all guilty until proven innocent now.  And thanks to the 24/7 surveillance being carried out by the government's spy network of fusion centers, we are all now sitting ducks, just waiting to be tagged, flagged, targeted, monitored, manipulated, investigated, interrogated, heckled and generally harassed by agents of the American police state.  Although these precrime programs are popping up all across the country, in small towns and big cities, they are not making us any safer but they are endangering individual freedoms.  Nationwide, there are upwards of 123 real-time crime centers (a.k.a. fusion centers), which allow local police agencies to upload and share massive amounts of surveillance data and intelligence with state and federal agencies culled from surveillance cameras, facial recognition technology, gunshot sensors, social media monitoring, drones and body cameras, and artificial intelligence-driven predictive policing algorithms.  These data fusion centers, which effectively create an electronic prison — a digital police state — from which there is no escape, are being built in partnership with big tech companies such as Microsoft, Google and Amazon, which helped to fuel the rise of police militarization and domestic surveillance.

A State of Martial Law: America Is a Military Dictatorship Disguised as a Democracy.  It's not just the drones, fusion centers, license plate readers, stingray devices and the NSA that you have to worry about.  You're also being tracked by the black boxes in your cars, your cell phone, smart devices in your home, grocery loyalty cards, social media accounts, credit cards, streaming services such as Netflix, Amazon, and e-book reader accounts.

How to Fix the FBI.  [Scroll down]  While Section 702 surveillance is targeted only at foreigners located outside the U.S., it does sweep in some communications involving persons in the U.S., and the FBI has improperly dipped into the 702 database more than 278,000 times to gather information on Americans for purposes having nothing to do with national security.  The subjects of these improper FBI searches have included Jan. 6 rioters, Black Lives Matter protesters, visitors to the FBI headquarters, and even donors to congressional campaigns, among others.

France To Allow Police To Spy On Citizens Through Phone Cameras and Microphones.  French police will be granted the power to spy on citizens by accessing their smartphone cameras and activating device microphones, according to a justice reform bill agreed on by lawmakers last Wednesday.  French news outlet Le Monde reported that while the bill only applies to suspects in crimes that are punishable by a minimum of five years in jail, the move has been widely condemned as a heavy-handed authoritarian "snoopers" charter.

Nationwide AI Mass Surveillance System Takes Root In Another State.  The town council of Jackson, Wyoming, agreed in a close vote last month to install the 30 solar-powered license plate recognition (LPR) cameras along their streets and traffic lights, which feeds into a centralized surveillance system managed by the private company Flock Safety.  The town is the first in the state of Wyoming to install the cameras.  Council members who agreed to the measure expressed reluctance with their decision.  Councilman Jonathan Schechter indicated his belief that the cameras marked a negative trend down an undesirable path.  "I don't like this particular arc of this particular part of history," said Schechter.  "I'm screaming 'stop' as I vote 'yes.'"  The cameras in Jackson are part of the "Falcon" line, which sends instant alerts to law enforcement.  There are different models of the AI surveillance technology, each named after birds:  Raven, an audio device for detecting sounds of crime such as gunshots, breaking glass, sawing metal, and screeching tires; Wing, which combs through thousands of hours of footage for specific vehicle identifiers for police; and Condor, which provides a live feed with zooming capabilities.

A spy in your pocket.  You knew it was coming.  I knew it was coming.  But cell phones are so darn convenient that we have been crossing our fingers and hoping it wouldn't happen.  You phone will be (already is?) spying on you.  Well, the future is here in France.  A bill just passed that will allow the government to secretly turn on your phone's camera and microphone without your knowledge.  As of now, the power to do this legally will be restricted by the need for a judge's assent, but if you think that this limitation will be respected and that it never will change, I have news for you:  your privacy is gone.  [Tweet] [...] The list of abuses the FBI has engaged in over the past few years is impressive.  Illegal searches, lying to the FISA court, opening an investigation into a presidential candidate/president based upon no evidence, intimidation of activists...   [Tweet with video clip]  Books will be written about the corruption of the intelligence apparat in the United States in the past decade or two, and the US has more legal protections for citizens than most countries.  But the abuses of power go unpunished, and when they do they multiply.  Now France is openly sanctioning turning your expensive cell phone into a snitch, and you can bet that governments around the world have been doing this for a long time without anybody knowing.

Secret map on your cell that shows you everywhere you've been — and how to disable it.  Years ago you might've been branded a conspiracy theorist for claiming your cellphone is tracking you — but not anymore.  Your iPhone has been keeping track of everywhere you've ever been, and you can view it in map form with a few clicks.  It can be quite a handy feature if you are forgetful.  For example, your phone can automatically generate directions home or find your parked car.

WHO Declares 'Infodemic,' Announces 'Misinformation' Surveillance Program.  The World Health Organization (WHO), funded primarily by the CCP and Bill Gates tag team, has been very busy getting its so-called "pandemic treaties" into place, which in effect hand over national control of a state's public health response to unaccountable multinational bureaucrats — whose interests, not unimportantly, are not shared by the populations over which they exercise authority.  Relatedly, the WHO also succeeded recently in instituting "vaccine passports" across the European Union.  Dovetailing with both of those projects of social control is the organization's declaration of war on something called an "infodemic."

Bombshell report finds Pentagon's new surveillance tools can 'pinpoint' private citizens.  In a shocking report published by The Intercept on June 17, details have emerged of a U.S. national security surveillance strategy to covertly track, locate and identify anyone expressing dissent or even dissatisfaction with the actions of the U.S. military and its leadership.  The measures, undertaken by the Army Protective Services Battalion, fall under their remit of safeguarding top generals from "assassination, kidnapping, injury or embarrassment."

The feds are buying mountains of your personal data and one day could use it against you.  Federal agencies are secretly accumulating mountains of data that could be used for "blackmail, stalking, harassment and public shaming" of American citizens.  That allegation doesn't come from a pink-haired civil-liberties fanatic — it's in a new report for the nation's chief spymaster, Avril Haines.  The Fourth Amendment recognized Americans' right "to be secure ... against unreasonable searches and seizures."  But Washington is mothballing that lofty standard for a new motto: "Those who have nothing to hide have nothing to fear."  The latest federal surveillance tsunami is being spurred by purchases of commercially available information (CAI) that private companies vacuum up from data from smartphones, computers and other digital devices and trackers.

Military Monitors Social Media for Mean Posts About Generals.  The U.S. Army's Protective Services Battalion (PSB), the Department of Defense's equivalent of the Secret Service, now monitors social media to see if anyone has posted negative comments about the country's highest-ranking officers.  Per a report by the Intercept, the PSB's remit includes protecting officers from "embarrassment," in addition to more pressing threats like kidnapping and assassination.  An Army procurement document from 2022 obtained by the Intercept reveals that the PSB now monitors social media for "negative sentiment" about the officers under its protection, as well as for "direct, indirect, and veiled" threats. [...] Per the report, the Army intends not just to monitor platforms for "negative sentiment," but also to pinpoint the location of posters.

The Editor says...
The Army brass must think we're really stupid.  If somebody was plotting an assassination, would they talk about it on social media?  Or even on the phone?

US Government Has Been Secretly Stockpiling Dirt On Americans Via Data Brokers.  The US Government has been purchasing troves of information on American citizens from 3rd party data providers, according to Wired, which cites privacy advocates who say this constitutes a "nightmare scenario." [...] The government has been using 'craven interpretations of aging laws' to bypass privacy rights, as prosecutors have increasingly ignored limits traditionally imposed on domestic surveillance.  "I've been warning for years that if using a credit card to buy an American's personal information voids their Fourth Amendment rights, then traditional checks and balances for government surveillance will crumble," according to Sen. Ron Wyden (D-OR).  During a March 8 hearing, Wyden pressed Haines to release the panel's report -- after Haines said it should "absolutely" be read by the public.  On Friday, that's exactly what happened after the Office of the Director of National Intelligence (ODNI) released it amid a battle with the Electronic Privacy Information Center (EPIC) over various related documents.  "This report makes it clear that the government continues to think it can buy its way out of constitutional protections using taxpayers' own money," said EPIC law fellow, Chris Baumohl.

The CIA Is Begging Congress to Please Keep Spying on U.S. Citizens Legal.  High-level officials from the CIA, FBI, and NSA are testifying before the Senate Judiciary Committee today, asking Congress to continue allowing the agency to spy on the communications of US citizens.  They are urging Congress to reauthorize Section 702 of the Foreign Intelligence Surveillance Act (FISA) — one of the nation's most hotly contested government surveillance programs.  Intelligence agencies have long cited the powerful 2008 FISA provision as an invaluable tool to effectively combat global terrorism, but critics, including an increasing number of lawmakers from both parties, say those same agencies have morphed the provision into an unchecked, warrantless domestic spying tool.  The provision is set to expire at the end of this year.  Federal agents urged lawmakers to reauthorize 702 without adding new reforms that could potentially slow down or impair operators' access to intelligence.

US Intel Is Stockpiling Dirt on All Its Citizens.  Wired reports that the United States government has been secretly amassing a large amount of sensitive and intimate information on its own citizens.  A group of senior advisers informed April Haines, the DNI, more than a year ago that they are accumulating data on the most minute details of Americans' lives.  In late 2021 Haines told her advisers to untangle a web of secretive business arrangements between commercial data brokers and you, US intelligence community members, reports Wired.

Report: Intelligence Agencies Buying 'Sensitive and Intimate' Data of American Citizens.  Arecently-declassified report alleges that multiple U.S. intelligence agencies have been actively "flouting the law" by gathering massive collections of "sensitive and intimate" data on American citizens.  According to the New York Post, the claims were made in a report to Director of National Intelligence (DNI) Avril Haines, which was only recently declassified and is now being amplified by watchdog groups and privacy advocates.  The report details a loophole that has allowed intelligence agencies, including the FBI, DHS, and NSA, to simply buy large troves of cell phone data for tracking purposes without needing a warrant.  If the information was paid for, the report notes, then it is technically considered "publicly available."  The government only needs to ask for a warrant if they are asking to access a cell phone's location, and thus would raise Fourth Amendment concerns necessitating a judge's approval.

U.S. Spy Agencies Buy Vast Quantities of Americans' Personal Data, U.S. Says.  The vast amount of Americans' personal data available for sale has provided a rich stream of intelligence for the U.S. government but created significant threats to privacy, according to a newly released report by the U.S.'s top spy agency.  [Paywall]

The 'Wrongthink' case against Biden could help end federal policing of public speech.  It's not every day that a federal judge asks attorneys representing the president if they've read their "1984."  Yet Judge Terry A. Doughty did just that last month, invoking the dystopian novel in questioning lawyers for President Biden, Dr. Anthony Fauci, Homeland Security Secretary Alejandro Mayorkas and other officials about their Orwellian conduct.  These are the defendants in perhaps the most consequential First Amendment case you've never heard of.  That case, Missouri v. Biden, has exposed arguably the most extensive mass-surveillance and mass-censorship regime in the history of mankind.  In so doing, it has set in motion events that could lead to that regime's collapse.

WHO to Use 'Listening Surveillance Systems' to Monitor Americans' Speech for 'Misinformation'.  Congress is launching an investigation into the World Health Organization (WHO) after details emerged of the United Nations health body's disturbing Orwellian plan to combat so-called "misinformation."  The WHO's pandemic prevention initiative, the Preparedness and Resilience for Emerging Threats (PRET), pushes plans to use "social listening surveillance systems" to monitor the public's speech for "misinformation."  However, PRET has been met with a backlash as more people start to push back against unelected bodies who are trying to suppress speech and potentially override sovereignty.  PRET aims to "guide countries in pandemic planning," according to documents from the UN agency.

Was the Durham Report a distraction to cover up something even worse?  Some recent events have caused me to pause and ask some questions about why now.  When multiple "bad" items are reported in tandem, I am often left to ask:  is this really the thing, or is it perhaps a distraction?  In the same timeframe during which the Durham report was released, we also saw a report released on the FBI FISA abuses.  We are supposed to be happy that only 278,000 unauthorized (illegal) warrantless searches occurred in 2020 and accept that the FBI has resolved this situation.  Interesting... a system created to keep tabs on foreign threats is being used to illegally spy on American citizens at an alarming rate.  And the most absurd item in the story is that we are to believe that the FBI has new processes in place that resolve this.  I would not be surprised if we learn later that they redefined the definition of searches to cut down on the number of illegal searches (think redefining gain-of-function research to say we aren't funding it).

FBI Collected License Plate Numbers of Parents Attending School Board Meetings.  During Thursday's hearing by the House Judiciary Select Committee on the weaponization of the federal government, FBI whistleblower Stephen Friend testified that he was ordered to write down the license plate numbers of parents who attended school board meetings.  Friend — a 12-year veteran of the bureau — was suspended after he refused to take part in a SWAT-style raid on a January 6 suspect who was facing misdemeanor charges last summer.  "I have an oath to uphold the Constitution," Mr. Friend, a 12-year veteran of the bureau, told his supervisors when he declined to participate in the raid on August 24, 2022.  "I have a moral objection and want to be considered a conscientious objector."  On Thursday, U.S. Rep. Matt Gaetz (R-FL) questioned the FBI whistleblowers on the bureau's "terrorism symbol guide."  The agents told Gaetz that voicing support for the second amendment, the Betsy Ross flag and writing "2A" were all among the FBI's designated domestic terrorism symbols.  Gaetz then turned his attention to Friend and asked about school board meetings.

FISA Court Report: FBI Continued to Abuse Surveillance Tool After Trump-Era Abuses.  The FBI continued to abuse a powerful digital surveillance tool even after the Bureau promised reforms following its Trump-era abuses, according to a newly-unsealed Foreign Intelligence Surveillance Court document.  The FBI misused Section 702 of the Foreign Intelligence Surveillance Act (FISA) more than 278,000 times, the Washington Post reported, "including against crime victims, January 6 riot suspects, and people arrested at protests in the wake of the police killing of George Floyd in 2020."  In one particularly egregious case, they reportedly relied on Section 702 to spy on 19,000 donors to a congressional candidate.  Section 702 is a provision of the FISA Amendments Act of 2008 that "permits the government to conduct targeted surveillance of foreign persons located outside the United States, with the compelled assistance of electronic communication service providers, to acquire foreign intelligence information."  The law, created in the aftermath of the Sept. 11, 2001 terror attacks, allows National Security Agency and FBI employees a to search a vast database of electronic communications and other information.

FBI misused controversial surveillance tool to investigate Jan. 6 protesters.  The FBI improperly searched the personal communications of Americans who participated in the Jan. 6 attack on the Capitol and the 2020 protests over police violence, newly declassified documents show.  The inappropriate searches of data intercepted under the Foreign Intelligence Surveillance Act (FISA) were originally detailed in a classified April 2021 certification issued by the court that oversees the statute and found roughly 300,000 abuses logged between 2020 and early 2021.  The Biden administration on Friday also shared a second, significantly redacted document that detailed a technique for the FBI to conduct physical searches for the first time under FISA.

FBI Misused Surveillance Tool More Than 278,000 Times Including Against Jan. 6 People, BLM, Political Donors.  The FBI has a surveillance tool that it can use to deal with foreign intelligence questions.  The tool is supposed to be used to target foreign actors, not Americans, and you are supposed to have an evidentiary basis for using it.  According to a Foreign Intelligence Surveillance Court order that came down in April 2022, but was released with redactions on Friday, the FBI misused that database more than 278,000 times.  The order was released by the Office of the Director of National Intelligence. [...] The report explained that 13 people connected to Jan. 6 were "inappropriately queried" to see if they had foreign ties.  In the case of BLM people, the FBI searched for 130 of them in the database during the 2020 riots.  Over 19,000 donors to a congressional campaign were also looked into, as well as victims of crimes, including "individuals listed in police homicide reports."  The latter included "victims, next-of-kin, witnesses, and suspects."  They didn't reveal who the congressional campaign involved.

FBI obtained Americans' bank records without subpoena: Whistleblowers.  The Federal Bureau of Investigation obtained the financial records of Americans' from Bank of America "without any legal process" following the January 6, 2021 riot, according to an interim staff report from the House Judiciary Committee and Select Subcommittee on the Weaponization of the Federal Government.  The report containing allegations from FBI whistleblowers is the subject of a select committee hearing on Thursday.  "Just like FBI whistleblowers [Garret] O'Boyle and [Stephen] Friend, retired FBI Supervisory Intelligence Analyst George Hill provided the Committee with detailed allegations of FBI civil liberties abuses," read the report, which was released ahead of Thursday's hearing.  "Specifically, he testified that following the events at the Capitol on January 6, 2021, Bank of America (BoA) gave the FBI's Washington Field Office a list of individuals who had made transactions in the D.C., Maryland, Virginia area with a BoA credit or debit card between January 5 and January 7, 2021.  He also testified that individuals who had previously purchased a firearm with a BoA product were elevated to the top of the list provided by BoA," it also read.

New York to Track Residents' Food Purchases and Place 'Caps on Meat' Served by Public Institutions.  New York City will begin tracking the carbon footprint of household food consumption and putting caps on how much red meat can be served in public institutions as part of a sweeping initiative to achieve a 33% reduction in carbon emissions from food by 2030. Mayor Eric Adams and representatives from the Mayor's Office of Food Policy and Mayor's Office of Climate & Environmental Justice announced the new programs last month at a Brooklyn culinary center run by NYC Health + Hospitals, the city's public healthcare system, just before Earth Day.  At the event, the Mayor's Office of Climate & Environmental Justice shared a new chart to be included in the city's annual greenhouse gas inventory that publicly tracks the carbon footprint created by household food consumption, the Gothamist reported.

FBI Audit Reveals 8,000 Unjustified Searches of Americans' Communications.  The FBI conducted thousands of queries on digital data collected on U.S. citizens in 2021 and 2022 despite having no warrant and no justification under the FBI's own rules, according to an internal report released on May 10.  The audit, conducted by the FBI Office of Internal Auditing (OIA), was intended to examine the agency's compliance with rules for querying data the government routinely collects on U.S. citizens under Section 702 of the Foreign Intelligence Surveillance Act of 1978 (FISA).  FISA allows the government to collect electronic data including phone calls, text messages, and emails of foreigners overseas, even if the communications involve a U.S. citizen.  U.S. agencies can then search that data in connection with national security investigations.

American Despotism.  The United States surveillance state, with no analytics to assess mountains of data, uses intelligence not for the public but for the kleptocrats' interests:  to spy on conservative media and political enemies, including President Trump.  The FBI not only peddled the fraudulent Steele dossier, it has long wasted taxpayer money for its agents to infiltrate unimportant dissident groups, entrap their members in silly plots, and then imprison them.  In the farcical plot to kidnap Michigan Governor Whitmer, five of the "militiamen," those who concocted the plot, were FBI agents or informants entrapping those they arrested. [...] Unsurprisingly, the FBI payroll funded the leaders of the Proud Boys and the Three Percenters who called for violence at the January 6 capitol riot.  Homeland Security labels the riot an "insurrection" to justify its increased surveillance over political dissidents even as it declares "white supremacy," meaning Trump supporters, the country's greatest terrorist threat.

RFK Jr.  Lays Out 3-Step Plan to Dismantle Deep State Censorship.  Democratic presidential candidate Robert F. Kennedy Jr. has announced his intent, if elected, to neutralize the ability of U.S. intelligence agencies to spy on its own citizens.  In a tweet posted Friday morning [5/5/2023], Kennedy posited that the "surveillance state" has taken a number of steps to silence dissent of U.S. foreign policy and prosecution of whistleblowers.  He promised to replace officials instructing tech companies to suspend users identified as problematic to national interests, end prosecutions of whistleblowers by the Department of Justice, and rescind policies that permit spying on American citizens.

Largest Mass-Surveillance and Mass-Censorship Program in American History Uncovered.  Just the News reports that the law firm America First Legal has filed a federal lawsuit alleging that private parties conspired with the government to target millions of Americans for pervasive censorship and surveillance.  In its introductory statement, the lawsuit asserts that the so-called "Election Integrity Partnership" and "Virality Project" constitute "probably the largest mass-surveillance and mass-censorship program in American history."  The Election Integrity Partnership and Virality Project collaborated "closely with state and federal government officials," per the lawsuit.  The defendants are monitoring and censoring social media platforms under their pressure, directives, and coercion.  The complaint was filed predominantly on behalf of Jill Hines, co-director of the consumer and human rights nonprofit Health Freedom Louisiana, and Jim Hoft, founder and chief editor of the news website The Gateway Pundit.  According to the lawsuit, both parties have been subjected to "extensive censorship" and continue to be subjected to it.

Over One Million Secret FBI Searches [were] Made in Error: Watchdog.  More than one million secret searches of Americans conducted by the FBI were made erroneously, a watchdog testified to Congress on April 27.  Around 30 percent of the approximately 3.4 million searches were done in error, Department of Justice Inspector General Michael Horowitz testified.  "It's obviously very concerning that there's that volume of searches," Horowitz told a U.S. House of Representatives subcommittee, adding that he was particularly concerned with the high error rate.  The searches in question were conducted by FBI personnel with authority under the Foreign Intelligence Surveillance Act (FISA).  The bill enables U.S. authorities to gather information on U.S. citizens suspected of being involved with possible spies or terrorists.  Some 3.39 million searches were conducted by the FBI in 2021, U.S. intelligence officials have said.  That was up from just 1.2 million in 2020.

DOJ Inspector General Reveals More than 10,000 Federal Employees Have Access to NSA Database for Surveillance Inquiries.  Office of Inspector General Michael Horowitz testified yesterday that more than 3.4 million search queries into the NSA database took place between Dec. 1st, 2020 and Nov. 30th, 2021, by government officials and/or contractors working on behalf of the federal government.  These search queries were based on authorizations related to the Foreign Intelligence Surveillance Act (FISA).  Approximately 30% of those 3.4 million search queries were outside the rules and regulations that govern warrantless searches, what the politically correct government calls "non-compliant searches."  Additionally, IG Horowitz also admitted that somewhere north of 10,000 federal employees have access to conduct these searches of the NSA database; a database which contains the electronic data of every single American, including emails, text messages, social media posts, instant messages, direct messages, phone calls, geolocation identifiers, purchases by electronic funds, banking records and any keystroke any American person puts into any electronic device for any reason.

More Than 10,000 Government Workers Can Conduct 'Backdoor' Surveillance on Americans.  Inspector General Michael Horowitz was unable to provide a clear answer when questioned by Republican Florida Representative Matt Gaetz about the number of federal government officials authorized to conduct backdoor searches on Americans using the Foreign Intelligence Surveillance Act (FISA).  Under FISA Section 702, intelligence agencies have the authority to conduct targeted surveillance on non-U.S. individuals outside the country, but this power has been misused on Americans in the past.  According to the 2022 Transparency report by the Office of the Director of National Intelligence, there were a staggering 3.4 million backdoor searches conducted in 2021.  These figures highlight the potential for abuse of FISA, and raise concerns about the privacy of American citizens.  Some Republicans in both the House and Senate have expressed opposition to the reauthorization of FISA, citing previous abuses that were exposed, in part, by Inspector General Michael Horowitz.

New York City to Track Personal Food Choices Using Credit Card Data.  Remember the crazy right-wing conspiracy theory alleging that our food purchases will be tracked to reduce our CO2 consumption?  That one is turning out to be true!  Yesterday, New York City announced its plan to track the "food choices" of New Yorkers using credit card data from individual store purchases.  According to the mayor, tracking individual food choices is a step towards "reducing the CO2 output" of New Yorkers. [...] You would think such a plan would only be made after a conversation with New Yorkers, right?  After all, the mayor of New York is supposed to serve New Yorkers, not the other way around.  However, the reality is that there was no consultation and no "conversation" because New York's mayor Eric Adams is sure that people do not even want to have a "conversation" about interrogating their food choices.

NYC's Vegan Mayor Eric Adams to Limit Amount of Meat People Can Eat to Combat Climate Change.  New York City's vegan mayor Eric Adams wants to limit the amount of meat people can eat in an effort to combat climate change.  Adams wants to reduce food-based gas emissions by 33% in the next 7 years.  "Food is the third-biggest source of cities' emissions right after buildings and transportation.  But all food is not created equal.  The vast majority of food that is contributing to our emission crises lies in meat and dairy products," Adams said.  "According to new data released by the city, 20% of the Big Apple's greenhouse gas emissions come from food production and consumption.  The mayor is now vowing to reduce the city's food-based emissions at agencies by 33% in the next seven years and challenging the private sector to follow suit."

The Editor says...
[#1] That's okay, the tourism industry in New York is dead already.  [#2]  Since the mayor is opposed to eating, because it's wrecking the earth, would he prefer to oversee a city with no restaurants?

Time to Deal with Root Causes, Not Symptoms.  [Scroll down]  There have been many stories of domestic surveillance conducted by federal agencies, as well as the weaponizing of those agencies against political enemies of the Democrat Party.  Republicans in the House of Representatives are beginning to expose some of the abuses, but nobody is talking about dealing with the root cause that enabled the spying on Americans:  The Patriot Act of 2001.  Few people know that "Patriot" is an acronym that stands for "Providing Appropriate Tools Required to Intercept and Obstruct Terrorism."  And that euphemism means domestic surveillance!  The events of 9/11 stampeded Congress to unanimously pass the Act, which refocused the vast intelligence collection apparatus built to track the actions of potential adversaries onto US citizens for the first time — all in the interests of "anti-terrorism."  The result was weakened bank secrecy laws, new types of warrants on the flimsiest of excuses, and information collection by signals intelligence and electronic surveillance systems focused on Americans on our home soil.  Other increases in the government's surveillance powers are discussed [elsew]here.  Since 2001, the domestic surveillance apparatus has been politically weaponized to go after Democrat-defined terrorists, including "white supremacists," nationalists, and Trump supporters (refer to the continuing FBI investigations of J6 protestors).  A big part of the solution is to repeal the key root cause that opened the door for politicization of federal surveillance capabilities against Americans.  Time to repeal the Patriot Act.

The West Declares War on Itself.  Politicians may feign obedience to the will of the people, but it is the people who will be forced to obey.  Power, once obtained, is not relinquished voluntarily.  A federal government that has expanded in both size and authority well beyond anything the Founding Fathers conceived will not cut its own workforce, strip itself of powers stolen from the people and the states, rein in exorbitant tax and spend policies, or submit to constitutional checks and balances long since discarded.  A national security surveillance State will not publicly admit that its obscene domestic spying network violates the heart of the Fourth Amendment's prohibition against warrantless searches. [...] If America today feels less like a free country and more like an eavesdropping system run by the NSA, CIA, FBI, and other espionage agencies, that's because it is.

IRS Looking to Buy Internet-traffic Monitoring Technology.  The IRS is in the market for technology that would give them the ability to monitor Americans' online activity.  The monitoring system sought by the IRS has already been sold by the manufacturer to the FBI and the Department of Defense. [...] Vice says the product description page claims that Recon can "trace malicious activity through a dozen or more proxies and VPNs to identify the origin of a cyber threat."  Now, the IRS would likely claim that they want to monitor internet traffic in order to prevent hackers from gaining access to the the agency's servers, and thus to protect the private data of millions of Americans from being stolen.  Anyone who has kept up with just how committed the tax collectors are to identifying and targeting groups and individuals of a conservative bent would realize that there's little to no chance that the IRS intends to use the Recon technology to defend data.  The more likely purpose for the purchase is to keep track of the online traffic of those they want to audit for being patriotic.

IRS Wants to Buy Internet Mass Monitoring Tool.  The IRS wants to purchase an internet monitoring tool from a company that has sold products to sections of the U.S. military and the FBI, according to public procurement records.  The company, called Team Cymru, provides access to "netflow" data, which can show activity on the wider internet, such as which server communicated with another.  This is information that may ordinarily only be available to the company hosting the server or the internet service provider carrying the traffic.  The news shows federal agencies' continued interest in Team Cymru's data and products.  The procurement records show the IRS also wants to buy subscriptions from a variety of cybersecurity companies, suggesting the intended use case may be defensive in nature.  In essence, Team Cymru's products let cybersecurity professionals monitor activity outside of their own networks and observe what is happening on the wider internet.  This may benefit defenders in identifying hackers' infrastructure, but multiple cybersecurity professionals have previously expressed concern to Motherboard about the sale of netflow data.

AI Firm Scrapes 30 Billion Social Media Photos, Hands Them to Law Enforcement.  One of the most notorious privacy-breaching tech companies in operation, Clearview AI, has, according to its CEO, scraped 30 billion social media photos, packaged and curated them, and passed them along to the surveillance state authorities to do with what they will (in the dark, with no oversight, naturally, as the Founders warned such authorities would if left unchecked).  Clearview's collaboration with law enforcement reportedly includes handing over information to help identify and prosecute the January 6 "insurrectionists" currently being hounded by the FBI. Let's assume for the sake of argument that all of the social media images that Clearview gave to the police depicted Americans.  With 30 billion images divided by the current American population of roughly 330 million, that's 90.9 images, on average, of every man, woman, and child in the United States that Clearview gifted the police state with — irrespective of whether or not they were ever suspected of criminal activity.

FBI Associates Slang Like 'Based' With 'Extremism,' Docs Show.  An investigation launched by The Heritage Foundation's Oversight Project found in early April that the FBI associated common social media language with "violent extremism."  Using a Freedom of Information Act request, The Heritage Foundation accessed a glossary of terms used by the FBI to flag indications of "involuntary celibate violent extremism" or "racially or ethnically motivated violent extremism," according to documents posted on Twitter.  Phrases such as "LARPing," "red pill," and "based" were all considered part of racial and ethical-extremist language, according to the documents.  The FBI also listed terms like "red pill; black pill," "rope," and "chad," as part of linguistics used by involuntary celibate violent extremism, or "incels." The document further argues that incels are those possibly wanting to "commit violence in support of their beliefs that society unjustly denies them sexual or romantic attention, to which they believe they are entitled."

The Editor says...
Thanks for the tip.  I have added these words to the list of Carnivore Trigger Words.

Nashville DA Spends $32K on Cameras to Spy On Public, Employees.  Nashville District Attorney Glenn Funk's office is under investigation by the Tennessee Attorney General for recording audio of visitors and employees without their knowledge, and spending $32,000 on cameras, according to an Open the Books investigation.  The DA's office bought $32,000 worth of cameras and supportive equipment from October 2020 to August 2021 from vendor Southern Contracting, and records show some of the cameras have audio capabilities.

Republicans lay the groundwork for 2025 indictments.  [Scroll down]  Godfather Biden is just one of many targets.  While Ted Cruz gallantly leveled Department of Homeland Security Secretary Alejandro Mayorkas over his open borders policy, House members were digging into the Go To Jail stuff on his turning his agency into one that spies on all Americans in America.  Politico reported, "Congressional Republicans are launching an investigation into an under-the-radar domestic intelligence-gathering program within the Department of Homeland Security.  "House Homeland Security Chair Mark Green (R-Tenn.), as well as Reps.  Dan Bishop (R-N.C.) and August Pfluger (R-Texas), two subpanel chairs, on Monday warned DHS Secretary Alejandro Mayorkas that the program 'raises serious concerns about the Department's overreach of its statutory mandate and potential violations of Americans' fundamental civil liberties.'  'There appears a pattern of mission creep and overreach by the Department emerging at the expense of Americans more than foreign actors who threaten the homeland,' the three GOP lawmakers wrote in a letter to Mayorkas."  The story said, "The probe comes after Politico reported last week that, under the program, officials are collecting information by questioning people within the United States and that employees within DHS' intelligence office have raised concerns that their work could be illegal, according to a broad tranche of internal documents."

A.I., Brain Scans and Cameras: The Spread of Police Surveillance Tech.  A brain wave reader that can detect lies.  Miniaturized cameras that sit inside vape pens and disposable coffee cups.  Massive video cameras that zoom in more than a kilometer to capture faces and license plates.  At a police conference in Dubai in March, new technologies for the security forces of the future were up for sale.  Far from the eyes of the general public, the event provided a rare look at what tools are now available to law enforcement around the world: better and harder-to-detect surveillance, facial recognition software that automatically tracks individuals across cities and computers to break into phones.  Advances in artificial intelligence, drones and facial recognition have created an increasingly global police surveillance business.  Israeli hacking software, American investigation tools and Chinese computer vision algorithms can all be bought and mixed together to make a snooping cocktail of startling effectiveness.

The Patriot Act on steroids: D.C. Uniparty wants to use anti-TikTok legislation as Trojan horse for censorship and surveillance.  TikTok is indeed a pestilence upon our society.  But there are right ways to go about minimizing this "digital opium" and its impact on our lives, and other means that will allow the American government to leverage the situation to further curtail our individual rights.  And unsurprisingly, the latter idea is making lawmakers in the beltway beyond giddy this week.  The Restricting the Emergence of Security Threats that Risk Information and Communications Technology (RESTRICT) Act (S.686), which was introduced in the Senate earlier this month, would do much more than just ban TikTok.  This bill is no mere "TikTok ban," it is a mechanism for a massive, sweeping surveillance and censorship overhaul.  The RESTRICT Act goes far, far beyond potentially banning TikTok.  It gives the government virtual unchecked authority over the U.S. communications infrastructure.  The incredibly broad language includes the ability to "enforce any mitigation measure to address any risk" to "national security" today and in any "potential future transaction."  The Senate legislation currently has 19 cosponsors, all of whom are Uniparty members in good standing.

Is Your Homeowner's Association Playing Big Brother Without Your Knowledge?  Apparently, it is not only local governments that will engage in tyranny.  Homeowner's associations (HOAs) have also been found to participate in some questionable practices.  In some cases, they have essentially formed their own mini surveillance states, monitoring residents — sometimes without their knowledge. [...] Communities across the United States are experiencing increased surveillance without the knowledge or consent of many residents, thanks to a partnership between police departments and private surveillance company Flock Safety, a startup founded in Atlanta in 2017 and currently valued at around $3.5 billion.  The company has strategically focused on homeowners associations (HOAs) to become one of the largest surveillance vendors in the United States.  HOAs are a prime target for Flock due to their large budgets and potential access to private gated areas that are normally out of reach for law enforcement.

Left/Right Alliance Could End Massive Domestic Spying Program.  A once highly controversial and radical law, enacted in 2008, that empowers the U.S. government to spy without warrants is once again up for renewal.  The Biden administration is demanding that the spying law be not just renewed, but renewed with no reforms or safeguards of any kind.  The entire Democratic establishment is predictably in line, as always, behind the Biden administration's demands.  But what makes all this interesting and noteworthy — and potentially newsworthy — is that the same left-right populist coalition that just united to vote in favor of Matt Gaetz's resolution to withdraw troops from Syria is starting to align again against renewal of the spying powers, meaning that, as so often happens, the establishment wings of the two parties will have to unite in defense of the U.S. Security State if Biden's demands for more powers are to be met.  In other words, if Joe Biden is to win and get the spying powers he's demanding, he'll need Republican establishment votes, presumably in large numbers, in order to do it.

CDC Bought Phone Data to Monitor Americans' Compliance With Lockdowns, Contracts Show.  The U.S. Centers for Disease Control and Prevention (CDC) purchased data from tracking companies to monitor compliance with lockdowns, according to contracts with the firms.  The CDC paid one firm $420,000 and another $208,000.  That bought access to location data from at least 55 million cellphone users.  The contracts, approved under emergency review due to the COVID-19 pandemic, were aimed at providing the CDC "with the necessary data to continue critical emergency response functions related to evaluating the impact of visits to key points of interest, stay at home orders, closures, re-openings and other public heath communications related to mask mandate, and other merging research areas on community transmission of SARS-CoV-2," the contracts, obtained by The Epoch Times, state.  The CDC said it would be using the tracking data to "assess home-by-hour behaviors (i.e. curfew analysis) by exploring the percentage of mobile devices at home during specific period of time."

The FBI Just Admitted It Bought US Location Data.  The United States Federal Bureau of Investigation has acknowledged for the first time that it purchased US location data rather than obtaining a warrant.  While the practice of buying people's location data has grown increasingly common since the US Supreme Court reined in the government's ability to warrantlessly track Americans' phones nearly five years ago, the FBI had not previously revealed ever making such purchases.  The disclosure came today during a US Senate hearing on global threats attended by five of the nation's intelligence chiefs.  Senator Ron Wyden, an Oregon Democrat, put the question of the bureau's use of commercial data to its director, Christopher Wray:  "Does the FBI purchase US phone-geolocation information?"  Wray said his agency was not currently doing so, but he acknowledged that it had in the past.  He also limited his response to data companies gathered specifically for advertising purposes.

Unconstitutional spying on Americans: Will it ever end?  Last week, the Biden administration asked Congress to permit its agents to continue to spy on Americans without search warrants.  The actual request was to reauthorize Section 702 of the Foreign Intelligence Surveillance Act of 1978.  FISA requires warrants from the FISA Court for all domestic spying.  Section 702 is a 2008 amendment to FISA.  It expressly authorizes warrantless spying of foreign persons.  The Supreme Court has characterized spying as surveillance and surveillance as a search under the Fourth Amendment.  That amendment requires search warrants issued by judges and based upon probable cause of crime demonstrated to the judges under oath and specifically describing the place to be searched or thing to be seized for the surveillance to be lawful.  Since FISA Court warrants — issued by a secret court in Washington, D.C. — are not based on probable cause of crime, and since Section 702 does away altogether with the warrant requirement when foreign persons are even peripherally involved, both FISA and its Section 702 are unconstitutional.

FBI Whistleblowers: Threat Tags Were Used to Target Conservatives.  In the latest stunning testimony from whistleblowers at the FBI, it has been alleged that the bureau actively used intelligence threat tags to label multiple groups of conservative activists as potential domestic terror threats.  According to Just The News, one such whistleblower told the House Judiciary Committee over the weekend that a terrorist threat tag originally created to target far-left activists who threatened conservative Supreme Court justices after the overturning of Roe v. Wade was ultimately flipped to the opposite purpose, and instead became a marker for pro-life activists that the FBI considered dangerous for simply protesting at abortion clinics.

The Right To Be Let Alone: When The Government Wants To Know All Your Business.  There was a time when the census was just a head count.  That is no longer the case.  The American Community Survey (ACS), sent to about 3.5 million homes every year, is the byproduct of a government that believes it has the right to know all of your personal business.  If you haven't already received an ACS, it's just a matter of time.  A far cry from the traditional census, which is limited to ascertaining the number of persons living in each dwelling, their ages and ethnicities, the ownership of the dwelling and telephone numbers, the ACS contains some of the most detailed and intrusive questions ever put forth in a census questionnaire.  At 28 pages (with an additional 16-page instruction packet), these questions concern matters that the government simply has no business knowing, including questions relating to respondents' bathing habits, home utility costs, fertility, marital history, work commute, mortgage, and health insurance, among other highly personal and private matters.

DHS has a program gathering domestic intelligence — and virtually no one knows about it.  For years, the Department of Homeland Security has run a virtually unknown program gathering domestic intelligence, one of many revelations in a wide-ranging tranche of internal documents reviewed by POLITICO.  Those documents also reveal that a significant number of employees in DHS's intelligence office have raised concerns that the work they are doing could be illegal.  Under the domestic-intelligence program, officials are allowed to seek interviews with just about anyone in the United States.  That includes people held in immigrant detention centers, local jails, and federal prison.  DHS's intelligence professionals have to say they're conducting intelligence interviews, and they have to tell the people they seek to interview that their participation is voluntary.  But the fact that they're allowed to go directly to incarcerated people — circumventing their lawyers — raises important civil liberties concerns, according to legal experts.

While you are watching your TV, your TV is watching you.  In February 2018, an analysis by the reputed magazine Consumer Reports announced that their testing revealed that the increasingly ubiquitous "smart TV" was capable of "watching" the viewer and keeping a detailed record of the viewer's TV watching patterns and related behaviour.  As more of smart devices find a place in the average home, there are other gadgets that can work in tandem with smart TVs to perform the task of "watching."  Consider, for instance, the Alexa device that responds to voice commands to perform simple tasks, including connecting with a smart TV to control the smart TV.  All such devices and functions rely on the fact that these devices always "surveil" their environment — watching with built-in cameras, listening with built-in microphones, and capturing data with built-in sensors.  Real people occupy the space that is under the surveillance of these devices.

Charter Boat Captains Don't Have To Share Their Location Data With the Government, Court Rules.  Boat-tracking regulation is a warrantless search, court says.  Can the government force charter boat captains to continuously transmit their location information to the authorities?  It seems preposterous, but the Department of Commerce and the National Oceanic and Atmospheric Administration (NOAA) this privacy-infringing protocol in 2020.  The rule required charter-boat captains to install — at their own expense — onboard monitoring systems that regularly relayed their boats' GPS locations to the government.  A group of charter boat captains represented by the New Civil Liberties Alliance (NCLA) sued, saying the rule violated rights to due process, privacy, and freedom of movement, among other things.

Twitter Coordinated with Intel Agencies.  Over the course of some 15 "Twitter Files" exposés, independent journalists also revealed the tech giant worked closely with intelligence agencies, resulting in the censorship of more speech.  As Matt Taibbi put it:  ["]The files show the FBI acting as doorman to a vast program of social media surveillance and censorship, encompassing agencies across the federal government — from the State Department to the Pentagon to the CIA.["]  "Requests poured in from FBI offices all over the country, day after day, hour after hour: Las Vegas, Los Angeles, Baltimore," Taibbi wrote, with Twitter "taking requests from every conceivable government agency, from state officials in Wyoming, Georgia, Minnesota, Connecticut, California, and others to the NSA, FBI, DHS, DOD, DOJ, and many others."  And although Twitter's new owner, Elon Musk, could only share Twitter's internal communications, that material showed the CIA — referred to under the euphemism "Other Government Agencies" in the emails — "ended up sharing intelligence through the FBI and FITF [Foreign Influence Task Force] not just with Twitter, but with Yahoo!, Twitch, Cloudfare, LinkedIn, even Wikimedia."

Facial Recognition Comes to a TSA Checkpoint Near You.  Facial recognition technology has come a long way in recent years, spurred in equal parts by convenience and the priorities of government snoops.  Now, if you plan to go a long way via air travel, you can expect to be required to stare into a camera as a computer algorithm scans your features to make sure you're no imposter.  The TSA is trying out facial recognition technology at airports as a means of ensuring that travelers are who they claim to be and speeding security lines.  It's, maybe, an improvement for impatient travelers, but even more so for the never-satisfied security state.

Madison Square Garden's facial recognition mess.  Back in 2018, the parent company of Madison Square Garden and Radio City Music Hall in New York City (MSG) began using facial recognition software tied into its security cameras at those venues.  They claimed that the system would help them identify suspected domestic terrorists and other security threats.  At the time, that sort of made sense, because those are both large arenas that pack in a lot of people, so either could be a tempting terror target.  But since then, it has come to light that MSG has been identifying and prohibiting access to more people than just ISIS wannabes.  They have singled out attorneys from every law firm representing plaintiffs who have brought lawsuits against the venues.  Others have reportedly been locked out as well.  Now New York's Attorney General has sent them a warning letter and they may have a date in court with her before long.

11,000 Police Surveillance Cars With 360-Degree Cameras and "Perimeter Alerts" To Patrol NYC.  The Wausau Police Department is already using Ford's 360-degree police surveillance vehicles to quietly surveil everyone.  According to Yahoo News the New York City Police Department (NYPD), which employs more people than the FBI, has announced it is turning all their police vehicles into 360-degree surveillance vehicles.  To put the public's mind at ease of having 11,000 spying police vehicles monitor everyone, the NYPD has decided to put QR codes on their new patrol cars.  If and when the public finally cares about losing their privacy, all they have to do is scan a police vehicle's QR code.  This will bring them to a carefully worded law enforcement website that will reassure them that the government really cares about their privacy and that 360-degree surveillance cameras are for the public's safety.  When a concerned citizen approaches a 360-degree police surveillance vehicle, they may be surprised to find out what is really happening inside.  Ford's Police Interceptors come with a factory-installed version of"Surveillance Mode" or a built-in "Police Perimeter Alert" that automatically analyzes people for officer perceived threats.  Because nothing says public safety like an AI that automatically analyzes people for so-called threatening behavior.

Will Jordan's Subcommittee Be Able to Achieve What the 'Church Committee' Couldn't?  Important and laudable as it was at the time (1975), we must conclude that the Senate's vaunted "Church Committee," under Sen. Frank Church (D-Idaho), ultimately failed in its mission to reform the CIA, FBI, IRS, and the National Security Agency (NSA) anywhere near permanently. [...] I hesitate to use Wikipedia, given its reflexive bias, but its summary of what the Church group found seems accurate:  "The most shocking revelations of the committee include Operation MKULTRA involving the drugging and torture of unwitting US citizens as part of human experimentation on mind control; COINTELPRO involving the surveillance and infiltration of American political and civil-rights organizations; Family Jewels, a CIA program to covertly assassinate foreign leaders; Operation Mockingbird as a systematic propaganda campaign with domestic and foreign journalists operating as CIA assets and dozens of US news organizations providing cover for CIA activity.  "It also unearthed Project SHAMROCK, in which the major telecommunications companies shared their traffic with the NSA (while officially confirming the existence of this signals intelligence agency to the public for the first time)."  Does any of this sound familiar?  More exactly, what part of this doesn't sound familiar?

U.K. Government spied on citizens over Covid views.  Since his first COVID related video simply titled, "Coronavirus" on January 26, 2020, [Dr. John] Campbell has produced nearly daily videos covering every aspect of the virus and the pandemic.  For three years, subscribers have watched Campbell interpret every piece of scientific data that's been released concerning both the virus and the jabs.  Methodically showing viewers news highlights fresh from his printer, and accentuating text with his fountain pen, his rational calmness and "concerned father" demeanor have established him as a trusted and steady source of valuable information.  Lately, he's questioned the safety and efficacy of COVID "vaccines" with video's such as, "Immunology of mRNA vaccines" and "Excess deaths in all age groups."  He's crafted his words carefully so as not to alarm YouTube censors.  Monday night, he began his latest video by saying he wasn't sure if he was going to post it or not.  These are heavy words from the laid-back Campbell.  Nervously scratching his head, he continued to tell his viewers that, "it turns out there's been a covert military operation observing UK citizens during the pandemic."

British army Psyops battalion monitored UK citizens.  The Sunday Mail lifted the lid — a bit — on how the COVID "emergency" prompted the government to expand domestic surveillance on politicians, journalists, and ordinary UK citizens — using their military psyops Brigade.  In effect, the program was a military operation targeting domestic dissidents, although from what we know the military component was using surveillance technology, while whatever active measures were taken to manipulate information were taken through other channels.  Most of those measures remain shrouded in mystery.

UK military spied on lockdown critics — media.  The UK Ministry of Defence has been closely monitoring the social media accounts of public figures critical of the government's Covid-19 policies since the start of the pandemic, a whistleblower told the Daily Mail newspaper on Saturday.  The claim counters repeated official denials that the government is carrying out any such surveillance.  The military's secretive 77th Brigade compiled dossiers on anyone with a sizable following who questioned the lockdowns, mandates, and predictions of doom that characterized London's response to the novel coronavirus outbreak, according to the source, who worked for the unit during the pandemic.

Why Preserve a 'World Order' without Freedom?  It is increasingly obvious that the Intelligence Community has used the PATRIOT Act and other patently unconstitutional tools at its disposal to spy expansively on American citizens here at home for their "own good."  Social media accounts, private email, search engine histories, banking transactions, location tracking, and countless other pieces of personal data are collected and monitored by the U.S. government with neither warrants nor established probable cause while politicians, judges, and private companies willingly participate in these grotesque violations of Americans' privacy and maintain the cynical pretense that Americans' rights and freedoms remain protected.  It has become fashionable now for lawmakers to demand accountability for the social media site TikTok because it is finally being correctly acknowledged as both an intelligence-gathering net and propaganda fire hose for the Chinese Communist Party.  The irony, though, is that Facebook, Twitter, YouTube, and Google Search provide the U.S. government with identical tools.  The D.C. Deep State does not mind if Americans are spied on and psychologically manipulated by government actors; on the contrary, it seeks a total monopoly on such influence operations.

Feds adapting AI used to silence ISIS to combat American dissent on vaccines, elections.  The government's campaign to fight "misinformation" has expanded to adapt military-grade artificial intelligence once used to silence the Islamic State (ISIS) to quickly identify and censor American dissent on issues like vaccine safety and election integrity, according to grant documents and cyber experts.  The National Science Foundation (NSF) has awarded several million dollars in grants recently to universities and private firms to develop tools eerily similar to those developed in 2011 by the Defense Advanced Research Projects Agency (DARPA) in its Social Media in Strategic Communication (SMISC) program.  DARPA said those tools were used "to help identify misinformation or deception campaigns and counter them with truthful information," beginning with the Arab Spring uprisings in the the Middle East that spawned ISIS over a decade ago.

Do we have rights any more?  In the past few days I have run across two different stories about how the government has been expanding its monitoring of citizens.  The first was a report from the Brennan Center for Justice, a left-leaning non-profit fighting for its vision of the rule of law under the constitution.  Many of their issues don't float my boat, and like the old ACLU, they might infuriate me while also invoking admiration for their consistent stands on the issues that matter to them.  The second was a report in the Wall Street Journal about how an Arizona non-profit set up by the Arizona Attorney General monitors millions of money transfers and shares the data with law enforcement without any legal oversight.  Both pieces highlight the expansion of the surveillance state in the US, and how "innovate" the government can get when circumventing constitutional limits on the surveillance of Americans.  The Brennan Center report focuses on the problem with "fusion centers," which were set up after 9/11 to facilitate the sharing of information among state and local governments about potential threats.  As with all such agencies and organizations, the initial idea sounds benign and even worthy of support.  The reality is often much different.

US government scooped up information on money transfers without a warrant.  International money transfers are far from private according to findings by The Wall Street Journal and Sen. Ron Wyden (D-OR).  Regular readers will know Reclaim The Net covered the start of this investigation almost a year ago.  Law enforcement in the US can access international money transfer details without a warrant through a controversial surveillance program the Arizona attorney general's office approved in 2014.  The program resulted in the creation of a money transfers database managed by the Transaction Record Analysis Center (TRAC).  The database contains the full names and amounts transferred for transactions above $500 between the US, Mexico, and 22 other jurisdictions via international money transfer services like MoneyGram and Western Union.  Money transfer services like PayPal, Venmo, Cash App, Apple Cash, and Zelle do not provide data to TRAC.

360 Degree Surveillance: How Police Use Public-Private Partnerships to Spy on Americans.  In this age of ubiquitous surveillance, there are no private lives: everything is public.  Surveillance cameras mounted on utility poles, traffic lights, businesses, and homes.  License plate readers.  Ring doorbells.  GPS devices.  Dash cameras.  Drones.  Store security cameras.  Geofencing and geotracking.  FitBits.  Alexa.  Internet-connected devices.  There are roughly one billion surveillance cameras worldwide and that number continues to grow, thanks to their wholehearted adoption by governments (especially law enforcement and military agencies), businesses, and individual consumers.  With every new surveillance device we welcome into our lives, the government gains yet another toehold into our private worlds.  Indeed, empowered by advances in surveillance technology and emboldened by rapidly expanding public-private partnerships between law enforcement, the Intelligence Community, and the private sector, police have become particularly adept at sidestepping the Fourth Amendment.

Some Information Is More Equal Than Others.  Individual data ownership is a major, underappreciated issue in the 21st century. [...] Information about where we have been, what we have bought, etc., may today be found not only on our phones but throughout the information environment we inhabit:  emails, social media, and location data all bear witness to our innermost actions.  Much of this data is used to benefit private companies and government, who have an interest in harvesting ever more of it.  Attempts to keep individual information from being commercialized by "data monarchs" has been criticized as "injecting enormous friction into free flow of information ... a significant amount of data sharing serves important public interests and values.  The friction and disruption from any system of payments for data would undermine these interests and values ... with little benefit for individual privacy."

Iran Says Face Recognition Will ID Women Breaking Hijab Laws.  Last month, A young woman went to work at Sarzamineh Shadi, or Land of Happiness, an indoor amusement park east of Iran's capital, Tehran.  After a photo of her without a hijab circulated on social media, the amusement park was closed, according to multiple accounts in Iranian media.  Prosecutors in Tehran have reportedly opened an investigation.  Shuttering a business to force compliance with Iran's strict laws for women's dress is a familiar tactic to Shaparak Shajarizadeh.  She stopped wearing a hijab in 2017 because she views it as a symbol of government suppression, and recalls restaurant owners, fearful of authorities, pressuring her to cover her head.  But Shajarizadeh, who fled to Canada in 2018 after three arrests for flouting hijab law, worries that women like the amusement park worker may now be targeted with face recognition algorithms as well as by conventional police work.

Arrest In Idaho Murders Is A Reminder That Your DNA Is Not Private Or Safe.  On Friday, police finally arrested a suspect in the savage stabbing and murder of four University of Idaho students in November.  According to law enforcement, 28-year-old criminology graduate student Bryan Christopher Kohberger was identified through DNA sourced from a public genealogy database.  Kohberger's arrest is a relief to Americans across the country, particularly the victims' families and the traumatized Moscow, Idaho community.  However, it is also a reminder that DNA technology is a dangerously unaddressed issue that poses a threat to personal freedoms, privacy, and safety.  In 2018, DNA famously helped catch Joseph James DeAngelo Jr., a serial killer, sex offender, and burglar, who terrorized Californians for more than a decade in the 1970s and '80s.  Investigators found DeAngelo via distant relatives who had used GEDmatch, a free genealogy site where users find relatives by uploading their DNA test results.

NYC Mayor Declares "Big Brother is Protecting You".  New York City Mayor Eric Adams responded to criticism over increasing the use of facial recognition technology by declaring, "Big Brother is protecting you!"  Adams made the comments in response to elected officials who expressed concerns that using such technology could lead to an all-pervasive surveillance state.  Blaming his predecessor Bill de Blasio, Adams asserted that New Yorkers felt they were living in a "state of lawlessness" and that his priority was to "stabilise" the situation.  Facial recognition technology uses surveillance cameras to flag up individuals who appear on databases of criminal suspects when they enter certain public locations, although the technology is far from perfect.

World governments using COVID-19 tech to expand global surveillance.  What he didn't know was that the feared internal security agency, the Shin Bet, was using mass surveillance technology mobilized for coronavirus contact tracing, against Israeli residents and citizens for purposes entirely unrelated to COVID-19.  In the pandemic's bewildering early days, millions worldwide believed government officials who said they needed confidential data for new tech tools that could help stop coronavirus' spread.  In return, governments got a firehose of individuals' private health details, photographs that captured their facial measurements and their home addresses.  Now, from Beijing to Jerusalem to Hyderabad, India, and Perth, Australia, The Associated Press has found that authorities used these technologies and data to halt travel for activists and ordinary people, harass marginalized communities and link people's health information to other surveillance and law enforcement tools.  In some cases, data was shared with spy agencies.

Sen. Wyden Demands Answers From FBI on Hacking of Americans' Phones.  Sen. Ron Wyden (D-Ore.) has called for the FBI to provide public disclosures about the extent of its hacking of the phones of U.S. citizens and the criteria that the bureau uses in determining when to put specialized software to use to manipulate a person's phone.  In a Dec. 20 letter to FBI Director Christopher Wray, the senator expressed a number of concerns related to the agency's acquisition of — and later, its purported decision to not use — highly specialized Pegasus software developed by the Israeli firm NSO Group for the purpose of hacking phones.  The tool can be used to infiltrate a person's phone and extract its contents without the owner's knowledge.

AP: You'll never guess what governments are doing with all of that pandemic tracking tech!  I'm so old that I remember when media outlets would have considered "extreme" any allegations that governments would abuse pandemic-tracking tools.  And yet, here we have the Associated Press reporting its scoop today that reveals precisely that outcome.  After first insisting that individual privacy had to be set aside in an emergency, the AP seems shocked, shocked to find that governments like being able to track and snoop on its subjects — er, citizens: [...] The AP spends a lot of time on China, but Beijing's tyranny began long before COVID arrived.  The Xi Jinping had begun integrating its tech tools, surveillance systems, and domestic intelligence into a "social credit" system that virtually locked down its populations years prior to the physical lockdowns that finally produced a revolt this year.  More interestingly, the AP takes note of the same encroaching domestic surveillance in other nations, countries with democratic values such as India, Israel, and Australia, which had some of the harshest lockdown measures in the Western world.  Their use of health apps turns out to be more like Big Brother, too.

A Twitter data tracker inhabits tens of thousands of websites.  Tens of thousands of websites belonging to government agencies, Fortune 500 companies and other organizations host Twitter computer code that sends visitor information to the social media giant, according to research first reported by The Cybersecurity 202.  And virtually none of them have used a Twitter feature to put restrictions on what the company can do with that data, said digital ad analysis firm Adalytics, which conducted the study.  The presence of Twitter's code — known as the Twitter advertising pixel — has grown more troublesome since Elon Musk purchased the platform.

Not Big Brother, but Close: A Surveillance Expert Explains Some of the Ways We're All Being Watched, All the Time.  A group of researchers studied 15 months of human mobility movement data taken from 1.5 million people and concluded that just four points in space and time were sufficient to identify 95% of them, even when the data weren't of excellent quality.  That was back in 2013.  Nearly ten years on, surveillance technologies permeate all aspects of our lives.  They collect swathes of data from us in various forms, and often without us knowing.  I'm a surveillance researcher with a focus on technology governance.  Here's my round-up of widespread surveillance systems I think everyone should know about. [...]

FBI tracked Jan. 6 protesters' location even if phones were in airplane mode: report.  Government entities can track individuals' smartphone geolocation data even when there's no cell service or if phones are in airplane mode, according to technology website Wired.  The confirmation came in a report about the FBI's tactics to find participants in the riot at the U.S. Capitol on January 6, 2021.  In a November 28 report, Wired investigative science and technology reporter Mark Harris highlighted evidence uncovered from January 6 court records.  According to the filings, FBI officials served a bevy of so-called "geofence warrants" to Google to access smartphone location data belonging to individuals suspected of taking part in the riot.

FBI Dragnet for Google Data Pertaining to Jan. 6 Should Concern Us All.  We saw an unprecedented effort by the government to go after those who were at the Capitol on Jan. 6, with the FBI investigating hundreds of people and employing all kinds of tactics to arrest them.  Not only did the FBI have informants who were involved, but they also employed some unusual methods.  Among the tactics in their huge investigatory effort was the "biggest-ever haul of phones from controversial geofence warrants, court records show."  According to a filing in one of the Jan. 6 cases, Google gave up information to the FBI on 5,723 devices that had been in or near the Capitol during the riot.  Geofence warrants allowed them to get anyone in the area using digital services.  There weren't that many people who were inside the Capitol.  About 900 have been charged.  So those warrants were grabbing people who had not been inside the building — they were potentially grabbing information on dissenters and/or random people who were just in the neighborhood.

Google Gives Location Data of 5,000+ Phones to Feds for Unconstitutional Jan. 6 Patriot Crackdown.  A new article from Wired has revealed that Google gave the location data of at least 5,000 phones to the federal government to help them crack down on patriots in their overreaching and unconstitutional probe over the Jan. 6 election fraud protest.  A court filing has shown that Google identified 5,723 mobile devices for the feds in order to help them charge peaceful Capitol protesters at Jan. 6.  Meanwhile, shady provocateurs caught on video inciting violence, such as Ray Epps, remain free.  Jan. 6 was the Reichstag event needed for the feds to initiate war in the domestic home front against dissidents and patriots, and Big Tech is fully on board for these treasonous affronts against the people.

A Peek Inside the FBI's Unprecedented January 6 Geofence Dragnet.  The FBI's biggest-ever investigation included the biggest-ever haul of phones from controversial geofence warrants, court records show.  A filing in the case of one of the January 6 suspects, David Rhine, shows that Google initially identified 5,723 devices as being in or near the US Capitol during the riot.  Only around 900 people have so far been charged with offenses relating to the siege.  The filing suggests that dozens of phones that were in airplane mode during the riot, or otherwise out of cell service, were caught up in the trawl.  Nor could users erase their digital trails later.  In fact, 37  people who attempted to delete their location data following the attacks were singled out by the FBI for greater scrutiny.  Geofence search warrants are intended to locate anyone in a given area using digital services.  Because Google's Location History system is both powerful and widely used, the company is served about 10,000 geofence warrants in the US each year.  Location History leverages GPS, Wi-Fi, and Bluetooth signals to pinpoint a phone within a few yards.  Although the final location is still subject to some uncertainty, it is usually much more precise than triangulating signals from cell towers.  Location History is turned off by default, but around a third of Google users switch it on, enabling services like real-time traffic prediction.

Americans Should Pay Close Attention To The FBI And Zero-Click.  Here's Why.  During the Trump administration, the FBI paid $5 million to an Israeli software company for a license to use its "zero-click" surveillance software called Pegasus.  Zero-click refers to software that can download the contents of a target's computer or mobile device without the need for tricking the target into clicking on it.  The FBI operated the software from a warehouse in New Jersey.  Before revealing any of this to the two congressional intelligence committees to which the FBI reports, it experimented with the software.  The experiments apparently consisted of testing Pegasus by spying — illegally and unconstitutionally since no judicially issued search warrant had authorized the use of Pegasus — on unwitting Americans by downloading data from their devices.

Massachusetts Illegally Installed Covid Spyware on Android Users' Phones.  A federal lawsuit alleges that the Massachusetts Department of Public Health installed Covid spyware on the Android smartphones of millions of state residents to code and trace their movements without their knowledge.  The state hid the application from users, the lawsuit says, by ensuring that it did not launch a shortcut on the phone's homescreen.  The lawsuit says the move violates the federal and state constitutions, and asks for an injunction to stop the state from spying on both their residents and those from other states who also fell victim to the scheme.

Is Facebook sharing user information with the FBI illegally?  Is Facebook secretly giving the FBI user information in violation of the the Electronic Communications Privacy Act of 1986?  Maybe, according to FBI director Christopher Ray.  He can't say for sure.  Oh.  Really?  The allegations that the FBI is doing a lot of shady things are not exactly new, although they are only sporadically covered in the MSM.  After all, the MSM likes censorship — as long as it isn't censorship of themselves.  So if the FBI is helping censor us bad people, that is probably a good thing.  [Indeed], the MSM didn't even mind when one of their own was called a spy and had his phone records seized — he was a Fox News guy, so big deal.  Besides, Obama did it so that makes it OK.

FBI deployed unconstitutional 'zero-click' Pegasus surveillance software.  During the Trump administration, the FBI paid $5 million to an Israeli software company for a license to use its "zero-click" surveillance software called Pegasus.  Zero-click refers to software that can download the contents of a target's computer or mobile device without the need for tricking the target into clicking on it.  The FBI operated the software from a warehouse in New Jersey.  Before revealing any of this to the two congressional intelligence committees to which the FBI reports, it experimented with the software.  The experiments apparently consisted of testing Pegasus by spying — illegally and unconstitutionally, since no judicially issued search warrant had authorized the use of Pegasus — on unwitting Americans by downloading data from their devices.

Security Cameras Make Us Feel Safe, but Are They Worth the Invasion?  San Francisco, long a capital of progressivism and a haven for techies, is about to embark on a citywide surveillance experiment that privacy experts warn could set a dangerous precedent.  It signifies an important moment in which anyone who owns a security camera, including popular devices like Amazon's Ring and Google's Nest Cam, should pause to reflect on some critical questions: What are we actually getting from these cameras?  What are we giving away?  Are the trade-offs worth it?  First, let me explain what's happening in San Francisco.  This week, the city will put into effect its new camera ordinance, which is aimed at helping the police investigate crimes.  The legislation, crafted by the city's mayor, London Breed, gives the police the right to request access to the live footage of privately owned internet cameras.  In the past, the police could request recorded footage from the owners of internet cameras, or they could ask the tech companies for the data.  The police say having access to live footage will enable them to respond to crimes happening in real time.

Leaked Documents Outline DHS's Plans to Police Disinformation.  The Department of Homeland Security is quietly broadening its efforts to curb speech it considers dangerous, an investigation by The Intercept has found.  Years of internal DHS memos, emails, and documents — obtained via leaks and an ongoing lawsuit, as well as public documents — illustrate an expansive effort by the agency to influence tech platforms.  The work, much of which remains unknown to the American public, came into clearer view earlier this year when DHS announced a new "Disinformation Governance Board": a panel designed to police misinformation (false information spread unintentionally), disinformation (false information spread intentionally), and malinformation (factual information shared, typically out of context, with harmful intent) that allegedly threatens U.S. interests.  While the board was widely ridiculed, immediately scaled back, and then shut down within a few months, other initiatives are underway as DHS pivots to monitoring social media now that its original mandate — the war on terror — has been wound down.

Report: Twitter and Facebook Had Regular Meetings with DHS on Censoring Americans.  Executives from Facebook and Twitter, including the recently-fired head of trust & safety Vijaya Gadde, held regular meetings with the Department of Homeland Security (DHS) to discuss censorship on a wide range of topics, including the withdrawal from Afghanistan, coronavirus, and "racial justice," according to leaked documents.  The information came to light via leaks to the Intercept, as well as documents and minutes revealed through Missouri Attorney General Eric Schmitt's lawsuit filed against the Biden Administration that alleges government collusion with Big Tech to suppress Americans' First Amendment rights.

Leaked DHS Documents Show Portal Connections Where Govt Officials Backchannel Instructions to Social Media Engineers and Conduct Surveillance.  [Scroll down] DHS gets domestic surveillance tools under the guise of 'national security'.  Meanwhile, massive social media companies get financial offsets for the extreme data processing costs associated with millions of simultaneous users.  That's the mutual benefit behind "Jack's Magic Coffee Shop."  Previously people called it a 'conspiracy theory', I didn't care, still don't, it just makes the most sense; Occam's Razor applies.  Today, all that was almost certain is now brought forth with buckets of evidence showing how social media enterprises have direct portals to DHS to transmit information and receive instructions.  It's a public-private partnership, just like it always appeared.

Signal says it will leave India if the government bans encrypted messaging.  Signal is one of the apps competing in the security and privacy-first market, offering users who put these features first encrypted communication.  Another thing Signal promises is not to collect huge amounts of data, that could then be abused by any number of malicious actors — from hackers to governments.  When governments and law enforcement criticize this kind of app or service, the argument usually comes down to those allegedly promoting less security both for a country as a whole and individuals — since criminals can also use them to safely communicate.  And as of late, another narrative in favor of undermining encryption — that of the need to stop the spread of "misinformation" — has also been gaining in popularity in those circles.  These governments, naturally, don't go into how individuals and societies are threatened by government overreach when messaging and chat apps are unencrypted and open to data harvesting and warrantless mass surveillance.

The Civilization That Knew Too Much.  [Scroll down] The digital revolution has provided the troubled states with the technical means to spy their population's activity while simultaneously giving that same public the awareness of how often they are being spied on.  Wherever one looks, whether Russia, China, Iran, the EU, Latin America or the US, this duality is evident:  there is conflict within societies as well as friction between civilizations fueled by a popular awareness of identity, grievance and controversy that could not have existed twenty years ago.  The underlying cause of both is that trust-based governance and institutional arrangements which were viable in the information-poor environment of the 20th century are hopelessly inadequate in the information-rich 21st.

The Politicization of the Department of Justice.  Now, it is bad enough to have a politically-neutral surveillance state controlled by the national security crowd and their DOJ cousins.  But take that panopticon and put it in the hands of an executive branch willing to weaponize its reams of information against its perceived political enemies, and we've got a frightening problem on our hands.  Laws such as the Patriot Act were designed to fight the unique problem of terrorism.  But they quickly morphed into a mechanism by which the government keeps constant tabs on law-abiding Americans and threatens to disrupt their lives if they dare act contrary to those in power.  And it's within this world of omnipotent oversight and control that the U.S. Department of Justice now operates.  They have all the tools of the surveillance state at their disposal, and the only thing standing in their way is an independent judiciary willing to enforce our constitutional rights.

Biden Executive Order Abolishes Constitutional Safeguards Against Spying on Americans.  Joe Biden unilaterally abolished protections preventing the federal government from spying on Americans without a warrant.  A presidential memorandum on an executive order issued on October 7, entitled "Enhancing Safeguards for United States Signals Intelligence Activities," admits that the EO removes the "the safeguards for personal information collected through signals intelligence established by Presidential Policy Directive 28 of January 17, 2014 (Signals Intelligence Activities) (PPD-28)...."  After expressly revoking the previously enacted protections against collection of domestic surveillance data without a warrant, the Biden order declares that "Signals intelligence activities shall be authorized by statute or by Executive Order, proclamation, or other Presidential directive and undertaken in accordance with the Constitution and with applicable statutes and Executive Orders, proclamations, and other Presidential directives."  Only two of the items in that list — statutes and the Constitution — have the force of law in the United States.  The latter of those two legal documents explicitly declares in fact that "All legislative Powers herein granted shall be vested in a Congress of the United States...."  That very clear language not only grants exclusive power to Congress to make laws for the union, but by implication denies such authority to the president of the United States!  Therefore, Mr. Biden, your executive orders, proclamations, and directives are of no legal effect in the union.

These Are The World's Most-Surveilled Cities.  This may come as a surprise, but it wasn't until 2007 that the global urban population overtook the rural population.  At that time, the two groups were split nearly 50/50, with around 3.3 billion people apiece.  Today, the percentage of people living in urban areas has grown to over 55%, and is expected to reach 68% by 2050.  Due to this trend, many of the world's largest cities have become home to tens of millions of people.  In response to such incredible density, governments, businesses, and households have installed countless security cameras for various purposes including crime protection.

Gates Foundation gives $200 million to help establish global digital ID system of surveillance.  The Bill and Melinda Gates Foundation recently pledged $1.27 billion toward the United Nations' openly pro-abortion 2030 Agenda goals, with $200 million going directly to aid in the creation of an invasive global digital ID system.  According to a September 21 press release published on the Gates Foundation's website, the $200 million package will be used to create an infrastructure that "encompasses tools such as interoperable payment systems, digital ID, data-sharing systems, and civil registry databases" that purports to make countries "more resilient to crises such as food shortages, public health threats, and climate change, as well as to aid in pandemic and economic recovery."  The 2030 Agenda was adopted by the UN in 2015 and establishes a set of 17 goals that are rooted in Marxist theory.  These goals, set to be achieved by 2030, aim to control the population through abortion and contraception, reduce fossil fuel consumption supposedly for the sake of the climate, and instigate a global ID system in which people's every move will be tracked and monitored.

China is using half of all security cameras in the world.  There are more than a billion surveillance cameras in operation around the world and more than half of them — roughly 540 million — are in China.  The Chinese Communist Party is actively working towards having a comprehensive profile on every single one of its 1.4 billion citizens.  They're making this goal possible by using the staggering number of active surveillance cameras in the nation, according to research from an investigation by the New York Times and ChinaFile.  For every 1,000 Chinese citizens, there are at least 372 cameras tracking their every move.

Big Brother watching?  Government agencies buying cell phone, internet data to track Americans.  In a little noted trend, law enforcement agencies at every level of government are increasingly buying data from private, third-party data brokers on Americans' phone and internet activities in order to track them, often without a warrant.  While proponents say this practice provides critical help for investigations, critics argue it poses a serious violation of civil liberties that needs to be addressed through legislation.  One of the latest revelations about this controversial public-private partnership came from the Electronic Frontier Foundation, a nonprofit dedicated to "defending civil liberties in the digital world."  EFF recently obtained a trove of records through Freedom of Information Act requests on local and state police departments, as well as federal entities, purchasing a cellphone tracking tool that can monitor people's movements going back months in time.  The tool, Fog Reveal, is a product of the company Fog Data Science, which claims it has "billions" of data points about "over 250 million" devices that can be used to learn where people work, live, and associate.

Postal Service surveilled protesters with pro-gun, anti-Biden agendas.  The U.S. Postal Service monitored protesters across the country, snooping on Americans focused on issues involving guns and President Biden's election, according to records obtained by The Washington Times.  Postal inspectors tracked the actions of gun rights activists gathering in Richmond, Virginia; people preparing to demonstrate against police in Louisville, Kentucky, after an investigation into the police shooting of Breonna Taylor; and far-right groups headed to the District of Columbia after Mr. Biden's election.  Cato Institute senior fellow Patrick Eddington obtained the heavily redacted records detailing the postal inspectors' spying from September 2020 through April 2021, including through covert social media surveillance called the Internet Covert Operations Program (iCOP).

Postal Service monitored protests in 2020 and 2021: Report.  The Postal Service surveilled protests in 2020 and 2021, specifically ones that were pro-gun and against President Joe Biden, a new report alleges.  The report from the Washington Times cites redacted documents obtained by Patrick Eddington, a senior fellow at the Cato Institute, from September 2020 to April 2021 that allegedly show postal inspectors tracking protests in various locations across the country.  The service reportedly monitored a number of protests through its social media surveillance program, the Internet Covert Operations Program.  A document shows the various bulletins posted using intelligence obtained through the program warning of protests and keeping tabs on any plans for protesting.

New York City subway trains [will be] getting security cameras.  Security cameras, which are already ubiquitous on New York's streets, will soon be installed in all of the city's nearly 6,400 subway cars as officials work to rebuild riders' faith in the system's safety.  The Metropolitan Transportation Authority plans to put two cameras in each train car in a project expected to take three years to complete, Gov. Kathy Hochul said Tuesday as she announced the effort at a rail yard in Queens.  "You think Big Brother's watching you on the subways?  You're absolutely right," said Hochul, a Democrat.

Connections, Facebook Spies on Private Messages and DHS Uses Private Chats Against J6 Detainees.  This 'surveillance system' has been of great interest to CTH for several years, in part because it is a key aspect of the domestic intelligence system now operating as a functioning part of the Fourth Branch of Government.  The overwhelming majority of the investigative resources within the Dept of Homeland Security (DHS) are used in this whole of network monitoring system.  I cannot emphasize the importance of the connections enough.  Surveillance of domestic communication, to include surveillance of all social media platforms, is now the primary mission of DHS. The information is gathered by social media, funneled by direct portals into the DHS network then distributed to DOJ-NSD and FBI officials as well as the Office of the Director of National Intelligence.  This communication surveillance network is what DHS, created as an outcome of the Patriot Act, is all about.

Big Tech Whistleblower Exposes Twitter's Close Relationship With The Chinese Communist Party.  A former Twitter executive testified to the U.S. Congress on Tuesday regarding concerns about Twitter's data security issues.  His testimony and the following Q&A with senators revealed many problems relating to the safety and security of user data, but the most disturbing revelation was Twitter's relationship with China.  Peiter Zatko, the former head of security at Twitter, was fired by the company in January of this year.  Zatko filed a whistleblower complaint with the Securities and Exchange Commission (SEC) last month, alleging the company "prioritized profits over security" and exposed Twitter users worldwide to data privacy and security risks.

Facebook spied on private messages of Americans who questioned 2020 election.  Facebook has been spying on the private messages and data of American users and reporting them to the FBI if they express anti-government or anti-authority sentiments — or question the 2020 election — according to sources within the Department of Justice.  Under the FBI collaboration operation, somebody at Facebook red-flagged these supposedly subversive private messages over the past 19 months and transmitted them in redacted form to the domestic terrorism operational unit at FBI headquarters in Washington, DC, without a subpoena.  "It was done outside the legal process and without probable cause," alleged one of the sources, who spoke on condition of anonymity.  "Facebook provides the FBI with private conversations which are protected by the First Amendment without any subpoena."

Facebook Worked With FBI to Spy on Americans Who Questioned 2020 Election.  According to Department of Justice sources, Facebook has been spying on the private messages and data of Americans who questioned the 2020 election results and reporting them to the FBI.  Since the election, Facebook has worked in conjunction with the FBI to report on "subversive" private messages, sending them to the FBI's domestic terrorism operational unit, supposedly in redacted form, a direct violation of Americans' First and Fourth Amendment rights.  "It was done outside the legal process and without probable cause," one of the sources told the New York Post.  "Facebook provides the FBI with private conversations which are protected by the First Amendment without any subpoena."  According to the Post, "These private messages then have been farmed out as 'leads' to FBI field offices around the country, which subsequently requested subpoenas from the partner US Attorney's Office in their district to officially obtain the private conversations that Facebook already had shown them."

The FBI's Apex Bureaucracy Is Dangerous.  Twenty years after the post-9/11 PATRIOT Act architecture redefined Americans' constitutional rights without amendment ratification or public permission, perhaps it is time for Americans to insist that federal officers once again deign to establish probable cause and execute valid warrants before they go snooping where they have not been invited.  Maybe it is time for citizens to recognize that with their silence and compliance, they have handed away a mountain's worth of personal liberty for an anthill's hollow promise that they would remain secure.  Any way you slice it, nothing about the expansive, entrenched, and cumbersome national security Deep State that exists today is remotely conducive to Americans' constitutional rights or personal liberties.  The surveillance state buttressed by the DOJ and FBI justifies its enduring need to violate Americans' privacy by disseminating waves of fear to the public and pretending that its existence, however unsavory, is critical for Americans' personal survival.  It is far past time for Americans to recognize this ruse as the con it is and reclaim their inherent freedoms.

US government finally unseals long-hidden rulings on mass surveillance.  The US government has finally released previously classified rulings from the Foreign Intelligence Surveillance Court (FISC), which have revealed how the secretive court interprets the Foreign Intelligence Surveillance Act (FISA), a law that allows mass surveillance of foreigners.  FISC was created by Congress in 1978 to act as a warrant court that approved the surveillance of individual foreign targets.  However, after 9/11, the court's role expanded and it started approving mass surveillance programs, some of which illegally collected data of foreigners and US citizens.  In 2015, Congress passed the USA Freedom Act, which required the government to make public all significant rulings by the FISC.  However, the executive branch argued that the USA Freedom Act did not apply to FISC rulings issued before the passing of the law in 2015.

Not Just The FBI: Institutions Across The Board Have Forfeited America's Trust.  In 2007, programs that were developed to target terrorists quickly morphed into domestic spying programs.  The NSA began capturing and monitoring Americans' electronic communications and metadata through the PRISM program.  Both John Brennan and James Clapper denied the government was monitoring American citizens and openly lied to Congress.  They were never charged with perjury, and not a single person who authorized this program was ever held accountable for this direct assault on the Fourth Amendment.  Journalists have also been routinely monitored by federal agencies making a mockery of the First Amendment. [...] What about the U.S. Postal Service's iCOP program, where postal inspectors were monitoring people's social media accounts and forwarding posts to the Department of Homeland Security?  Again, no accountability.  Federal courts have also admonished the FBI on several occasions for illegally accessing the NSA's repository for information on Americans.  Multiple intelligence and federal law enforcement agencies continue to monitor and collect the data of American citizens, including the FBI, the CIA, and ICE.  The Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) has amassed millions of records on legal firearm owners even though a gun database is strictly prohibited by Congress.

New Jersey is accused of keeping a database of DNA from babies, to use for solving crimes and more.  New Jersey police are facing a lawsuit on suspicion of obtaining blood samples taken from babies for disease screening purposes and doing this without a warrant to use the results of DNA analyses to help in investigations against the parents.  The legal action was launched by the New Jersey Office of the Public Defender (OPD) and the first hearing is set to take place on September 8.  The Office initially tried to learn more about the practice through public records law requests, but these were denied on two occasions.  Blood samples are taken from babies at birth to screen for diseases, and all states store them — some, like California, New York, Michigan, and Minnesota for a very long time — sometimes decades.  Needless to say that newborns cannot give consent for their blood samples to be used in police investigations, but what's even more jarring is that parents are also not informed about the possibility of the samples/DNA of their children being used in this way — nor are they asked for permission, i.e., given a chance to opt-out.

GCHQ experts back scanning of encrypted phone messages to fight child abuse.  Companies could police encrypted messaging services for possible child abuse while still preserving the privacy and security of the people who use them, government security and intelligence experts said in a discussion paper published yesterday [7/20/2022].  Ian Levy, technical director of the UK National Cyber Security Centre (NCSC), and Crispin Robinson, technical director for cryptanalysis at GCHQ, argued that it is "neither necessary nor inevitable" for society to choose between making communications "insecure by default" or creating "safe spaces for child abusers".  The technical directors proposed in a discussion paper, Thoughts on child safety on commodity platforms, that client-side scanning software placed on mobile phones and other electronic devices could be deployed to police child abuse without disrupting individuals' privacy and security.

The J6 Motive — The Political Surveillance of American Citizens.  After 9/11/01 the electronic surveillance system that was originally created to monitor threats from abroad was retooled to monitor threats inside our country.  That is when all of our electronic 'metadata' came under federal surveillance.  That inflection point, and the process that followed, was exactly what Edward Snowden tried to point out.  What Barack Obama and Eric Holder did with that new construct was refine the internal targeting mechanisms so that only their political opposition became the target of this new national security system.  The problems we face now as a country are directly an outcome of two very distinct points that were merged by Barack Obama.  (1)\ The post 9/11 monitoring of electronic communication of American citizens; and (2) Obama's team creating a fine-tuning knob that it focused on the politics of the targets.

RCMP admits to remotely turning on phone cameras, mics of criminal suspects.  The RCMP has admitted for the first time that it has been using spyware to infiltrate the cell phones of Canadians, including by remotely turning on the camera and microphone of suspect's phones and laptops.  The RCMP says those tools were only used in serious cases when other, unintrusive measures were not successful.

The Editor says...
The only difference between the RCMP and the FBI is that the RCMP admits they're listening to your cell phone, and the FBI brushes off such an idea as a conspiracy theory.

RCMP admits they hack Canadians' devices to spy on them.  According to Politico, the RCMP claim they only use such spyware in the most "serious cases," such as when there are national security concerns.  However, this is the first time the RCMP has openly admitted that they infiltrate mobile devices to collect data, despite having access to the technology for years.  Their admission came after a Conservative MP questioned what government programs are used to gather data on Canadians last week.  "This is a kind of capability that they have done everything possible to keep incredibly quiet," said UofT senior research associate Christopher Parsons.  "This is a remarkable finding and, for the first time, publicly reveals that the RCMP is using spyware to infiltrate mobile devices, as well as the broad capabilities of their spyware."  Parsons continues, saying that many security experts have been aware of these capabilities but that this is the first time the RCMP has admitted it.

Norway Is Tracking What Everyone Buys, And Biden Wants To Follow Suit In The United States.  A report published at the end of May by NRK, the Norwegian Broadcasting Corporation, notes that the official statistics bureau of Norway will soon track most grocery store purchases made in the Scandinavian country, a development that should serve as a warning to Americans about the growing trend in Western nations to expand surveillance and tracking of everyday citizens.  In an article titled "Statistics Norway demands to know exactly what Norwegians buy in the grocery store," reporter Martin Gundersen wrote that Statistics Norway has "ordered the grocery chains NorgesGruppen, Coop, Bunnpris and Rema 1000 to share all their receipt data with the statistical agency."  Gundersen further reports that Nets, a payment service provider that processes about 80 percent of all in-store payments, "has also been required to share detailed information on all transactions."

Norway launches new monitoring scheme to track all food purchases of private citizens.  Statistics Norway (SSB), which operates the Nordic country's data collection operations, now has a new task that involves tracking the food purchasing habits of Norwegians.  According to reports, the SSB will force all private companies — not just public ones — to hand over data on what foods people in Norway are buying, and in what quantities.  NRK says that the SSB, which collects, produces and communicates statistics related to the Norwegian economy at the national, regional and local levels, will essentially become a Big Brother entity to surveil, track and report on what Norwegians are doing at the grocery store.  "In Norway every citizen is linked to their fødselnummer (birth number), and thus the SSB is well-informed about what individuals earn, their taxes due and their criminal records," reports Free West Media.

Houston Forces Private Businesses to Install 24/7 Citywide Digital Surveillance Cameras for Warrantless Access by Police.  The Rutherford Institute is calling on the City of Houston to address glaring constitutional concerns relating to a recently adopted ordinance that requires private businesses to install citywide digital surveillance cameras that can be accessed by police without a search warrant.  The Exterior Security Cameras Ordinance, adopted by the Houston City Council on April 20, 2022, requires private businesses to purchase and install digital surveillance cameras that carry out round-the-clock, citywide surveillance on the populace while "allowing" police to access the footage at any time, for any reason, and without the need of a court-issued warrant.  In a letter to the Houston City Council, Rutherford Institute attorneys warn that the City's thinly veiled attempt to evade oversight and accountability for Fourth Amendment violations by forcing a quasi-private/public arrangement on private businesses regarding the ownership and governance of digital surveillance cameras will not likely hold up to judicial scrutiny.  "By placing the burden of round-the-clock, citywide surveillance on private businesses, the City of Houston is clearly attempting an end-run around the Fourth Amendment's warrant requirement as it relates to surveillance by government officials," said constitutional attorney John W. Whitehead, president of The Rutherford Institute[.]

Norwegian Government is Collecting Details of Personal Supermarket Purchases Through Bank Card Transactions.  Norway is a leading country when it comes to digital ID.  It is already an almost "must" to be able to live life:  for online banking and many other things, wrote Swedish journalist Peter Imanuelsen.  Now Norwegian authorities want even more control over citizens.  The Norwegian State Statistics Bureau ("SSB") already knows where people live and their income and now, they also want to monitor Norwegians' grocery store purchases.  They want to know every single food item that consumers buy.

Did you take part in the Freedom Convoy?  Maybe you were wiretapped like this retired cop.  We're going to get to the bottom of this and we're going to try to make this right.  This isn't China or Venezuela where it's perfectly acceptable for the government to spy on political dissidents.  We're going to come out this from four different angles.  First, we have to tell the story.  Because the story of the Ontario government wiretapping political dissidents is so outrageous that if we didn't have the proof documents, no one would believe it.  Then, we've got a petition that we will deliver to the attorney general of Ontario, and the federal public safety minister — if we find out the federal government was involved in this also.

Report Shows FBI Spied on 3.3 Million Americans Without a Warrant, GOP Demands Answers.  Top House Republicans are demanding answers from the FBI after court-ordered information came to light showing that the federal agency had collected the information of over 3 million Americans without a warrant.  In a May 25 letter to FBI Director Christopher Wray, Reps. Jim Jordan (R-Ohio) and Mike Turner (R-Ohio) asked Wray to explain why his agency had wiretapped and gathered personal information on over 3.3 million Americans without a warrant.  Limited authority to gather foreign intelligence information is granted by the Foreign Intelligence Surveillance Act (FISA).  Specifically, section 702 of the bill says:  "the Attorney General (AG) and the Director of National Intelligence (DNI) may jointly authorize the targeting of (i) non-U.S. persons (ii) who are reasonably believed to be outside of the United States (iii) to acquire foreign intelligence information."

Largest US high-tech facial recognition software rolled out at Miami Airport.  By 2023, all of Miami International Airport's (MIA) more than 130 gates will be equipped with facial biometric recognition technology, making it the "largest implementation of biometrics at a US airport".  Critics fear that this surveillance could undermine privacy.  "MIA says it will merely require passengers to step in front of a camera at a boarding gate and have their identity verified," reported Biometric Update magazine.  As early as 2017, the MIA started a pilot project with biometric output technology in cooperation with the US Customs and Border Protection Agency (CBP).  In 2019, a biometric output technology was introduced in cooperation with the information technology company SITA, CBP and Lufthansa.

CE has assembled a 'surveillance dragnet' with facial recognition and data, report says.  Immigration and Customs Enforcement, or ICE, "now operates as a domestic surveillance agency," according to a new report by Georgetown Law's Center on Privacy and Technology based on a two-year investigation.  The report details how, since the agency was established in post-9/11 legislation, ICE has moved beyond cooperating primarily with other law enforcement agencies to assemble an infrastructure that enables it to pull detailed information on Americans, immigrants and non-immigrants alike, with data from private data brokers and state and local governments.  ICE's "surveillance dragnet" also uses facial recognition, especially the scanning of driver's license photos for immigration enforcement, according to the report, which involved hundreds of Freedom of Information Act Requests and reviews of the agency's contracting and procurement records.  Between 2008 and 2021, ICE spent about $96 million on biometrics, a category that also includes fingerprinting and DNA testing, according to the report.

FBI opened multiple investigations into protesting parents, GOP lawmakers say.  The FBI has opened multiple investigations into parents protesting education policies, including a father who was upset over mask mandates, according to new whistleblower revelations.  The FBI's activities were publicly revealed in a letter Wednesday from Republicans on the House Judiciary Committee to Attorney General Merrick Garland.  The specifics of the FBI's investigations were disclosed to lawmakers by whistleblowers.  Garland directed the FBI and the Department of Justice to form a joint task force in October 2021 to investigate threats against school board members after the National School Boards Association asked the Biden administration in a September 2021 letter to investigate parents protesting at school board meetings as domestic terrorists under the Patriot Act.

Sen. Johnson Opens Probe Into CDC Tracking Americans Through Phone Location Data.  Senator Ron Johnson (R-WI) is investigating the CDC for tracking million of American through phone location data.  "Just because data exists, doesn't mean that the government should be using it to track Americans, I would think that that really raises some very serious constitutional issues," Senator Ron Johnson told John Solomon [...].  The Centers for Disease Control and Prevention used phone location data to track millions Americans in 2021.  The CDC monitored curfew zones, churches, schools, neighbor-to-neighbor visits and trips to pharmacies through SafeGraph, a controversial data broker.

The CDC Spied on Americans by Purchasing Location Data for Tens of Millions of Phones.  "I always feel like somebody's watching me," sang Rockwell in his catchy '80s hit.  If you feel the same way, you're probably right.  A Vice Motherboard report published Tuesday claims that the Centers For Disease Control (CDC) bought cell phone data for tens of millions of phones owned by Americans to track compliance with COVID lockdown orders and vaccination efforts.  You know things have jumped the shark when a government organization ostensibly set up to control disease resorts to spying on Americans.

FBI: Russian cyberthreat fueled almost 2M warrantless searches of Americans' data in 2021.  The threat of cyberattack from Russia fueled more than half of the FBI's 3.39 million warrantless searches of Americans' data last year, according to a government report.  The warrantless searches, legal under the Foreign Intelligence Surveillance Act, were up sharply from approximately 1.32 million reported in 2020, according to the report, published Friday by the Office of the Director of National Intelligence.  Almost all of the increase can be traced to one Russian cyberthreat to critical U.S. infrastructure in 2021.  The FBI's response to the threat accounted for approximately 1.9 million searches.

The CDC paid $420,000 to track tens of millions of cell phones and see who went to schools and churches in the pandemic.  The US Centers for Disease Control and Prevention paid for location data harvested from millions of cell phones to track compliance with COVID-19 lockdown measures, according to a new report.  The CDC paid $420,000 for a year of access to the cell phone location data from the data brokerage SafeGraph, according to documents reported by Vice News on Tuesday [5/3/2022].  The data was aggregated, meaning that it was intended to show general trends rather than the movements of specific phones, however the move still set off alarm bells with some privacy advocates.

CDC Tracked Millions of Phones to See If Americans Followed COVID Lockdown Orders.  The Centers for Disease Control and Prevention (CDC) bought access to location data harvested from tens of millions of phones in the United States to perform analysis of compliance with curfews, track patterns of people visiting K-12 schools, and specifically monitor the effectiveness of policy in the Navajo Nation, according to CDC documents obtained by Motherboard.  The documents also show that although the CDC used COVID-19 as a reason to buy access to the data more quickly, it intended to use it for more general CDC purposes.

Biden's Ministry of Truth will spy on American citizens.  In a disturbing development for freedom of speech, the Biden administration announced that it will collaborate with social media to crack down on any information that is critical of Biden's vaccination policy.  Disinformation, said Tucker Carlson, "seems to be anything the Biden administration does not want the people to know including, for example, how effective the COVID vaccines actually are and what the potential side effects might be from taking them."  You would no longer be allowed to text such information to other people.  Your private conversations would be controlled by Joe Biden and the Democrats.  "The Biden administration considers censorship applicable to private speech," said Carlson.  To add insult to injury, we have a new development that frankly is beyond my comprehension.  The president has created an information czar to spy on American citizens.  Biden is establishing what he calls the Disinformation Governance Board as part of the Department of Homeland Security.

More about Ministry of Truth.

The FBI may have conducted as many as 3.4 million searches of Americans' electronic data without a warrant last year.  The Federal Bureau of Investigation may have conducted as many as 3.4 million searches of Americans' elecronic [sic] data without a warrant last year.  The Wall Street Journal first cited the number Friday [4/29/2022], saying it came from an annual report published by the Office of the Director of National Intelligence.  The report doesn't allege that the FBI was illegally or improperly searching American data, but still could alarm members of Congress over privacy concerns.

Biden Regime Announces Creation of "Disinformation Governance Board" Under the Authority of Homeland Security with a Lunatic in Charge.  Following Elon Musk's purchase of Twitter last week, which was a triumphant victory in the ongoing war over free speech, the Biden Regime announced the creation of a "Disinformation Governance Board" that will be tasked with silencing anything deemed to be misinformation that's related to homeland security.  And, yes.  It's just as dystopian and creepy as it sounds.  The new board will operate under the authority of the Department of Homeland security with a special focus on Russia and "irregular migration," according to the Post Millennial.

Former Intel Officials Want Efforts to Break Up Big Tech Stopped.  Former Obama era intelligence officials, those who helped construct, organize and assemble the public-private partnership between intelligence data networks and supported social media companies, have written a letter to congress warning that any effort to break up Big Tech (Twitter, Facebook, Instagram, Google, Microsoft, etc.) would be catastrophic for the national security system they have created.  Citing the information control mechanisms they assembled, vis-a-vis the ability of social media networks to control and approve what is available for the public to read and review, the intelligence officials declare that any effort to break up the private side of the intel/tech partnership will only result in less ability of the intelligence apparatus to control public opinion.  They willfully admit that open and uncensored information is adverse to the interests of the intelligence state and therefore too dangerous to permit.  They specifically argue, if the modern system created by the partnership between the U.S. government and Big Tech is not retained, the national security of the United States is compromised.

Pentagon Throws Privacy Out the Window as They Launch Surveillance Balloons in the Midwest.  Irrespective of privacy concerns from The American Civil Liberties Union of South Dakota, the Pentagon has decided to launch solar powered balloons across six different states this Friday.  These balloons are intended to be a persistence surveillance system in order for the Pentagon to track narcotics and Homeland Security threats.  This is according to the filing with the Federal Communications Commission.  The Federal Communications Commission authorized these balloons to be launched into high altitude on July 12th.  This is considered an experimental special temporary authorization.  About two dozen balloons will be carrying radars that can track vehicles over 25 square miles beneath them in the states of Iowa, Minnesota, Wisconsin, Illinois and Missouri. [...] It is unknown if this is just a test or if it is actually a real time investigation.  Additionally, it is unknown what information will be recorded exactly, what will happen to the information that is gathered during this event, and who will have control of the information after this event.  Information such as what vehicles are driving to where and at what time.

Project Veritas:  DOJ Secretly Spied on Journalists' Apple and Google Accounts.  Project Veritas on Wednesday [4/13/2022] revealed the DOJ secretly spied on journalists' Apple and Google accounts.  "Apple and Google have come forward to disclose that between November 2020 and March 2021, the Department of Justice issued nine secret subpoenas and warrants to them for the private information of Project Veritas journalists." Project Veritas reported.  The DOJ also compelled Apple and Google to keep quiet about the spying.  The DOJ was able to access journalists' browsing history, payment information and other personal information, James O'Keefe said.

Ten Steps to Totalitarianism.  Does anybody still think totalitarianism can't happen here?  Ask yourself how many of these steps we've already galloped past. [... #10] Digital Identity Tracking:  What started with Obamacare and socialized medicine and quickly expanded with Democrat cities' experimentation with COVID-19 digital passports is set to go into overdrive with the introduction of central bank digital currencies.  If government-issued cyber-monies replace the relative anonymity of physical cash, then no purchase, donation, or investment can be free from the prying eyes of the State.  Combined with government control over health care and the imposition of mandatory digital IDs, the State will have created the perfect surveillance system.  When all human activity is monitored and social credit scores are the norm, personal choice disappears.

Post office social media surveillance program found to be illegal.  A review conducted by the Postal Service Office of Inspector General found that the Postal Service surveillance program iCOP exceeded its legal authority by surveilling Americans during protests between 2018 and 2021.  In 2021, Yahoo News reported the existence of the secret program, prompting outrage from lawmakers and constitutional experts who noted the program operated without oversight from Congress.  Soon after the Yahoo News' report, Congress requested the Inspector General's office to launch an investigation into iCOP (Internet Covert Operations Program).  "We determined that certain proactive searches iCOP conducted using an open-source intelligence tool from February to April 2021 exceeded the Postal Inspection Service's law enforcement authority," the March 25, 2022, Inspector General report stated.

Project Veritas scandal sparks scrutiny of federal courts' secret spying warrants.  The recent covert seizures of Project Veritas emails has led to new criticism from conservatives and civil rights groups alike of law enforcement's use of Big Tech companies to spy on the communications of journalists and media organizations.  The Trump-era Department of Justice, which was investigating the theft of Ashley Biden's diary during the 2020 election campaign, forced Microsoft to turn over emails from nine accounts associated with Project Veritas, according to court filings from the project that Microsoft confirmed.  Project Veritas, an investigative reporting project led by James O'Keefe and known for its controversial sting operations over the years, claims the government spying on it using gag orders is an infringement of the First Amendment and retribution for O'Keefe's investigations.

Court Won't Hear Merits of EPIC Suit Challenging Secret Postal Service Surveillance Program.  A federal district court on Friday dismissed EPIC's lawsuit challenging a secret surveillance program run out of the law enforcement wing of the Postal Service, reasoning that EPIC did not suffer a "cognizable injury in fact" from the Service's unlawful refusal to disclose information about the program.  In EPIC v. USPS, EPIC is seeking to enforce privacy protections in the E-Government Act of 2002 against the Postal Inspection Service.  In recent years, agents from the Internet Covert Operations Program (iCOP) have used facial recognition, social media monitoring tools, and other advanced surveillance technologies to infiltrate online communities and monitor protests.  The Postal Inspection Service used these tools without undertaking and publishing a privacy impact assessment, as required by the E-Government Act of 2002.

The O'Keefe Project:  All is in order edition.  We only learned this week that the FBI and Southern District prosecutors have had James O'Keefe and Project under surveillance in the case of Ashley Biden's diary roughly since President Biden was sworn in.  I wrote about the related court orders [on] (March 22) and [on] (March 23).  This surveillance was in addition to the raids executed by the FBI this past November and subsequently leaked to the friends of the national security establishment at the New York Times.  I take it that the government is out to get Project Veritas.  Yesterday [3/24/2022] the government responded to the motion filed by O'Keefe and Project Veritas this past Wednesday. [...] According to the government, they dotted every "i" and crossed every "t."  All is in order.  I can only say that if I were Judge Torres, I would feel that the government has been inexcusably disingenuous and that if I were James O'Keefe I would be worried about what comes next.

NYPD Sued Over Illegal Collection And Storage Of Citizens' DNA.  The NYPD's DNA database is comprised of an ever-growing number of genetic profiles of thousands of innocent New Yorkers, including children, a lawsuit alleges.  The Legal Aid Society, in a suit filed Monday [3/21/2022] in Manhattan Federal Court, is asking a judge to declare unconstitutional the "practice of secretly taking, analyzing and maintaining peoples' DNA in its suspect index."  The public defenders group seeks an order the NYPD expunge those DNA files and records.  There are 31,826 DNA profiles in the database at last count, according to the suit.  The database, which is maintained by the Office of the Chief Medical Examiner, has been the subject of much debate the past few years.

Project Veritas says feds secretly accessed its emails.  A group that has singled out journalists and Democrats in undercover operations contends that prosecutors misled a federal court and sought unwarranted gag orders during a federal investigation of the group's ties to the alleged theft of a diary belonging to President Joe Biden's daughter Ashley.  In November, the FBI conducted predawn raids at the home of Project Veritas founder James O'Keefe and the homes of two other individuals who worked with the group.  The agents acted with warrants that allowed them to seize phones and computers to search for evidence of trafficking in interstate property.  The raids generated controversy in some circles because Project Veritas identifies itself as a news organization and the use of search warrants against journalists and news outlets is extremely rare due to Justice Department policies and a federal law passed in 1980 to limit such investigative steps.

The O'Keefe Project:  Surveillance edition.  I infer from yesterday's New York Times story that the FBI is working with prosecutors in in the Office of the United States Attorney for the Southern District of New York to nail James O'Keefe and Project Veritas.  Given the bylines of Michael Schmidt and Adam Goldman on the Times's coverage, I see the Times as the public relations arm of the operation.  The SDNY first obtained a warrant and grand jury subpoena for documents from Microsoft in November 2020, some two weeks after the election.  The FBI has had Project Veritas under some form of surveillance since January 2021.  The surveillance has been conducted under previously sealed search warrants and court orders prohibiting Microsoft from disclosing it to Project Veritas.  Eight Project Veritas journalists (and the organization's human resources officer) have been subject to the surveillance.

DOJ collected Project Veritas emails but didn't reveal it to federal judge overseeing case.  An attorney for Project Veritas sent a letter to District Court Judge Analisa Torres accusing the Department of Justice of sidestepping her prior rulings designed to protect the journalistic and attorney-client privileges of the organization.  Microsoft recently revealed that the DOJ had previously seized Project Veritas documents from a cloud account using a warrant which was not revealed to the court and which Microsoft was forbidden from revealing until recently.  At the base of all of this is the FBI investigation into how Project Veritas wound up in possession of Ashley Biden's diary.

DOJ collected Project Veritas emails but didn't reveal it to federal judge overseeing case.  An attorney for Project Veritas sent a letter to District Court Judge Analisa Torres accusing the Department of Justice of sidestepping her prior rulings designed to protect the journalistic and attorney-client privileges of the organization.  Microsoft recently revealed that the DOJ had previously seized Project Veritas documents from a cloud account using a warrant which was not revealed to the court and which Microsoft was forbidden from revealing until recently.

A Great Reset Is Already Underway in Utah.  [Scroll down]  Abuse here is not just likely; it's inevitable, Clapper's faux reassurances notwithstanding.  Ironically, the Bluffdale paradigm and curtailment surveillance was born out of the ashes of Islamist 9/11 infamy.  The literal response to Islamic religious fanaticism is now virtual digital fascism.  Who wins that fight?  To be sure, Orwellian spying is possible only with industrial-scale collaboration.  The Davos crowd was in on the meta-mega-collection paradigm caper from the start.  Here, the tradeoffs are obvious:  big data in exchange for a laissez-faire internet.  Uncle Sam now has access to communications and internet "back doors" across the world, and that includes all commercial and domestic digital scat at your house, coast to coast.

DHS Collected Americans' Financial Records in Bulk:  Sen. Wyden.  The Department of Homeland Security (DHS) has collected Americans' financial records in bulk, according to Sen. Ron Wyden (D-Ore.).  Wyden revealed the existence of a DHS financial surveillance in a March 8 letter to the department's inspector general, calling for an investigation into the previously unknown activities.  Wyden said he recently learned that Homeland Security Investigations (HSI) — a law enforcement component of DHS — was operating an "indiscriminate and bulk surveillance program that swept up millions of financial records about Americans."  "After my staff contacted HSI about the program in January 2022, HSI immediately terminated the program," Wyden wrote to DHS Inspector General Joseph Cuffari.  The senator said his office was briefed by HSI on Feb. 18 — the first time Congress has been told about the program.

States sue Biden admin over FBI surveillance of parents protesting school boards.  Thirteen states have signed on to a Freedom of Information Act lawsuit seeking Biden administration records on any FBI surveillance of parents protesting school boards.  Indiana Attorney General Todd Rokita, a former member of Congress, has taken the lead in the lawsuit against President Biden, Attorney General Merrick Garland and Education Secretary Miguel Cardona, citing a failure of U.S. officials to honor FOIA requests.  The Indiana attorney general previously demanded all communications and records relating to the FBI's decision to investigate violent threats against local education officials.  "We just want the facts," Rokita told Fox News Digital.

A School District Spied on Parents and Reported Social Media Activity to Their Employers.  Apparently, we have a school district that spied on parents, compiled a dossier of their social media activity, and reported such activity to the employers of these problematic parents.  And by 'problematic', I mean, they were politically conservative.  This little spy game was conducted by Rochester Schools, which is located outside Detroit.  Elena Dinverno, a parent, filed a lawsuit in 2021.  The Center Square has more, but this operation is straight-up insane.  Dinverno alleges that the school district's harassment led to her employment being terminated.

Rochester Schools collect dossier, call employers on critical parents.  Rochester Community School (RCS) officials were sued for compiling a dossier on parents who commented negatively on the school's virtual learning policy.  One official even called a parent's employer, which possibly resulted in the parent's termination.  Parent Elena Dinverno sued the district in 2021, claiming school officials called her place of work in the fall of 2020, and told her employer Dinverno was part of a group threatening the school district.  She was fired in December 2020.  The Detroit News first reported the story.  A lawsuit filed on May 3, 2021, claims Dinverno advocated on two separate Facebook groups to reopen schools in-person:  "RCS Parents for In-Person Education" and "Conservative Parents for Rochester."  Dinverno asked other parents for video testimony of how virtual school was hurting kids.

Supreme Court Sees Nothing Wrong with Prolonged, Warrantless Spying of One's Home by Police Using Hidden Cameras.  The U.S. Supreme Court has refused to stop police from using hidden cameras to secretly and warrantlessly record and monitor a person's activities outside their home over an extended period of time.  In refusing to hear an appeal in Travis Tuggle v. U.S., the Supreme Court left in place a lower court ruling which concluded that no "search" in violation of the Fourth Amendment had occurred because the private activity recorded by the hidden surveillance cameras took place in public view.  The Rutherford Institute and the Cato Institute had filed an amicus brief in Tuggle warning that without adequate safeguards in place, there would be no turning back from the kinds of intrusions posed by such expansive, ever-watching surveillance technology capable of revealing intimate details of a person's life.

Court Chides F.B.I., but Re-Approves Warrantless Surveillance Program.  For a second year, the nation's surveillance court has pointed with concern to "widespread violations" by the F.B.I. of rules intended to protect Americans' privacy when analysts search emails gathered without a warrant — but still signed off on another year of the program, a newly declassified ruling shows.  In a 67-page ruling issued in November and made public on Monday [9/20/2021], James E. Boasberg, the presiding judge on the Foreign Intelligence Surveillance Court, recounted several episodes uncovered by an F.B.I. audit where the bureau's analysts improperly searched for Americans' information in emails that the National Security Agency collected without warrants.  Rather than a new problem, however, those instances appeared largely to be additional examples of an issue that was already brought to light in a December 2019 ruling by Judge Boasberg.  The government made it public in September.

CIA spying on Americans and their collaborators.  In the past month, this column has twice addressed the unbridled propensity of federal intelligence agencies to spy on Americans without search warrants as required by the Fourth Amendment to the U.S. Constitution.  These agencies believe that the Fourth Amendment — which protects the individual right to privacy — only regulates law enforcement and does not apply to domestic spying.  There is no basis in the constitutional text, history or judicial interpretations for such a limiting and toothless view of this constitutional guarantee.  The courts have held that the Fourth Amendment restrains the government.  Period.  Last week, Congress got burned when the CIA released a heavily redacted summary of its current spying in the United States.

The CIA Got Caught Spying On Americans Again.  It's Time For Congress To Make Them Stop.  Nearly a decade ago, Edward Snowden dropped a series of bombshell revelations on the world, chief among them revealing the presence of the PRISM program: a constitutionally dubious surveillance program under which the National Security Agency, Federal Bureau of Investigation, and Central Intelligence Agency gather and search through the emails, internet calls, photos, and chats of Americans without obtaining a warrant, usually through the backdoor of America's major tech companies.  In response, Congress passed the USA Freedom Act in 2015, a bill that amended the Foreign Intelligence Surveillance Act (FISA) to ban the bulk collection of Americans' telephone records and internet metadata under Section 215 of the PATRIOT Act.  In its place, Congress authorized more targeted measures subject to transparency, declassification, and reporting requirements.

CIA has secret program that collects Americans' data, senators say.  The CIA has a secret, undisclosed data repository that includes information collected about Americans, two Democrats on the Senate Intelligence Committee said Thursday.  While neither the agency nor lawmakers would disclose specifics about the data, the senators alleged the CIA had long hidden details about the program from the public and Congress.  Sens. Ron Wyden of Oregon and Martin Heinrich of New Mexico sent a letter to top intelligence officials calling for details about the program to be declassified.  Large parts of the letter and documents released by the CIA were blacked out.  Wyden and Heinrich said the program operated "outside the statutory framework that Congress and the public believe govern this collection."

Maryland Legislature Considers Creating 'Advisory Council' to Collect Data on Homeschoolers.  If we have learned anything about left-wing cultural revolutionaries over the past few years and decades, it's that they insist that all conform to their view of "diversity."  All are welcome, except for those who disagree.  That's why it's so troubling to see government authorities rope in, and attempt to control, people attempting to maintain their independence.  Maryland Delegate Sheila Ruth, a Baltimore County Democrat, recently proposed legislation in the Maryland House of Delegates that would create a deeply worrisome "advisory council" to watch over and gather data on homeschool families.  The 16-seat council would be staffed by four political appointees, four government officials, and eight members of the homeschool community.  It would "gather information on the needs of homeschool parents and homeschool umbrella schools," and would effectively sweep homeschool parents under the wing of a government agency.

IRS Wants Bio Data from Phones & Computers for ID Which Can Then Be Used As Evidence.  The new IRS face-scanning system will require taxpayers to use their phones or computers to submit biometric data.  And according to the IRS, "Mobile phones are used as a piece of identity evidence themselves" noting that "Geolocation can be gleaned from the Mobile Network Operators (MNOs) in the event of an investigation into a user."

U.S. accused of procuring Israeli spyware that surveils through smartphones.  The U.S. intelligence community is accused of acquiring spyware technology from the Israeli tech firm NSO Group that could snoop on just about anyone through their smartphone.  The alleged procurement of the technology came before the Biden administration blacklisted the tech last year.  NSO Group's Pegasus product allows access to a smartphone user's messages, camera, and microphone without action by the victim, according to the Pegasus Project, an investigation organized by the news outlet Forbidden Stories.  Pegasus has attracted attention from surveillance-focused watchdogs and from governments interested in becoming users.

FBI considered using Pegasus spyware for US domestic surveillance.  A new report uncovers how Israel used the NSO Group's infamous Pegasus iPhone hacking tool, and how the FBI secretly bought it.  It has previously been reported that Israeli police have used the Pegasus spyware against its own citizens, and done so without legal oversight.  Now the New York Times has released the results of a year-long investigation into the company behind the Pegasus spyware, including how the US considered using it and a more advanced tool.  According to the full report, and a New York Times summary of it, the FBI secretly bought Pegasus spyware in 2019. The NSO Group also reportedly gave the agency a demonstration of Phantom, a newer tool which was able to hack American phone numbers.

The Vaccine Passport Pathway to a Social Credit System.  Simply put the vaccine programs are really population control programs, because by pushing vaccines the elites are pushing vaccine passports which are the first step to creating digital ID numbers on a software platform where every subject's personal information will eventually end up.  Control of information means control of the subjects.  The real-life model for this is the Chinese social credit system.  This system is, through the totalitarian perspective, a brilliant combination of national digital identification numbers combined with high surveillance technology all controlled by advanced artificial intelligence.  Each Chinese subject is branded with a digital number and the surveillance state can follow his employment, medical, criminal and schooling records, his online browsing records, his voiced political views, and even the places he visits through GPS positioning technology. If the subject so much as jaywalks across a street, it will likely be picked up by one of the millions of surveillance cameras installed in Chinese cities and run through face recognition software.

Fight the American Stasi with Mockery.  In a 2019 article for The Atlantic, "The Lingering Trauma of Stasi Surveillance," Charlotte Bailey explores how many of the thousands of Germans who were victims of the The Ministry for State Security — commonly known as the Stasi — still suffer from psychological trauma. [...] The Stasi, Bailey writes, "wiretapped, bugged, and tracked citizens.  It steamed open letters and drilled holes in walls.  It had nearly 200,000 unofficial informers and hundreds of thousands more occasional sources providing information on their friends, neighbors, relatives, and colleagues. [...] The record of your permanent digital footprint and the growing power of tech companies such as Facebook, Google, and YouTube mean that just a few companies have more information about you, and power over you, in 2022 than the Stasi could ever have imagined.  With an entire spy apparatus available on their phones, students snitch on each other.

China harvests masses of data on Western targets, documents show.  China is turning a major part of its internal Internet-data surveillance network outward, mining Western social media, including Facebook and Twitter, to equip its government agencies, military and police with information on foreign targets, according to a Washington Post review of hundreds of Chinese bidding documents, contracts and company filings.  China maintains a countrywide network of government data surveillance services — called public opinion analysis software — that were developed over the past decade and are used domestically to warn officials of politically sensitive information online.

Do Democrats Want to Build Back Better, or Do They Want a Coup?  In the so-called Build Back Better (BBB) legislation, the leftist cult now in power (albeit marginally) wants to double the size of the IRS by adding 86,000 agents.  The net result of this incredible increase is not to increase oversight, but to weaponize the IRS as an instrument of public intimidation.  Just as conservative political organizations were targeted by the IRS during the Obama administration, the present desired expansion will allow for more harassment and fines of individuals in our new surveillance society.  Does anyone really think surveillance of individuals in our society and world is just paranoia?  Haven't we seen, if we message a friend on Facebook or in an email about looking for insurance, that, suddenly, ads for insurance start appearing on our Facebook accounts?  The surveillance society is already here.  It's just a question of the extent to which that expertise will be applied to monitoring our daily lives.  The doubling of the IRS, I propose, is a giant step toward extending the surveillance state.

Internal Amazon Documents Show Alexa Owners Aren't Using Devices.  According to a recent report, Amazon is aware that many owners of its Alexa devices are not using them after as little as two weeks of use.  According to internal documents viewed by Bloomberg, as many as 25 percent of Amazon's smart home assistants become expensive paperweights just weeks after being activated.  A recent report from Bloomberg reveals that Amazon knows that users of its Alexa devices are not utilizing the full capabilities of the smart home assistant, and often are becoming bored with the device as quickly as two weeks after getting it.

The Editor says...
If you get tired of it, don't just ignore it.  Pull the power cord, so it won't keep listening and/or recording everything you say.

The AP would like to know why DHS is tracking journalists.  Over the weekend, we learned that a special unit of Customs and Border Protection had been using sensitive government databases (designed to track terrorists) to monitor several American journalists, congressional staffers, and potentially even some members of Congress.  One CBP agent who accessed the system in this fashion shrugged off any complaints about the process, saying it was totally routine.  But that didn't stop a rapidly evolving uproar among journalists claiming that this type of activity represented an infringement of the First Amendment.  One of the journalists whose name showed up on the list was a Pulitzer Prize winner with the Associated Press, so the AP quickly took the question to the Department of Homeland Security demanding answers.

Watchdog: Federal anti-terror unit investigated journalists.  A special Customs and Border Protection unit used sensitive government databases intended to track terrorists to investigate as many as 20 U.S.-based journalists, including a Pulitzer Prize-winning Associated Press reporter, according to a federal watchdog.  Yahoo News, which published an extensive report on the investigation, also found that the unit, the Counter Network Division, queried records of congressional staffers and perhaps members of Congress.  Jeffrey Rambo, an agent who acknowledged running checks on journalists in 2017, told federal investigators the practice is routine.

Eighty House Republicans Vote for More Government Spying.  Our lack of privacy, not to mention the increased ability of the government to spy on us, has been ratified by eighty — count 'em eighty — House Republicans, including minority leader Kevin McCarthy (who wants us to see him as a viable replacement of, an actual savior from, Nancy Pelosi) and Burgess Owens of all people (Et tu, Burgess?  Who can we rely on now?)  What these GOP members of what seems more and more like the People's Congress of Cambodia under Pol Pot have voted for en masse, joining one hundred percent of the Democrats (something suspicious right there), is a bill to fund a Federal Vaccination Database.  Known as the Immunization Infrastructure Act (H. R. 550), this baby would provide $400 million of your dollars and mine for an "immunization system data modernization and expansion" of "a confidential, population-based, computerized database that records immunization doses administered by any health care provider to persons within the geographic area covered by that database."  In other words, it's a handy way to get the "wrong" people fired, ostracized or whatever, while getting their children kicked out of school.

House passes federal vaccine database bill, 80 Republicans betray their voters — again.  Yesterday [12/2/2021], the House of Representatives passed a bill called H. R. 550 that would facilitate the creation of a federal vaccination database.  The purpose would be to track the vaccination status of all U.S. citizens.  To call this bill a danger to the personal freedoms of every citizen is an understatement.  The bill states that $400 million of taxpayer money will be used to "direct the Department of Health and Human Services (HHS) to take actions to improve data sharing and other aspects of immunization information systems.  These are confidential, population-based databases that maintain a record of vaccine administrations." [...] To sum it up, the bill provides sweeping powers to CDC and compels public and private health care providers at both state and local levels to share information with the central government.

The Frogs Have Begun Fleeing the Government's Boiling Pot.  The federal government spies on every email, text, and call you make.  It uses your phone's location services to pinpoint where you are at all times.  It knows which I.P. addresses are associated with online comments that have been deemed "politically incorrect."  Its partnerships with Amazon and Walmart let it know what you're reading and buying.  Its partnerships with Google and Facebook let it know what you're thinking.  Its partnerships with Twitter and Hollywood allow it to censor unapproved messages before too many brains have the opportunity to consider new thoughts.  Its alliance with credit card companies allows it to track all your financial transactions and thereby understand your habits, preferences, choices, and addictions.  Its alliance with cellular companies allows it to monitor all your movements, contacts, and associations.  And all of these consumer comforts that are used by the "national security" surveillance state to watch everyone in real time constantly measure every American's potential for subversiveness, even when that American is engaged in the most mundane things during the course of an ordinary day.

Los Angeles Police Tried Out Social Media Surveillance Software To Spy On The Public.  The Los Angeles Police Department (LAPD) partnered with a data analytics company to spy on social media profiles, according to internal LAPD documents.  In 2019, the LAPD engaged in a four-month trial with data collection and surveillance software company Voyager Labs, according to documents requested by the Brennan Center for Justice and first reported by The Guardian.  The software offers the ability to surveil and analyze massive amounts of data collected from social media profiles, according to communications between Voyager and the LAPD.

The FBI Just Admitted Something Terrifying and No One Seems to Be Noticing.  Why [...] was there an FBI drone directly over the [Rittenhouse] shooting?  Have we even considered the ramifications of what that actually means?  Our government, for any reason that they perceive to be a threat, can conduct mass surveillance of you without a warrant?  Certainly, this was a public place and the courts have ruled that surveillance can be conducted in public without a warrant, however, there were local police resources.  Why would the FBI be conducting this surveillance if they had no way of stopping or preventing what was happening, from occurring?  Regardless of the legality of it, should we as citizens become comfortable with the idea that this is normal? [...] And probably most importantly, how did you end up directly over this shooting that night, despite all the other areas in the city where bad things were happening?  While I have never been a conspiracy theorist and abhor conspiracy theories, it seems wildly coincidental that of the several dozen square block area of Kenosha where there was violence going down that night, that you end up directly over the one shooting that is going to cause a national debate?  I can't be the only one here thinking that's awfully convenient.

US government ordering Google to provide users' search data: report.  The US federal government is secretly ordering Google and other search engines to track and provide data on anyone who searches certain terms through "keyword warrants," according to a new report.  In recent years, only two such warrants have been made public, but accidentally unsealed court documents obtained by Forbes show the government has been making these requests far more frequently.  The unsealed warrant stemmed from a 2019 federal investigation in Wisconsin, where investigators were searching for men they believed had taken part in trafficking and sexually abusing a minor.  In an effort to track them down, officials ordered Google to provide any information on users, including account names, IP addresses and CookieIDs, that searched the victim's name, two spellings of her mother's name and her address over 16 days throughout the year.

Accidental leak reveals US government has secretly hit Google with 'keyword warrants'.  The U.S. government is using 'keyword warrants' to uncover the identity of anyone who searches Google and other search engines for certain search terms that may be related to a crime, according to a new report.  The controversial practice, which is already drawing civil liberties concerns about sweeping government overreach, was revealed on Tuesday [10/5/2021] in 'accidentally unsealed' court documents obtained by Forbes.  Keyword warrants — which have been secretly employed for at least several years — are drawing backlash as many argue they violate an individual's constitutional protections against unreasonable search and seizure.

I've got some keywords for ya.

FBI Director:  Ban Encryption to Counter Domestic Extremism.  FBI Director Christopher Wray said on Sept. 21 that restrictions on encrypted chat services are needed to combat domestic terrorism — a claim that has been disputed by a wide array of tech companies, industry associations, and privacy groups, as well as other government agencies.  Wray made the remarks during the Senate Committee on Homeland Security's counterterrorism hearing.  "I can't overstate the impact of default encryption and the role it's playing, including on terrorism," Wray said in response to a question from Sen. Jacky Rosen (D-Nev.) about what tools Congress can give law enforcement to counter domestic extremism.  "The information that will allow us to separate the wheat from the chaff, in terms of social media, is being able to — with lawful process — get access to those communications, where most of the meaningful discussions of the violence is occurring."

The Editor says...
[#1] If all the FBI wants to do is combat bona fide terrorists and anarchists, especially Islamic terrorists, I wish them all the best.  But recent history shows they're much more interested in right-wing rednecks than suicidal Muslims.  The FBI is mainly interested in protecting the government, not the citizens.  There's a big difference.  [#2] Just wait til you see the government's new definition of "encryption."  No, I haven't heard anything, but it's obvious that if the government bans encryption, that ban will be expanded (by changing the dictionary) to include everything from ROT13 to Base64 to the Morse Code.  U.S. citizens have the right "to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures," and sometimes my "papers and effects" include email, and sometimes my email is cryptic, if not encrypted.  Keeping my personal communications from prying eyes is the difference between a first-class letter and a postcard.

Rand Paul urges end to FISA-authorized snooping on Americans.  Sen. Rand Paul of Kentucky announced his opposition to using FISA warrants on American citizens, specifically political candidates, during an exchange Tuesday with FBI Director Christopher Wray.  At a Senate Homeland Security Committee hearing, Paul questioned Wray about the surveillance of American citizens via the Foreign Intelligence Surveillance Act (FISA).  "The problem is the system can be abused," Paul said.  "We should obey the Constitution.  I don't think Americans nor political candidates should be investigated using a foreign intelligence surveillance court."  Wray responded to the senator's comments saying he believed FISA warrants were constitutional and that they have a "difference of opinion on how to characterize" its legality. [...] FISA was enacted into law in 1978 at the height of the Cold War.  Attempts to reform or abolish it would take an act of Congress.

Court rules cops violated Constitution by filming man for 3 months.  A police force can't set up a camera to peer over the top of a man's privacy fence, then record him for months, before finally filing criminal charges against him.  That's the ruling from the state supreme court in Colorado, where the decision freed suspect Rafael Tafoya from what was expected to be a significant prison sentence.  According to a report in Courthouse News, officers in Colorado Springs set up a special camera on top of a utility pole next to Tafoya's home after a "tip" from an anonymous source.  Without a search warrant, they watched him and his property, recording events there, for months.

The Freedom to Be Left Alone.  What must animate a "free society" is the understanding that you are not only free of the unwanted gaze from others, including the state, but that you and your fellow citizens must avoid looking into the private lives of others.  A free society minds its own business.  That would be the opposite of what we see in modern America.  This is a land of the perpetual and promiscuous busybody.  Gossip may be the national pastime, but it is the crude art of not minding your own business that defines the American.  Everywhere you go in America, you are hounded by busybodies poking into your affairs.  Everyone feels she has a right and duty to know everything about you and what you are doing.

Is Apple Gearing Up for China-Style Internet Control in the U.S.?  Recently, Apple announced that it will deploy a new algorithm, NeuralMatch, to monitor iMessages and images on its devices.  The ostensible purpose is to scan for photos containing nudity sent by or to children and also for photos of nude or seminude children. [...] But, well-intentioned as the motive may sound, this is a matter of grave concern for privacy.  Once such surveillance is begun, it opens the gates for other tech firms to follow suit, and worse, for warrantless scans for nefarious government purposes.  Coming as it does from Apple, this is a curious development in the U.S. For although Apple has bent over backward to please the Chinese government on its surveillance and censorship needs, it has vehemently resisted assisting the U.S. government.  It has refused to unlock cellphones for criminal investigations and prosecutions, citing concerns about protecting the data and privacy of its customers.  It has received — and objected to — at least 10 requests from federal courts for extracting data from locked iPhones.  But now, in a complete turnabout, if Apple thinks (or its algorithm decides) that certain images are illegal, it will cooperate with the authorities.

10 Govt Agencies Want To Expand Use Of Facial Recognition Technology.  Federal agencies have planned to expand the use of facial recognition technology in the next few years.  According to a Government Accountability Office report on Tuesday, 10 federal agencies would begin implementing artificial intelligence technology in more aspects of their work.  The report indicated many of the agencies already use facial recognition to give employees access to their the buildings or computers.  However, the agencies have wanted to expand such technology to track crime and investigate people of interest.

Synopsis from the Risks Digest.
The Chinese smart city that knows people's personal habits.  Chongqing (population ~16M in 2019) is wired with ~300K cameras that continuously surveils the population, applying facial recognition to ensure public order, and to suppress the free expression of ideas that might challenge the supremacy of political governance priorities.  [Video clip]

The Pentagon has a laser that can identify people from a distance — by their heartbeat.  Everyone's heart is different.  Like the iris or fingerprint, our unique cardiac signature can be used as a way to tell us apart.  Crucially, it can be done from a distance.  It's that last point that has intrigued US Special Forces.  Other long-range biometric techniques include gait analysis, which identifies someone by the way he or she walks. [...] An individual's cardiac signature is unique, though, and unlike faces or gait, it remains constant and cannot be altered or disguised.  A new device, developed for the Pentagon after US Special Forces requested it, can identify people without seeing their face:  instead it detects their unique cardiac signature with an infrared laser.  While it works at 200 meters (219 yards), longer distances could be possible with a better laser.  "I don't want to say you could do it from space," says Steward Remaly, of the Pentagon's Combatting Terrorism Technical Support Office, "but longer ranges should be possible."

Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life.  Apple has announced impending changes to its operating systems that include new "protections for children" features in iCloud and iMessage.  If you've spent any time following the Crypto Wars, you know what this means:  Apple is planning to build a backdoor into its data storage system and its messaging system.  Child exploitation is a serious problem, and Apple isn't the first tech company to bend its privacy-protective stance in an attempt to combat it.  But that choice will come at a high price for overall user privacy.  Apple can explain at length how its technical implementation will preserve privacy and security in its proposed backdoor, but at the end of the day, even a thoroughly documented, carefully thought-out, and narrowly-scoped backdoor is still a backdoor.

The Editor says...
Apple's excuse — that they're only looking for child pornography — is a thin wrapper to make us think their intentions are honorable.  If the mechanism is in place to sift through your words and pictures, it will soon be used to find "deadbeat dads," tax evaders, gang members, and anybody who's wanted by the FBI.  At that point, if Apple still hears no objections, there can be no doubt that they will start using this wholesale surveillance technology for left-wing political purposes.

Chinese Regime Has Stolen Enough Data to Compile 'Dossier' on All Americans:  Former Official.  A former U.S. national security official warned that the Chinese Communist Party (CCP) is stealing data to compile a "dossier" on every American adult and may use coercive means to influence private citizens and political leaders.  During a Senate Intelligence Committee hearing this week, former Trump deputy national security adviser Matthew Pottinger said the CCP has stolen Americans' sensitive data via illicit methods, including cyber theft and hacking.  "Assembling dossiers on people has always been a feature of Leninist regimes, but Beijing's penetration of digital networks worldwide, including using 5G networks ... has really taken this to a new level," Pottinger said, referring to former Soviet dictator Vladimir Lenin.

Senate Infrastructure Bill Seeks to Make Breathalyzers, Interior Cameras Mandatory.  The U.S. Senate is currently considering a $1 trillion bipartisan infrastructure bill that's primarily targeting the ailing highway system, with tens of billions left over to spend on advancing the nation's EV charging infrastructure and incorporating more eco-friendly modes of public transportation.  But there's also some really kooky shit that you need to be made aware of before this passes into law.  Along with new regulations that would mandate the inclusion of collision detection systems and automatic emergency braking, where the car calls your bluff and applies the wheel-stoppers independently of your actions, provisions have been made that would also require some kind of in-car breathalyzer.  The stated aim is to reduce incidents of drunk driving.  However, the proposed system may also include driver-monitoring cameras, totally undermining any nobility the cause might otherwise have had.  Complaining about regulatory overreach is kind of my beat and the last few years have kept me truly busy.  But this is on a whole other level as the nanny state runs amok — and we're just getting started.

That Senate Infrastructure Bill Shreds Privacy in the Sanctuary of Your Own Car and Blows Up the Budget.  The U.S. Senate plans to take a vote on the infrastructure bill on Saturday, according to the best available reports for you late-to-the-party fact-checkers.  The bill as it's currently written is fiscally disastrous, according to the Congressional Budget Office (CBO), and removes what's left of any vestige of privacy in your own private vehicle. [...] That "mass surveillance" is part of a system to keep track of where and how much you drive, as if that's any of their beeswax.  But they'll use it against you eventually.  No doubt it would have Fourth Amendment implications. [...] The bill requires that breathalyzers — which detect too much alcohol but not weed or other substances — be installed in all vehicles. [...] But look at what has to happen for it to "work."  Cockpit cameras check to make sure your sober buddy isn't blowing into the contraption for you, and facial recognition software will "track face and eye movements in case you're planning to get drunk while driving."

Are The Tech Giants Afraid of Something?  Over the past three weeks, some of the most powerful tech companies in the world have taken a number of steps — unprecedented even by their standards — to monitor their users.  On July 26, a consortium of tech companies including Facebook, Google, Microsoft, Twitter, Reddit, Verizon, Airbnb, and Mailchimp announced it would shift the focus of their joint counter-terrorism program, the Global Internet Forum to Counter Terrorism (GIFCT).  Previously dedicated to tracking Islamic extremists, the coalition would now focus its attention on material shared online by "white supremacists" and "far-right militias."  The next day, PayPal, the leading online payments processor, announced a partnership with the far-left Anti-Defamation League to uncover and disrupt payment flows to those who are allegedly profiting from, according to Reuters, "antisemitism, Islamophobia, racism, anti-immigrant, anti-Black, anti-Hispanic and anti-Asian bigotry."  In addition to sharing its data with the far-left ADL, PayPal said it would share data with law enforcement.

Apple Will Scan iPhones for Illegal Child Abuse Images, Sparking Privacy Debate.  Apple announced Thursday is it planning to scan all iPhones in the United States for child abuse imagery, raising alarm among security experts who said the plan could allow the firm to surveil tens of millions of personal devices for unrelated reasons.  In a blog post, the company confirmed reports saying that new scanning technology is part of a suite of child protection programs that would "evolve and expand."  It will be rolled out as part of iOS 15, which is scheduled for release sometime in August.  Apple, which has often touted itself as a company that promises to safeguard users' right to privacy, appeared to try and preempt privacy concerns by saying that the software will enhance those protections by avoiding the need to carry out widespread image scanning on its cloud servers.  "This innovative new technology allows Apple to provide valuable and actionable information to [the National Center for Missing and Exploited Children] and law enforcement regarding the proliferation of known CSAM," said the company, referring to an acronym for child sexual abuse material.

'Privacy Company' Apple Plans To Monitor All US iPhones For Evidence Of Child Porn.  As the old saying goes:  If you aren't doing anything illegal, then you have nothing to fear from surveillance.  Smartphones already act like tracking devices broadcasting the whereabouts of their owners, but Apple is about to open the door to far more advanced forms of smartphone-based voluntary surveillance by launching a new program designed to detect and report iPhone users who are found to have child pornography — known by the academic-speak acronym CSAM — which stands for Child Sexual Abuse Materials.  According to a handful of academics who were offered a sneak preview of the company's plans — then promptly spilled the beans on Twitter, and in interviews with the press.

News Outlets That Criticized Trump for Targeting Reporters [are] Mostly Silent About 'Unmasking' of Tucker Carlson.  The New York Times, The Washington Post, and CNN strongly objected and protested when the Trump administration obtained reporters' phone records as part of an investigation into the leak of classified information.  Yet those same news organizations aren't willing to stand with popular Fox News Channel host Tucker Carlson, who the National Security Agency "unmasked" during the early months of the Biden administration.  The New York Times is "very concerned about government surveillance of journalists," a spokeswoman said when asked this week about the Carlson revelations.  Just last month, the Times' executive editor, Dean Baquet, said the Trump administration's action "profoundly undermines press freedom." [...] After an internal investigation, the Biden administration's National Security Agency admitted that Carlson's identity was "unmasked" and leaked, as first reported July 23 by The Record, a news site focused on cybersecurity, and later by other news outlets.

Former Head NSA Lawyer:  Tucker Carlson's Allegations Merit Further Investigation.  The National Security Agency's reported internal review of Fox News host Tucker Carlson's spying allegations suggests that the matter should be investigated further, according to a former NSA general counsel.  Citing two unnamed sources familiar with the matter, The Record reported last week that the NSA's internal review found that government officials indeed "unmasked" Carlson's identity in classified documents — supporting some of the claims the Fox News host has made against the agency.  "The nation's top electronic spy agency found that Carlson was mentioned in communications between third parties and his name was subsequently revealed through 'unmasking,' a process in which relevant government officials can request the identities of American citizens in intelligence reports to be divulged provided there is an official reason, such as helping them make sense of the intelligence documents they are reviewing," The Record reported.

Grassley presses FBI to explain its monitoring of conservative women's group.  Sen. Charles E. Grassley is pressing the FBI to explain the reasoning for its newly revealed probe into the conservative group Concerned Women for America, The Washington Times has learned.  The FBI's review of the pro-life women's organization has prompted an outcry from the group's leadership and others concerned about law enforcement and intelligence community surveillance of Americans.  The FBI determined in July 2016 that there was nothing to investigate regarding Concerned Women for America after a "charity assessment" for potential "embezzlement of non-profit organizations/corporate fraud," according to a document that the FBI revealed in response to a Freedom of Information Act request from the Cato Institute.

The NSA WAS monitoring Tucker Carlson.  National Security Agency (NSA) sources say they found no evidence to support Tucker Carlson's claims that he was being spied on by the agency, according to a report, but they admit his identity was 'unmasked' in communications between third parties.  The unmasking can be approved only by senior officials.  The report didn't identify the two parties allegedly having a conversation that mentioned Carlson; it also didn't identify who approved the alleged unmasking.  Two people familiar with the matter told cybersecurity news outlet The Record that a review confirmed the NSA did not target the Fox News host's communications, but that he had been swept up in the agency's monitoring of communications between other people.

NSA Reportedly Admits To Unmasking Tucker Carlson's Identity.  The National Security Agency (NSA) under the Biden administration allegedly unmasked Fox News host and Daily Caller co-founder Tucker Carlson's identity, according to a Friday report by The Record.  According to the report, the NSA admitted that Carlson's name was unmasked after it was mentioned by a third party during intelligence gathering.  [Tweet]  "The NSA has just completed its internal review of the matter," Fox News host Brit Hume said.  "The NSA now admits that it unmasked Tucker's identity after an intelligence intercept.  By law, the identities of American citizens are concealed when they're caught up during foreign intelligence gathering.  They can only be unmasked in extraordinary circumstances."

Company tied to Obama Foundation spying on Americans' online activity — for the government?  We have seen over the past several months the Biden administration putting out continuous dog whistles about "white supremacy," going so far as to claim that "domestic white extremism" is the biggest threat to our country since... well since forever.  Newly discovered information however shows to what extent the administration and the Pentagon are going in trying to "root out" alleged extremism.  According to numerous sources including Fox News, the Pentagon is apparently working with a company, Moonshot CVE which has ties to — surprise, surprise — the Obama Foundation — is currently working on data which would provide military leaders which military bases and branches have the most troops searching for so-called "domestic extremist" content.  So what does Moonshot consider to be a "search for domestic extremist content?" How about if you put the following into your web browser:  "The truth about Black Lives Matter."  According to Moonshot, that along with a number of other seemingly innocent searches shows signs of either interest in or engagement with white supremacism, according to Defense One.

New Report Raises Even More Questions About NSA Spying on Tucker Carlson.  A cyber security media outlet called The Record is reporting that the NSA, after an investigation of themselves, say that they weren't targeting or spying on Tucker Carlson.  Oh, goodie, I'm always comforted when government agencies investigate themselves.  Especially given the sketchy statement that they put out when the issue exploded last month.  [Tweet]  Attorney Harmeet Dhillon went through some of the problems with the statement.  [Tweet]  What they are admitting, at least according to this report, was that his name came up in a discussion and his name was unmasked when some government official asked for it to be.  Fox was furious at the report. [...] But as Dhillon says this just raises more questions.  Why were they unmasking his name?  This doesn't pertain to his messages, so what about that?  And what justification would there be for leaking to the media.  Hint:  there isn't one, unless you are trying to harm him in media, which goes back to the point Tucker originally made — that this was done with purpose to hurt him.

Regime Spokesperson Very Defensive About Americans Knowing the White House is Reviewing Their Social Media.  The Biden regime is becoming increasingly unstable as they attempt to keep control over the American people.  During a terse exchange today, spokesperson Jen Psaki attempts to justify the White House surveillance of American speech saying the Facebook platform users should be "more concerned" with people dying from COVID than having their community speech monitored by the federal government.  When questioned about the U.S. Federal Government now openly admitting Big Brother is watching you, the regime defender responds: "They are more concerned about that, than people dying across the country because of a pandemic where misinformation is traveling on social media platforms?"  Continuing with, "That feels unlikely to me, if you have the data to back that up I'm happy to discuss it."  Fox News journalist Peter [Doocy] asked the regime to name the 12 people on Facebook the White House has identified as problematic for the interests of the state; however, the spokesperson refused to name them, obviously and transparently fearing a lawsuit.

House Republicans Demand Information From NSA About Allegations The Agency Illegally Spied On Tucker Carlson.  A group of House Republicans sent a Tuesday [7/13/2021] letter to the National Security Agency (NSA) demanding information about allegations the agency illegally spied on Fox News host and Daily Caller co-founder Tucker Carlson.  The Daily Caller first obtained the letter, which was spearheaded by Republican Texas Rep. Louie Gohmert and Republican Florida Rep. Bill Posey.  In the letter, the lawmakers call on the NSA to provide them with information about allegations that the agency was spying on Carlson in regards to communication with U.S.-based Kremlin intermediaries pertaining to a potential interview with Russian President Vladimir Putin, Axios reported.  The Axios report referenced two sources "familiar with Carlson's communications."  In late June, Carlson said that the NSA was spying on him, and reading confidential texts and emails in order to try and take his show off the air.

Bidenites dispatch DNC operatives to police private SMS texts for COVID 'misinformation'.  In what looks like a confluence from hell, the Democratic National Committee plans to police your SMS messages for "misinformation" about COVID vaccines.  It sounds like a bad joke, or a right-wing conspiracy theory.  But nope, it's right there in Politico:  ["]The White House has decided to hit back harder on misinformation and scare tactics after Republican lawmakers and conservative activists pledged to fight the administration's stated plans to go "door-to-door" to increase vaccination rates.  The pushback will include directly calling out social media platforms and conservative news shows that promote such tactics.["]

Biden Allies and DNC Instructing Cell Phone Carriers to Filter and Censor Text Message Content.  Yes, you read that correctly.  Fact checking your SMS text messages through your carrier, your cell phone or internet provider.  This is a rather remarkable escalation in totalitarian censorship instruction.  Not only will Big Tech social media networks (Google, YouTube, Facebook, Twitter) censor, delete, and look into any content placed in their "private sector" domain, but the implication is now that AT&T, Verizon, Comcast, T-Mobile etc. etc. will deploy monitors and fact-checkers to control what you are allowed to say in text messages to your friends and family.  We have noted in past discussion that ISP providers have been enlisted to use their control nodules to steer and restrict internet travel; even placing landing warnings on websites that are arbitrarily deemed dangerous to approved government messaging.  However, taking the leap to control the content of all communication platforms is another level entirely.

Rand Paul seeks Tucker Carlson investigation.  Sen. Rand Paul (R-Ky.) is requesting an investigation into allegations by Tucker Carlson that the National Security Agency was spying on him, Axios has learned.  The senator sent a letter to Gen. Paul Nakasone of the National Security Agency, casting doubt on the NSA's public denial of spying on Carlson and defending the Fox News host as a journalist who should be protected by the First Amendment.  Paul, who sits on the Senate Committee on Homeland Security and Governmental Affairs, wrote that he is "open-minded" to believe the NSA may be telling the truth.

Rand Paul Demands Investigation Into Allegations US Intelligence Spied on Tucker Carlson.  The National Security Agency's head should investigate whether officials spied on Tucker Carlson, Sen. Rand Paul (R-Ky.) said.  "I write to demand that you investigate the National Security Agency's (NSA) alleged spying and unmasking of Tucker Carlson, as well as any leaks of his private emails from the NSA to other reporters," Paul wrote in a recent letter to Gen. Paul Nakasone, the NSA head.  Carlson, the most popular cable news host in the country, alleged on his Fox News show last week that his identity was unmasked by the NSA after he tried arranging an interview with Russian President Vladimir Putin.  Carlson also alleged that the NSA leaked some of his emails to media outlets.  Unmasking refers to intelligence officials revealing the identity of a person.

CPAC: Richard Grenell Urges Federal Action Over Alleged 'Unmasking' of Tucker Carlson.  Former Acting Director of National Intelligence (DNI) Richard Grenell on July 10 said federal action should be taken against the individual or individuals who allegedly "unmasked" the identity of Fox News host Tucker Carlson to the National Security Agency (NSA).  Speaking on Saturday [7/10/2021] at a Conservative Political Action Conference's (CPAC) in Dallas, Texas, Grenell said two violations were potentially committed, based on the claims from Fox News host Carlson.  Carlson claimed Wednesday during his popular cable television show, "Tucker Carlson Tonight," that his identity was "unmasked" by the NSA, which conducts surveillance on foreign targets, after he attempted to schedule an interview with Russian President Vladimir Putin.

The NSA's spying on Tucker Carlson is the tip of the iceberg.  Well, everyone could see it coming.  It turns out that the National Security Agency (NSA) didn't just eavesdrop "incidentally" on the emails and text messages of Tucker Carlson, one of the few journalists in America willing to stand up to the Deep State.  Anyone with half a brain could see the lizard-like lawyering in the NSA's "non-denial denial."  As Bill Clinton famously put it, "it depends on what the meaning of the word 'is' is."  "Tucker Carlson has never been an intelligence target of the Agency," the NSA statement read, dodging the question of whether it had obtained and read his emails and texts, "and the NSA has never had any plans to try to take his program off the air."  Again, from what we know of lying government lawyers, the tenses are crucial:  the NSA never "had" any plans.

License to monitor:  National strategies, the Capitol Police, and Tucker Carlson.  On 15 June, the Biden administration published its new National Strategy for Countering Domestic Terrorism.  At the time, commentary outlets including Liberty Unyielding recognized the "Strategy" as a pretext for vilifying and ultimately criminalizing a huge segment of the American population.  In that earlier treatment, I focused on the process of vilification and how the media would factor into it; e.g., seeking to discredit factual reporting by raising "questions" about it (without proving anything against it), and then making the leap from that to calling the disfavored factual reporting "disinformation."  But another use for the "Strategy" is now emerging — notably a mere two to three weeks after the Strategy was published — and needs highlighting so people can see the link clearly.  The Strategy for Countering Domestic Terrorism will be used to justify a lot of things.  When the wording is inspected, the reader can readily discern what they are.  We're already seeing the evidence that such justifications will be used, and how.

The Biggest Question:  Who Illegally Unmasked Tucker Carlson?  [Scroll down]  This is of paramount concern because unless he was the direct target of surveillance, a possibility that the NSA has categorically denied, then someone very high up in the food chain would have had to request his unmasking and subsequent leaking of his communications to the press.  For background, Axios published an article yesterday referencing the electronic communications the NSA has between Carlson and U.S.-based liaisons with Putin's people.  It drew much attention, not only because it verified the most viable scenario for the existence of the leaked emails was the NSA spying on him or someone with whom he was corresponding.  The whole scenario gets trickier when we consider that any reports regarding the communications would require Carlson's identity to be masked.  Unmasking him, particularly in the timeframe in question, required someone very powerful at the White House.  The list of people who have that type of clout is very short.

Tucker Carlson Says NSA Is Leaking The Contents Of His Emails To Journalists.  Tucker Carlson claimed Wednesday [7/7/2021] that the National Security Agency (NSA) leaked the contents of his emails to journalists as part of an effort to target his show and take it off the air.  Appearing on Fox Business' Mornings With Maria with host Maria Bartiromo, the Fox News host and Daily Caller co-founder said that he was contacted by a journalist who read back to him the contents of his emails that he says were leaked by the NSA.

The NSA Leaked Details of Their Tucker Carlson Surveillance to Allied Deep State Media.  This is a great example of how the Intelligence Branch of the U.S. government now operates.  Not only did the NSA conduct surveillance of Tucker Carlson's electronic communication, but the NSA also leaked Carlson's emails to allied intelligence media (Axios, CNN, New York Times, Washington Post) who operate as PR firms on behalf of the Intelligence Branch.  [Video clip]

Tucker Carlson got the General Mike Flynn treatment.  When Tucker Carlson first said that the National Security Agency (NSA) was spying on him, various leftist media outlets had a good laugh.  However, that laughter became a bit forced when the NSA issued a letter that merely denied "targeting" Tucker.  The obvious implication was that the NSA had gotten to him as an incidental person while targeting someone else.  The NSA also didn't bother to explain how it was that it unmasked Tucker.  There's no laughter now.  It's clear that the NSA did spy on Tucker, that it illegally unmasked him, and that it even more illegally leaked to one or more media outlets the information it gathered.  On Wednesday night [7/7/2021], Tucker explained that he was trying to do what many other outlets have successfully done, which was to get an interview with Vladimir Putin.

Tucker Carlson was trying to set up Putin interview amid claims of NSA spying, report says.  Tucker Carlson emailed Russian "intermediaries" in the United States about an interview with Vladimir Putin before he claimed the National Security Agency was spying on his communications, according to reports.  Quoting "sources familiar with the conversations", Axios said Carlson was in talks with the US-based Kremlin contacts to secure an interview with the Russian president when US government officials learned of the efforts.  The report comes after Carlson said on Fox News earlier on Wednesday that his emails were leaked to journalists in an "effort to discredit me".

The NSA Does Not Deny Reading Tucker Carlson's Emails.  [Scroll down]  The NSA's non-denial of Carlson's allegations therefore raises some serious questions.  Why did the NSA not flatly state it never accessed Carlson's communications?  Were Carlson's communications "unmasked" at the request of White House officials?  Susan Rice admitted she unmasked Trump campaign aides during the Obama administration and now serves in the Biden White House.  Has Rice resumed her previous efforts to weaponize NSA reporting against the political enemies of another Democratic president?  A more troubling question is whether this story, if true, indicates that NSA did not actually halt its "upstream collection" of emails, as it claimed in 2017.  So in response to the NSA statement, I admit that I may have been wrong and Carlson may be right.  The NSA only denied Carlson was an intelligence target.  It did not deny reading his emails or violating his privacy rights.

Are US Spy Services Monitoring the Opposition's Communications?  Fox News host Tucker Carlson has reported during the last week about a whistleblower who told him that the National Security Agency (NSA) has been monitoring his electronic communications with the intention of leaking them to get his show taken off the air.  While most of the prestige press has dismissed Carlson's claims, the whistleblower may have struck just the tip of the iceberg — it's possible that along with Carlson much of the leadership of the American opposition movement is also under surveillance.  The NSA denied that Carlson is "an intelligence target of the Agency."  It explained on its Twitter account that the "NSA has a foreign intelligence mission.  We target foreign powers to generate insights on foreign activities that may harm the United States.  With limited exceptions ... NSA may not target US citizens without a court order that explicitly authorizes the targeting."  As absurd as it sounds, it's not hard to imagine U.S. officials presenting phony evidence to a secret court to try to show that an American TV star is actually a foreign spy.  They did it when the former host of "Celebrity Apprentice" ran for president in 2016.

Tucker Carlson Pushing Back Against NSA Surveillance.  Tucker Carlson used his TV broadcast on Wednesday night [6/30/2021] to continue pushing-back against NSA operational data collection that appears to have caught him in their surveillance dragnet.  However, what Carlson (and many others) have yet to reconcile is the totality of control held by the newest branch of government, the Intelligence Branch.  CTH has been contacted by numerous interested stakeholders in the larger dynamic.  Tomorrow we hope to be able to give readers an explanation of exactly how each traditional branch of government; including the administrative agencies within them; have been taken over by a methodical expansion of the Intelligence Community.  Everything is now controlled by the Intelligence Branch, and the underlying mechanisms of government have abdicated, perhaps even abandoned, their oversight.

Microsoft Honcho Testifies That the DOJ Routinely Abuses Secrecy Orders to Seize Data From American Citizens.  A Microsoft executive on Wednesday [6/30/2021] testified that the Department of Justice routinely abuses "secrecy orders" in order to seize data on thousands of American citizens without letting them know.  Tom Burt, Microsoft's corporate vice president for customer security and trust, made the accusations during a House Judiciary Committee hearing examining leak probes and prosecutorial abuse.  The hearing followed recent revelations that the Justice Department secretly seized the records of several news organizations while investigating leaks under both the Trump and Biden administrations — a practice that became increasingly routine during the Obama administration.

The greatest conspiracies are open and notorious.  [Scroll down]  In my life, I've had enough of both the practice and the theory.  In my work for the United States National Security Agency, I was involved with establishing a Top-Secret system intended to access and track the communications of every human being on the planet.  And yet after I grew aware of the damage this system was causing — and after I helped to expose that true conspiracy to the press — I couldn't help but notice that the conspiracies that garnered almost as much attention were those that were demonstrably false:  I was, it was claimed, a hand-picked CIA operative sent to infiltrate and embarrass the NSA; my actions were part of an elaborate inter-agency feud.  No, said others: my true masters were the Russians, the Chinese, or worse — Facebook.

Tucker Carlson Says the NSA Is Spying on Him.  Sadly, It's Plausible.  Tucker Carlson now says a "whistleblower" in the NSA tipped him off that the agency was planning to leak emails and texts to get him off the air over a story he's working on.  Sounds rather fantastical.  We've seen no evidence or corroboration of the accusation.  My initial instinct should be to dismiss conspiratorial claims about domestic espionage.  As it happens, though, I've been alive for the past two decades.  And history tells us it is wholly conceivable that intelligence and law-enforcement agencies would spy on a television personality.  They spy all the time.  They do it illegally.  They do it for partisan reasons.  They do it to lawmakers.  They do it to journalists.

Of course they deny it!  Is there another option?
NSA denies leaking scheme to take Tucker Carlson off the air.  The National Security Agency insisted Tucker Carlson "has never been an intelligence target" after the Fox News host claimed the Biden administration spied on him.  The NSA has a "foreign intelligence mission," a spokesperson said Tuesday [6/29/2021] in response to Carlson's claims the night before that a government whistleblower told his team the agency was spying on their communications and "planning to leak them in an attempt to take this show off the air."  "This allegation is untrue," the NSA spokesperson said.  "Tucker Carlson has never been an intelligence target of the Agency and the NSA has never had any plans to try to take his program off the air."

NSA Responds to Tucker Carlson Claim of Surveillance, The Generic and Very Political Non-Denial Should Alarm Everyone.  Last night Fox news host Tucker Carlson reported on a whistleblower contact from within the intelligence community who informed him the NSA was conducting electronic surveillance of his private communication (email and text messages). Tonight the NSA responded via Twitter:  [Tweet]  Techno Fog noted something most of us would also note the NSA statement is an obtuse non-denial. [...] First, notice the time of the tweet message.  Exactly 8:00 pm to coincide with the beginning of Tucker Carlson's broadcast.  That's typical political operative snark, which wouldn't be too surprising if it were not the fact this is from the actual National Security Agency.  Many people in/around the intelligence apparatus have noted and confirmed to me that most of the modern human resources, within the working analytical part of the intelligence apparatus, are immature, solitary and emotionally stunted individuals.  Accepting things as they directly appear, this subtle snark is actual confirmation.

Whistleblower Told Tucker Carlson Biden Admin's IC is Illegally Monitoring His Electronic Communications.  In what may be an early example of the saying "What's sauce for the goose is sauce for the gander," Tucker Carlson reported on his show Monday night that he has received notice — AND EVIDENCE — that internal communications among the staff of his show are being monitored by the Intelligence Community of the Biden Administration.  This would be the first reported instance that I'm aware of regarding a Biden Administration official leaking information to a news media outlet calling attention to allegedly illegal/objectionable conduct taking place inside the Administration.

Fox News Host Tucker Carlson Reveals NSA Conducting Surveillance on His Electronic Communication, Texts and Emails.  As disturbing as this statement is, considering the prior admissions of warrantless wiretapping by the FBI using the NSA database, this does not come as a surprise.  Remember, for five consecutive years the U.S. intelligence community has admitted to the FISA court they continually conduct illegal searches of U.S. citizen data, using the NSA database, and they admit to illegally extracting information which is illegally shared with interests outside the intelligence community.  Tonight [6/28/2021] on Tucker Carlson the Fox News Host outlined how an NSA whistleblower contacted him and told him the NSA was conducting electronic surveillance of his communication.  To verify the authenticity of the claim the whistleblower told Carlson what the content of his private text messages and emails contained.  While alarming in part, again this should not be surprising.  [Video clip]

Tucker Carlson Announces Whistleblower Confirmed the NSA is Plotting to Leak Info and Get His Show Pulled Off Air.  Tucker Carlson has revealed that a whistleblower told his show that the National Security Agency is spying on him and plotting to leak information in an effort to have him pulled off the air.  Carlson announced the shocking news on Monday evening's episode of Tucker Carlson Tonight.  "The NSA is monitoring our electronic communications and is planning to leak them in an attempt to take this show off air," Carlson said, admitting that it is a shocking claim and normally he would be skeptical of it, as it is illegal for the NSA to spy on American citizens.  However, Carlson explained that the whistleblower even provided details about a story that the show was working on, which someone would only know from looking at his personal texts and emails.

NSA Agrees to Release Records on FBI's Improper Spying on 16,000 Americans.  The National Security Agency (NSA) has agreed to release records on the FBI's improper spying on thousands of Americans, the secretive agency disclosed in a recent letter.  The agreement may signal a rift between the NSA and the FBI, according to attorney Ty Clevenger.  Clevenger last year filed a Freedom of Information Act (FOIA) request on behalf of The Transparency Project, a Texas nonprofit, seeking information on the FBI's improper searches of intelligence databases for information on 16,000 Americans.  The searches violated rules governing how to use the U.S. government's foreign intelligence information trove, U.S. District Judge James Boasberg, an Obama nominee who currently presides over the Foreign Intelligence Surveillance Court, wrote in a 2019 memorandum and order that was declassified last year.

FBI built fake phone company in global wiretapping operation of historic proportions.  The United States Federal Bureau of Investigation built a fake telephone service provider for a secret worldwide operation that officials described on Monday as "a watershed moment" in law enforcement history.  The operation, known as TROJAN SHIELD, began in 2018 and involved over 9,000 law enforcement officers in 18 countries around the world.  When the existence of TROJAN SHIELD was announced in a series of official news conferences yesterday, officials said the operation had "given law enforcement a window into a level of criminality [that has never been] seen before on this scale".  The operation centered on the creation of an entirely fake telephone service provider, known as ANØM.  The fake firm advertised cell phones that were specially engineered to provide peer-to-peer encryption, thus supposedly making it impossible for government authorities to decipher intercepted messages or telephone calls between users.

USA Today fights FBI subpoena for readers' data from report on shooting that killed two agentsUSA Today is fighting an FBI demand for information related to readers who accessed a report on the newspaper's website earlier this year about a shooting in which two agents were killed during a search at a Florida apartment.  The FBI made the request via subpoena to USA Today's owner, Gannett, in April.  The agency sought information including the IP addresses and mobile identification information of people who accessed the Feb. 2 article about the agents during a 35-minute window.  After Gannett objected to disclosing the subpoenaed records, the FBI confirmed on May 25 it had received the response, and the company moved to quash the subpoena as unconstitutional, according to a May 28 court filing in the U.S. District Court for the District of Columbia.

The New Domestic War on Terror Has Already Begun — Even Without the New Laws Biden Wants.  Pending Domestic War on Terror legislation favored by the White House — sponsored by Rep. Adam Schiff (D-CA) — would simply amend the old War on Terror laws, which permitted a wide range of powers to fight foreign terrorist organizations, so as to now allow the U.S. government to also use those powers against groups designated as domestic terror organizations.  Just as was true of the first War on Terror, this second one would thus vest the government with new, wide-ranging powers of surveillance, detention, prosecution and imprisonment, though this time for use against U.S. citizens on U.S. soil.  Even while that legislation is pending, the U.S. government is already waging an aggressive new domestic war on terror that has largely flown under the radar.  Grave warnings from DHS are now just as common, vague and unreliable — but also fear-inducing — as they were in the days of Tom Ridge.  Domestic surveillance is also on the rise.

House Democrat, Republican leaders demand investigation of Postal Service spying.  The House Oversight Committee on Tuesday [5/25/2021] urged an inspector general to investigate the extent of the U.S. Postal Service's surveillance of Americans' social media accounts.  The Postal Service's law enforcement arm previously confirmed to lawmakers' staffs that the agency's Internet Covert Operations Program or iCOP had monitored social media for "inflammatory" posts and shared details about the accounts and posts with other federal law enforcement agencies, according to lawmakers.  "These activities raise serious questions about the scope of the program, the extent of sharing of information among law enforcement agencies, and whether [U.S. Postal Inspection Service] has the authority to conduct such an operation," the committee's top Democratic and Republican wrote in a letter to Postal Service Inspector General Tammy L. Whitcomb.

Your Car Is Spying On You, and a CBP Contract Shows the Risks.  U.S. Customs and Border Protection purchased technology that vacuums up reams of personal information stored inside cars, according to a federal contract reviewed by The Intercept, illustrating the serious risks in connecting your vehicle and your smartphone.  The contract, shared with The Intercept by Latinx advocacy organization Mijente, shows that CBP paid Swedish data extraction firm MSAB $456,073 for a bundle of hardware including five iVe "vehicle forensics kits" manufactured by Berla, an American company.  A related document indicates that CBP believed the kit would be "critical in CBP investigations as it can provide evidence [not only] regarding the vehicle's use, but also information obtained through mobile devices paired with the infotainment system."  The document went on to say that iVe was the only tool available for purchase that could tap into such systems.

Report: USPS 'Internet Covert Operations Program' Is 'Much Broader in Scope Than Previously Known'.  Last month, Yahoo News ripped the lid off of a government surveillance program run by a division of the USPS. The program monitors, scans, and collects information on social media postings considered "inflammatory" enough to pass along to other government agencies.  It includes posts promoting the coordination and planning of upcoming political demonstrations.  The program's existence came out after the news outlet obtained a copy of a March USPS bulletin that was "distributed through the Department of Homeland Security's fusion centers."  It warned of the possibility of violence at upcoming protests though they acknowledged they had no reliable intelligence to suggest any alleged threats were legitimate.

1 in 10 police departments can now access videos from millions of consumers' Ring security cameras.  Nearly one in 10 U.S. police departments have access to videos from millions of privately owned Amazon Ring devices.  Ring's Active Agency Map shows the home security camera company now has partnerships with more than 1,800 police departments in the U.S. out of nearly 18,000 total departments across the country.  The company's "Neighbors" app notifies Ring users when neighbors or local law enforcement agencies send out public safety alerts.

USPS Uses Facial Recognition and Other High-Tech Tools To Monitor Social Media.  Is every federal agency a surveillance unit now?  With a plethora of law enforcement and intelligence agencies deputized to monitor American communications, it seems insane to think that the U.S. Postal Service (USPS) would also be enlisted for this task.  But indeed it has been, as Yahoo News revealed earlier this year.  Now, new details have emerged about the postal service's Internet Covert Operations Program (iCOP), including the fact that the agency has been using facial recognition software from Clearview AI and has a specific program to monitor people posting about protests.  As part of the iCOP program, postal service employees have been monitoring Americans' social media posts and sharing things they deem suspicious with law enforcement agencies.  "Yet the program is much broader in scope than previously known and includes analysts who assume fake identities online, use sophisticated intelligence tools and employ facial recognition software," writes Yahoo News' Jana Winter.

Facial recognition, fake identities and digital surveillance tools:  Inside the post office's covert internet operations program.  The post office's law enforcement arm has faced intense congressional scrutiny in recent weeks over its Internet Covert Operations Program (iCOP), which tracks social media posts of Americans and shares that information with other law enforcement agencies.  Yet the program is much broader in scope than previously known and includes analysts who assume fake identities online, use sophisticated intelligence tools and employ facial recognition software, according to interviews and documents reviewed by Yahoo News.  Among the tools used by the analysts is Clearview AI, a facial recognition software that scrapes images off public websites, a practice that has raised the ire of privacy advocates.  The U.S. Postal Inspection Service uses Clearview's facial recognition database of over 3 billion images from arrest photos collected from across social media "to help identify unknown targets in an investigation or locate additional social media accounts for known individuals," according to materials reviewed by Yahoo News.

Pentagon Surveilling Americans Without a Warrant, Senator Reveals.  The Pentagon is carrying out warrantless surveillance of Americans, according to a new letter written by Senator Ron Wyden and obtained by Motherboard.  Senator Wyden's office asked the Department of Defense (DoD), which includes various military and intelligence agencies such as the National Security Agency (NSA) and the Defense Intelligence Agency (DIA), for detailed information about its data purchasing practices after Motherboard revealed special forces were buying location data. [...] Netflow data creates a picture of traffic flow and volume across a network.  DNS records relate to when a user looks up a particular domain, and a system then converts that text into the specific IP address for a computer to understand; essentially a form of internet browsing history.  Wyden's new letter to Austin urging the DoD to release that answer and others says "Information should only be classified if its unauthorized disclosure would cause damage to national security.  The information provided by DoD in response to my questions does not meet that bar."

Washington Post says US secretly obtained reporters' records.  The Trump Justice Department secretly seized the phone records of three Washington Post reporters who covered the federal investigation into ties between Russia and Donald Trump's 2016 presidential campaign, the newspaper said Friday.  The disclosure sets up a new clash between the federal government and news organizations and advocates for press freedom, who regard the seizures of reporters' records as incursions into constitutionally protected newsgathering activity.

Lara Logan:  Surveillance of Americans 'much, much worse' than most realize, only benefits 'tyrannical elite'.  Fox Nation host Lara Logan warned on Wednesday that Big Tech surveillance of Americans is "much worse" than most people think, while adding that we are quickly becoming a "monitored class" of people much like what occurs in totalitarian regimes like China.  In an interview with Fox News host Pete Hegseth said Logan, who hosts "No Agenda" on the network's streaming service, is currently working on a documentary that will air in June detailing just how widespread the surveillance is, and why it's a problem for Americans who live under Constitution that supposedly protects their privacy.  "I can honestly tell you that with everything in me it is much, much worse than anybody realizes.  Most people have no idea how valuable our information is," Logan began.

Russiagate the Model.  On Monday, reports surfaced that the Joe Biden administration may use private firms to collect intelligence on its critics, recategorized by the White House as "domestic terrorists."  What makes them dangerous, according to Biden surrogates, is that they believe — like many of the participants in the Jan. 6 events who have been held for five months in Washington, D.C. jails without bail — the 2020 election was compromised.  Do Biden aides believe that using outside contractors to circumvent laws against spying on Americans will shore up the president's legitimacy?  No, the aim is to prevent the America First movement from mobilizing.  To kill it before it grows, according to reports, the private firms licensed by the government, will "gather large amounts of information that could help [U.S. intelligence] identify key narratives as they emerge."  The basic premise of this Biden initiative should sound familiar — it's Russiagate's first plot point.

House Republicans Demand Answers from FBI on FISA Abuse Revelations.  House Republicans have called on FBI Director Christopher Wray to provide a "detailed accounting" of every instance since 2019 that the agency has used warrantless surveillance authority to obtain information unrelated to national security, while accusing the FBI of "illegal spying activities."  Reps.  Jim Jordan (R-Ohio) and Andy Biggs (R-Ariz.), in a joint letter to Wray, cited a 67-page opinion from the Foreign Intelligence Surveillance Court (FISC), which they said shows the FBI has been "seriously and systematically abusing its warrantless electronic surveillance authority" by overstepping the limitations under section 702 of the Foreign Intelligence Surveillance Act (FISA).  Section 702 allows the attorney general and the director of national intelligence to jointly authorize warrantless surveillance of non-U.S. citizens residing outside the United States, subject to certain constraints.  These include requiring investigators to adopt "targeting procedures" to make sure the information obtained under Section 702 warrantless surveillance is indeed limited to noncitizens and to prevent the "intentional acquisition" of communications within the United States.  Section 702 also requires a FISA court order for a review of query results in criminal investigations that aren't related to national security.

Rep. Jim Jordan Calls for Hearings into DHS Using Non-Profits to Spy on Republicans.  Fox News host Laura Ingraham warned Monday [5/3/2021] that the Department of Homeland Security is using private messaging apps to spy on Americans to look for domestic extremist chatter.  She cited a CNN report that said DHS is "limited in how it can monitor citizens online without justification and is banned from activities like assuming false identities to gain access to private messaging apps used by extremist groups such as the Proud Boys or Oath Keepers."  Therefore, according to CNN, DHS might partner with non-profit groups that "periodically use covert identities to access private social media groups like Telegram, and others used by domestic extremist groups," which "thrusts DHS into a potential legal gray area even as it plugs an intelligence gap that critics say contributed to the failure to predict the assault on the Capitol."

CNN: Biden Admin Considering Using Private Firms To Conduct Warrantless Surveillance Of U.S. Citizens.  President Joe Biden's administration is reportedly considering working with private firms to monitor "extremist chatter by Americans online" because the federal government is legally limited to what they can do without a warrant.  The report said the federal government is also banned from using false identities to gain access to private messaging apps and groups.  The government can scan public social media profiles.  "The plan being discussed inside DHS, according to multiple sources, would, in effect, allow the department to circumvent" laws that limit what the federal government can do in surveilling U.S. citizens without a warrant, CNN reported.  "A source familiar with the effort said it is not about decrypting data but rather using outside entities who can legally access these private groups to gather large amounts of information that could help DHS identify key narratives as they emerge."

Biden Administration considering outsourcing domestic spying to private companies to get around laws that prohibit domestic spying.  [Scroll down]  See, the problem they are trying to address is that whole cumbersome civil liberties thing.  Constantly gumming up the works.  Apparently these private messaging apps are not used by extremist groups like Antifa.  Besides, Antifa is not extremist.  Also, it's not a group. [...] Using private agents you pay as opposed to public agents you also pay, gets around the bother of having to first get permission from a judge in the judicial branch of government the purpose of which is to provide a check on the unbridled power of the executive branch, and in doing so, provides unbridled power to the executive branch.

Biden team may partner with private firms to monitor extremist chatter online.  The Biden administration is considering using outside firms to track extremist chatter by Americans online, an effort that would expand the government's ability to gather intelligence but could draw criticism over surveillance of US citizens.  The Department of Homeland Security is limited in how it can monitor citizens online without justification and is banned from activities like assuming false identities to gain access to private messaging apps used by extremist groups such as the Proud Boys or Oath Keepers.

The Editor says...
Is BLM an extremist group?  Is Antifa an extremist group?  Is Planned Parenthood an extremist group?  Is the NAACP an extremist group?  Is "The Squad" an extremist group?  What about the Black Panthers?  What about the Nation of Islam?  What about Jeremiah Wright's church?

Spy Plane Identified Circling the Arizona Veterans Memorial Coliseum Where the Election Audit Is Taking Place.  A spy plane was identified flying over the Maricopa County audit.  What information are they after?  Sunday morning [5/2/2021] we were alerted to the fact that a plane was circling around the Arizona Veterans Memorial Coliseum last week.  We received only the picture above.  We followed up and found more information on this plane and additional information on other events where a plane circled the sky in a similar fashion.  One such incident was in San Bernadino after the shooting spree by Islamic terrorists Farook and Malik.  But we looked further into this flight above in Arizona and found the plane used was owned by the City of Phoenix.

Chinese smart TVs are snooping on their owners.  Hundreds of millions of Chinese consumers had a surprise discovery last week:  Their TV sets know a lot more about them than they'd ever thought, or ever agreed to.  It turns out Beijing-based Gozen Data, a leading Chinese TV viewership analytics firm, has been collecting personal data in real time using smart TVs — without users' consent.  The practice was first exposed when a user on V2EX, an online forum for tech enthusiasts, noticed their Skyworth-brand smart TV had become slow and analyzed the code of back-end programs to figure out why.  What they found was a program that scans the user's Wi-Fi every 10 minutes and uploads a wide range of information to Gozen Data's website.

Gaetz, House Republicans introduce bill to defund Postal Service covert operations program.  Rep. Matt Gaetz (R-Fla.) and a group of other House Republicans on Friday introduced legislation to end funding for an arm of the U.S. Postal Service that carries out online surveillance.  The legislation was rolled out in response to a March bulletin, reported by Yahoo News earlier this month, distributed by the Postal Service's Inspection Service's Internet Covert Operations Program (iCOP).  The bulletin cited iCOP concerns about potential "significant" protests planned for March 20 based on "online inflammatory material" and posts on social media platforms Parler and Telegram.  "iCOP analysts are currently monitoring these social media channels for any potential threats stemming from the scheduled protests and will disseminate intelligence updates if needed," the agency wrote in the bulletin.

USPS admits it IS spying on Americans:  Law enforcement arm is snooping on social media posts and 'working with other agencies'.  The U.S. Postal Service admitted during a Wednesday meeting to spying on citizens with its law enforcement arm, claiming it worked with other agencies to track Americans' social media posts.  Chief Postal Inspector Gary Barksdale briefed lawmakers on the Oversight Committee regarding the program known as iCOP, or Internet Covert Operations Program, but could not provide a date for when it was initiated.  'The Chief Postal Inspector was wildly unprepared for this briefing,' GOP Representative Nancy Mace of South Carolina told DailyMail.com following the meeting with Barksdale.  The inspector was called for a briefing after iCOP was first made public in a report last week.

Postal Service 'wildly unprepared' to answer allegations it spied on Americans:  Rep. Nancy Mace.  The U.S. Postal Service failed to answer lawmakers' questions in a Wednesday briefing about its alleged spying on Americans, according to Rep. Nancy Mace, South Carolina Republican.  Chief Postal Inspector Gary R. Barksdale briefed lawmakers on Wednesday about its "Internet Covert Operations Program (iCOP)" that allegedly monitored Americans' social media posts.  Mr. Barksdale could not give a date for when the program started and denied that it was even a program but said an 'executive' was overseeing it, according to Ms. Mace's office.  "The Chief Postal Inspector was wildly unprepared for this briefing," said Ms. Mace in a statement to The Washington Times.

Declassified FISA Opinion Shows More FBI Abuses.  A FISA Court opinion and order declassified today reveals continued FBI abuses of "raw FISA-acquired information."  After a DOJ National Security Division review, the FISA Court noted "the FBI's failure to properly apply its querying standard when searching Section 702-acquired information was more pervasive than was previously believed."  This opinion includes these findings:  April 2019 - July 2019:  An FBI technical information specialist was involved in "Compliance incidents" by conducting 124 queries of Section 702-acquired information on (1) Volunteers who had requested to participate in the FBI's "Citizens Academy"; (2) Persons who needed to enter the field office to perform repairs; and (3) Persons who reported they were victims of a crime.

FISA court doc shows FBI looked for domestic terrorists without warrants, report.  The FBI has without court orders looked through troves of National Security Agency foreign communications for information on American "racially motivated violent extremists," according to a news report based on a recently declassified report.  The agency conducted the reviews despite being warned several years ago by the Foreign Intelligence Surveillance Court, which approves warrants for such investigations, that such inquiries were constitutionally alarming, according to the Daily Beast.  The FBI's warrant-free queries, known as backdoor searches, were related to criminal investigations including those on "domestic terrorism involving racially motivated violent extremists."

The Editor says...
Why limit the search to those who are racially motivated?  Aren't other motivations just as dangerous?  Terrorists motived by Islam, for example.  Antifa terrorists motivated by anti-capitalism.  Eco-terrorists motivated by militant environmentalism.  In general, violence and hate speech come from the left.

The Postal Service Is a Spy-Op Now.  Why is the U.S. Postal Service (USPIS) reading Americans' social media posts?  Now there's a question for someone to ask Biden administration Press Secretary Jen Psaki.  The news broke this week when someone leaked a "Situational Awareness Bulletin" to Yahoo News.  Dated March 16, 2021, this two-page "intelligence summary" reported that USPIS's Internet Covert Operations Program (iCOP) had monitored "multiple social media platforms" including Facebook, Parler, Twitter, and Telegram.  What caught their eye?  Postings and conversations related to possible March 20 protests at state capitals and in Washington, D.C., against Biden's election, 5G cellular, and tyranny.  The agency did not say it was investigating any of the individuals surveilled.  Rather, the USPIS document said iCOP had shared the "inflammatory" postings with the Department of Homeland Security's fusion centers, which merge intelligence across a variety of federal and state agencies.

If you really think somebody is reading your email, some handy tips about low-level encryption can be found here.

FBI turn to high-tech facial recognition, undercover operations to nab Capitol invaders.  The number of U.S. Capitol invaders charged with crimes has topped 400, Justice Department records show, and in a recent case the FBI disclosed new twists in identifying and ensnaring a suspect.  A Washington Times review of scores of law enforcement affidavits justifying an arrest show this pattern:  Agents examine thousands of videos and photos taken inside the Capitol on Jan. 6.  In old-school detective work, officers pick out a target and compare Capitol images to online posts from that day or previous days based on tips from the invaders' friends, co-workers and even family.  To seal the deal, FBI agents openly approach the suspect in a phone call or home visit.  The targets in many cases readily admit to their actions.  It is difficult to deny wronging when caught on camera.

The US Postal Service Surveillance Scandal is Targeting Trump Supporters, Not All Americans.  Journalist Lee Smith hits the sweet spot in his discussion of the U.S. Postal Service conducting surveillance on Americans.  As Smith notes the targeting is not to identify the political ideology of "all Americans", rather the objective is surveillance of people who likely did not vote for Joe Biden.  [Video clip]  Again it is important to repeat, this type of activity is one long continuum.  The IRS was previously used; federal contractors for the FBI have previously been used; allied Big Tech companies have been used; and now the United States Postal Service is running a covert surveillance program against Americans that sounds suspiciously like the prior DHS announcement.

Congress Presses Postal Service After Report Agents Are Monitoring American Social Media Accounts.  Members of Congress on Thursday [4/22/2021] asked Postmaster General Louis DeJoy to provide information about an alleged group in the U.S. Postal Service (USPS) that has been monitoring Americans' social media accounts.  The United States Postal Inspection Service is the law enforcement arm of the Postal Service.  The inspection service has a group called the Internet Covert Operations Program (iCOP) that has been monitoring activity on social media, including posts on Parler and Telegram, according to Yahoo News, which says it obtained a March government bulletin on the matter.  "If the reporting is accurate, iCOP raises serious questions about the federal government's ongoing surveillance of, and encroachment upon, Americans' private lives and discourse," House Oversight Ranking Member James Comer (R-Ky.) and House Judiciary Ranking Member Jim Jordan (R-Ohio), along with 30 other Republican lawmakers, wrote to DeJoy.

We Discovered Where the Post Office Likely Got Their List of Conservatives to Spy On.  Today we found out that the US Postal Service is spying on Americans who just happen to be conservative.  We noted that the law enforcement arm of the US Postal Service, the US Postal Inspection Service (USPIS), is secretly monitoring and collecting Americans' social media posts, according to documents obtained by Yahoo News.  The spying program is known as iCOP, or Internet Covert Operations Program, and involves goons trolling through social media sites to look for "inflammatory" posts — and then sharing the information with other government agencies.  Last we checked, "inflammatory" language was covered by the First Amendment.

The Postal Service is running a 'covert operations program' that monitors Americans' social media posts.  The law enforcement arm of the U.S. Postal Service has been quietly running a program that tracks and collects Americans' social media posts, including those about planned protests, according to a document obtained by Yahoo News.  The details of the surveillance effort, known as iCOP, or Internet Covert Operations Program, have not previously been made public.  The work involves having analysts trawl through social media sites to look for what the document describes as "inflammatory" postings and then sharing that information across government agencies.

Shedding light on fairness in AI with a new data set.  Facebook AI has built and open-sourced a new, unique data set called Casual Conversations, consisting of 45,186 videos of participants having nonscripted conversations.  It serves as a tool for AI researchers to surface useful signals that may help them evaluate the fairness of their computer vision and audio models across subgroups of age, gender, apparent skin tone, and ambient lighting.  To our knowledge, it's the first publicly available data set featuring paid individuals who explicitly provided their age and gender themselves — as opposed to information labeled by third parties or estimated using ML models.

Devin Nunes warns intel chiefs against targeting Americans, 'particularly Republicans'.  Republicans are putting the Biden intelligence chiefs on notice that their agencies are moving dangerously close to spying on Americans in the U.S.  They raised concerns on Thursday [4/15/2021] at a House Permanent Select Committee on Intelligence hearing featuring President Biden's five top intelligence officials, including Director of National Intelligence Avril Haines and FBI Director Christopher A. Wray.  The fears stem from both the past and the present.

Appeals Court Hearing:  Pelosi/Schiff Argue Congress Can Secretly Subpoena Phone Records of Citizens.  Judicial Watch today [4/12/2021] released a transcript of the March 24 oral argument before the U.S. Court of Appeals for the District of Columbia Circuit challenging a lower court ruling upholding the secrecy of controversial secretly-issued congressional subpoenas for phone records by Rep. Adam Schiff, Chairman of the U.S. House Permanent Select Committee on Intelligence, relating to the impeachment of President Trump.  The appeals court hearing came after a lower court ruling in the Freedom of Information Act (FOIA) lawsuit, Judicial Watch v.  Adam Schiff and U.S. House Permanent Select Committee on Intelligence (No. 1:19-03790)), requesting subpoenas issued by the Committee on or about September 30, 2019.  The Judicial Watch lawsuit sought the controversial impeachment-related subpoenas for phone records, including those of Rudy Giuliani, President Trump's lawyer.  Schiff and the Committee are being represented by the Office of General Counsel for the House of Representatives.  The phone records led to the publication of the private phone records of Giuliani, Congressman Devin Nunes, journalist John Solomon, Trump attorney Jay Sekulow, attorney Victoria Toensing, and other American citizens.

I wish this article was completely off-topic, but I don't think it is.
Senators Offer to Let NSA Hunt Cyber Actors Inside the US.  A bipartisan group of senators offered to help expand the National Security Agency's authorities allowing the spy agency to hunt domestically for signals intelligence against foreign adversaries that U.S. officials have said are behind a string of recent attacks, like the recent SolarWinds hack.  Several members of the Senate Armed Services Committee on Thursday voiced their support for expanded authorities for the NSA and U.S. Cyber Command to conduct more intelligence gathering domestically, something that the Biden administration already is exploring, according to Gen. Paul Nakasone, who leads both agencies.  Committee members heaped praise on Nakasone for his efforts to secure the 2020 elections from foreign interference.  The NSA and Cyber Command conducted some two dozen operations to protect U.S. infrastructure and target adversaries in the runup to November, Nakasone said.

Senators on Armed Services Committee Promote Expansion of NSA Domestic Data Gathering and Surveillance — NSA Response:  "The Fourth Amendment is a "Key Obstacle" You Need to Remove.  OK, before I blow a blood pressure cuff on this issue, please keep in mind the warnings provided on these pages about DHS now starting to assemble lists of dissident citizens under the guise of domestic extremists.  Also remind yourself the same DHS and FBI are now using private contractors embedded in Big Tech to scour public information on social media and provide feedback to help DHS assemble those lists.  Now, we take that foundation and build it one step further.  This well-written report about the recent Senate Armed Services Committee discussion with the National Security Agency (NSA) needs to be absorbed with the prior information as context.  These paragraphs are alarming in the extreme: [...]

Magic Kingdom Uses COVID-19 As An Excuse To Install Facial Recognition.  Sadly, Walt Disney World has joined the ranks of airports and corporations using COVID-19 as an excuse to install facial recognition.  According to the Disney Tourist Blog, Walt Disney World will [test] facial recognition at Magic Kingdom. [...] Walt Disney World has been treating families like suspected criminals at a TSA checkpoint so it's the next logical step for them.

Amazon is reportedly telling delivery drivers they must give 'biometric consent' so the company can track them as a condition of the job.  Amazon is telling its delivery drivers to sign a consent form that allows the company to track them based on biometric data as "a condition of delivering Amazon packages," Motherboard's Lauren Kaori Gurley reported on Tuesday [3/23/2021].  Thousands of drivers across the US must sign the "biometric consent" paperwork this week, and if they don't they'll lose their jobs, according to Motherboard.  The form, which was viewed by the outlet and published in the report, states that Amazon would be allowed to use "on-board safety camera technology which collects your photograph for the purposes of confirming your identity and connecting you to your driver account." The system would then "collect, store, and use Biometric Information from such photographs."  The technology specifically would track a driver's location and movement, like how many miles they drive, when they brake and turn, and how fast they are driving.

Greenwald: If Left Can Create Narrative The Country Is Always Under Threat, They Can Expand Mass Surveillance.  Glenn Greenwald warned the left is desperate to contain the "mythology" of what happened on the day of the Capitol Riot in order to preserve the Capitol Wall and have Congress create laws expanding surveillance.  [Video clip]

China using 'emotion recognition technology' for surveillance.  China has been ramping up surveillance known as "emotion recognition technology" in order to monitor human feelings — and help them with law enforcement, according to reports.  Emotion recognition technology tracks traits such as facial muscle movements, vocal tone and body movements in order to infer a person's feelings, the state-run Global Times reported.  "Emotion recognition is definitely the direction of humanity's future tech development," Ma Qingguo, who is head of the Academy of Neuroeconomics and Neuromanagement at Ningbo University, told the outlet.  Some Chinese experts boast that the new technology is up to 95 percent accurate at detecting people's emotions.

Drones With 'Most Advanced AI Ever' Coming Soon To Your Local Police Department.  Three years ago, Customs and Border Protection placed an order for self-flying aircraft that could launch on their own, rendezvous, locate and monitor multiple targets on the ground without any human intervention.  In its reasoning for the order, CBP said the level of monitoring required to secure America's long land borders from the sky was too cumbersome for people alone.  To research and build the drones, CBP handed $500,000 to Mitre Corp., a trusted nonprofit Skunk Works that was already furnishing border police with prototype rapid DNA testing and smartwatch hacking technology.  Mitre's unmanned aerial vehicles didn't take off.  They were "tested but not fielded operationally" as "the gap from simulation to reality turned out to be much larger than the research team originally envisioned," a CBP spokesperson says.  But the setback didn't end CBP's sci-fi dreams.  This year, America's border police will test automated drones from Skydio, the Redwood City, Calif.-based startup that on Monday [3/1/2021] announced it had raised an additional $170 million in venture funding at a valuation of $1 billion.

Instagram Will Now Monitor Your Private Messages To Watch For 'Hate Speech'.  Instagram announced in the past week that they will begin policing private direct messages in their latest crackdown on so-called "hate speech" on their platform, a report says.  In line with the recent racial abusive comments that are "targeted at footballers in the U.K." after losing a match, the social media platform Instagram announced Wednesday that they will be imposing stricter measures in order "to help prevent" the further spread of abuse and hate speech in direct messages, Daily Wire reported.

In San Diego, 'Smart' Streetlights Spark Surveillance Reform.  A homicide detective looked up from the scene of a fatal shooting in San Diego's Gaslamp District in August 2018 and saw something unusual:  The streetlight glowing overhead didn't look like a normal streetlight.  That's because it wasn't.  The LED light on the pole was also equipped with an optical sensor.  As it illuminated the city, it was capturing 24-hour video footage of the scenes beneath it.  "We had no idea what the quality of video would be, or what it would capture," said Jeffrey Jordon, who leads special projects and legislative affairs for the San Diego Police Department.  "The first time we saw it we were like, '[Indeed], that's really good video.'"  The San Diego Police Department knew that the city had been recently outfitted with a few thousand such "smart" streetlights, installed to monitor car and foot traffic, Jordon says.  But until that moment, he said the department had not yet thought to ask the city for the light's recordings.

The future of "smart" cities is in street lights.  Cities are rushing to replace their legacy street lights with "smart" LED fixtures that could one day be able to find you a parking space, monitor air quality, and announce an oncoming thunderstorm.  Despite a bumpy and controversial start to some smart street light programs, cities are saving tons of money on energy by banishing traditional bulbs — and may soon be able to turn a profit by monetizing data from smart LED sensors or leasing space on light poles.  There's been lots of hype about "smart cities," where connected technology helps governments serve us better — but also lots of money wasted on expensive projects that fizzled or caused public outcry over police use of camera surveillance.

Is the FBI Already Engaged in a Coverup in the Nashville Bombing?  [Scroll down]  There is nothing delusional or irrational at all in thinking 5G, 4G, or any G before or since, including the earliest iterations of cellular, is being used to spy on Americans.  It's a fact.  It is and has been.  Indeed, it has been known since the publication of James Bamford's book "The Puzzle Palace" that the National Security Agency and others have the capability to spy on virtually every citizen of this country — and that was close to 40 years ago (1983)!  And it's only gotten worse since.  I'm sorry to say it, but anyone who thinks he or she has any privacy is a fool.  Even the current president was spied upon.  Edward Snowden, as I indicated in my previous column, made it clear just how deeply implicated AT&T is in this activity.  In fact, that company may well be the government's principal private industry ally in clandestine work, helping to connect it with other cellular companies.  If I know that, why wouldn't Warner, an IT professional, know that? [...] I believe they are once again covering up here, creating a distraction from the actual motive, because the one thing they don't want to be investigated — well, one among many — is the alliance between private industry and our intelligence agencies, coupled with the realization we all live now in an Orwellian surveillance culture, not dissimilar to that in China.

Harris Poll:  Most Americans Concerned Govt Tracking Them Through Cellphone.  Fifty-five percent of American adults are concerned that the government is tracking them through location data generated from their cellphones, according to a new Harris Poll survey, The Wall Street Journal reported on Wednesday [11/25/2020].  The survey also revealed that 77% of respondents said the government should get a warrant to purchase the kind of detailed location information that data brokers regularly buy and sell on the commercial market.  The government is currently buying such data for criminal law enforcement and border-security purposes, but without any court oversight, according to the Journal.

Mississippi Cops Can Now Use Your Ring Doorbell Camera To Live Stream Your Neighborhood.  The Jackson, Mississippi police department is piloting a 45 day program that allows them to live stream private security cameras, including Amazon Ring cameras, at the residences of its citizens.  It's no surprise that Amazon's Ring cameras were the only brand named for the pilot program, as EFF pointed out, since they have over 1,000 partnerships with local police departments.  The program allows Ring owners to patch their camera streams to a "Real Time Crime Center" - i.e. a dispatcher on desk duty whose new favorite way of passing the time is to watch you bring out your garbage twice a week in a bathrobe.

Michigan Governor:  Up To Six Months In Prison If Businesses Don't Surveil Customers For Contact Tracing.  The Michigan Department of Health and Human Services (MDHHS) is requiring restaurants, barbershops, tattoo parlors, recreational facilities, and entertainment establishments to record the names, contact information, and visit times of all customers to "aid with contact tracing." Any establishment that does not comply is threatened with a maximum $200 fine and a misdemeanor charge punishable with up to six months in prison.  The order, announced Friday [10/30/2020], comes as Michigan's Democratic Gov. Gretchen Whitmer and her administration began backtracking on the state's latest reopening plan and tightening COVID-19 restrictions, citing rising hospitalizations and deaths.  Other states including New York have implemented similar contact tracing rules, requiring restaurants to record diners' information in the case of an outbreak.  In addition to scaling back the number of people at gatherings at indoor venues from 500 to 50, the order also advised against shouting and screaming at events, claiming that cheering could spread the virus in the air 30 times more than speaking.

A 'Persistent Eye in the Sky' Coming to a City Near You?  "Gorgon Stare will be looking at a whole city, so there will be no way for the adversary to know what we're looking at, and we can see everything."  That same persistent eye in the sky may soon be deployed over U.S. cities.  At the time he made that comment about surveillance drones over Afghanistan, Maj. General James Poss was the Air Force's top intelligence officer.  He was preparing to leave the Pentagon, and move over to the Federal Aviation Administration.  His job was to begin executing the plan to allow those same surveillance drones to fly over American cities.  This plan was ordered by Congress in the 2010 National Defense Authorization Act.  It directed the Departments of Defense and Transportation to "develop a plan for providing expanded access to the national airspace for unmanned aircraft systems of the Department of Defense."

Portland Bans Facial Recognition Technology to Protect Peaceful Rioters.  Portland has some really, really strange things going on.  On Wednesday [9/9/2020], amid a record-setting season of chaos, arson, vandalism, and violence in the streets, the city decided to ban the use of facial-recognition technology by local law enforcement. [...] What's the technology good for?  Well, it "could help with tasks ranging from solving crime to checking student attendance at school."  But it "comes with fundamental privacy issues."  In addition to the cops, "private entities in places of public accommodation" are now barred from using it as well.  That means businesses that serve the public — restaurants, grocery stores, etc.

Portland Bans Police Using Facial-Recognition Technology.  On Wednesday [9/9/2020], the city of Portland — which has been decimated by rioters the last three months — banned the use of facial-recognition technology by local police.  "Its decision to prevent both local government and businesses from employing the technology appears to be the most sweeping ban yet by an individual city," CNN reported, adding:  ["]The new rule prevents 'private entities in places of public accommodation' in Portland from using it, too, referring to businesses that serve the general public — a grocery store or a pizza place, for instance.  It does not prevent individuals from setting up facial-recognition technology at home, such as a Google Nest camera that can spot familiar faces, or gadgets that use facial-recognition software for authenticating users, like Apple's Face ID feature for unlocking an iPhone.["]

60 Percent of Police Drones Are Chinese Made.  Chinese manufacturers produced more than three in five drones used by local and state law enforcement, potentially exposing sensitive geographic and personal data to the Chinese government.  Chinese tech companies have sold or gifted drones to more than 970 law enforcement and first responder agencies across the country, presenting a massive national security risk, according to a new report by John Venable and Lora Ries, senior research fellows at the conservative Heritage Foundation.  The authors of the report warn that the Chinese government can compel these companies to cough up sensitive data collected in the United States.  The technology could help Beijing identify vulnerabilities in U.S. critical infrastructure and track down the location of American civic leaders.

New York Cops stationed at tunnels and bridges to scan license plates.  Travelers coming into New York City from 35 COVID-19 hotspot states were met at road entry points Wednesday under a program announced earlier in the day by Mayor Bill de Blasio.  At a press conference on Wednesday morning, de Blasio said those who do not self-isolate for 14 days once they arrive in the city from those locations could face a $10,000 fine.  He failed to explain how he would enforce the order.  Pictures taken by DailyMail.com show police officers stationed at the Goethals Bridge toll plaza Wednesday evening.  The sheriff's department scanned plates and pulled people over, onlookers say.

California Police, Amazon Ring Partnerships Raise Concerns.  As nationwide protests force a deep examination of police tactics and funding, technology companies say they are re-evaluating their relationship with law enforcement as well.  Amazon has halted police use of its facial recognition technology for one year and the website Nextdoor has stopped forwarding tips to police.  Now, privacy groups and activists are scrutinizing the relationships between Amazon and local police departments that allow law enforcement to request access to video recordings from doorbell cameras installed in private homes.  Amazon's expanding network of law enforcement "partners" for its Neighbors app remains intact, an arrangement that critics say is designed to boost sales of its Ring cameras and capitalize on fears of property crime.  Social media and news channels are filled with stories of package thieves and other incidents captured on Ring cameras, which acts as a form of marketing for the products.

Apple Suddenly Catches TikTok Secretly Spying On Millions Of iPhone Users.  As I reported on June 23, Apple has fixed a serious problem in iOS 14, due in the fall, where apps can secretly access the clipboard on users' devices.  Once the new OS is released, users will be warned whenever an app reads the last thing copied to the clipboard.  As I warned earlier this year, this is more than a theoretical risk for users, with countless apps already caught abusing their privacy in this way.  Worryingly, one of the apps caught snooping by security researchers Talal Haj Bakry and Tommy Mysk was China's TikTok.  Given other security concerns raised about the app, as well as broader worries given its Chinese origins, this became a headline issue.

Study Finds Some Governments Already Using Contact Tracing Apps For Mass Surveillance.  For months, privacy experts like Edward Snowden were warning about governments using virus contact tracing phone apps to conduct mass surveillance on citizen populations.  As most of us know, governments are already spying on domestic citizens, but if they have access to data from the contact tracing apps, it gives them yet another tool that helps to give them a clearer picture of everyone's day-to-day activities.

Liberals Still Think Obama Was the 'Best President Ever,' Here Are 14 Reasons Why That's Ridiculous.  [#8] He literally spied on millions of Americans.  Fans of the book 1984 got a real treat during the Obama years.  Potential terror suspects may not have been under the eye of the federal government, but everyday citizens were.  The NSA surveillance program experienced exponential growth on Obama's watch, altering surveillance methods away from terror suspects and toward mass surveillance.  According to the ACLU, there was a 64 percent growth in electronic spying by the United States government during Obama's first term.  The Obama administration argued in federal court in 2012 that the public has no "reasonable expectation of privacy" regarding their cell phone location data and that the government can obtain these records without a warrant.  Further blemishing Obama's record on civil liberties, his administration green-lighted a giant government database of information on millions of citizens who weren't even suspected of terrorism or any crime at all.

Obama Used National Security to Spy on Americans Opposed to Islamic Terrorists.  We know when Obamagate ended, but we don't know when the policy of spying on Americans began.  The tangled roots of the domestic surveillance of political opponents by the NSA predate the alarmism about Russia.  Tracing them back into the fetid swamp takes us not toward Moscow, but to Tehran.  The first public revelation that the White House was spying on high level members of the political opposition came in 2015.  Members of Congress had been eavesdropped on as part of an operation to sabotage Prime Minister Netanyahu's campaign against the Iran Deal.  The Israeli leader and his entire country had earlier been targeted by a massive spy campaign to stop Israel from taking out Iran's nukes.  But the new wave of surveillance was no longer just against a potential Israeli attack on Iran, but was part of a political campaign to win the domestic argument to aid Iran and legalize its nuclear program.

Recommendation: Do Not Install or Use Centralized Server Coronavirus (COVID-19) Contact Tracing Apps.  As I write this, various governments are rushing to implement — or have already implemented — a wide range of different smartphone apps purporting to be for public health COVID-19 "contact tracing" purposes.  The landscape of these is changing literally hour by hour, but I want to emphasize MOST STRONGLY that all of these apps are not created equal, and that I urge you not to install various of these unless you are required to by law — which can indeed be the case in countries such as China and Poland, just to name two examples.  Without getting into deep technical details here, there are basically two kinds of these contact tracing apps.  The first is apps that send your location or other contact-related data to centralized servers (whether the data being sent is claimed to be "anonymous" or not).  Regardless of promised data security and professed limitations on government access to and use of such data, I do not recommend voluntarily choosing to install and/or use these apps under any circumstances.

America is awash in cameras, a double-edged sword for protesters and police.  On Saturday night, as protests were still taking place in city streets across the country, the Dallas police department put out a call for help on Twitter.  It asked anyone who had video from the protests showing "illegal activity" to upload it to its anonymous tip app, iWatch Dallas.  What it got was a different kind of protest, in the form of a flood of videos and images of K-pop stars performing.  The department later tweeted that the app was down because of technical difficulties.  In the tense and escalating standoffs between law enforcement and protesters that have now spread to more than 100 cities in the wake of George Floyd's killing in Minneapolis police custody, photos and video footage are being collected and wielded by all sides.  And there is no shortage of cameras to pull from.

IBM Bails Out Of "Racist" Facial Recognition Software Development.  The field of companies racing to develop reliable facial recognition software just became a bit less crowded.  IBM CEO Arvind Krishna made the announcement this week that his company would no longer work on such projects while simultaneously sending a letter to Congress asking them to take action.  But what action is he looking for?  Congress isn't particularly well known for its coding skills.  No, Krishna isn't pulling his company out of the game because the technological challenges are too daunting.  He's bailing out because the software is racist, you see.  And he wants Congress to shun such applications as well.

The Rule of Doctors Threatens Trump's Reelection, American Well-Being.  Sports entrepreneur Mark Cuban, whose principal claim to fame is that he owns a basketball team, came up with the gimcrack idea of hiring and training millions of the newly unemployed to act as contract tracers, snooping around the sick to find out with whom they've come into contact.  Thus far, no one has suggested the East Asian solution (South Korea, Singapore, Hong Kong), which involves cellphone monitoring via apps and quarantining visitors for 14 days with the mobile phone equivalent of an ankle bracelet, but you can bet that's coming.

8 Genius Ways to Trick Surveillance Systems.  Today's databases are jam-packed with, well, our data, from our license plate numbers to our fingerprints to photos of our actual faces.  But that doesn't sit right with some hackers, who take issue with all the ways we can be tracked and surveilled through technology.  So the world's best black hats have come up with a clever solution to defeat databases: feed them with faulty data to make the systems less effective and more expensive.  Here are some of their most resourceful methods for fooling surveillance systems, and how you can follow suit.

Your cell phone is being followed wherever you take it.
Apple data from Memorial Day weekend shows driving is back to pre-pandemic levels.  The number of Americans venturing out over the Memorial Day weekend has spiked to levels not seen since the coronavirus pandemic brought the United States to a grinding halt more than two months ago.  Cellphone data from Apple's COVID-19 mobility trends report shows that the number of people out driving across the US increased by more than 25 percent on Saturday [5/23/2020] alone.  The number of people out walking also increased on Saturday to levels not seen since mid-March when stay-at-home orders were put in place across most of the country.  In some states — like Missouri and Mississippi — the levels of driving at the weekend increased to levels not seen this year.

The Left Is What It Once Loathed.  Compare the current progressive view about civil liberties against the old liberal positions of the past.  Surveillance and spying on U.S. citizens?  Remember liberal Senator Frank Church of Idaho and his 1975 post-Watergate select Senate investigative committee?  It found the CIA, FBI, and NSA improperly over three decades had tapped into the phones of Americans, opened their mail, and worked with telecommunications companies to monitor the data of supposedly suspect politicians, actors, celebrities, and political activists.  "Collusion" with the communists and the Russians was often the pretense to surveil American citizens.  Consider Church either a bastion of civil liberties protection or a dangerous firebrand who weakened the CIA and FBI.  But the point is that the Left's position had once mostly been that the government's unelected deep-state intelligence officers simply had too much power to trust.

Dan Bongino Finds Out There's a Fourth Way the Government Can Spy on a Citizen.  [Scroll down]  The government is surveilling Kislyak.  They're receiving transcripts of his phone calls.  How do they know who he's speaking with?  FBI officials know Flynn would be vacationing in the Dominican Republic at the end of December.  It would be easy for Obama officials to identify a Kislyak call to the Dominican Republic.  How can Obama officials guarantee that Kislyak will call Flynn while he's there?  They might announce sanctions against Russians or they might expel 35 Russian diplomats and close two Russian compounds for interference in the 2016 presidential election.  Which is exactly what they did.  To be precise (and this distinction will become clear shortly), on December 28, Obama signed Executive Order #13757 which enacted sanctions on several Russians and Russian entities.  On the next day, December 29, 2016, Obama announced the closing of two Russian compounds and the expulsion of 35 Russian diplomats.  Odd timing, is it not?  Why did they wait so long after Election Day?

Inside the Media's Desperate Cover-Up of 'Obamagate'.  Obama's Director of National Intelligence James Clapper, now a CNN contributor, told his viewers that it is "routine" to unmask Americans who are communicating with foreigners under surveillance.  Yahoo News told its readers unmaskings are "routine."  New York Times reporter Charlie Savage tweeted the practice is so "routine" that under President Trump, the National Security Agency handled 10,000 unmasking requests last year and 17,000 requests in 2018 — an average of 37 per day over the two years." [...] What all of these Obamagate deniers are about is a determined effort to journalistically cover-up what arguably is the biggest scandal in American history — a silent coup attempt against a President of the United States by a collection of dirty cops and dirty bureaucrats.

Was Obama systematically spying on everyone who could threaten his legacy?  [Scroll down]  First, I am indebted to Mary Theroux, of the Independent Institute, who alerted me to the National Security Agency's collection and storage capacity.  Its Utah Data Center, completed in May 2019 at a cost of $1.5 billion, is located at Camp Williams, near Bluffdale, Utah.  The structure covers somewhere between 1 [and] 1.5 million square feet, with 100,000 square feet dedicated to the data center and the remainder for technical support and administration.  The Data Center's storage capacity is estimated to exceed exabytes, plural.  If you're wondering, a single exabyte is equal to one quintillion bytes (or 10 to the 18th power of bytes).  That's a lot of information.  Mary Theroux pointed out that there is no way that the U.S. can scan this information in real time.  That is, there's nothing in this massive database that will alert our intelligence agencies to a planned terrorist attack.  Instead, this database exists as a repository to hunt down information after the fact.  In that regard, it gives the government power that Lavrentiy Beria only dreamed about.  Lavrentiy Beria was the head of the secret police under Stalin.

Report:  John Brennan Used Private Contractors to Unmask Trump Officials.  [Scroll down]  "Unmasking" an American is a major breach of people's privacy — attaching a name to a call that shouldn't have been eavesdropped on in the first place, not without a warrant.  So you're supposed to have a very strong intelligence or law enforcement pretext for doing so.  Instead, the Obama administration just stared unmasking every call made by Trump personnel "inadvertently" spied on by Obama's minions.  They did this so that the information could be leaked.  In his last days in office, Obama also changed the rules about who was allowed to see "unmasked' names.  Previously, the secret must be closely held — again, to keep some privacy for Americans wrongly spied on.  But Obama changed the rules so that the names could be propagated far and wide in government, with hundreds, possibly thousands, of people having access to unmasked names which are supposed to be a closely-held secret.  He did this so that anyone who wanted to leak the names to the press could not be caught — if just one or two people know the names, it would be easy to determine the leakers, and prosecute them.

ACLU attempts to block Baltimore surveillance planes from flight.  There was a rather amazing bit of good news coming out of Florida this weekend.  As of yesterday, there have been no murders recorded in the city of Miami for seven straight weeks.  If that sounds like an underwhelming statistic to you, we should put it in context and note that this is the first time that's happened since 1957.  The ongoing pandemic is being credited by the police as the largest factor driving this happy news.  I brought up that story mostly to draw a contrast with another city where things aren't going nearly as well.  That would be Baltimore, Maryland.  To be sure, the murder rate in Charm City is down from the same period last year (finally).  After averaging more than one murder per day through the first six weeks of the year, even some of the gang bangers seem to be staying at home.  But there have still been 85 murders on the year, with four more recorded in the past week.

Documents Reveal Feds Are Excited To Create A Mass Surveillance Network.  A FOIA request by the Electronic Privacy Information Center revealed how excited the National Security Commission on Artificial Intelligence (NSCAI) is about using CCTV cameras to create a national surveillance network.  An NSCAI presentation titled "Chinese Tech Landscape Overview" discusses China's facial recognition CCTV camera network in glowing terms.  "When we talk about data resources, really the largest data source is the government.'"  The presentation discusses how the Chinese government profits from encouraging companies to use facial recognition on visitors and employees. [...] In America things are not all that different.  In the United States, the Feds encourage private companies like Clearview AI, Amazon Ring and Flock Safety to use facial recognition and automatic license plate readers to identify everyone.

Adam Schiff's surveillance state.  Lawmakers are debating ways to prevent the Federal Bureau of Investigation from abusing its surveillance authority again.  While they're at it, they have an obligation to address their own privacy transgressor, Rep. Adam Schiff.  That's the gist of a pointed letter from Federal Communications Commissioner Brendan Carr, which landed Thursday at the House Intelligence Committee.  Chairman Schiff spent months conducting secret impeachment hearings.  His ensuing report revealed that he'd also set up his own surveillance state.  Mr. Schiff issued secret subpoenas to phone carriers, to obtain and publish the call records of political rivals.  Targets included Rudy Giuliani and another attorney of the president, the ranking Republican on the Intelligence Committee (Rep. Devin Nunes) and a journalist (John Solomon).

Why FISA Should Be Abolished!  It's time to put "foreign" back into the Foreign Intelligence Surveillance Act.  The Russia Hoax exposed FISA to the world; all the lies and deceptions that were sold to the FISA court to spy on Trump campaign associate, Carter Page, is proof.  As a result, Americans have lost trust in the FISA court... because they have lost faith in the FBI & DOJ to present evidence honestly in surveillance warrant applications.  There are only two real solutions.  1) Abolish FISA or, 2) Enact Senator Rand Paul's proposal that it can no longer be used against Americans.  Republicans are reluctant to renew FISA because of the chronic and pervasive abuse.  Democrats, who supposedly care more than anyone about civil liberties, should also be against it.

State proposes spy cameras to charge 'presumed guilty' citizens.  [The Virginia] legislature is considering the deployment of automated cameras and radar to "bring speeding charges for which the accused is presumed guilty." The Rutherford Institute is denouncing House Bill 1442, which would authorize "photo speed monitoring devices."  "At a time when the Commonwealth of Virginia is struggling with critical issues on almost every front, it is a poor reflection on the General Assembly that one of its top legislative priorities — authorizing the installation and deployment of automated speed cameras throughout the state — involves a backdoor means of generating revenue for localities and police agencies at the expense of the citizenry's rights to privacy and due process," said constitutional attorney John W. Whitehead, the institute's president.  "To the detriment of all, House Bill 1442 will further extend the government's pervasive and oppressive surveillance of citizens."

Trump's Presidency Reveals 7 Undeniable Facts About The Swamp.  [#7] As a result of what became known as Edward Snowden's 2013 Global Surveillance Disclosures, American and British initiatives were exposed including PRISM and Tempora that revealed cooperation with governments around the world working in connection with multi-national corporations including Microsoft, Facebook, Apple, Google, British Telecommunications, and Verizon.  Moreover, backdoor data-gathering programs such as XKeyscore were unveiled along with other various ways by which government spooks could intercept phone calls, text messages, and private data from commonly used internet platforms like Yahoo.  Just as technological breakthroughs in computing and the proliferation of "smart" communication and entertainment devices gave rise to government spying, it was not a very large leap of understanding to see how easy it would be to blackmail and control not only citizens, but government administrators, politicians, officials, and even judges, around the world.

Rogue NYPD cops are using facial recognition app Clearview.  Rogue NYPD officers are using a sketchy facial recognition software on their personal phones that the department's own facial recognition unit doesn't want to touch because of concerns about security and potential for abuse, The [New York] Post has learned.  Clearview AI, which has scraped millions of photos from social media and other public sources for its facial recognition program — earning a cease-and-desist order from Twitter — has been pitching itself to law enforcement organizations across the country, including to the NYPD.  The department's facial recognition unit tried out the app in early 2019 as part of a complimentary 90-day trial but ultimately passed on it, citing a variety of concerns.  Those include app creator Hoan Ton-That's ties to viddyho.com, which was involved in a widespread phishing scam in 2009, according to police sources and reports.

New Jersey cops told to halt all use of controversial facial-recognition technology.  The state attorney general is ordering all New Jersey police to stop using a powerful new facial-recognition technology that's pulling millions of photos from social media.  The order was issued Friday [1/24/2020] to county prosecutors, concerning a New York-based company called Clearview AI.  "Like many people, I was troubled," state Attorney General Gurbir Grewal said about the company's techniques, which were first reported by The New York Times.

The Role of Facial Recognition for Law Enforcement.  Faces have unique qualities that allow individuals to be recognized through computer algorithms that have developed to the point where software is being used by law enforcement to help identify perpetrators of crime.  As its use becomes widespread, the technology is raising concerns about privacy and security.  Sens. Chris Coons (D-Del.) and Mike Lee (R-Utah) are attempting to address these issues in their legislation, S. 2878, the Facial Recognition Technology Warrant Act of 2019, which was introduced on November 14, 2019.  This bipartisan legislation would impose limits on use of facial recognition technology by federal law enforcement agencies and require a warrant before this technology could be used for surveillance activities.  Since 2013, Citizens Against Government Waste has supported modernizing laws that would require a warrant to access email content and data stored in the cloud, including the Electronic Communications Privacy Act (ECPA) of 1986.  However, efforts to update ECPA have stalled with the current Congress.  The legislation introduced by Sens. Coons and Lee does not address access to email content and data accumulated and retained using new technologies beyond facial recognition algorithms and technology.

Mysterious drones are flying around the Midwest, Great Plains, and no one has answers.  Local and federal authorities are investigating confirmed reports of mysterious drone sightings in northeastern Colorado and Nebraska that appeared in the night sky this week.  Sheriff's offices in Lincoln, Washington and Sedgwick counties have been getting calls this week about the unknown winged devices after initial reports came out of Phillips and Yuma counties, sheriffs said.  The drones have 6-foot wingspans and fly between 7 and 10 p.m. in gridlike patterns 150 to 200 feet in the air in groups of six to 10, the Denver Post reported.

A Big And Bizarre Drone Mystery Is Unfolding In Rural Colorado.  [Scroll down]  Based strictly on the descriptions conveyed, it sounds like someone or some group is testing a broad-area surveillance capability with lower-end autonomous drones.  This could include something as simple as having a group fly a series of planned routes and return with the information gathered via autopilot.  By doing so, a group of small, relatively inexpensive drones can cover a large area quickly instead of single, far more expensive assets that could take more time and offer less redundancy.  Such a capability could be used for search and rescue, mapping, and general intelligence gathering.  This also doesn't require man-in-the-loop control that would necessitate line-of-sight connectivity.

Here are the FISA Court Documents Revealing How the Obama-Comey FBI abused surveillance powers.  In a little-publicized opinion issued on April 26, 2017, FISC Judge Rosemary Collyer scalded Obama-era intelligence agencies for rampant abuse of NSA databases.  These agencies, including the FBI, routinely accessed the communications (emails, texts, etc.) of American citizens.  Nearly 90 percent of all such queries were deemed violations of various laws, starting with the Fourth Amendment prohibiting illegal searches.  And no one, to my knowledge, has ever been held accountable.

The DNA database used to find the Golden State Killer is a national security leak waiting to happen.  A private DNA ancestry database that's been used by police to catch criminals is a security risk from which a nation-state could steal DNA data on a million Americans, according to security researchers.  Security flaws in the service, called GEDmatch, not only risk exposing people's genetic health information but could let an adversary such as China or Russia create a powerful biometric database able to identify nearly any American from a DNA sample.  GEDMatch, which crowdsources DNA profiles, was created by genealogy enthusiasts to let people search for relatives and is run entirely by volunteers.  It shows how a trend toward sharing DNA data online can create privacy risks affecting everyone, even people who don't choose to share their own information.

UNH poll infers 70% favor giving FBI all NH license photos.  A survey released by the University of New Hampshire claims to show that an overwhelming majority of residents support sharing driver's license photos with the Federal Bureau of Investigation for inclusion in a national facial recognition database.  New Hampshire officials do not share Department of Motor Vehicle photos with the FBI, but 21 states do support of the agency's efforts to build a massive database of over 400 million photos.

Gartner Predicts 11.2 Million 5G IoT Surveillance Cameras by 2022 and 49 Million Units for Connected Cars by 2023.  Don't like being watched?  Concerned about all the accidents and warnings associated with automated vehicles?  Worried that the Telecom Industry has provided NO scientific evidence that 5G is safe and many doctors and scientists say it isn't? [...] Opposition and litigation regarding forced 5G installation is increasing in the U.S. and worldwide.  It's going to take more than common sense to stop this insanity.

Christopher Wray Has Some Explaining to Do.  A constitution is a piece of paper.  The powerful must respect and submit to it or it has no power.  In America, our Constitution is supposed to protect Americans from government snooping.  While the framers might have feared overzealous constables with powdered wigs and silk stockings, the protection against unreasonable searches and spying is even more relevant today.  With our most private secrets stored online, Americans are more vulnerable than ever to spying by our own government.  Over the past few weeks, we found ourselves distracted by the Ukraine farce, courtesy of the CIA and its allies in the media and Congress.  You likely missed the release of a series of bombshell rulings that partially laid bare illegal spying on Americans by the FBI.

The government can now activate your phone camera to stream live video of whatever you are seeing.  A New Jersey police department recently implemented new technology that allows 911 operators in the area to stream live video from callers' smartphones with the touch of a button.  While callers will still have to give their consent to such monitoring, some media outlets have dubbed the technology a slippery slope towards automatic surveillance, whereby Big Brother will one day have immediate access to people's smartphones without their consent.  In the meantime, some police departments plan to utilize 911eye, as it's called, a product of Capita Secure Solutions and Services, for permission-based surveillance during emergencies, which will allow first responders to see exactly what callers are seeing before they arrive.

Rashida Tlaib, in contentious tour, tells Detroit police chief to hire only black analysts for facial recognition program.  Democratic Rep. Rashida Tlaib told Detroit's chief of police that he should hire only black people as analysts to run their facial recognition software because, she claimed, non-black people think they all look alike.  The suggestion came Monday as Chief James Craig gave Tlaib a tour of the Real Time Crime Center, where the department uses facial recognition technology to find suspects.  Craig was showing Tlaib how the software works, and how analysts use it to identify and locate individuals.  But the tour quickly turned contentious as the freshman Michigan congresswoman made repeated requests that were shot down by the chief.

No One Noticed When Clinton and Obama Abused Whistleblowers.  [Scroll down]  President Obama promised to be different.  In his official campaign documents, candidate Obama presented himself as a whistleblower's best friend, this in high relief to his predecessor who "stifled" the "courage and patriotism" of those who dared speak out.  As Thomas Drake can attest, Obama fell rather spectacularly short of his promises.  Drake, an Air Force veteran and NSA analyst, objected, as did others, to an NSA data collection program known as TrailBlazer.  Drake testified honestly when the accusations of waste, fraud, and mismanagement reached the Inspectors General office in the Department of Defense.  The Inspectors General report substantiated Drake's testimony, but that did not stop NSA management from persisting with TrailBlazer and punishing Drake with a purgatory of petty assignments.  In November 2007, Drake's life took a turn for the Kafkaesque when a dozen FBI agents raided his house for allegedly leaking info about the NSA's warrantless wiretap program.

Facial Recognition for a Free Travel Ticket in China?  Welcome To Orwell's 1984.  China wants to give its prisoners (populace) the ability to pay with their faces to ride subways; this will be combined with its social credit program — which already tracks the communist nation's citizens traveling — and if points are too low, it prevents travel. [...] In Shenzhen, China, home of OnePlus, Huawei and internet giant Tencent, the city has released a new government system for elderly Chinese.  This new program will allow residents of China over the age of 60 to register for free subway rides, using just their face as their ticket.  If you think this is just a one-off, you would be utterly wrong.  This form of facial recognition is already being experimented in other cities including Jinan, Shanghai and Nanjing according to the South China Morning Post.

Baltimore To Fight Crime By Airplane Surveillance Of Entire City.  The head of an aerial surveillance company is pitching Baltimore officials on flying not one but three camera-laden planes above the city simultaneously, covering most of the city and its violent crime, he said in emails obtained by The Baltimore Sun.  A pair of Texas donors have stepped forward to help fund three planes and extra police, 40 local analysts and oversight personnel if there is city buy-in, the records and interviews show.  The effort aims to "demonstrate the effectiveness" of such an all-seeing surveillance system in fighting crime in the city. [...] Each plane would be capable of recording up to 32 square miles at a time, and each would fly 45 to 50 hours a week, McNutt said.

Secret FBI Subpoenas For Personal Data Go Far Beyond Previously Known.  Secret subpoenas issued by the FBI for personal data go far deeper than previously known, according to new documents obtained by the Electronic Frontier Foundation through a Freedom of Information Act (FOIA) lawsuit, according to the New York Times.

Orwellian Nightmare:  Six US Cities Make List Of Most Surveilled Places In The World.  A new report from Comparitech, a technology research firm, details how an Orwellian society, very similar to what was written in George Orwell's (non-fiction) novel 1984, is playing out across cities in the US. According to Comparitech, six US cities made the top 50 list of the most surveilled places in the world.  Why?  Because closed-circuit television (CCTV) cameras in the US have increased from 33 million in 2012 to nearly 62 million in 2016 and could double or triple from there in the next five years.  Both government and private sources operate these cameras in cities.

Detroit Police Commission Board Approves Use Of Facial Recognition Technology Despite National Backlash.  The Detroit Board of Police Commissioners voted to approve the Detroit Police Department's use of controversial facial recognition technology on the public, Courthouse News reported.  According to the directive, police would be limited to using the system when officers have "reasonable suspicion" of home invasions and violent crimes involving incidents like shootings, sexual assaults and carjacking.  Further, the system doesn't have assess to check immigration status on individuals and was restricted from accessing live surveillance streaming video or any security camera device.  Outside agencies would be allowed access to the information if needed after proper paperwork is filed.

This Company Built a Private Surveillance Network.  We Tracked Someone With It.  In just a few taps and clicks, the tool showed where a car had been seen throughout the U.S. A private investigator source had access to a powerful system used by their industry, repossession agents, and insurance companies.  Armed with just a car's plate number, the tool — fed by a network of private cameras spread across the country — provides users a list of all the times that car has been spotted.  I gave the private investigator, who offered to demonstrate the capability, a plate of someone who consented to be tracked.

Don't Smile for the Camera.  Our federal government's 60,000-person strong domestic spying apparatus already captures every keystroke — even those which we think we have deleted — on every device used to transmit digital data on fiber optic cable in the United States.  That covers every mobile, desktop and mainframe device.  The government, of course, will not acknowledge this publicly.  Yet some of its officials have told as much to me privately.  They have also told me that they believe that they can get away with this so long as the data captured is not used in criminal prosecutions.  Why is that?  The last thing the feds and rogue police want is for government agents to be compelled to answer under oath how they acquired the evidence they are attempting to introduce.  Yet the admission of spying assumes that the right to privacy, which is guaranteed in the Fourth Amendment to the Constitution, is protected from governmental invasion only for criminal prosecution purposes.

Rutherford Institute Launches Inquiry Into Government Use of Drivers' License Photos to Build Facial Recognition Database, Track Citizens.  Pushing back against the expansion of secret government surveillance programs at the expense of individual privacy, The Rutherford Institute is asking the State of Illinois to disclose information about its participation in the federal government's scheme to establish a massive facial recognition database by collecting the drivers' license photographs of millions of Americans.  In a Freedom of Information Act (FOIA) request made on behalf of Illinois resident Dmitry Feofanov, The Rutherford Institute is seeking details about the federal government's facial recognition program, which allows government agents to track citizens whenever they are in public.  The request comes after it was disclosed in July 2019 that the FBI and Immigration and Customs Enforcement (ICE) have mined information kept by state DMVs to create a massive database of biometric photos and personal information without the consent of citizens.

California Bill Would Ban Facial Recognition Tech On Body Cams.  A proposed bill banning facial recognition features on police body cameras is waiting for California Governor Gavin Newsom's stamp of approval.  According to reports, the state's legislature voted in favor of the controversial law Thursday [9/12/2019].  Supporters of the bill say the devices would be helpful to crack down on crime, but critics warn the new age technology comes with flaws.  This comes as several studies have shown facial recognition technology to be inaccurate, especially when trying to identify minorities, women and in some cases even well known lawmakers.

Dem senator worries Amazon's Ring doorbell could cause increased racial profiling.  Sen. Edward Markey expressed worries Thursday [9/5/2019] that Amazon's video doorbell Ring and its partnership with law enforcement could lead to increased racial profiling, particularly with people of color.  Mr. Markey wrote a letter to Amazon's chief executive saying he was "alarmed to learn that Ring is pursuing facial recognition technology" and offering police departments access to Rekognition, their face-matching program.  The Massachusetts Democrat added the technology raises "serious privacy and civil liberties concern" that "could easily create a surveillance network that places dangerous burdens on people of color" in areas where Ring has partnered with police officials.

The Editor says...
The creation of a Big Brother surveillance state is alarming enough.  There is no need to inject a racial component into this issue.

The Surveillance State Is Here and Now.  The Police State with full Surveillance State capability is not coming; it is already here.  And private citizens are purchasing and installing the apparatus used to build it.  Amazon-owned Ring, which sells video doorbells and other security cameras, announced last week that it has "partnered" with more than 400 police departments across the United States to create the Neighbors Active Law Enforcement Map using the video feeds from doorbells bought, paid for, and installed by private citizens. [...] On the darker side of the equation, your ever-connected spy-cam is also accessible by the Amazon employees and the police, if your local department has joined Ring's "partnership" program.  All of your comings and goings, all of your friends comings and goings, and all of the traffic in front of your home — and within the range of the camera — are part of the data now available to police without so much as applying for a search warrant.

Your Apple Watch May Be Used to Decide Whether You Can Own a Gun.  The Trump administration is reportedly considering a proposal that would see the federal government partnering with Google, Amazon, and Apple in order to use their smart home devices to capture data on users — and then use that information to determine whether users exhibit signs of mental illness and a potential for violent behavior.  The Washington Post published the report, citing sources within the administration.  Although it did not specify whether the president himself approves of the proposal, it was apparently brought to the White House by the Suzanne Wright Foundation.

Doorbell-camera firm Ring has partnered with 400 police forces, extending surveillance reach.  The doorbell-camera company Ring has quietly forged video-sharing partnerships with more than 400 police forces across the United States, granting them access to homeowners' camera footage and a powerful role in what the company calls the nation's "new neighborhood watch."  The partnerships let police automatically request the video recorded by homeowners' cameras within a specific time and area, helping officers see footage from the company's millions of Internet-connected cameras installed nationwide, the company said.  Officers don't receive ongoing or live-video access, and homeowners can decline the requests, which Ring sends via email, thanking them for "making your neighborhood a safer place."

American And Chinese Cities Lead The World In Spying On People.  It is no longer speculation, American law enforcement has been lying to the public about the expansion of CCTV camera surveillance.  A recent report released by CompariTech confirmed what I have been warning people about for years:  American law enforcement has become a world leader in spying on its citizens. [...] CompariTech measured the amount of CCTV cameras per 1,000 people in a city and two U.S. cities made the Top 20.  "Atlanta has 7,800 cameras for 501,178 people or 15.56 cameras per 1,000 people and Chicago has 35,000 cameras for 2,679,044 people or 13.06 cameras per 1,000 people."  But that only scratches the surface of American police surveillance.

The opposite of journalism:  CNN is encouraging government officials to lie.  In March 2013, U.S. Director of National Intelligence James Clapper lied under oath before the Senate Intelligence Committee.  Sen. Ron Wyden, D-Ore., asked Clapper, "Does the NSA collect any type of data at all on millions, or hundreds of millions of Americans?" Clapper responded with a flat denial.  "No, sir. ... Not wittingly.  There are cases where it could, inadvertently perhaps.  But not wittingly."  This was a blatant lie, told knowingly and willingly, in public and under oath.  Just months later, Edward Snowden's leaks proved it.  Clapper had been exposed, and he could have been prosecuted, if not for the chummy Washington culture in which the powerful protect one another.

Unmasking the unmaskers.  In early 2009, Department of Justice officials acknowledged that broad authority granted by the previous Bush Administration had resulted in government "overcollection" of domestic communications by the National Security Agency.  Under President Barack Obama, the FBI, CIA, and other agencies' searches of names or phone numbers of U.S. citizens in surveillance metadata exploded from 9,500 in 2013, to 30,355 in the election year of 2016.

Pentagon testing mass surveillance balloons across the US.  The US military is conducting wide-area surveillance tests across six midwest states using experimental high-altitude balloons, documents filed with the Federal Communications Commission (FCC) reveal.  Up to 25 unmanned solar-powered balloons are being launched from rural South Dakota and drifting 250 miles through an area spanning portions of Minnesota, Iowa, Wisconsin and Missouri, before concluding in central Illinois.  Travelling in the stratosphere at altitudes of up to 65,000 ft, the balloons are intended to "provide a persistent surveillance system to locate and deter narcotic trafficking and homeland security threats", according to a filing made on behalf of the Sierra Nevada Corporation, an aerospace and defence company.

LAPD Spied On Left-Wing Activists During Trump Protests.  The LAPD ordered a confidential informant to secretly record the group Refuse Fascism, the documents show.  Transcripts of the interaction were obtained in a criminal case against activists who were charged with trespassing after blocking traffic on a California freeway amid anti-Trump protests.  The operation was spearheaded by the LAPD's Major Crime Division in October 2017 ahead of potential mass demonstration to mark the first anniversary of Trump's election.  The informant was equipped by police with a hidden recording device and assigned the informant to attend Refuse Fascism meetings at a local church "in an attempt to elicit information regarding the closure" of the freeway and to express interest in being involved "in any such future activities", police wrote.

Israeli security company reportedly has tool that spies on Apple, Google and Facebook cloud data.  An Israeli cybersecurity company has developed spyware that can scrape data from the servers of Apple, Google, Facebook, Amazon and Microsoft products, according to The Financial Times.  The report says NSO Group's proprietary smartphone malware, Pegasus, harvests not only data stored on a device, but also any information stored in the cloud, including a user's location data, archived messages and photos.  NSO Group, who previously installed malware in Facebook's WhatsApp, denied that it markets software capable of capturing data in the cloud.  It's unclear if it has developed the tools internally.

When Does the Deep State Morph into the Police State in Our Country?  The East German state police agency, the Stasi, was granted virtually unlimited power to monitor and spy on the lives of their citizens with the objective of maintaining absolute control over all aspects of the personal and professional lives of its people.  The Stasi was renowned for being highly proficient and effective in its ability to subjugate East Germany's citizens.  This movie is a warning to Americans about the dire consequences of increasing the powers of the state.

NSA collected phone data it was not authorized to obtain.  The NSA's much maligned phone data collection program was dealt another blow Wednesday [6/26/2019], after it emerged it had collected call and text records it wasn't authorized to obtain — the second time such an incident has occurred.  The error, which took place last October, happened several months after the agency said it had purged hundreds of millions of metadata records it had over-collected since 2015, following a similar incident.

State GOP Learns to Love Big Brother.  In Great Britain, officials are arresting people who refuse to submit to a random face scan.  Their facial-scan system has proved wildly inaccurate, often leading to aggressive police actions against people misidentified as suspects.  You can't walk around any British city without being monitored by police cameras somewhere — something that has turned once-free citizens into the kind of sheep who have to be careful about anything they say or do lest it trigger a police visit.  American cities are trying to follow this police-state model, emboldened by tech companies that will earn a fortune by opening up this taxpayer-funded marketplace.  California agencies want body cameras not only to record police encounters — something that protects the public from abusive officers and officers from unfounded abuse allegations — but to alert the authorities if the person's face matches that of a suspect on some growing database.  The problems are obvious.

Review: Google Chrome has become surveillance software.  It's time to switch.  You open your browser to look at the web.  Do you know who is looking back at you?  Over a recent week of web surfing, I peered under the hood of Google Chrome and found it brought along a few thousand friends.  Shopping, news and even government sites quietly tagged my browser to let ad and data companies ride shotgun while I clicked around the web.  This was made possible by the web's biggest snoop of all:  Google.  Seen from the inside, its Chrome browser looks a lot like surveillance software.

They are Watching Us — All the Time.  During the Obama presidency, Americans discovered that his administration's intelligence agencies were spying on us.  In fact, Director of National Intelligence James Clapper lied to Congress about it, for which he was never charged — but then, he's a Democrat, the laws don't apply to them.  Eventually, he came clean, admitting that all Americans were being spied on, all the time, with spy agencies keeping a record of all phone conversations, texts, and emails made by every American.  This was merely a precaution in case they ever needed to prosecute any of those who disagreed with Barry.  Yet, I believe that the tech industry not only does the same thing (spying) but does it better.

The Omnipresent Surveillance State:  Orwell's 1984 Is No Longer Fiction1984 portrays a global society of total control in which people are not allowed to have thoughts that in any way disagree with the corporate state.  There is no personal freedom, and advanced technology has become the driving force behind a surveillance-driven society.  Snitches and cameras are everywhere.  People are subject to the Thought Police, who deal with anyone guilty of thought crimes. [...] Incredibly, as the various nascent technologies employed and shared by the government and corporations alike — facial recognition, iris scanners, massive databases, behavior prediction software, and so on — are incorporated into a complex, interwoven cyber network aimed at tracking our movements, predicting our thoughts and controlling our behavior, the dystopian visions of past writers is fast becoming our reality.

Report:  Obama seriously violated the 4th Amendment.  A new report reveals that the government routinely violated American 4th Amendment protections under the Obama administration while snooping through overseas intercepts.  Administration officials only revealed the illegal actions as the previous president headed out the door.  That's according to a report out from Circa, which confirms suspicions that American privacy suffered greatly under President Barack Obama.

Faces in the crowd.  The Lockport (N.Y.) City School District was poised to test a facial recognition security system for students and staff this week until a late-breaking memo from the New York Department of Education temporarily halted the program.  The district told parents the goal was to enhance student safety, but the proposal drew criticism from concerned local residents and the New York Civil Liberties Union (NYCLU).  The system would have provided surveillance at schools and issued an alert when the cameras detected someone whose face appeared in a database of flagged individuals.  The NYCLU asked the New York Department of Education to intervene, stating that schools should be "safe spaces" where students are not "constantly surveilled."

The Case for Prosecuting Comey and Brennan.  Just imagine a snooping government making a word-searchable transcript of audio and digital recording of video passively transmitted from your phone.  What could a curious agent, with access to a feed from the two cameras in your phone, record while simultaneously viewing your private life in both directions?  Such data could give unlimited power to influence and blackmail elected officials, private citizens, judges, law enforcement, journalists, and so on.  When Americans see a public official or an influential journalist suddenly reverse a position or do something otherwise deemed illogical, speculation often runs to question whether "somebody has something on" that official.  We should worry about the potential abuse of a database containing essentially unlimited source material that easily could be used to gain power over our fellow Americans.

FISA Court exposes Obama's abuse of NSA to spy on Americans.  The Obama White House used the most sensitive intrusive surveillance systems of the NSA to spy on Americans.  A ruling by FISA Court Presiding Judge Rosemary Collyer finds that 85% of NSA database requests under FISA section 702 authority at the DOJ were illegal or noncompliant.  Surveillance systems, including PRISM, spying on hundreds if not thousands of Americans.  Including Donald Trump and those around him.  Moreover, Collyer finds, that the Department of Justice showed an appalling "lack of institutional candor".

The "Secret Research Project" — an IRS List, an NSA Database, and Resulting "Files" on Americans.  In April 2017 Judge [Rosemary] Collyer wrote a highly critical FISA Court opinion following discoveries by Director Admiral Rogers of government contractors accessing the NSA database, and extracting illegal search results from the electronic records of every American.  The scale of abuse was incredible and the surveillance issues had been covered up for years.  Collyer cited the Obama administration as having "an institutional lack of candor" in their responses to her and the FISA court.  The judge focused her criticism after a review of the period 2012 through April 2016.

Waking up in a virtual jail with no recollection of how you got there.  China's growing surveillance state has made the news again.  The NYT described a "God's-eye" — perhaps better described as a State's-eye — view of Chinese society as seen from the millions of networked devices that are blanketing the country. [...] The combination of ubiquitous sensors and database fusion has allowed the Communist Party to create "virtual cages" for millions of people.  It's easy with Internet of Things technology to turn off an individual's credit card, phone, car, refrigerator, etc., should he stray into a proscribed zone.

Huawei's An Asset All Right — But It's Not Our Asset.  China's 1.4 billion people are encircled, monitored and censored in their digital communications by the "Great Firewall of China."  Anyone who dares dissent openly from the Party line risks prison.  China's rulers are now enlisting technology to enhance the usual pervasive domestic surveillance with an Orwellian system designed to control everyone in its sights by assigning scores, rewards and penalties for "social credit."

Police Facial Recognition Systems Have Registered Over 117 Million Americans.  Massive nationwide study in 2006 reveals that thirty-six percent of Americans are in a facial recognition database, and the number is growing rapidly.  Law enforcement is mostly unregulated and agencies are free to drift toward a police state reality.

Listen to Joe diGenova.  If diGenova's track record holds, a legal rain of ruin is about to befall the deep state operatives who tried to steal the 2016 election and, failing that, to unwind the result.  And if, in fact, the enormous surveillance powers of our intelligence agencies were usurped by the Obama administration to spy for years before the election on the opposing political party, then the implications go far beyond just one election and one presidential candidate.  If that happened, then there can be no doubt that, when candidate Obama promised to "fundamentally transform America," he really meant it.  If Obama's "fundamental transformation" involved not only the atrocious harassment and intimidation of the Tea Party patriots by his Internal Revenue Service, but also included surveillance state spying on the Republican Party generally, there must be no question about whether the deep state actors should be punished for their actions.

NSA Metadata Collection May Be a Thing of the Past.  The agency is now calling for an end to the PATRIOT Act's Section 215 data program.

Can We Give James Clapper The Roger Stone Treatment Yet?  On March 12, 2013, Gen. James R. Clapper, Jr., President Obama's director of the Office Of National Intelligence, testified under oath before the Senate Intelligence Committee.  Responding to a question from Oregon Sen. Ron Wyder on whether the U.S. government was collecting "any type of data at all" from American citizens, Clapper paused and said, "No, sir. ... Not wittingly."  Three months later, when Edward Snowden dumped millions of stolen government documents into the public domain, it became abundantly clear that Clapper lied.  The U.S. government was, in fact, vacuuming up details about virtually every electronic communication by every American citizen.  When asked directly about his answer to Wyden, Clapper said that his response was "the least untruthful" answer he could give.

The Feds 9,000 "Opportunity Zones" Will Allow Law Enforcement To Spy On 35 Million People.  Is there no end to Big Brother's desire to turn America into a mirror image of China?  An article in Go Erie, revealed how the Feds are classifying parts of cities as "Opportunity Zones" or as I call them "Opportunity Surveillance Zones" (OPS ).  The U.S. Treasury Department and the Internal Revenue Service are using Opportunity Zones to help law enforcement turn sections of cities into federally funded surveillance zones.  Mayor Joe Schember's administration is using federal grants to turn Erie, Pennsylvania into an OPS.

Report: ICE Agents Given Access to Private License Plate Database.  The more important lead story of this article is buried within the outcome story of ICE agents using a private license plate database to capture illegal aliens. [...] Use a private-sector database to track down people for missed property tax payments; or use the database to track lawful gun owners; or use the database to stop a traveler from entering an airport until they pay an unpaid parking fine, and hey, no biggie.  But start using that private database to arrest illegal aliens, and Whoa, now the ACLU says we've got a problem.

Facial recognition's 'dirty little secret': Millions of online photos scraped without consent.  Facial recognition can log you into your iPhone, track criminals through crowds and identify loyal customers in stores.  The technology — which is imperfect but improving rapidly — is based on algorithms that learn how to recognize human faces and the hundreds of ways in which each one is unique.  To do this well, the algorithms must be fed hundreds of thousands of images of a diverse array of faces.  Increasingly, those photos are coming from the internet, where they're swept up by the millions without the knowledge of the people who posted them, categorized by age, gender, skin tone and dozens of other metrics, and shared with researchers at universities and companies.

18 Real Attacks on the 'Rule of Law'.  [#1] Unmasking:  Obama Administration officials "unmasked" hundreds of Americans who were caught up in government surveillance of foreign nationals.  It's illegal for the government to spy on Americans without a warrant.  So when an American is heard speaking to a target of a legal foreign wiretap, the government is supposed to take action to shield the American from the effect of the surveillance.  Without those safeguards, it's just the government spying on an American citizen without a warrant.  Hundreds of Americans were outed (unmasked) by former United Nations Ambassador Samantha Power and other Obama officials in the closing months of Obama's tenure, despite the fact that Power as the U.S. ambassador to the U.N. had no reason to be perusing the private conversations of American citizens.

Singapore to test facial recognition on lampposts, stoking privacy fears.  In the not too distant future, surveillance cameras sitting atop over 100,000 lampposts in Singapore could help authorities pick out and recognize faces in crowds across the island-state.

'Inherently invasive': FBI counter-hacking operations raise red flags over privacy.  To catch a hacker, sometimes you have to be a hacker.  But when it's the FBI doing the hacking, civil liberties groups get worried.  The agency's revelation this week that it joined a computer botnet attack piggybacking on the malware's signal to track its activities has raised new questions about what is acceptable in cybersecurity.  The problem, the civil liberties advocates say, is that the FBI collected IP addresses and "ancillary" information from computers it traversed as it tried to map the Joanap malware.

How To Use Encrypted USB Memory Sticks.  To protect your data on your USB stick, you should encrypt your data.  There are two methods to encrypt data on a USB stick — hardware and software.  Hardware encryption is a special USB stick that includes additional chips in the USB stick to encrypt your data.  Software encryption uses a normal USB stick and does the encryption though software on the computer.

Border Patrol and the TSA [were] allowed to secretly spy on everyone's social media accounts.  The U.S. Border Patrol (CBP) and the TSA claim they need to secretly spy on everyone's social media accounts so they can understand a person's relationship with their friends, family and the government.  According to a DHS report published last month, nothing can stop the Border Patrol or the TSA from secretly spying on everyone's social media accounts.  "In order to conduct a complete investigation, it is necessary for DHS/CBP to collect and review large amounts of data in order to identify and understand relationships between individuals, entities, threats and events, and to monitor patterns of activity over extended periods of time that may be indicative of criminal, terrorist, or other threat."  Understanding a person's relationship with "entities" is just a euphemism for the government.  The Feds want to know if you are anti-government an activist or a protester.

Schools in China introduce 'smart uniforms' with GPS chips to track students' movements and stop napping.  Schools in China have created uniforms with tracking chips to monitor students' whereabouts and stop them playing truant.  The so-called "smart uniforms", which have been criticised on social media, record the time and date a student enters the school and a short video parents can see through a mobile app.  Eleven schools in the southwest province of Guizhou have introduced the uniforms, developed by local tech firm Guizhou Guanyu Technology.  Skiving off classes triggers an alarm to notify both teachers and parents of the student's absence and an automatic voice alarm is activated if a student leaves school without permission.

The Editor says...
That's a little extreme, although I've worked with some people who always seemed to be someplace other than their work station, and could have used a little of this automatic supervision.

Connected cars accelerate down data-collection highway.  Automakers are collecting valuable pieces of information thanks to the internet connections, cameras and sensors built into most vehicles in recent years.  The online access makes it possible for cars to be unlocked remotely if the keys are lost.  It's how safety features can be upgraded wirelessly and maintenance schedules adjusted based on performance.  But these digital peepholes are also offering a windshield-size view of people's lives.  That's creating the potential for intrusive marketing pitches and government surveillance.

Before and After:  What We Learned About the Hemisphere Program After Suing the DEA.  In late 2013, right as the world was already reeling from the Snowden revelations, the New York Times revealed that the AT&T gives federal and local drug enforcement investigators access to a phone records surveillance system that dwarfs the NSA's.  Through this program, code-named Hemisphere, police tap into trillions of of phone records going back decades.  It's been five long years of privacy scandals, and Hemisphere has faded somewhat from the headlines since it was first revealed.  That was long enough for officials to rebrand the program "Data Analytical Services," making it even less likely to draw scrutiny or stick in the memory.  Nevertheless Hemisphere remains a prime example of how private corporations and the government team up to help themselves to our digital lives, and the lengths they will go to to cover their tracks.

Hemisphere:  Law Enforcement's Secret Call Records Deal With AT&T.  For almost 10 years, federal and local law enforcement agencies across the country have engaged in a massive and secretive telephone surveillance program known as "Hemisphere."  Publicly disclosed for the first time in September 2013 by the New York Times, the Hemisphere program provides police access to a database containing call records going back decades, combined with a sophisticated analytical system.  The program involves a private-public partnership with AT&T.  "Hemisphere" came to light amidst the public uproar over revelations that the NSA had been collecting phone records on millions of innocent people.  However, Hemisphere wasn't a program revealed by Edward Snowden's leaks, but rather its exposure was pure serendipity:  a citizen activist in Seattle discovered the program when shocking presentations outlining the program were provided to him in response to regular old public records requests.

The Hemisphere Project (f/k/a Hudson Hawk): The Latest Spy Scandal Involving 4 Billion Recorded Phone Calls Per Day.  It is convenient that in a recent post covering the latest historic Verizon M&A deal we showed a spaghetti chart, created by the WSJ, of the US telecom space because it lays roughly how many current subscribers that other US telecom giant, AT&T, has.

Facebook's Deepest, Dirtiest Secret.  Facebook is a for-profit surveillance company disguised as a social media company.  Once you invite it into your life, it will suck as much data as it can from you.  If you're on Facebook — or if you use Facebook-owned WhatsApp or Instagram — you're sharing the most intimate details of your private life with advertisers and political campaign strategists.  If that doesn't alarm you, consider that Facebook is also an unofficial arm of the Deep State's surveillance apparatus.  Leaked documents from the National Security Agency (NSA) revealed this back in 2013.  As the result of secret court orders, Facebook — along with Google, Microsoft, and Yahoo — routinely hands over users' account details to the U.S. government spooks.

Homeland Security Will Let Computers Predict Who Might Be a Terrorist on Your Plane — Just Don't Ask How It Works.  You're rarely allowed to know exactly what's keeping you safe.  When you fly, you're subject to secret rules, secret watchlists, hidden cameras, and other trappings of a plump, thriving surveillance culture.  The Department of Homeland Security is now complicating the picture further by paying a private Virginia firm to build a software algorithm with the power to flag you as someone who might try to blow up the plane.  The new DHS program will give foreign airports around the world free software that teaches itself who the bad guys are, continuing society's relentless swapping of human judgment for machine learning.

Chinese businesswoman accused of jaywalking after AI camera spots her face on an advert.  Chinese police have admitted to wrongly shaming a famous businesswoman after a facial recognition system designed to catch jaywalkers mistook an advert on the side of a bus for her actual face.  Dong Mingzhu, president of Chian's biggest air conditioning maker, had her image flashed up on a public display screen in the city of Ningbo, near Shanghai, with a caption saying she had illegally crossed the street on a red light.  But Ningbo's facial recognition cameras had actually only caught an advert featuring her face on the side of a passing bus — a fact quickly spotted by Chinese citizens, who shared pictures of the alert on Weibo, a social network similar to Twitter.

Surveillance cameras equipped with thermal imaging allow police to identify people by their gender, body size and color of their skin.  BriefCam's Video Synopsis version V allows police and retail stores to use surveillance cameras to identify individuals and cars in real-time.  "BriefCam is the industry's leading provider of Video Synopsis® solutions for rapid video review and search, real-time alerting and quantitative video insights.  By transforming raw video into actionable intelligence."  What is really disturbing about the video is no one knows where it is being used and by whom.  BriefCam's limited disclosures, claim it is being used by top law enforcement agencies and governments but that's it.

Sheriff's Dept.: The 1,079 Privileged Jailhouse Calls We Intercepted Was Actually 34,000 Calls.  A few months back, the Orange County Sheriff's Department admitted it had been listening in on privileged conversations.  Calls from inmates to lawyers were being swept up along with everything else by service provider Global Tel Link.  This violation of state law (among other things) jeopardized dozens of prosecutions.  In all, GTL's so-called "technical error" resulted in the interception of more than 1,000 privileged calls.  The Sheriff's Department claimed it told GTL to fix the problem, but didn't appear to have been terribly bothered by this evidentiary windfall... some of which made its way into the hands of prosecutors.  It made several disappointed noises about its provider when confronted in court, but its quasi-proactive "knock it off" — directed towards GTL — didn't explain its lack of proactivity when it came to informing criminal defendants and their legal reps their cases may have been compromised by attorney-client privilege violations.

Feds Also Using 'Reverse Warrants' To Gather Location/Identifying Info On Thousands Of Non-Suspects.  Because nearly everyone carries a tracking device on their person these days, it's become a whole lot easier for the government to find out where everybody's been.  It's TinEye but for people, and it appears to be a new go-to tool for law enforcement.  What used to be officers canvassing the area where a crime took place is now a warrant sent to Google to obtain location data and identifying info for all people and devices in the area.  These so-called "reverse warrants" first started coming to light earlier this year.  The Raleigh Police Department (NC) was serving warrants to Google in hopes of figuring out who to suspect of committing crimes, rather than having a suspect in mind and working forward from there.  The warrants were of the "general" variety, guaranteed to give the RPD location/identifying info of hundreds of non-suspects who just happened to be in the area.  There's some evidence Google has pushed back against these warrants, but it hasn't been enough to deter law enforcement from continuing to use Google as one-stop shopping to bulk location/identifying info.  This practice isn't limited to the local boys.

Obama-era CIA peeked at congressional staff emails.  The CIA during the Obama administration intercepted and analyzed the email of some congressional staffers, the agency publicly confirmed this week, releasing declassified notifications from 2014 that contained details of the snooping.  The emails dealt with CIA whistle-blowers, and the agency said they were snared during "routine counterintelligence (CI) monitoring of government computer systems."  The agency then prepared a report on the information in the emails — apparently sensitive conversations about protecting whistle-blowers looking to report malfeasance by the agency.

That sign telling you how fast you're driving may be spying on you.  The next time you drive past one of those road signs with a digital readout showing how fast you're going, don't simply assume it's there to remind you not to speed.  It may actually be capturing your license plate data.  According to recently released US federal contracting data, the Drug Enforcement Administration will be expanding the footprint of its nationwide surveillance network with the purchase of "multiple" trailer-mounted speed displays "to be retrofitted as mobile LPR [License Plate Reader] platforms."  The DEA is buying them from RU2 Systems Inc., a private Mesa, Arizona company.  How much it's spending on the signs has been redacted.  Two other, apparently related contracts, show that the DEA has hired a small machine shop in California, and another in Virginia, to conceal the readers within the signs.  An RU2 representative said the company providing the LPR devices themselves is a Canadian firm called Genetec.

That Radar Speed Road Sign Might Be Saving Your License Plate for Later.  Zooming down the highway past a radar speed sign can serve as a reminder you're going a little to hard on the gas pedal, but it can also get your license plate number siphoned into a massive data dragnet used by the Drug Enforcement Agency (DEA).  A new report in Quartz details an extensive new government contract between the DEA and RU2 Systems, a manufacturer of Radar Speed Display Trailers, and other contractors based in California, Virginia and Canada.

Shanghai airport automates check-in with facial recognition.  It's now possible to check in automatically at Shanghai's Hongqiao airport using facial recognition technology, part of an ambitious rollout of facial recognition systems in China that has raised privacy concerns as Beijing pushes to become a global leader in the field.

Welcome to the Quiet Skies.  Federal air marshals have begun following ordinary US citizens not suspected of a crime or on any terrorist watch list and collecting extensive information about their movements and behavior under a new domestic surveillance program that is drawing criticism from within the agency.  The previously undisclosed program, called "Quiet Skies," specifically targets travelers who "are not under investigation by any agency and are not in the Terrorist Screening Data Base," according to a Transportation Security Administration bulletin in March.

Facebook's creepy new speakers are freaking people out.  Facebook is rolling out its first-ever tech gadget — and it's every bit as creepy as you'd expect.  The social-networking giant on Monday unveiled a new line of voice-activated home speakers with screens that enable video chats with friends and family — but critics said they sound more like Big Brother spy devices.  In addition to collecting data on users' commands with Alexa-powered artificial intelligence software, the Portal and Portal+ speakers are equipped with cameras that can follow users around a room and enhance the sound of their voices when they talk.

What happened to the FBI's quest for web browsing data?  Senate leaders eagerly championed FBI Director James Comey's 2016 request for more power to seize Internet browsing histories without court oversight in national security investigations.  But after coming just two votes from victory, the FBI's "number one legislative priority" hasn't received much attention. [...] Experts were reluctant to speak on the record about why they believe the fight stalled.  One policy advocate who opposed expanding national security letter authority told the Washington Examiner that it is important to discern whether the FBI is relying on other authorities or methods to get this information without a court order.

We Are Living Nineteen Eighty-Four.  George Orwell's 1949 dystopian novel Nineteen Eighty-Four is no longer fiction.  We are living it right now.  Google techies planned to massage Internet searches to emphasize correct thinking.  A member of the so-called deep state, in an anonymous op-ed, brags that its "resistance" is undermining an elected president.  The FBI, CIA, DOJ, and NSC were all weaponized in 2016 to ensure that the proper president would be elected — the choice adjudicated by properly progressive ideology.  Wearing a wire is now redefined as simply flipping on an iPhone and recording your boss, boy- or girlfriend, or co-workers.

Turning the Tide on Police Surveillance.  The stories seem non-stop.  The NSA, FBI, and other federal agencies are spying on us in new ways and with new programs or authorities.  But surveillance that is most overlooked, but is equally as pervasive, is how state and local police spy on their own residents.  In Baltimore, the police department secretly deployed Stingrays to track the phone calls of residents in primarily black neighborhoods.  In New Orleans, the police entered into a six-year contract with data mining firm Palantir to conduct predictive policing.  When residents found out, their opposition was so fierce that within two weeks, the city canceled the agreement.  And in cities and towns all over the country, police departments are tracking people's movements with surreptitiously installed automatic license plate readers.

Public Transit Becomes Another Tool for Total Government Surveillance.  Richmond, Virginia's new bus-rapid-transit system, the Pulse, has been beset with controversy.  The original price tag of $49 million has risen to around $65 million.  Some community leaders and City Council members thought its footprint didn't go far enough.  The system was supposed to be up and running months ago, and businesses along the affected Broad Street corridor have complained about the way the drawn-out construction has kept customers away.  City marketers like to say Richmond is "easy to love," but loving the Pulse takes more effort.  Now there's another reason to harbor a resentment against it:  surveillance.

You May Be Secretly Watched by the TSA on Your Next Airplane Flight.  A government surveillance program that secretly monitors Americans on domestic flights, even if they are not suspected of any crime and have no ties to terrorism, is being questioned by civil liberties advocates and the general public.  The program — called "Quiet Skies" by the Transportation Security Administration (TSA) — has been in existence since 2010, when Barack Obama was in the White House.  But it was disclosed to the general public this past weekend via reporting by The Boston Globe.

Flying the quiet skies.  Federal air marshals have begun following ordinary US citizens not suspected of a crime or on any terrorist watch list and collecting extensive information about their movements and behavior under a new domestic surveillance program that is drawing criticism from within the agency.  The previously undisclosed program, called "Quiet Skies," specifically targets travelers who "are not under investigation by any agency and are not in the Terrorist Screening Data Base," according to a Transportation Security Administration bulletin in March.  The internal bulletin describes the program's goal as thwarting threats to commercial aircraft "posed by unknown or partially known terrorists," and gives the agency broad discretion over which air travelers to focus on and how closely they are tracked.

The cameras that know if you're happy - or a threat.  Facial recognition tech has been around for decades, but it has been progressing in leaps and bounds in recent years due to advances in computing vision and artificial intelligence (AI), tech experts say.  It is now being used to identify people at borders, unlock smart phones, spot criminals, and authenticate banking transactions.  But some tech firms are claiming it can also assess our emotional state.  Since the 1970s, psychologists say they have been able to detect hidden emotions by studying the "micro expressions" on someone's face in photographs and video.  Algorithms and high definition cameras can handle this process just as accurately and faster, tech firms say.

Six Reasons Why Barack Obama Is the Worst President in History.  [#5] Obama's surveillance state:  According to the ACLU there was a 64 percent growth in electronic spying by the United States government during Obama's first term.  The Obama administration argued in federal court in 2012 that the public has no "reasonable expectation of privacy" regarding their cell phone location data and that the government can obtain these records without a warrant.  Further blemishing Obama's record on civil liberties, his administration green-lighted a giant government database of information on millions of citizens who weren't even suspected of terrorism or any crime at all.  In May 2017, we also found out that Obama's National Security Agency had been conducting illegal searches on Americans for years and was rebuked by the Foreign Intelligence Surveillance Court (FISC).  We didn't hear about it sooner because the Obama administration covered it up.

Amazon's Facial Recognition Wrongly Identifies 28 Lawmakers, A.C.L.U. Says.  Representative John Lewis of Georgia and Representative Bobby L. Rush of Illinois are both Democrats, members of the Congressional Black Caucus and civil rights leaders.  But facial recognition technology made by Amazon, which is being used by some police departments and other organizations, incorrectly matched the lawmakers with people who had been charged with a crime, the American Civil Liberties Union reported on Thursday morning [7/26/2018].  The errors emerged as part of a larger test in which the civil liberties group used Amazon's facial software to compare the photos of all federal lawmakers against a database of 25,000 publicly available mug shots.  In the test, the Amazon technology incorrectly matched 28 members of Congress with people who had been arrested, amounting to a 5 percent error rate among legislators.

Amazon's face ID tool mismatched 28 members of Congress to mugshots:  ACLU.  A facial recognition tool that Amazon.com Inc (AMZN.O) sells to web developers wrongly identified 28 members of Congress as police suspects, in a test conducted by the American Civil Liberties Union (ACLU), the organization said on Thursday [7/26/2018].

Facebook As The Ultimate Government Surveillance Tool?  Earlier this month it came out that among Facebook's myriad algorithmically induced advertising categories was an entry for users whom the platform's data mining systems believed might be interested in treason against their government.  The label had been applied to more than 65,000 Russian citizens, placing them at grave risk should their government discover the label.  Similarly, the platform's algorithms silently observe its two billion users' actions and words, estimating which users it believes may be homosexual and quietly placing a label on their account recording that estimate.  What happens when governments begin using these labels to surveil, harass, detain and even execute their citizens based on the labels produced by an American company's black box algorithms?  One of the challenges with the vast automated machine that is Facebook's advertising engine is that its sheer scale and scope means it could never possibly be completely subject to human oversight.  Instead, it hums along in silence, quietly watching the platform's two billion users as Big Brother, silently assigning labels to them indicating its estimates of everything from their routine commercial interests to the most sensitive and intimate elements of their personality, beliefs and medical conditions that could be used by their governments to manipulate, arrest or execute them.

NSA Deletes Hundreds of Millions of Records They Should Never Have Had.  [Scroll down]  So who's at fault?  The NSA refuses to say, but Senator Ron Wyden (D-Ore.), who has made shielding Americans' data from the NSA his prime focus, blames the telecom companies.

NSA Began Deleting Phone Records In May, Cited Authorization Issues.  The National Security Agency is permanently erasing years of phone records due to alleged authorization errors.  In a statement Thursday [6/28/2018], the agency cited the Title V Surveillance Act as the reason they started erasing call details.  Officials added, irregular technical errors found in phone data were an additional reason the clean-up is taking place.

CEO of facial-recognition company calls police use "irresponsible".  Last month, controversy erupted around news that at least two police departments have deployed or tested Amazon's Rekognition platform.  Facial-recognition algorithms have been shown to be less accurate at identifying people of color, often because their images are underrepresented in the datasets that algorithms are trained on.

Sales Tax, Cell Phones, and the Court.  [Carpenter v. United States] concerns a warrantless collection of cell phone location data.  The defendant, Carpenter, had his cell phone records acquired by the government, which it used to prove that he led a series of robberies of (ironically) cell-phone stores.  Carpenter argues that this collection amounts to GPS tracking, and is therefore a search.  The government argues, however, that this cell phone location data was freely shared by Carpenter with a third party, his service provider.  The Court typically considers information shared with a third party (such as bank records) to lose any privacy protections.  The Justices, by a 5-4 margin, decided that principle doesn't extend to cell phone location records.  Justice Roberts, joining the Court's liberal Justices, delivered the Court's opinion.  Unusually, three of four dissenting Justices wrote a separate dissenting opinion.  Still, at points, those dissents agreed with each other.  The majority logic starts from the premise that someone has a particularly powerful privacy claim at stake when someone can track their movements.  Specifically, when it can be tracked constantly and easily.  From here, the Court reaches its conclusion by a single step.  Constant surveillance, even in the form of voluntary cell phone use, is always a search.  It does not matter how the government gets that information: even if the data is being collected by a private company during business transactions, the person being tracked always expects privacy from the government.

The Wiretap Rooms.  Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world.  A body of evidence — including classified NSA documents, public records, and interviews with several former AT&T employees — indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory.  The NSA considers AT&T to be one of its most trusted partners and has lauded the company's "extreme willingness to help."  It is a collaboration that dates back decades.  Little known, however, is that its scope is not restricted to AT&T's customers.

Supreme Court says warrant necessary for phone location data.  Carpenter v. United States is the first case about phone location data that the Supreme Court has ruled on.  That makes it a landmark decision regarding how law enforcement agencies can use technology as they build cases.  The court heard arguments in the case on Nov. 29.  The dispute dates back to a 2011 robbery in Detroit, after which police gathered months of phone location data from Timothy Carpenter's phone provider.  They pulled together 12,898 different locations from Carpenter, over 127 days.  The legal and privacy concern was that police gathered the four months' worth of Carpenter's digital footprints without a warrant.  A Sixth Circuit Court of Appeals judge ruled that cellphone location data isn't protected by the Fourth Amendment, which forbids unreasonable search and seizure, and therefore didn't require a warrant.

Orlando International Airport to scan faces of US citizens.  Florida's busiest airport will be the first in the nation to require a face scan of passengers on all arriving and departing international flights, officials said Thursday, a move that pleases airport executives but worries privacy advocates.

Police use spying doorbells to create digital neighborhood watch networks.  It seems like all I have been writing about lately, is how police are using cam-share programs to create city-wide surveillance networks.  When I first heard about 'Ring' a smart doorbell with a video camera, I didn't think much of it.  I mean how could the police state turn what appeared to be an innocuous smart device into another surveillance tool?  Enter Amazon, who recently purchased Ring for $1 billion dollars.  Fast forward a few months and Amazon announces that Ring is on a mission to work with law enforcement across the country.

New Technologies Nurturing Big Brother.  Centralized control over all financial activity has reached the point where there is talk of abandoning cash for all-0electronic transactions, the better to flesh out the state's dossiers on all of us.  Various security measures allow eavesdropping on our telephone conversations, monitoring our internet access, and taking photos of us in public places. [...] Money was created as a vehicle to grease the wheels of commerce, a way to transact business without having to trade two swords for a horse.  And money provided an accurate method of valuing disparate objects:  a pair of shoes is worth three chickens, but you no longer need the chickens to acquire the shoes. [...] Money's only purpose is to facilitate free trade.  But in a Big Brother state, free trade will wither and die, eliminating the need for money.

The NSA Continues to Abuse Americans by Intercepting Their Telephone Calls.  One of the few positive things in the ill-named USA FREEDOM Act, enacted in 2015 after the Snowden revelations on NSA domestic spying, is that it required the Director of National Intelligence to regularly report on its domestic surveillance activities.  On Friday [5/4/2018], the latest report was released on just how much our own government is spying on us.  The news is not good at all if you value freedom over tyranny.  According to the annual report, named the Statistical Transparency Report Regarding Use of National Security Authorities, the US government intercepted and stored information from more than a half-billion of our telephone calls and text messages in 2017.  That is a 300 percent increase from 2016.  All of these intercepts were "legal" under the Foreign Intelligence Surveillance Act (FISA), which is ironic because FISA was enacted to curtail the Nixon-era abuse of surveillance on American citizens.

Liberals Upset That License Plate Readers Are Used To Find Illegal Aliens.  The battle of public safety and law enforcement versus privacy concerns isn't going away any time soon.  Much of the debate these days revolves around increasingly affordable and available technology allowing the use of publicly mounted (or drone-based) cameras which can record both automobile license plate numbers and even human faces.  Scanners and facial recognition software can interpret this data and assist law enforcement agencies in locating suspects more quickly and accurately.  But this has some people highly upset.

Spy agency NSA triples collection of U.S. phone records: official report.  The U.S. National Security Agency collected 534 million records of phone calls and text messages of Americans last year, more than triple gathered in 2016, a U.S. intelligence agency report released on Friday [5/4/2018] said.

NSA admits to collecting more than 534 million phone calls and text messages from Americans last year.  The U.S. National Security Agency collected more than 534 million records of phone calls and text messages from American telecommunications providers last year, tripling the amount of data it collected in 2016, according to a report released Friday [5/4/2018].  Service providers like AT&T and Verizon are providing much of the data.  That includes records of phone calls received and made, but not the actual contents of what was said, according to the report from the office of the Director of National Intelligence.  The report does not explain why the increase in data collection was so large.

DHS expands police spying by adding surveillance cameras to bus stops.  Not content with surveillance cameras on buses, the police state has now begun adding them to bus stops.  Last month an article in WTVR 6 revealed that the Greater Richmond Transit Center (GRTC) is installing more than one hundred surveillance cameras at bus stops.  What should really concern everyone is the amount of cameras being installed at each bus stop.

How Federal Surveillance and "Parallel Construction" Undermine the Rule of Law.  When we talk about NSA spying, most people's eyes glaze over.  They just don't think it will have any impact on them.  After all, the surveillance agency only spies on foreigners and terrorists, right?  And if some Americans' data ends up in NSA databases in the process, well, that doesn't really matter.  It's the price we pay for security.  But in fact, federal surveillance and the investigative practices it fosters undermines and subverts the fundamental rule of law in the United States.  State and local law enforcement agencies use the reams of data the NSA collects to prosecute Americans.  Most of these cases have nothing to do with terrorism or national security.  In fact, the vast majority relate to the so-called "war on drugs."  In the process, these state and local cops shred due process, obliterate the Fourth Amendment and make a mockery out of the "rule of law."

Las Vegas Installs 37 DHS Surveillance Cameras on the Strip.  What happens in Vegas will be recorded by cameras provided by the Department of Homeland Security.  All along the storied Las Vegas Strip, 37 surveillance cameras watch and record every movement.  Such an expensive purchase might surprise citizens of Sin City given that the Metropolitan Police Department is in the middle of a hiring freeze and has laid off dozens of officers all over the city.

Obama Staffer: Facebook Knew Presidential Campaign Improperly Seized Data, Looked the Other Way.  Facebook is embroiled in a political controversy over the manner its social data was utilized by the Trump campaign, but a former Obama campaign staffer argues the social media company has been allowing this type of behavior since at least 2012.  The social media giant is being lambasted for failing to verify that data from an estimated 50 million users was deleted by the Steve Bannon-led firm, Cambridge Analytica.  However, a former Obama campaign staffer has come forward to claim that Facebook turned a blind eye to the same issue in 2012.

FBI Paid Best Buy Technicians to Inform Them about Illegal Content on Customer Devices.  The FBI recruited computer technicians at Best Buy to inform them about illegal content on personal devices customers brought in for repairs, new Bureau documents show.  The informants were discovered after Best Buy's Geek Squad technicians at a Kentucky repair shop found thousands of child-pornography images on California doctor Mark Rettenmaier's computer.  The documents from the ensuing court case showed that eight informants were cooperating with the FBI to turn over illegal content.

Best Buy Gave Obama FBI [a] Tour of [a] Geek Squad Facility [and the] FBI Paid Employees As Informants.  Well isn't this interesting?  The FBI was given it's [sic] own private tour of the Best Buy "Geek Squad" computer repair facilities during the Obama and Comey days.  This was done back in September of 2016, at the height of the election season.  We'll wait (and wait and wait) to see if Mr. Magoo Jeff Sessions or his boss Rod Rosenstein do anything about this.

Police are creating a national surveillance network using COMTEC, Project Green Light etc.  Detroit officials have been using the Macomb County Communications and Technology Center (COMTEC) to spy on everyone since 2013.  According to an article in the Macomb Daily News, law enforcement and DoT officials are using CCTV cameras to spy on everyone. [...] But this year things changed for the worse; law enforcement soon made it mandatory for businesses to pay the police to let them spy on everyone.

Super-secret spy court raises alarm over feds' snooping.  It's a mysterious court that hides behind a hulking vaulted door and impenetrable concrete walls — and it's where the federal government makes some of its most secretive decisions concerning Americans' basic liberties.  If you dare ask where the secret court is located, employees at the E. Barrett Prettyman Federal Courthouse in Washington, D.C. — where the court reportedly relocated in 2009 — won't tell you.  That's because the super-secret court is far beyond the reach of any journalist or curious American citizen.  Fortified with biometric hand scanners, wooden and metal doors and walls reinforced by concrete, it's the room where it all happens:  Eleven powerful court judges approve wiretaps, data collection and government requests to monitor suspected terrorists, spies and even American citizens.  And they're given sweeping power under the Foreign Intelligence Surveillance Act, or FISA.

Amazing New Breakthrough to Reduce Mass Shootings.  As fun as it is to ridicule the FBI for devoting massive resources to chasing down Hillary Clinton's oppo research while blowing off repeated, specific warnings about school shooter Nikolas Cruz, we've put a lot on the agency's plate.  We're hauling in nearly 2 million manifestly unvetted Third World immigrants every year, leading to a slew of FBI "Watch Lists" with a million names apiece.  In 2015, Director James Comey said that there were ISIS investigations in all 50 states — even Idaho and Alaska!  And that's just one terrorist organization.  Maybe the FBI brass would still be a bunch of incompetent, PC nincompoops if we weren't dumping millions of psychotic and terrorist foreigners on the country.  But even the most efficient organization would have trouble keeping track of the Nikolas Cruzes when our immigration policies require approximately one-third of the country to be constantly watching another third of the country.

An emerging police state that spies on Americans?  The left yawns.  Ever since the McCarthy era, hasn't it been a cultural norm from the left to holler about the U.S. becoming a police state?  A police state that spies on innocent Americans? [... But then] We had the Internal Revenue Service spying on and repressing internal dissidents, which were not people who sought to harm us, as the left's heroes did, but who called themselves the 'Tea Party' and campaigned for lower government spending.  The IRS and its minions such as the notorious Lois Lerner, who looks every bit like the warden she was, spied away, admitted their political motivation, and got off scot-free, retiring to their multi-million-dollar beltway manions as their reward.  And from the principled left?  Silence.

Critically important:  FISA, the NSA, and the 4th Amendment.  [Scroll down]  Jump now to the National Security Agency.  It has no criminal investigative purpose.  Instead, it was formed in the 1950's with a mandate to capture signal intelligence for foreign intelligence and counterintelligence purposes.  Almost seventy years later, modern communication systems mean that the NSA sucks up a goodly portion of the world's electronic communications, including those of Americans within our borders.  We know that last bit because, in 2013, James Clapper, then-Director Of National Intelligence, appeared before Congress.  When asked, "Does the NSA collect any type of data at all on millions, or hundreds of millions of Americans?"  Clapper's response was swift and sure:  "No, sir. ... Not wittingly."  It later came out that in fact the NSA does, quite wittingly, sweep up electronic communications from hundreds of millions of Americans and that Clapper knowingly committed perjury with his answer.  But as is true for everyone else in the Obama administration who committed criminal offenses, Obama's DOJ and FBI declined to pursue criminal charges against him.

NSA Deletes "Honesty" and "Openness" From Core Values.  The National Security Agency maintains a page on its website that outlines its mission statement.  But earlier this month, the agency made a discreet change:  It removed "honesty" as its top priority.  Since at least May 2016, the surveillance agency had featured honesty as the first of four "core values" listed on NSA.gov, alongside "respect for the law," "integrity," and "transparency."  The agency vowed on the site to "be truthful with each other."  On January 12, however, the NSA removed the mission statement page — which can still be viewed through the Internet Archive — and replaced it with a new version.  Now, the parts about honesty and the pledge to be truthful have been deleted.  The agency's new top value is "commitment to service," which it says means "excellence in the pursuit of our critical mission."

Paul Craig Roberts Slams The NSA: "It's A Blackmail Agency".  The main function of the National Security Administration is to collect the dirt on members of the house and senate, the staffs, principal contributors, and federal judges.  The dirt is used to enforce silence about the crimes of the security agencies.  The blackmail mechanism was put into gear the minute the news reported that the House Intelligence Committee had assembled proof that the FBI, DOJ, and DNC created Russiagate as a conspiracy to unseat President Trump.  Members of Congress with nothing to hide demanded the evidence be released to the public.

NSA deleted surveillance data it pledged to preserve.  Since 2007, the NSA has been under court orders to preserve data about certain of its surveillance efforts that came under legal attack following disclosures that President George W. Bush ordered warrantless wiretapping of international communications after the 2001 terrorist attacks on the U.S.  In addition, the agency has made a series of representations in court over the years about how it is complying with its duties.  However, the NSA told U.S. District Court Judge Jeffrey White in a filing on Thursday night [1/18/2018] and another little-noticed submission last year that the agency did not preserve the content of internet communications intercepted between 2001 and 2007 under the program Bush ordered.  To make matters worse, backup tapes that might have mitigated the failure were erased in 2009, 2011 and 2016, the NSA said.

Senate renews surveillance law that collects email from an unknown number of Americans.  The Senate voted Thursday [1/18/2018] to renew for six years a surveillance program that collects the content of an unknown number of Americans' email, text messages, photos and other electronic communication without a warrant.  The Senate voted 65-34 to renew the controversial law, known as Section 702 of the Foreign Intelligence Surveillance Act.  The action came after Senate leaders narrowly won a vote Tuesday night to allow the renewal bill to move forward.  The House approved the legislation last week, and President Trump is expected to sign the bill before the law expires at midnight Friday.

Lawmakers want James Clapper prosecuted for surveillance testimony before statute of limitations runs out.  Some lawmakers would like to see the Justice Department prosecute former spy chief James Clapper for inaccurate testimony to Congress about domestic surveillance before it's too late.  Privacy-conscious critics say looming five-year statutes of limitation for perjury and making false statements — establishing a March 12 deadline for charges — make an urgent case for action, and that nonprosecution would set a dangerous precedent that impedes oversight and executive-branch accountability.  Clapper, director of national intelligence from 2010 to 2017, testified during a March 2013 Senate Intelligence Committee hearing that the NSA was "not wittingly" collecting "any type of data at all" on millions of Americans.  Months later, former NSA contractor Edward Snowden revealed secret court orders forced phone companies to turn over all U.S. call records on an "ongoing, daily basis."

House Committee to vote on voiding Fourth Amendment rights.  While the country was being treated to a mega-dose of tweets proclaiming Trump's "genius" over the weekend, so-called conservatives (i.e.  Trumplicans) in the House of Representatives were making plans to hold a vote on a bill that will void the Fourth Amendment rights of every American.  Scheduled for this week, the House Rules Committee will meet to consider a bill re-authorizing Section 702 of the Foreign Intelligence Surveillance Act (FISA) which, according to Rep. Justin Amash (R-MI) "allows the government to conduct warrantless searches on Americans and maintain massive troves of our data."

Not Smiling About DHS Facial Recognition Program.  Now that the US Department of "Homeland Security" is well on its way to achieving more power than even Hitler's Reich Minister of Propaganda, Joseph Goebbels, ever dreamed of, they are positioning themselves for the ultimate Orwellian horror:  their ability to know where each and every one of us is, at any time, no matter where on earth we go.  DHS recently announced they are adding $1 billion to fund a facial recognition program that will scan the faces of Americans who board airplane flights exiting the country.  Too bad this is as illegal as it is ineffectual.

DHS Announces Program to Illegally Scan Our Faces.  Both Congress and the Department of Homeland Security have never justified the biometric scanners at airports that could cost Americans $1 billion in 2018.  As TSA agents continue to prove their incompetence in the "War on Terror," the Department of Homeland Security is now allocating $1 billion in taxpayer funding to create a facial recognition program that will illegally scan Americans' faces.  A study conducted by Georgetown Law's Center for Privacy and Technology looked at the biometric scanners that are creating an inventory of the faces of individuals leaving the country at airports across the United States.  While they are only at certain major airports right now, the full implementation of these scanners could cost Americans up to $1 billion.

Inventory of surveillance cameras installed on Seattle City Light utility poles.  [An email conversation between a privacy activist and an opaque municipal bureaucracy.]

CIA and NSA first sought to exploit commercial databases in mid-80s.  Open Source Intelligence (OSINT) is the least famous, least exciting, and most prevalent form of intelligence, covering any sources that are theoretically open to anyone, such as newspaper articles, published books, or social media posts.  With the ubiquity of the internet, the use of such commercial databases is beyond routine for both the Intelligence Community and the government at large, but there was a time, however, where the mere interest was not only cutting edge, but problematic.

10 times the intel community violated the trust of US citizens, lawmakers and allies.  No matter where you stand politically, a growing body of facts raises the question:  Is there systemic corruption or misfeasance at work inside America's intelligence agencies?  By that, I don't mean people stealing money.  I mean officials who are stealing our privacy — using the tools of intelligence-gathering and law-enforcing, which are meant to protect Americans, to instead spy on them, to gather information that isn't the government's business (at least not without a court's approval).  And, in some instances, it appears, to punish or silence those with whom they disagree — personal and political foes, in and out of government — rather than to pursue and protect Americans from the country's real enemies.  Perhaps more alarming is the growing evidence that suggests some officials at all levels in intelligence and justice agencies are operating in a way that is clearly intended to serve their own political beliefs and interests — not the public's interests.

The State Government Agency That Spied on Citizens.  The 88-page report by Wisconsin Attorney General Brad Schimel details the notorious "John Doe" investigations that went after almost every conservative, nonprofit organization in Wisconsin (the state chapter of Club for Growth among them) for supposed violations of campaign finance laws.  Except that there were not any actual violations of the law, according to the Wisconsin Supreme Court.  The court shut down the prosecutions in 2015, calling the legal theory under which the prosecutors were pursuing the case "unsupported in either reason or law."  The state's highest court used the word "amazing" in describing the "breadth" of documents seized by prosecutors through numerous, wide-ranging subpoenas and search warrants.  This included "virtually every document possessed by the [targets] relating to every aspect of their lives, both personal and professional, over a five-year span."  The report from Schimel, a Republican, has an unbelievable list of 218 subpoenas and search warrants issued in the investigation — and this is only a "partial" list.

Fusion GPS Dossier cabal was using spy tradecraft to evade leaving electronic footprints for NSA surveillance.  The National Security Agency (NSA) picks up and records almost all electronic communications, thereby effectively wiretapping telephone conversations, email, and practically everything else we send out electronically.  When a FISA court permits "unmasking" of American citizens, that universal wiretapping capability can be used to spy on their conversations.  It now appears that an elaborate plot was crafted to generate phony accusations of dirty ties to Russia that would be used to get a FISA Court warrant to "unmask" members of the Trump campaign, and thereby enable spying on that campaign.  We do not know how many members of that campaign were "unmasked" (i.e., spied on), but there are suggestions that the list ended up quite long.

NSA Whistleblowers:  NSA Collects 'Word for Word' Every Domestic Communication.  PBS interviewed NSA whistleblowers William Binney and Russell Tice this week.  Binney is the NSA's former director of global digital data, and a 32-year NSA veteran widely regarded as a "legend" within the agency.  Tice helped the NSA spy with satellites for 20 years.  Binney and Tice confirmed that the NSA is recording every word of every phone call made within the United States.

iPhone Apps Can Secretly Turn On Your Camera And Take Pictures At Any Time.  A new warning has been issued to iPhone users.  Apps downloaded to the smartphones can turn on the phone's camera and take pictures at any time, and it's doing it secretly.  Felix Krause, an Austrian developer who works for Google, built an app that was able to take pictures of its user every second and upload them, without the app or the phone ever notifying the user.

LAPD Drones Threaten Privacy.  Today, the Los Angeles Police Department (LAPD) civilian police commission voted to approve proposed guidelines for a one-year unmanned aerial vehicles (UAVs) pilot program.  According to the LAPD's guidelines, UAVs will not be equipped with lethal or nonlethal weapons and will only be deployed in a narrow set of circumstances.  The guideline also requires officers to obtain a warrant before using a UAV "when required under the Fourth Amendment or other provision of the law."  This looks all well and good, except that the Fourth Amendment and California law provide little protection when it comes to aerial surveillance.  The Fourth Amendment protects "persons, houses, papers, and effects" from "unreasonable searches and seizures."  Many Americans could be forgiven for thinking that this constitutional provision would act as a shield against warrantless aerial surveillance.  Sadly, this is not the case.

Cities are getting paid to turn street lights into spying SmartNodes.  SmartNodes will soon replace street lights, because they are equipped with cameras, microphones, speakers etc., all-in-one light pole.  The city of Los Angeles, Calfornia is working with Phillips Lighting and ENE-HUB to turn 110,000 street lights into a one-of-a-kind citywide SmartNode surveillance network.

6 Dangerous Electronics & Apps Secretly Spying On You In Your Home.  [#2] Smart TVs:  While smart TVs allow you to connect to the Internet directly, they can also be used to collect your data.  For example, a new technology called TVision Insights allows companies to monitor TV watchers' viewing habits.  This means that they can literally watch you as you watch TV. They even record data on where your eyes are looking, when you're distracted, and what emotions you're conveying.  In early 2015, Samsung warned its customers:  "Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party."

To see your gestures, the TV will have to watch you continuously.  Do you really want that?
End of the TV remote could be nigh as scientists invent technology to change channel using gestures.  The television remote could become a thing of the past according to scientists who have developed a new technology that allows the device to be controlled through gestures instead.  Computer scientists at Lancaster University have come up with a system that makes it possible interact with screens simply by using body movements, or waving objects.  Requiring only a simple webcam, the "Matchpoint" works by displaying moving targets that orbit a small circular "widget" in the corner of the screen.

Revisiting Orwell to Understand Our Times.  Just two or three generations ago, most Americans understood that George Orwell's classics Animal Farm and 1984 were written to explain how freedom is lost to totalitarianism and the intolerance that accompanies it.  "Big Brother," a term still casually used to describe an all-knowing governing authority, comes right out of 1984.  In the society that Orwell describes, everyone was reminded that "Big Brother is watching you," by way of a constant surveillance through the pervasive use of "telescreens" by the ruling class. [...] Orwell's Big Brother has become a reality in the NSA's tracking and recording of all email, text, and telephone communication in the United States.  But Big Brother has a new dimension with social media and consumer giants, Google, Facebook, and Amazon knowing almost everything about people's preferences through their artificial intelligence peering into people's "telescreen" computers and smartphones.

Mystery Surrounds Metal Towers Popping Up In Tunnels & Bridges.  Mysterious metal towers are popping up at local tunnels, and soon they'll start appearing at bridges, too.  But even people on the MTA board in charge of the towers can't say why they're being used or what's in them, CBS2's Dave Carlin reports.  Jose Lugo said the tall metal towers quickly appeared up after the Brooklyn Battery Tunnel tolls booths came down.  "We don't really know what's the purpose of this," he told Carlin.  It's a $100 million MTA project shrouded in secrecy, with 18 of them for tunnels and bridges.  So what are they exactly?

The Editor says...
It doesn't matter if these devices are lights, riot control machines, automatic license plate readers, or surveillance cameras.  If the project costs $100 million and they won't tell anybody what it's for, it's not going to be good.

Sharyl Attkisson explains what we are up against.  Sharyl Attkisson is the bravest reporter of her generation, so much of a threat to people with access to the capabilities of our intel agencies that she was spied upon and worse.

It looks like Obama did spy on Trump, just as he apparently did to me.  Nobody wants our intel agencies to be used like the Stasi in East Germany; the secret police spying on its own citizens for political purposes.  The prospect of our own NSA, CIA and FBI becoming politically weaponized has been shrouded by untruths, accusations and justifications.  You'll recall DNI Clapper falsely assured Congress in 2013 that the NSA was not collecting "any type of data at all on millions or hundreds of millions of Americans."  Intel agencies secretly monitored conversations of members of Congress while the Obama administration negotiated the Iran nuclear deal.  In 2014, the CIA got caught spying on Senate Intelligence Committee staffers, though CIA Director John Brennan had explicitly denied that.

Distrustful U.S. allies force spy agency to back down in encryption row.  In interviews and emails seen by Reuters, academic and industry experts from countries including Germany, Japan and Israel worried that the U.S. electronic spy agency was pushing the new techniques not because they were good encryption tools, but because it knew how to break them.

NSA Blocks Release Of Loretta Lynch-Bill Clinton Airplane Tape For 'National Security'.  The National Security Agency (NSA) blocked the release of a purported tape of Bill Clinton and former Attorney General Loretta Lynch's private airplane talk with a rare legal justification used to protect top national security secrets.  The NSA's block of the release of this information — citing one of President Obama's executive orders — undercuts Hillary Clinton's claim that her husband and Lynch had a "purely social" conversation about grandkids and golf on June 27, 2016, two weeks before Lynch dropped the Department of Justice investigation into Hillary Clinton's email scandal.  Citizen researcher Larry Kawa is pressing the government to release the contents of a taping system that is required to have been installed on Lynch's government airplane.  Kawa points to the Tempest system, a NATO-certified system by which the NSA tracks and records sound that emanates within government structures.

End Warrantless Deep State Spying:  Don't Renew 702.  As former NSA contractor Edward Snowden revealed to the world in 2013, the U.S. government routinely spies on its own citizens.  "I, sitting at my desk, could wiretap anyone, from you or your accountant, to a federal judge or even the president," Snowden told the journalists crowded into his hotel room before the publication of his leaked documents.  The leaks exposed lies from government officials about the mass surveillance of American citizens, with former Director of National Intelligence James Clapper testifying before Congress that the NSA didn't "wittingly" collect any data on millions of Americans.  Four years after the Snowden leaks, the government is still collecting Americans' private information.  Though the NSA claims it ended bulk collection of domestic phone calls, the agency is still operating several other far-reaching domestic spying programs.

Intel kill switch ME code indicates connection to NSA.  Security researchers studying the Intel Management Engine discovered an undocumented kill switch in the code, as well as references to a National Security Agency program.  Dmitry Sklyarov, Mark Ermolov and Maxim Goryachy, security researchers for Positive Technologies, based in Framingham, Mass., found the Intel kill switch that has the ability to disable the controversial Intel Management Engine (ME).  Experts have been wary of the Intel ME because it is an embedded subsystem on every chip that essentially functions as a separate CPU, with deep access to system processes, and it could be active even if the system were hibernating or shut off.

How California police are tracking your biometric data in the field.  EFF and MuckRock teamed up in August to reveal how state and local law enforcement agencies are using mobile biometric technology in the field by filing public records requests around the country.  With the help of members of the public who nominated jurisdictions for investigation, we have now obtained thousands of pages of documents from more than 30 agencies.  Because of the volume of records we've received so far — docs continue to flow in faster than EFF and MuckRock's teams can read through them — we're starting with California.  Nine of the agencies have responded to our requests with documents, while many more claimed they didn't have any records.  Of those that did respond, most employed a digital fingerprinting device.  Facial recognition has also been widely embraced among agencies in San Diego County, with Santa Clara County law enforcement agencies close behind.

Obama-Comey FBI Monitored Social Media On Election Day For Memes.  You'll be glad to know that your tax dollars were wasted on election day by both Obama and James Comey to monitor social media for "fake news" and memes.  This despite the fact everyone expected Hillary Clinton to easily win, with every poll saying as much.  Even Obama and Comey had to believe their own BS about Clinton easily winning in November.  So then why would Obama and Comey have to monitor social media for "fake news" and memes?  Even more ironic, it's the fake news kings at CNN that claim this "exclusive" story.

CIA Dumbo Project Created to Take Over Webcams, Microphones.  Details of the CIA's Dumbo project, a system that manipulates devices such as webcams and microphones on Microsoft Windows-operating systems, have been published by WikiLeaks.  The program also corrupts video recordings, according to the leaked documents.  The whistleblowing organization released the files as part of its Vault 7 series on the CIA's hacking capabilities.  According to Wikileaks, the technology is intended for use where the deployment of a special branch within the CIA's Center for Cyber Intelligence could be compromised.  Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating system, according to the documents.

Newly declassified memos detail extent of improper Obama-era NSA spying.  The National Security Agency and Federal Bureau of Investigation violated specific civil liberty protections during the Obama years by improperly searching and disseminating raw intelligence on Americans or failing to promptly delete unauthorized intercepts, according to newly declassified memos that provide some of the richest detail to date on the spy agencies' ability to obey their own rules.

Busted: Vermont DMV Caught Using Illegal Facial Recognition Program.  The American Civil Liberties Union of Vermont has obtained internal Department of Motor Vehicles records describing a DMV facial recognition program that is banned by Vermont state law and compromises the privacy and security of thousands of Vermonters.  In a letter delivered yesterday to DMV Commissioner Robert Ide, the ACLU demands an immediate end to the program, which was first implemented in 2012.  Vermont DMV records provided to the ACLU show the agency using facial recognition software (FRS) to search and share with other state and federal government agencies the photographs and personal information of Vermont ID holders.  That violates a 2004 state law barring the use of technologies that "involve the use of biometric identifiers."

NSA Reneges On Promise To Tell Congress How Many Innocent Americans It Spies On.  Technocrats are data hoarders and will never divulge how much data they have collected, legally or illegally.  The NSA and the entire intelligence network have gone rogue on the American public and have become a key element in the impending Technocracy waiting to be established.

Vault 7, Internet Security, and Your Life on Display.  When I talk with fellow engineers about the possibility that the feds are sucking up every bit of data they can get their packet sniffers on, we all agree it is happening, to an unknown extent.  How amazing to now get an actual peek behind the overpriced GSA-schedule gray curtain.  These disclosures are disturbing in multiple ways, for example, that our tax dollars are funding the federal government's hacking of free citizens' lives, all under the premise that they are only targeting criminals and spies.  Most commentators find this the greatest outrage.  The most disturbing fact to me, as a tech insider and developer, is that the Swiss cheese computing tools we use today are way more hole than cheese.  Vault 7 is evidence of this.  There are exploits in Vault 7 for nearly every modern computing platform, operating system, and communications method.  Everything connected to the Internet is broken.

NSA's use of 'traffic shaping' allows unrestrained spying on Americans.  A new analysis of documents leaked by whistleblower Edward Snowden details a highly classified technique that allows the National Security Agency to "deliberately divert" US internet traffic, normally safeguarded by constitutional protections, overseas in order to conduct unrestrained data collection on Americans.  According to the new analysis, the NSA has clandestine means of "diverting portions of the river of internet traffic that travels on global communications cables," which allows it to bypass protections put into place by Congress to prevent domestic surveillance on Americans.

Real Scandals The Trump-Obsessed Media Are Ignoring.  In late May, Circa News published a truly bombshell report about how the National Security Agency had been conducting illegal searches on American citizens for years, "routinely violat(ing) American privacy protections while scouring through overseas intercepts."  In addition, the administration "failed to disclose the extent of the problems until the final days before Donald Trump was elected president last fall."  Classified documents obtained by Circa showed that "one out of every 20 searches seeking upstream internet data on Americans inside the NSA's so-called Section 702 database violated the safeguards Obama and his intelligence chiefs vowed to follow in 2011." [...] The three network news programs all ignored this report, and it got little attention by any of the other mainstream news outlets.

First Arrest Made From Cameras Linked to Public Facial Recognition Database.  U.K. police recently made their first arrest using facial recognition software following a series of trials at large-scale public events.  According to authorities, the man was arrested three days prior to the UAEA Champions League Final June 3rd while South Wales police were conducting their most recent experiment with the high-tech surveillance.  Cameras linked to facial recognition software were located around the stadium, local train station, and designated police vehicles to monitor people in and around the city center.

Did the FBI have evidence of a breach larger than Snowden?  A lawsuit says yes.  A former U.S. intelligence contractor tells Circa he walked away with more than 600 million classified documents on 47 hard drives from the National Security Agency and the CIA, a haul potentially larger than Edward Snowden's now infamous breach.  And now he is suing former FBI Director James Comey and other government figures, alleging the bureau has covered up evidence he provided them showing widespread spying on Americans that violated civil liberties. [...] "This domestic surveillance was all being done on computers supplied by the FBI," [Dennis] Montgomery told Circa in an interview.  "So these supercomputers, which are FBI computers, the CIA is using them to do domestic surveillance."

DEA Deploying Powerful Spyware Without Required Privacy Impact Assessments.  It's not just the FBI that can't seem to turn in its privacy-related paperwork on time.  The FBI has pushed forward with its biometric database rollout — despite the database being inaccurate, heavily-populated with non-criminals, and without the statutorily-required Privacy Impact Assessment that's supposed to accompany it.  As of 2014, it hadn't produced this PIA, one it had promised in 2012.  And one that applied to a system that had been in the works since 2008.  Unsurprisingly, another federal law enforcement agency hasn't felt too compelled to produce PIAs for privacy-impacting programs.

Court Criticizes Obama Admin for Illegal Spying on U.S. Citizens.  [Scroll down]  Writing the 99-page opinion for FISC, Judge Rosemary Collyer castigated the Obama administration for failing to follow the Section 702 procedures designed to ensure that the government does not violate Americans' civil rights as it is performing work that is vitally important to national security.  Collyer declared that the previous administration's cavalier violations of Section 702's requirements created "a very serious Fourth Amendment issue."  Collyer sharply criticized the National Security Agency's inspector general and the NSA's Office of Compliance for Operations for their "institutional 'lack of candor,'" signaling that in addition to ignoring legal constraints, the Obama administration was not being honest with the court about its violations of federal law.

James Rosen:  Comey's FBI Broke Its Own Rules & Procedures On Spying On Americans.  The sheer scale of the 4th Amendment violations is staggering, as was the sternness of the rebuke of the Obama administration by the FISA court, which ordinarily approves 99.9% of the government's request.

New Revelations Shed Light On Extent Of NSA Spying Under Obama.  Typically, when an American citizen is swept up in NSA surveillance, they are supposed to be "masked" to protect their identity, but there are large loopholes in place that allow the NSA to spy on Americans without a warrant or any probable cause whatsoever.  When the NSA conducts what is known as "upstream collection" of Internet communications, it is impossible to target a single email, instead sweeping up "packets" of data containing several messages.  The NSA is supposed to sift through the data packets and discard all but the targeted email(s).  That alone poses some privacy issues, as before they are discarded the NSA can momentarily see the contents of the communications, but, when coupled with the NSA's targeting practices, the problem expands to a serious violation of American constitutional rights.

Secret court rebukes NSA for 5-year illegal surveillance of U.S. citizens.  U.S. intelligence agencies conducted illegal surveillance on American citizens over a five-year period, a practice that earned them a sharp rebuke from a secret court that called the matter a "very serious" constitutional issue.  The criticism is in a lengthy secret ruling that lays bare some of the frictions between the Foreign Intelligence Surveillance Court and U.S. intelligence agencies obligated to obtain the court's approval for surveillance activities.  The ruling, dated April 26 and bearing the label "top secret," was obtained and published Thursday [5/25/2017] by the news site Circa.

Vermont DMV Caught Using Illegal Facial Recognition Program.  The Vermont Department of Motor Vehicles has been caught using facial recognition software — despite a state law preventing it.  Documents obtained by the American Civil Liberties Union of Vermont describe such a program, which uses software to compare the DMV's database of names and driver's license photos with information with state and federal law enforcement.  Vermont state law, however, specifically states that "The Department of Motor Vehicles shall not implement any procedures or processes... that involve the use of biometric identifiers."

FISA Court Finds "Serious Fourth Amendment Issue" In Obama's "Widespread" Illegal Searches Of American Citizens.  In describing the violations, the FISA court said the illegal searches conducted by the NSA under Obama were "widespread" and created a "very serious Fourth Amendment issue."  These new discoveries come from a recently unsealed FISA court document dated April 26, 2017 and center around a hearing dated October 26, 2017, just days before the 2016 election, in which the FISA court apparently learned for the first time of "widespread" and illegal spying on American citizens by the NSA under the Obama administration.

Gowdy: Surveillance Programs Won't Be Renewed Until 'Unmasking' Questions [are] Answered.  Rep. Trey Gowdy (R-SC) said this morning that key surveillance programs won't be reauthorized by Congress until questions about intelligence "unmasking" are answered.  At a House Intelligence Committee hearing yesterday in the Russia investigation, Gowdy asked former CIA Director John Brennan about the issue.

Obama intel agency secretly conducted illegal searches on Americans for years.  The National Security Agency under former President Barack Obama routinely violated American privacy protections while scouring through overseas intercepts and failed to disclose the extent of the problems until the final days before Donald Trump was elected president last fall, according to once top-secret documents that chronicle some of the most serious constitutional abuses to date by the U.S. intelligence community.

Massive increase in searches of NSA data on U.S. citizens during election year.  Under President Obama, U.S. officials vastly expanded their searches of sensitive data captured about Americans during NSA surveillance of foreign targets. [...] Recently, the website Circa.com broke this major story.  A few years ago, the same story would have made big international headlines.  But today's news environment is highly-managed, and the reporting didn't get as widely circulated as one would expect.

Inspector General's Report Shows Section 702 Isn't The Only Thing Being Abused By The NSA.  There's more than Section 702 up for renewal at the end of this year.  Most of the attention has been focused on Section 702 because it's used most frequently for internet communications and data collections.  Not only does the NSA make use of this collection, but other agencies (FBI, CIA) are allowed unminimized access to NSA 702 data stores.  With this many agencies reliant on NSA communications interception, the sales pitches have been focusing on this particular authority.  But there are other surveillance authorities under Title VII:  Sections 704 and 705, which allow the NSA to target US persons located outside of the country.  The numbers put up by these sections aren't as impressive as Section 702's (~3,000 selectors for 151 million records), but 704/705 isn't supposed to result in incidental collection.  It's a US spy agency actively spying on US citizens.

Despite "Freedom Act," NSA Collected 151 Million Phone Records in 2016.  An April 27 report from the Office of the Director of National Intelligence revealed that during 2016 the National Security Agency (NSA) collected some 151 million phone records of Americans, despite passage of the USA Freedom Act of 2015.  While that law supposedly ended the program enabling the NSA to collect the phone records of Americans in bulk, it nonetheless allowed the NSA to continue accessing records from phone numbers of suspected terrorists via court orders.  The report revealed that the NSA still collected 151 millions [sic] phone records the next year under the new system, while obtaining court orders on only 42 individuals with suspected terrorist ties.

The Cloud Panopticon:  Google, Cloud Computing and the Surveillance-Industrial-Complex.  In June 2007, Privacy International, a U.K.-based privacy rights watchdog, cited Google as the worst privacy offender among 23 online companies, ranking the "Don't Be Evil" people below Microsoft, Apple, Amazon, eBay, LinkedIn, Facebook and AOL.  According to the report, no other company was "coming close to achieving [Google's] status as an endemic threat to privacy."  What most disturbed the authors was Google's "increasing ability to deep-drill into the minutiae of a user's life and lifestyle choices."  The result:  "the most onerous privacy environment on the Internet."  Indeed, Google now controls an estimated 70 percent of the online search engine market, but its deep-drilling of user information — where we surf, whom we e-mail, what blogs we post, what pictures we share, what maps we look at, what news we read — extends far beyond the search feature to encompass the kind of "total information awareness" that privacy activists feared at the hands of the Bush Jr. administration's much-maligned Total Information Awareness program.

Online Privacy Guide for Journalists 2017.  [Scroll down]  Let's begin by listing what you can do when it comes to communicating with a source, and storing sensitive information obtained thereof: [...] Always encrypt everything:  Security experts use simple math to make their point:  As you raise the cost of decrypting your files (say, for intelligence agencies like the NSA), you automatically increase the degree of effort expended on following you.  If you're not Chelsea Manning, Julian Assange, or Edward Snowden and if you weren't involved in active surveillance around Trump Tower apartments, they may give up the effort even if your encrypted communications were stored.  And should anyone decide to track you despite your efforts, it will be more of a headache if you use strong encryption like AES (Advanced Encryption Standard) and tools like PGP or openVPN, which are the strongest widely available encryption methods (VPN's are used by the US government itself).  But if you want bullet-proof security, you will need more than the AES encryption method.

Former DNI James Clapper Denies Any Impropriety in 'Unmasking' U.S. Citizens During Surveillance.  Former Director of National Intelligence James Clapper categorically denied any political or "voyeuristic" motive to the "unmasking" of Trump campaign associates when he addressed the Senate Judiciary Committee's Subcommittee on Crime and Terrorism Monday [5/8/2017].  "At no time did I ever submit a request for personal or political purposes or to voyeuristically look at raw intelligence, nor am I aware of any instances of such abuse by anyone else," Clapper told the Committee in his initial address.

James Clapper:  Intel Community 'Unmasked' 1,934 U.S. Persons in 2016.  Barack Obama's former Director of National Intelligence, James Clapper, testified Monday before the Senate Judiciary Subcommittee on Crime and Terrorism that the intelligence community "unmasked" 1,934 U.S. persons in 2016.  Clapper said the term "unmasking" is often misunderstood and that it is important to know the context.

Obama's team 'asked for NSA secrets on more than 30,000 Americans in 2016 and circulated 6,000 intelligence reports without removing their names'.  Barack Obama's team used NSA technology to examine data gathered on tens of thousands of Americans abroad during the election, it has emerged.  Officials searched both metadata and the actual contents of communications for the names of more than 30,000 US citizens, according to data released by the he Office of the Director of National Intelligence this week.  And more than 3,000 of the resulting intelligence reports were then circulated among government departments without the names of the searched parties being redacted, sources with direct knowledge told Circa.

NSA Halts Controversial Data Collection Program.  In what is being called a "sudden and unexpected triumph" for privacy advocates, the U.S. National Security Agency on Friday announced that it will no longer collect without a warrant the digital communications of Americans who are mentioned by a foreign intelligence target.  During the Obama years, warrantless surveillance programs vastly expanded, giving the government more power than ever to monitor American citizens — including political opponents — by collecting emails, texts, phone records, chats, locations, purchases, and other private information en masse.  Under the new rule, only communication to and from those targets will be collected.

N.S.A Halts Collection of Americans' Emails About Foreign Targets.  The National Security Agency has halted one of the most disputed practices of its warrantless wiretapping program: collecting Americans' emails and texts to and from people overseas that mention foreigners targeted for surveillance, according to officials familiar with the matter.  National security officials have argued that such surveillance is lawful and helpful in identifying people who might have links to terrorism, espionage or otherwise are targeted for intelligence-gathering.  The fact that the sender of such a message would know an email address or phone number associated with a surveillance target is grounds for suspicion, these officials argued.

NSA blimp
NSA Blimp Spied in the United States.  Back in 2004, a division of the NSA called the National Tactical Integration Office fitted a 62-foot diameter airship called the Hover Hammer with an eavesdropping device, according to a classified document published Monday by The Intercept.  The agency launched the three-engine airship at an airfield near Solomons Island, Maryland.  And from there, the blimp was able to vacuum up "international shipping data emanating from the Long Island, New York area," the document says.  The spy equipment on the airship was called Digital Receiver Technology — a proprietary system manufactured by a Maryland-based company of the same name — which can intercept wireless communications, including cellphone calls.


Report: School-Issued Computers 'Spy' on Children Without Parental Consent.  A new report finds that, under the guise of "personalized learning," school-issued computer devices — now distributed to one-third of K-12 students in schools across the United States — are serving to collect and store an unprecedented amount of personal data on children without their parents' notice or consent.  A newly released investigation by Electronic Frontier Foundation (EFF) reveals student use of technology in school has grown at a profound rate, especially with free or low-fee devices issued by schools.  The education technology industry, according to the report, is now valued at over $8 billion.

The Editor says...
Please note that laptop computers, which are obsolete after only a few years, are often paid for with 30-year municipal bonds.  So you're paying for outdated computers long after they're in the landfill.

Workplace Surveillance Is the New Office "Perk".  Whether through "voluntary" corporate wellness programs, smart badges that record voices and GPS locations, or surveillance apps in their mobile phones and personal computers, Americans are offering up more and more personal data at work.  Most of them don't have much idea of where that data goes, or how it will be used — and there aren't that many limits on what employers can find out about their employees, or what they can do with the data.  The more people who opt in now, the harder it will be to opt out in the future.  And it's about to get much worse.

Reports in unmasking controversy were detailed, had info about 'everyday lives.  The intelligence reports at the center of the Susan Rice unmasking controversy were detailed, and almost resembled a private investigator's file, according to a Republican congressman familiar with the documents.  "This is information about their everyday lives," Rep. Peter King of New York, a member of the House Intelligence committee said.  "Sort of like in a divorce case where lawyers are hired, investigators are hired just to find out what the other person is doing from morning until night and then you try to piece it together later on."

How California police are tracking your biometric data in the field.  [Scroll down]  Nine of the agencies have responded to our requests with documents, while many more claimed they didn't have any records.  Of those that did respond, most employed a digital fingerprinting device.  Facial recognition has also been widely embraced among agencies in San Diego County, with Santa Clara County law enforcement agencies close behind.  In addition, In addition, the Los Angeles Sheriff's Department's biometrics system includes tattoo recognition, while the Orange County Sheriff's Department is also investigating iris recognition.

Comey warns there is no longer 'absolute privacy' in US.  FBI Director James Comey said Wednesday that Americans should no longer have the expectations of complete privacy. [...] "Even our memories aren't private," he said.  "Any of us can be compelled to say what we saw.  In appropriate circumstances, a judge can compel any of us to testify in court on those private communications.  There is no place in America outside of judicial reach."

New WikiLeaks reveal proof we are sliding down the slippery slope toward totalitarianism.  The U.S. government must get a grip on the massive opening that the CIA, through its misfeasance, nonfeasance and malfeasance, has created.  If Tuesday's WikiLeaks document dump is authentic, as it appears to be, then the agency left open electronic gateways that make all Americans vulnerable to spying, eavesdropping and technological manipulation that could bring genuine harm.  That the CIA has reached into the lives of all Americans through its wholesale gathering of the nation's "haystack" of information has already been reported.  It is bad enough that the government spies on its own people.  It is equally bad that the CIA, through its incompetence, has opened the cyberdoor to anyone with the technological skills and connections to spy on anyone else.

Spies among us — Congress has created a monster that is coming for us.  Those of us who believe that the Constitution means what it says have been arguing since the late 1970s that congressional efforts to strengthen national security by weakening personal liberty are unconstitutional, un-American and ineffective.  The Foreign Intelligence Surveillance Act (FISA), which Congress passed in the aftermath of President Richard Nixon's use of the CIA and the FBI to spy on his political opponents, has unleashed demons that now seem beyond the government's control and are more pervasive than anything Nixon could have dreamed of.

CIA Turned Samsung Smart TVs into Listening Devices, WikiLeaks Dump Reveals.  Hackers within the Central Intelligence Agency have developed malware which can turn Samsung Smart TVs into listening devices, leaked documents published by WikiLeaks Tuesday [3/7/2017] reveal.  The malware, coined "Weeping Angel" — released as part of WikiLeaks' "Vault 7" data dump — appears to have been created during a 2014 joint workshop with Britain's equivalent spy agency MI5.  The attack, which seems to require physical access to the TV and an infected USB drive, enables a "Fake-Off mode" that allows the microphone to be accessed remotely even after the TV has been seemingly turned off.  The malware also suppresses the TV's LED lights, removing any suspicion that the device is still active.

The Editor says...
One would hope that the CIA was using this eavesdropping technology against our enemies, and always in foreign countries.  Raise your hand if you think the U.S. government spies on American citizens using the same technology.

Exclusive — NSA Whistleblower:  Agency 'Absolutely' Tapping Trump's Calls.  Regarding [Michael] Flynn's case, [William] Binney stated of the NSA:  If they weren't behind it, they certainly had the data.  Now the difference here is that FBI and CIA have direct access inside the NSA databases.  So, they may be able to go directly in there and see that material there.  And NSA doesn't monitor that.  They don't even monitor their own people going into databases.  So, they don't monitor what CIA and FBI do.  And there's no oversight or attempted oversight by any of the committees or even the FISA court.  So, any way you look at it, ultimately the NSA is responsible because they are doing the collection on everybody inside the United States.  Phone calls.  Emails.  All of that stuff.
[Emphasis added.]

How CIA allegedly turns everyday devices into high-tech spy weapons.  CIA software can secretly turn everyday electronics like smartphones and high-tech TVs into listening devices to spy on unsuspecting users, WikiLeaks claimed in a massive document dump Tuesday [3/7/2017].  Some of the computer programs target the iOS software that runs Apple iPhones as well as Google's Android operating system, which does the same for phones built by Samsung, HTC and Sony, WikiLeaks said.  The "weaponized" software also reportedly provides techniques to defeat the encryption abilities of popular apps including WhatsApp, Signal, Telegram and Wiebo, which claim to supply users with secure and private communications.

FBI needs to explain why Flynn was recorded, Intelligence Committee chairman says.  The chairman of the House Intelligence Committee said Tuesday that the most significant question posed by the resignation of national security adviser Michael Flynn is why intelligence officials eavesdropped on his calls with the Russian ambassador and later leaked information on those calls to the press.  "I expect for the FBI to tell me what is going on, and they better have a good answer," said Rep. Devin Nunes (R-Calif.), chairman of the House Permanent Select Committee on Intelligence, which is conducting a review of Russian activities to influence the election.  "The big problem I see here is that you have an American citizen who had his phone calls recorded."

Court:  Law enforcement can view private Twitter messages.  A New Jersey appeals court has ruled that law enforcement agencies can view private messages and tweets posted on Twitter.

Memo: New York Called For Face Recognition Cameras At Bridges, Tunnels.  The state of New York has privately asked surveillance companies to pitch a vast camera system that would scan and identify people who drive in and out of New York City, according to a December memo obtained by Vocativ.  The call for private companies to submit plans is part of Governor Andrew Cuomo's major infrastructure package, which he introduced in October.  Though much of the related proposals would be indisputably welcome to most New Yorkers — renovating airports and improving public transportation — a little-noticed detail included installing cameras to "test emerging facial recognition software and equipment."  "This is a highly advanced system they're asking for," said Clare Garvie, an associate at Georgetown University's Center for Privacy and Technology, and who specializes in police use of face recognition technologies.  "This is going to be terabytes — if not petabytes — of data, and multiple cameras running 24 hours a day.  In order to be face recognition compliant they probably have to be pretty high definition."

FBI allegedly paid Geek Squad for evidence.  Last May, the defense in a child pornography trial alleged that the FBI used a member of electronics retailer Best Buy's tech support team, Geek Squad, to peer into the accused's computer on the hunt for evidence of child pornography.  Since then, the defense's lawyers revealed that the FBI had cultivated at least eight of the company's IT handyfolk over a four-year period to serve as confidential informants, who all received some payment for turning over data.  Obviously, this raises serious questions about whether sending devices into the repair shop forfeits a person's right to privacy or unreasonable search and seizure.  The eight Geek Squad members in question worked in the tech support branch's repair center in Brooks, Kentucky, servicing items sent in from all over the country.  Technically, users sign consent to search over to Best Buy when they hand their devices over to get fixed.  This includes fine print indicating that any evidence of child pornography would require the company to hand the device over to authorities.

Your boss is watching you:  Companies fit staff with tracking devices to they can follow their movements night and day.  Employers across Britain and North America are fitting their staff with wearable tracker devices to monitor their fitness, productivity and stress levels 24 hours a day.  At least four companies — including a major bank and part of the NHS — are using 'sociometric badges' to measure the conditions of their staff.  The credit card-sized devices created by Humanyze include a microphone that analyses the tone, speed and volume, but not the content, of a person's voice, scan for proximity to others and measure physical activity and sleep patterns.

Boston police pause plans for $1.4-million social media surveillance program.  The Boston Police Department on Friday [1/13/2017] announced it was putting a hold on its plans to purchase $1.4 million worth of social media surveillance software, signaling a win for civil liberties activists who said the program was poised to chill free speech and hindered other constitutionally-protected activity.  Local law enforcement had sought social media analytic technology capable of scouring the internet for potential threats, including the ability to monitor platforms including Facebook, Twitter, Instagram and YouTube in real time for any data of interest to investigators, according to an Oct. 2016 request for proposals.

Obama Just Quietly Gave 16 Gov't Agencies Access To The NSA Data on US Citizens.  In virtually its last gasp, the Obama administration has quietly given the National Security Agency wider powers to share intercepted surveillance data with 16 other government agencies, including the FBI, DEA and CIA, before applying privacy protections.

Anything You Say Around Your Smart Devices Can And Will Be Used Against You In Court.  Are your smart devices spying on you for the State?  In this video, Vin Armani discusses the danger of prosecutors being able to confiscate the entire voice history on your smart devices, like the popular Amazon Echo, to find wrongdoing.

Government requests for Facebook data up 27 percent.  Governments worldwide requested Facebook users' data nearly 60,000 times in the first half of 2016, a 27 percent increase over requests made in the second half of 2015, according to a Facebook bi-annual report published this week.  In addition to government requests for user data, the report details which content Facebook restricts for violating local laws.  The company says it studies each request carefully to determine whether or not it has merit, especially in emergency cases where imminent risk of serious injury or harm is involved.  It ultimately handed over data in 80 percent of cases.

UK mass surveillence is illegal, EU court says.  The UK government's "general and indiscriminate" retention of personal data is not permitted under EU law, the EU's Court of Justice has ruled.  UK Brexit secretary David Davis initially launched the case when he was a backbench MP in 2014, challenging a law that allowed spies to intercept and store data relating to phone calls and online messages.

Federal agencies can spy on phones with 400 cell-site simulators.  The Department of Homeland Security and Justice Department have spent collectively more than $95 million on secret cellphone tracking technology and own more than 400 cell-site simulators that can be used to zero in covertly on the locations of cellphones, according to a congressional report.  A report released Monday [12/19/2016] by the House Oversight and Government Reform Committee reveals a tally of how many cell-site simulators federal agencies own and recommends that lawmakers adopt a national standard to govern use of the devices by local and federal law enforcement agencies.  With 194 cell-site simulators, the FBI has the most of any of the agencies identified as owning the devices, which often are referred to by brand names including Stingray or Hailstorm.

Surveillance "Reforms" Allow NSA Greater Access Than Ever to Phone Data.  Even as surveillance hawks such as FBI Director James Comey, CIA Director John Brennan, and joint chairs of the Senate Intelligence Committee Senators Richard Burr (R-N.C.) and Dianne Feinstein (D-Calif.) continue to claim that terrorists and other criminals are using technology to "go dark," so America needs an increased ability to perform civilian surveillance, the reality is that the hawks have more access to more data than ever before.  And — as recent information confirms — many of the reasons for that increased surveillance ability are the supposed "reforms" that were sold to the American people as a way to curtail that surveillance.  Those in power — especially those who have built their careers in government by expanding the surveillance state — are not above using manipulation to increase their power by increasing that surveillance.  The recent surveillance "reforms" — particularly the misnamed USA FREEDOM Act — prove that point perhaps better than anything else could.

Private Eyes:  The Little-Known Company That Enables Worldwide Mass Surveillance.  Dozens of internal documents and emails from Endace, obtained by The Intercept and reported in cooperation with Television New Zealand, reveal the firm's key role helping governments across the world harvest vast amounts of information on people's private emails, online chats, social media conversations, and internet browsing histories.  The leaked files, which were provided by a source through SecureDrop, show that Endace listed a Moroccan security agency implicated in torture as one of its customers.  They also indicate that the company sold its surveillance gear to more than half a dozen other government agencies, including in the United States, Israel, Denmark, Australia, Canada, Spain, and India.

When AT&T Profits Off Government Snooping, Shouldn't We Be Blaming the Government?  It is easy to forget that Americans had actually been clued in to the likelihood of domestic telecommunication surveillance by the National Security Agency (NSA) long before Edward Snowden's leaks.  Snowden helped us understand the massive scope and many particulars about which we were unaware and really put the issue before the public in a way we hadn't seen before.  But have we all forgotten Room 641A? That was the room in San Francisco where telecommunications company AT&T set up a system for the NSA to access the company's internet traffic for surveillance.  It was exposed by the Electronic Frontier Foundation and a former AT&T technician all the way back in 2006, years before Snowden's leaks.

AT&T Makes Money Mining, Selling Phone Use Data To Police Nationwide.  There's been chatter in the air for years about phone records and metadata, ever since civil rights advocates sued the NSA over its massive record-retention program back in 2013.  But new documents highlight that while federal surveillance might be sweeping, it's got nothing on the scope of the private sector — and that selling data to investigators can be a profitable side-business.  The Daily Beast published new documents today showing that not only does AT&T collect and retain a staggering amount of data on everything that happens in its network, but also that it has formed partnerships with law enforcement agencies all around the country to sell access to that database for as much as a million dollars per year.

Study: 1 in 2 American Adults Already In Facial Recognition Network.  Conducted over a year and relying in part on Freedom of Information and public record requests to 106 law enforcement agencies, the study, conducted by Georgetown Law's Center on Privacy and Technology, found American police use of facial recognition technology is a scattered, hodgepodge network of laws and regulations.  "Looking at the sum total of what we found, there have been no laws that comprehensively regulate face recognition technology, and there's really no case law either," Clare Garvie, an associate at the CPT, told Vocativ.  "So we find ourselves having to rely on the agencies that are using that technology to rein it in.  But what we found is that not every system — by a long shot — has a use policy."

GCHQ broke the law for 17 years... spying on UK citizens.  For more than 17 years British security and intelligence agencies broke the law, illegally collecting vast amounts of data about UK citizens without proper oversight.  That's the judgement of the Investigatory Powers Tribunal (IPT), the only court that hears complaints against MI5, MI6 and GCHQ, after human rights campaigners at Privacy International launched a legal complaint in June 2015.

Police Use Surveillance Tool to Scan Social Media.  A Chicago company has marketed a tool using text, photos and videos gleaned from major social media companies to aid law enforcement surveillance of protesters, civil liberties activists say.  The company, called Geofeedia, used data from Facebook, Twitter and Instagram, as well as nine other social media networks, to let users search for social media content in a specific location, as opposed to searching by words or hashtags that would be less likely to reveal an exact location.  Geofeedia marketed its abilities to law enforcement agencies and has signed up more than 500 such clients, according to an email obtained by the American Civil Liberties Union.

Local Police Using CIA-funded Software to Track All Citizens' Social Media Posts.  Stories from across the country have revealed that several local law enforcement agencies — in Seattle, Chicago, Philadelphia, and Oakland among others — and corporations — the Mall of America and McDonald's — have purchased surveillance software from a company called Geofeedia.  The program will inform police of the physical location from which you made your last social media post.  It will provide the content of your posts, too.  Twitter, Instagram, and Facebook are all included in the surveillance sweep, and all the updates posted to any one of these popular services will be uploaded to one single database available all day, every day, to police.  Geofeedia's pamphlet promoting the service touts their intelligence platform's ability to provide "targeted surveillance" and "perpetual monitoring" of social media posts.  Literature produced by Geofeedia also promotes its software's ability to track large crowds, including "protests," athletic events, and natural disasters.

Federal Agents Can Secretly Read Every E-mail of Every American.  Not only is the federal government able to read every e-mail ever sent by every American regardless of any reasonable belief that the target has committed any crime, they have these decisions upheld by secret courts where the owner of the e-mails has no right to question the accusers.  How did the federal government get this power?  They were given it by federal judges who allowed the government to define "premises" in a clever, crafty, and contemptuous way.

A Banana Republic, If We Choose to Keep It.  Here's what Americans have learned in the last two weeks alone. [...] Americans learned that Yahoo built a secret software system designed to search every customer email for the purpose of providing specific information demanded by U.S. intelligence officials.  Both Yahoo and the NSA refused to comment on the matter.  Reuters reported, "Experts said it was likely that the NSA or FBI had approached other Internet companies with the same demand."  No doubt.

Exclusive:  Yahoo secretly scanned customer emails for U.S. intelligence — sources.  The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.  Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to a spy agency's request by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.

Federal Agency Pushed Law Enforcement to Scan License Plates of Gun Show Attendees.  The emails date back to 2010 and were obtained by the Wall Street Journal (WSJ).  According to WSJ, "[ICE] crafted a plan in 2010 to use license-plate readers — devices that record the plate numbers of all passing cars — at gun shows in Southern California, including one in Del Mar."  ICE then "compared that information to cars that crossed the border, hoping to find gun smugglers, according to the documents and interviews with law-enforcement officials with knowledge of the operation."

NYPD Terrorism Expert:  We Act on Information and Behavior; We Do Not Spy on 'Constitutionally Protected Activities'.  John Miller, deputy commissioner of Intelligence and Counterterrorism for the New York City Police Department, told Congress Wednesday [9/21/2016] that the NYPD operates on information, behavior and actions in its counterterrorism efforts and does not place spies in the Muslim community to watch people engaged in "constitutionally protected activities."  "We operate under the Andrew guidelines, and the Andrew guidelines specifically say that we operate on information, on behavior, on actions, but we do not place undercovers or spies or people into the community to watch people who are engaged in completely constitutionally protected activities — whether that's at a restaurant, a house of worship, or a meeting," Miller said.

Watched.  Police forces across the United States are stockpiling massive databases with personal information from millions of Americans who crossed paths with officers but were not charged with a crime.  A person can end up in one of these databases by doing nothing more than sitting on a public park bench or chatting with an officer on the street.  Once there, these records can linger forever and be used by police agencies to track movements, habits, acquaintances and associations — even a person's marital and job status, The Post and Courier found in an investigation of police practices around the nation.  What began as a method for linking suspicious behavior to crime has morphed into a practice that threatens to turn local police departments into miniature versions of the National Security Agency.  In the process, critics contend, police risk trampling constitutional rights, tarnishing innocent people and further eroding public trust.

FBI director:  Cover up your webcam.  The head of the FBI on Wednesday defended putting a piece of tape over his personal laptop's webcam, claiming the security step was a common sense one that most should take.  "There's some sensible things you should be doing, and that's one of them," Director James Comey said during a conference at the Center for Strategic and International Studies.  "You go into any government office and we all have the little camera things that sit on top of the screen," he added.  "They all have a little lid that closes down on them.  "You do that so that people who don't have authority don't look at you.  I think that's a good thing."

1970s spy satellite 'better than Google Earth'.  Sorry to break it to you, but Google Earth ain't all that.  In a pre-digital era more than 30 years before Google Earth, an ultrasecret US satellite program spied on other countries by taking much higher quality photos of the planet's surface.  The intelligence community called this program Big Bird and Keyhole-9, but its codename was Hexagon.  "These were much better pictures than Google Earth," Phil Pressel told CNN's "Declassified."

'Pre-Search' Is Coming to U.S. Policing.  News that the city of Baltimore has been under surreptitious, mass-scale camera surveillance will have ramifications across the criminal justice world.  When it comes to constitutional criminal procedure, privacy, and the Fourth Amendment, it's time to get ready for the concept of "pre-search." [...] Since January, police in Baltimore have been testing an aerial surveillance system developed for military use in Iraq.  The system records visible activity across an area as wide as thirty square miles for as much as ten hours at a time.  Police can use it to work backward from an event, watching the comings and goings of people and cars to develop leads about who was involved. [...] But the technology collects images of everyone and everything.  From people in their backyards to anyone going from home to work, to the psychologist's or marriage counselor's office, to meetings with lawyers or advocacy groups, and to public protests.

Homeland Security Plans to Monitor YOUR Social Media Account.  The process for visa-waiver applicants has been under fire from US citizens and politicians alike.  But one program in particular, monitoring the social media presence of foreign visitors, is being targeted by a wide coalition of civil liberties groups.  Twenty-eight organizations are banding together to keep the Department of Homeland Security (DHS) out of visa-waiver applicants' Twitter feeds and other social networking accounts.  Citing a combination of invasion of privacy, potential for racial profiling and general pointlessness, organizations such as the American Civil Liberties Union and the Center for Democracy and Technology are hoping to get the DHS to nix the proposal.

How the NSA snooped on encrypted Internet traffic for a decade.  In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have uncovered an attack that remotely extracts decryption keys from the company's now-decommissioned line of PIX firewalls.  The discovery is significant because the attack code, dubbed BenignCertain, worked on PIX versions Cisco released in 2002 and supported through 2009. Even after Cisco stopped providing PIX bug fixes in July 2009, the company continued offering limited service and support for the product for an additional four years.  Unless PIX customers took special precautions, virtually all of them were vulnerable to attacks that surreptitiously eavesdropped on their VPN traffic.

Powerful NSA hacking tools have been revealed online.  A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate.  The file appeared to be real, according to former NSA personnel who worked in the agency's hacking division, known as Tailored Access Operations (TAO). [...] Said a second former TAO hacker who saw the file:  "From what I saw, there was no doubt in my mind that it was legitimate."

Federal Judge Rules Hidden Microphones In Public Do Not Violate Constitution.  On Friday July 22, U.S. District Judge Phyllis Hamilton issued a 17-page ruling which found the practice of placing recording devices on the steps of courthouses in Oakland and Martinez, California to be "unsettling," but not in violation of the Fourth Amendment.  The four defendants in the federal criminal fraud case are accused of rigging real estate bids throughout Alameda and Contra Costa Counties.  In an attempt to eavesdrop on the conversations of the defendants, the Federal Bureau of Investigations placed microphones in a light fixture on the steps of the Almeda County Courthouse and just outside the Contra Costa County Courthouse, among other locations.  The information gathered from the conversations was then used as evidence in grand jury proceedings.

Home Computers Connected to the Internet Aren't Private, Court Rules.  A federal judge for the Eastern District of Virginia has ruled that the user of any computer that connects to the Internet should not have an expectation of privacy because computer security is ineffectual at stopping hackers.  The June 23 ruling came in one of the many cases resulting from the FBI's infiltration of PlayPen, a hidden service on the Tor network that acted as a hub for child exploitation, and the subsequent prosecution of hundreds of individuals.  To identify suspects, the FBI took control of PlayPen for two weeks and used, what it calls, a "network investigative technique," or NIT — a program that runs on a visitor's computer and identifies their Internet address.  Such mass hacking using a single warrant has riled privacy and digital-rights advocates, but Senior U.S. District Judge Henry Coke Morgan Jr. upheld the use of the warrant and even stated that the warrant is unnecessary because of the type of crime being investigated and because users should have no "objectively reasonable expectation of privacy."

As Biometric Scanning Use Grows, So Does Security Risk.  Without you necessarily realizing it, your unique attributes — or "biometrics" — are being used to verify your identity.  Every time you unlock your smartphone, use a fingerprint scanner at the airport, or upload a photo with facial recognition to Facebook, your physical attributes are scanned and scrutinized against a template.  The use of biometrics has exploded in recent years, with companies ranging from 24-Hour Fitness to NYU Langone Medical Center using this convenient technology to identify their customers.

Federal appeals court considers constitutionality of NSA surveillance in terror case.  Civil rights attorneys say surveillance evidence used to convict a Somali-American man who plotted to bomb a 2010 Christmas tree-lighting ceremony was gathered unconstitutionally through the U.S. government's warrantless foreign surveillance program.  They laid out their arguments Wednesday [7/6/2016] before a three-judge panel of the 9th U.S. Circuit Court of Appeals in downtown Portland — directly across the street from the plaza where almost six years prior Mohamed Mohamud tried detonating a fake bomb that was part of an undercover operation.

US Government Approved 100% Of Wiretap Applications In 2015.  A ten-year study of how state and federal law enforcement wiretaps suspects shows that the government is extremely efficient at the practice, and is only getting better.  The new report, conducted by the Federal Judiciary, looked at the prevalence of the FBI and state and local police petitioning for a warrant to surveil someone.  Methods range from tracking their computer activity to bugging a home telephone or a room, though it overwhelmingly — 96 percent of the time 2015 — meant tracking or listening to their cell phone calls.  It has become a common enough practice that in a ten-year span, a wiretap request has been denied only eight times, and never more than twice in a year.  According to the report, "No wiretap applications were reported as denied in 2015."

Federal Court:  The 4th Amendment doesn't apply to your home computer.  In a dangerously flawed decision unsealed today [6/24/2016], a federal district court in Virginia ruled that a criminal defendant has no "reasonable expectation of privacy" in his personal computer, located inside his home.  According to the court, the federal government does not need a warrant to hack into an individual's computer.  This decision is the latest in, and perhaps the culmination of, a series of troubling decisions in prosecutions stemming from the FBI's investigation of Playpen — a Tor hidden services site hosting child pornography.  The FBI seized the server hosting the site in 2014, but continued to operate the site and serve malware to thousands of visitors that logged into the site.  The malware located certain identifying information (e.g., MAC address, operating system, the computer's "Host name"; etc) on the attacked computer and sent that information back to the FBI.  There are hundreds of prosecutions, pending across the country, stemming from this investigation.

NJ Transit keeps recordings of your conversations for a month, it says.  NJ Transit officials have broken their silence over what happens to surveillance recordings it makes of passenger conversations on light rail trains.  In April, the state American Civil Liberties Union and commuter groups demanded that NJ Transit disclose information about the surveillance after an NJ Advance Media article revealed that the conversations of passengers on light rail trains were being recorded.  "Audio and video remain in the surveillance device for approximately 30 days, with new video and audio overwriting (recording over) previous files," said Nancy Snyder, an NJ Transit spokeswoman.  "It is our practice and procedure."

Also posted under The police state on wheels.

[The Republican-controlled] Senate Falls One Vote Short of Giving FBI Access to Browser Histories Without a Court Order.  Privacy-minded senators on Wednesday [6/22/2016] blocked an amendment that would give the FBI power to take internet records, including browser histories and email metadata, without a court order.  But the victory may be fleeting.  Just one vote kept the measure from clearing a 60-vote procedural hurdle, and political arm-twisting may soon result in a second vote.  Senate Majority Leader Mitch McConnell, R-Ky., switched his vote to "no" to allow reconsideration in the near future.  That made the final tally 58-38, with four senators not voting.

New rule lets feds hack your computer anywhere, anytime.  A proposal that Washington bureaucrats be given nearly unfettered permission to hack into private computers, which WND reported earlier was being described as the ultimate "Big Brother" move, is drawing strong opposition from privacy activists and members of Congress.  "We're in the midst right now of one of the biggest battles in the privacy world that we have faced," said U.S. Rep. Blake Farenthold, R-Texas, on a website mobilizing opposition.  "If we keep down this path, we're going to wake up in a few years in George Orwell's 1984.  This is why, as we fight for security, any intrusion on privacy needs to be narrowly tailored and aggressively overseen."

House reverses course, upholds NSA phone snooping as terrorist attacks shift debate.  The fight is over snooping programs targeting foreigners' communications under Section 702 of the Foreign Intelligence Surveillance Act, but which also end up snaring Americans' emails and phone calls.  Intelligence agencies claim the right to go through that data when they are investigating terrorism and say it's critical to preventing plots or learning about the contours of attacks, such as the one in Orlando, as they happen.  Civil libertarians argue that the data shouldn't be collected in the first place and say if agents are going to peer into it, they should get a warrant before looking at Americans' data under Section 702.

Congress Must Shut the Backdoor on Section 702 Surveillance.  The fight over NSA surveillance is about to heat up again.  This week, the House will consider a measure that would require the NSA and other government agencies to follow due process and obtain a warrant to collect the communications of American citizens.  Through an amendment to H.R. 5293, the Department of Defense Appropriations Act of 2017, the House could defund warrantless government searches of the database of information collected under Section 702 of the Foreign Intelligence Surveillance Act (FISA).  The amendment, proposed by Reps.  Massie (R-Ky.), Lofgren (D-Calif.), and Poe (R-Texas), would prevent the NSA's backdoor spying on American citizens through the use of U.S. person identifiers.  The Massie-Lofgren-Poe amendment also prohibits government agencies from requesting that U.S. companies build security vulnerabilities into their hardware or software in order to make it easier for the government to access them.  This would protect encryption, which has been undermined by the NSA's breathtaking extension of surveillance.

Low Tech: 3 Ways to Beat the NSA.  [#1] Snail mail:  Mail can be sent from any dropbox anywhere, with any return address on it, with hidden messages enclosed, disguised as junk mail.  Yes, Stasi thugs can read your mail, but interpreting all the paper mail would take millions of employees while reading all the emails just takes a few mega-computers.  All the ultra-sophisticated electronic snooping in the world won't be able to physically open, read and check for encrypted messages in all 660 million pieces of mail delivered in the United States every day.

The Editor says...
I would add only this:  If you believe the government will someday sift through your email and paper mail, you should start sending encrypted email and cryptic paper mail to yourself (or having someone in another state send it to you) on a regular basis.  That way, there will be a steady stream of encrypted messages already underway when the time comes, and the government won't be able to tell when the important messages start.  It's called traffic analysis.  An opponent may not be able to decrypt your messages, but they can see when the traffic starts and stops.  For example, you could send yourself a steady stream of artificial junk mail with QR codes and bar codes all over it.  VXNlIHlvdXIgaW1hZ2luYXRpb24u

Crafty plan to give FBI warrantless access to browser histories axed.  A sly attempt to grant the FBI warrantless access to people's browser histories in the US has been shot down by politicians.  Unfortunately, the Electronic Communications Privacy Act (ECPA) Amendments Act of 2015, which would have brought in some privacy safeguards for Americans, was cut down in the crossfire.  The ECPA Amendments Act is very simple:  it amends the 1986 Electronic Communications Privacy Act, which gives cops and agents warrantless access to any email that has been read or is more than 180 days old.  That 30-year-old act made sense back in the day of 20MB hard drives and when we stored own emails on our own computers:  if we deleted something to save space or to simply destroy it, it was gone.  But in today's cloudy world, where we have no real control over our information, it has proven a privacy nightmare.

Judge Nap Slams Congress Over Web Browsing Access That Promotes 'a Police State'.  The FBI may soon enjoy the authority to access the internet activity of any citizen without a warrant — a continuation of what Fox News judicial analyst Andrew Napolitano described as a decades-old "assault" on the Fourth Amendment.  Lawmakers are considering proposed legislation this week that would grant the FBI that uninhibited access.  Critics, including Google and Facebook, have argued such changes would be a violation of Americans' privacy.  But, in Napolitano's view, elected officials will argue under the "facade" that it is necessary for the population's safety.  [Video clip]

FBI wants access to Internet browser history without a warrant in terrorism and spy cases.  The Obama administration is seeking to amend surveillance law to give the FBI explicit authority to access a person's Internet browser history and other electronic data without a warrant in terrorism and spy cases.  The administration made a similar effort six years ago but dropped it after concerns were raised by privacy advocates and the tech industry.  FBI Director James B. Comey has characterized the legislation as a fix to "a typo" in the Electronic Communications Privacy Act, which he says has led some tech firms to refuse to provide data that Congress intended them to provide.

The Editor says...
If they get this passed, you can be sure that the warrantless access won't stop with terrorism cases.

Facial Recognition Software Spells The End Of Anonymity.  Nearly 250 million video surveillance cameras have been installed throughout the world, and chances are you've been seen by several of them today.  Most people barely notice their presence anymore — on the streets, inside stores, and even within our homes.  We accept the fact that we are constantly being recorded because we expect this to have virtually no impact on our lives.  But this balance may soon be upended by advancements in facial recognition technology.  Soon anybody with a high-resolution camera and the right software will be able to determine your identity.  That's because several technologies are converging to make this accessible.  Recognition algorithms have become far more accurate, the devices we carry can process huge amounts of data, and there's massive databases of faces now available on social media that are tied to our real names.  As facial recognition enters the mainstream, it will have serious implications for your privacy.

Seven Giant Scandals That Barack Obama Just Couldn't Keep Undercover!  [#3] NSA Spying:  So Big Brother spied.  On American citizens.  On the Press.  Even on Washingtons own Viper pit called Congress.  If it wasn't for the nerdy guy in glasses with a very dumb sounding cadence (Edward Snowden), the public may have never known about it... unfortunately the pale NSA employee had to flee and choose Russia of all places to call his new home.  Good guy turned bad?  You decide for yourself.

Senate bill would let FBI read your emails without a court order.  Better watch what you put in email.  The Senate Intelligence Committee on Tuesday [5/24/2016] approved a bill that would make it easier for the government to read what you're writing online.  The 2017 Intelligence Authorization Act, if enacted into law, would let the FBI obtain email records without a court order.  All the agency would need is a National Security Letter, which lets the FBI get information from companies about their customers without alerting the person being investigated.  Currently, the FBI can access phone records that way, but not emails.  The bill is the latest move by the federal government to shore up its powers when it comes to surveilling citizens.  The government has been battling Apple and other tech companies for more access to data stored on devices.  Law enforcement argues it can't fight crimes unless it has access to information on mobile gadgets.  Technology companies and rights groups argue that features like strong encryption, which scrambles data so it can be read only by the intended recipient, are needed to keep people safe and protect privacy.

Bill would expand FBI's warrantless access to online records, senators warn.  Two US senators have warned that a new bill would vastly expand the FBI's warrantless access to Americans' online records.  Although the text of the 2017 intelligence authorization bill is not yet available to the public, two members of the Senate intelligence committee have said the bill could expand the remit of a nonjudicial subpoena called a National Security Letter (NSLs) to acquire Americans' email records, chat or messaging accounts, account login records, browser histories and social-media service usage.

DHS/Police are turning public CCTV cameras into surveillance cameras.  Thanks to Purdue University and Homeland Security, police can now access public CCTV cameras anywhere.  Purdue researchers have developed a prototype system called 'Visual Analytics for Command, Control and Interoperability Environments' (VACCINE) which allows law enforcement to tap into thousands of CCTV cameras.  This means police can spy on you in parking garages, college campuses, national parks, highways etc., no place is safe from Big Brother.

Lawyer: FBI used Best Buy informant to illegally search computers.  An employee at Best Buy's nationwide computer repair center served as a paid FBI informant who for years tipped off agents to illicit material found on customers' hard drives, according to the lawyer for a Newport Beach doctor facing child pornography charges as a result of information from the employee.  Federal authorities deny they directed the man to actively look for illegal activity.  But the attorney alleges the FBI essentially used the employee to perform warrantless searches on electronics that passed through the massive maintenance facility outside Louisville, Ky., where technicians known as Geek Squad agents work on devices from across the country.

Senators move to block FBI from expanding hacking powers.  Two US senators this week introduced a bipartisan bill meant to protect Americans from government hacking.  The Stopping Mass Hacking (SMH) Act from Sens. Ron Wyden (D-Ore.) and Rand Paul (R-Ky.) would prevent the implementation of a federal court procedure known as Rule 41.  Approved in May, Rule 41 makes it easier for the Justice Department to obtain warrants for remote electronic searches.  It also allows judges to issue a single warrant authorizing government hacking of numerous devices around the world.  "This is a dramatic expansion of the government's hacking and surveillance authority," Wyden said in a statement.  "Such a substantive change with an enormous impact on Americans' constitutional rights should be debated by Congress, not maneuvered through an obscure bureaucratic process."

The FBI has quietly been hacking Americans for 20 years.  Countless Snowden leaks have detailed the highly sophisticated tools used by the NSA to collect data in bulk from unsuspecting people, including American citizens.  But the NSA isn't the only agency conducting spying operations.  The FBI has been spying on US citizens as part of ongoing investigations for two decades, yet many details about its data collection practices are still secret, despite all of the leaks in recent years.

Secret Gov't microphones spying on citizens.  Big Brother is watching you.  It sounds increasingly like everyday life in the United States — and they don't need a warrant to do it.  That's according to reporter Jackie Ward from San Francisco-Oakland Bay Area station KPIX, who on Friday revealed she had uncovered a secret government surveillance program in the area that has citizens on edge.

Hidden Microphones Exposed As Part of Government Surveillance Program In The Bay Area.  Hidden microphones that are part of a clandestine government surveillance program that has been operating around the Bay Area has been exposed.  Imagine standing at a bus stop, talking to your friend and having your conversation recorded without you knowing.  It happens all the time, and the FBI doesn't even need a warrant to do it.  Federal agents are planting microphones to secretly record conversations.

Philly cops try to illegally disguise powerful surveillance SUV as Google Street View car... and fail badly.  A Philadelphia police surveillance SUV crudely disguised as the Google Maps car has left local residents baffled after it was spotted Wednesday [5/11/2016] — and triggered an internal investigation.  The large silver SUV, which has chunky black cameras on its roof that can photograph thousands of license plates in a minute, looks nothing like the colorful cars that Google uses to create its 360-degree interactive Street View maps.  But that didn't stop someone — presumably within the police — sticking a pair of large, unconvincing Google Maps decals on its back windows in an apparent attempt to disguise the vehicle's true purpose.

House of Representatives approves bill requiring warrants for email searches.  The House of Representatives today unanimously voted to approve the Email Privacy Act, which requires law enforcement officials to obtain a warrant before accessing stored electronic communications, such as emails.  The act updates the Electronic Communications Privacy Act, which has been in place since 1986.  Although that law provides some protections, digital privacy activists have long criticized a part of it that ends warrant requirements for stored electronic communications after 180 days.  The Email Privacy Act does away with that provision, and unlike ECPA, the Privacy Act also makes it clear that a warrant is required even if an email is already opened — an occasional point of contention between privacy groups and the government.

The NSA won't tell Congress how many Americans it's spying on because our democracy is broken.  Congress is trying to learn more about the NSA's surveillance programs, and it's not going well.  In a letter delivered today [4/22/2016] to director of National Intelligence James Clapper, a group of 14 legislators (eight Democrats and six Republicans) asked for a ballpark figure on how many Americans are having their data collected under Section 702 of the Foreign Intelligence Surveillance Act.  Section 702 is the legal justification for many of the NSA's most invasive programs, including PRISM.  But we still don't have an exact idea of how broad its reach is.  So Congress asked!  They passed FISA, after all, so it's only right that they should know how it's being used.  They don't need an exact number of Americans caught up in PRISM, just a ballpark.  Is it a thousand?  A hundred thousand?  318 million?  Take an educated guess.

The new way police are surveilling you:  Calculating your threat 'score'.  As a national debate has played out over mass surveillance by the National Security Agency, a new generation of technology such as the Beware software being used in Fresno has given local law enforcement officers unprecedented power to peer into the lives of citizens.  Police officials say such tools can provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases.  They say that last year's attacks in Paris and San Bernardino, Calif., have only underscored the need for such measures.  But the powerful systems also have become flash points for civil libertarians and activists, who say they represent a troubling intrusion on privacy, have been deployed with little public oversight and have potential for abuse or error.

U.S. Government spy planes use 'augmented reality' software as they fly above major US cities and 'target Muslim areas'.  The software, which works through the spy plane's high resolution cameras, can be used by pilots to superimpose information — including the names of house owners and businesses — onto their screens.  FBI and Homeland Security can also track the mobile phones of the residents below as dozens of aircraft take to the skies each day.

Encryption gets its Gang of Eight.  A pair of House committees is forming a bipartisan working group of eight lawmakers to prepare for possible legislation addressing how the widespread use of encryption affects law enforcement investigations. [...] The working group will attempt to develop bipartisan consensus in the House on an issue that has scrambled traditional party lines, especially since Apple CEO Tim Cook pledged to fight a court order that his company break into a cellphone owned by one of the San Bernardino terrorists.

Lawmakers Want Big Brother to Get a Warrant Before Looking in Your Inbox.  If the Email Privacy Act becomes law, the inboxes of millions of Americans will get a security update overnight.  The bill would prohibit the government from accessing private email accounts without a warrant. [...] At issue is the 1986 Electronic Communications Act.  Passed by Congress before most Americans went online, that law considers emails older than 180 days abandoned and makes them subject to search.

'Unprecedented' UN global data gathering to add huge amounts of information for governments to collect.  Six months after giving birth to a cluster of nebulous Sustainable Development Goals that aim to dramatically change the economic, social and environmental course of the planet, the United Nations is working on a drastic renovation of global data gathering to measure progress against its sweeping international agenda.  The result that emerged late last week from the U.N. Statistical Commission — an obscure body of national experts that calls itself the "apex entity of the international statistics system" — is a document as sprawling, undefined and ambitious as the sustainable Development Goals, or SDGs, themselves — which lay out 17 goals and 169 sometimes overlapping targets to transform global society.

Surprise! NSA data will soon routinely be used for domestic policing that has nothing to do with terrorism.  A while back, we noted a report showing that the "sneak-and-peek" provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases.  Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy.

With Viber's Latest Update, Congress is Losing the Encryption Battle.  WhatsApp, the popular online messaging service, recently changed the landscape of the encryption debate after announcing that their entire platform, between all devices, would offer end-to-end encryption.  This announcement was made on the tail end of Apple's dispute with the FBI, precisely about breaking into encrypted iPhones.  This past week, Viber, another popular messaging app, announced that their latest update would also include end-to-end encryption for all of its users.  While this may just seem like another example of encryption making its way onto popular apps, the case with Viber is particularly more salient in proving just how futile it is for Congress to try to restrict encryption.

BlackBerry's Global Encryption Key.  Last week, there was a big news story about the BlackBerry encryption key.  The news was that all BlackBerry devices share a global encryption key, and that the Canadian RCMP has a copy of it.

FBI director warns encryption makes information warrant-proof.  Apple General Counsel Bruce Sewell questioned Tuesday whether the FBI should have the right to force tech companies to create special software to help the government get into encrypted smartphones and other devices. [...] FBI Director James Comey said Tuesday that Congress must decide if it wants Apple and other tech companies to have the power to effectively bar law enforcement from obtaining evidence of crime and terrorism from encrypted smartphones and other electronic devices.  "The core question is this:  Once all of the requirements and safeguards of the laws and the Constitution have been met, are we comfortable with technical design decisions that result in barriers to obtaining evidence of a crime?" Comey asked the committee.

Obama to Trash Reagan's Restrictions on Domestic Spying.  At a secret meeting of the United States National Security Council on Feb 25, President Obama approved a draft 21-page memo relaxing a Cold War Reagan-era directive called Executive Order 12333 that restricted the number of government agencies that can access, without court order or Presidential approval, the contents of phone calls, emails and data the U.S. National Security Agency vacuums up from around the world.

US Congress locks and loads three anti-encryption bullets.  US Congress is preparing no fewer than three new bills over the ongoing encryption debate:  one banning end-to-end encryption, one setting up a commission to review the issue, and a third to make sure that it is Congress that gets to decide what happens next.  Leading member of the Senate Intelligence Committee Dianne Feinstein (D-CA) — who has been criticized for being too close to the NSA — has said she will introduce a new bill that will impose limits on encrypted devices.

If You Go Near the Super Bowl, You Will Be Surveilled Hard.  A hundred million people will watch the game on TV.  Over the next ten days, 1 million people are expected to descend on the San Francisco Bay Area for the festivities.  And, according to the FBI, 60 federal, state, and local agencies are working together to coordinate surveillance and security at what is the biggest national security event of the year.  The Department of Homeland Security, the agency coordinating the Herculean effort, classifies every Super Bowl as a special event assignment rating (SEAR) 1 event, with the exception of the 2002 Super Bowl, which got the highest ranking because it followed the September 11 terror attacks — an assignment usually reserved for only the Presidential Inauguration.  A who's-who of agencies, ranging from the DEA and TSA to the US Secret Service to state and local law enforcement and even the Coast Guard has spent more than two years planning for the event.

The new way police are surveilling you: Calculating your threat 'score'.  As a national debate has played out over mass surveillance by the National Security Agency, a new generation of technology such as the Beware software being used in Fresno has given local law enforcement officers unprecedented power to peer into the lives of citizens.  Police officials say such tools can provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases. [...] But the powerful systems also have become flash points for civil libertarians and activists, who say they represent a troubling intrusion on privacy, have been deployed with little public oversight and have potential for abuse or error.

Obama Spies on His Enemies in Congress.  Remember when Obama, the guy with big plans to resettle America's neighborhoods, clashed with Bibi Netanyahu for refusing to abandon construction and resettlement plans in East Jerusalem?  The president was so incensed that Netanyahu hesitated to comply with his demands that he left the prime minister sitting in a room alone while he went upstairs to eat.  That's when, out of fear of being wiretapped, Netanyahu and his delegation chose not to use White House phones.  As usual, Bibi's discernment was on target because recently it was revealed that Obama, concerned about his nuke deal with Iran, directed the National Security Agency to spy on Israel, American Jewish groups, and friends of Israel in the U.S. Congress.

Obama's NSA Spying on Congress Not a Story at AP — Until GOP Responds.  The Wall Street Journal ran a blockbuster story Tuesday afternoon ("U.S. Spy Net on Israel Snares Congress") about how the Obama administration's National Security Agency's "targeting of Israeli leaders swept up the content of private conversations with U.S. lawmakers."  In other words, the NSA spied on Congress.  As talk-show host and commentator Erick Erickson drily observed:  "Congress began impeachment proceedings on Richard Nixon for spying on the opposing political party."  Whether or not Congress has the nerve to defend itself and the Constitution's separation of powers, what the Journal reported is objectively a major story.  Yet the Associated Press ignored it on Tuesday [12/29/2015], and most of Wednesday.

NSA spying on US and Israeli politicians stirs Congress from Christmas slumbers.  After two years of doing little about the mass surveillance revealed by Edward Snowden, the US Congress has sprung into action in less than two days — with investigations into the NSA spying on some the legislature's members.  On Tuesday [12/29/2015] the Wall Street Journal reported that conversations between members of Congress and senior Israeli politicians had been monitored by the NSA under the orders of the White House.  The surveillance of Israeli Prime Minister Benjamin Netanyahu and his advisors occurred during negotiations into a deal with Iran over its nuclear power program.

Hackers Catch Prison Phone Company Securus Recording Attorney Calls.  In an example of Aaron Swartz's SecureDrop technology working as intended, the Intercept received a trove of dumped Securus phone records recently.  Securus, for those who have never been jailed in the United States virtually anywhere, is a phone services leader in the justice industry.  That particular part of the prison industrial complex, communication, is worth about $1.2 billion annually.

NSA stopped from indiscriminately collecting millions of phone records, but it's not enough.  The National Security Agency (NSA) is no longer allowed to collect and trawl the millions of phone calls made in the US each day, following an order by President Barrack Obama last year.  The move sees the end of mass collection of call records, to be replaced with more targeted intelligence gathering.  So, the NSA can still collect data, but not on the indiscriminate scale it had been until today [11/29/2015].

F.B.I. Director Repeats Call That Ability to Read Encrypted Messages Is Crucial.  The F.B.I. director and the Manhattan district attorney on Wednesday [11/18/2015] sought to reopen the argument that law enforcement and intelligence officials need to have access to encrypted information on smartphones with court approval.  The question seemed settled last month after President Obama decided not to push legislation requiring American technology companies — notably Apple, Google and Facebook — to roll back smartphone encryption schemes that make it almost impossible to read a target's communications, even if investigators have a court order.  But the terrorist attacks in Paris may have changed the politics on both encryption and a range of surveillance issues, with critics renewing their charge that the Obama administration is not using all tools available to stop terrorism.

The Editor says...
The article immediately above appears in the New York Times, which naturally argues in favor of Big Government.  Encryption is an inconvenience to Big Brother, and a totalitarian government would naturally like to get your encryption keys and read your email, just in case you're a terrorist.  Or behind on your child support.  Or you have outstanding warrants.

Battle against NSA spying in Courtroom 18.  On Thursday [10/8/2015], the fight to preserve democracy and hold government accountable to the people was unfolding in Courtroom 18 of the U.S. District Court for the District of Columbia, four blocks from the Congress.  I argued to the court our request for a preliminary injunction to immediately halt the government from spying on you and hundreds of millions of other U.S. citizens.  I am pleased to say that I believe we are going to win this for the American people. We expect a decision within a week to 10 days.

Of Course the Government Wants to Read Your Texts.  Imagine, if you will, a law that said all doors had to be left unlocked so that the police could get in whenever they needed to.  Or at the very least, a law mandating that the government have a master key.  That's essentially what some in the government want for your technology.  As companies like Apple and Google have embraced stronger encryption, they're making it harder for the government to do the kind of easy instant collection that companies were forced into as the government chased terrorists after 9/11.  And how could you oppose that government access?  After all, the government keeps us safe from criminals.  Do you really want to make it easier for criminals to evade the law?

NSA phone searches increased by 50 percent in 2013, report finds.  The number of phone numbers searched under the National Security Agency's phone-data surveillance program increased by 50 percent last year, according to a report that otherwise provides scant new information on the numbers of Americans and foreigners subject to U.S. surveillance.  The report, by the Director of National Intelligence, focused on the mechanics of a network of surveillance programs that sweep up millions of American phone records and gain indirect access to 75 percent of the nation's telecom infrastructure to facilitate those searches.  The report, the first such effort under new Obama administration guidelines pledging greater transparency, was as notable for what it left out as what it provided.

NSA phone searches increased by 50 percent in 2013, report finds.  The number of phone numbers searched under the National Security Agency's phone-data surveillance program increased by 50 percent last year, according to a report that otherwise provides scant new information on the numbers of Americans and foreigners subject to U.S. surveillance.  The report, by the Director of National Intelligence, focused on the mechanics of a network of surveillance programs that sweep up millions of American phone records and gain indirect access to 75 percent of the nation's telecom infrastructure to facilitate those searches.  The report, the first such effort under new Obama administration guidelines pledging greater transparency, was as notable for what it left out as what it provided.

Apple and Other Tech Companies Tangle With U.S. Over Data Access.  In an investigation involving guns and drugs, the Justice Department obtained a court order this summer demanding that Apple turn over, in real time, text messages between suspects using iPhones.  Apple's response:  Its iMessage system was encrypted and the company could not comply.  Government officials had warned for months that this type of standoff was inevitable as technology companies like Apple and Google embraced tougher encryption.  The case, coming after several others in which similar requests were rebuffed, prompted some senior Justice Department and F.B.I. officials to advocate taking Apple to court, several current and former law enforcement officials said.

Med Board lets DEA sneak peeks at patient records.  The Drug Enforcement Administration has been sifting through hundreds of supposedly private medical files, looking for Texas doctors and patients to prosecute without the use of warrants.  Instead, the agents are tricking doctors and nurses into thinking they're with the Texas Medical Board.  When that doesn't work, they're sending doctors subpoenas demanding medical records without court approval.  The DEA can't even count how many times it has resorted to the practice nationwide.  A spokesman estimated it was in the thousands.

Appeals court: NSA can resume bulk data collection.  A court of appeals on Friday [8/28/2015] overturned a lower court's ruling that the National Security Agency's bulk collection of phone records was illegal.  The D.C. Circuit Court of Appeals ruled the NSA may resume collecting data until the USA Freedom Act goes into effect in November, limiting government surveillance.

Hackers can access EVERY call and message you send.  Hackers are able to spy on smartphone users anywhere in the world.  The flaw is in a global telecom network called Signal System 7 that helps phone carriers across the world, including AT&T and Verizon, route calls and texts.  Experts say it is one of the biggest threat to privacy breaches the world has ever seen.

The Editor says...
If hackers can invade SS7 as a hobby, the engineers at the NSA can certainly do it for a living.

AT&T Helped N.S.A. Spy on an Array of Internet Traffic.  The National Security Agency's ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company:  the telecom giant AT&T.  While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed N.S.A. documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as "highly collaborative," while another lauded the company's "extreme willingness to help."

Federal Agencies Fight for Warrantless Access to Emails.  Back in 1986 — in a bygone era before email, the modern Internet, Facebook, the widespread use of cellphones and sharing economy sites — the government passed the Electronic Communications Privacy Act.  And believe it or not, this is still the law that protects the privacy of your electronic life in 2015.  A petition demanding reforms to ensure that emails cannot be accessed without a warrant achieved the necessary 100,000 signatures on the White House website to get a response.  You see, right now, the ECPA considers remotely stored digital files more than 180 days old to be abandoned and forces service providers to hand over those files whenever law enforcement demands — without the need for a warrant.  This means that all those old emails in your inbox aren't granted basic due process protections.

"Smart Cities" to Spy on You in Ways Orwell Never Imagined.  [Scroll down]  According to news reports, in London, data gathered from cameras is cross-referenced with government lists of people who have paid their driving fees, allowing violators to be identified and punished.  Authorities in Amsterdam, Barcelona, Stockholm, and other cities are also openly and purposely trying to become "smart."  In South Korea and the United Arab Emirates, fully "smart" cities are being designed and built from the ground up.  With facial-recognition software now extremely advanced, and billions of people around the world posting their data and pictures online through social-networking services, hand-held "smart" technology has already created potentially totalitarian tools far beyond anything George Orwell could have imagined in his worst nightmares.

NSA secretly tapped Google, Yahoo data centers worldwide, new report claims.  Massive cloud networks from companies like Google and Yahoo cache and serve up much of the data on the Internet — and the NSA has secretly tapped into the unencrypted links behind those company's enormous servers, according to a new report from the Washington Post.  By tapping into that link, the NSA can collect data at will from hundreds of millions of user accounts, the Post reported — including not just foreign citizens and "metadata" but emails, videos and audio from American citizens.  Operation MUSCULAR, a joint program of the NSA and its British equivalent GCHQ, relies on an unnamed telecommunications provider outside of the U.S. to offer secret access to a cable or switch through with Google and Yahoo pass unencrypted traffic between their servers.

NSA phone searches increased by 50 percent in 2013, report finds.  The number of phone numbers searched under the National Security Agency's phone-data surveillance program increased by 50 percent last year, according to a report that otherwise provides scant new information on the numbers of Americans and foreigners subject to U.S. surveillance.  The report, by the Director of National Intelligence, focused on the mechanics of a network of surveillance programs that sweep up millions of American phone records and gain indirect access to 75 percent of the nation's telecom infrastructure to facilitate those searches.

Former National-Security Officials Now See the Peril of Weakening Encryption.  FBI Director James Comey, Director of National Intelligence James Clapper, and NSA Director Mike Rogers continue to lament the ability of people to secure the privacy of their communications with end-to-end encryption that even governments cannot break.  But the push for laws mandating "backdoor access," or built-in security flaws for the state to exploit, has run into some unexpected opponents:  former national-security officials on the other side of the revolving door.

FOIA Documents Reveal Massive DEA Program to Record American's Whereabouts With License Plate Readers.  If license plate readers continue to proliferate without restriction and the DEA holds license plate reader data for extended periods of time, the agency will soon possess a detailed and invasive depiction of our lives (particularly if combined with other data about individuals collected by the government, such as the DEA's recently revealed bulk phone records program, or cell phone information gleaned from U.S. Marshals Service's cell site simulator-equipped aircraft).  Data-mining the information, an unproven law enforcement technique that the DEA has begun to use here, only exacerbates these concerns, potentially tagging people as criminals without due process.

NSA to Destroy Data Collected From Mass Phone Surveillance.  On November 29, 2015, the National Security Agency (NSA) will stop accessing "historical metadata" collected under Section 215 of the Patriot Act, the Office of the Director of National Intelligence announced in a press release on Monday [7/27/2015].  The practice of bulk telephone metadata collection, the once-secret practice uncovered by leaker Edward Snowden, briefly came to an end in June when provisions of the post-9/11 Patriot Act expired.  On June 29, however, the Foreign Intelligence Surveillance Court gave the NSA the go-ahead to resume its controversial bulk collection of telephone metadata for six months — the amount of time allotted by Congress in the USA Freedom Act.  This block is meant to give the NSA time to switch to its narrower surveillance program.  After November, the agency must receive approval from the FISA Court before requesting records from phone companies on an as-needed basis.

Exclusive: U.S. tech industry appeals to Obama to keep hands off encryption.  As Washington weighs new cybersecurity steps amid a public backlash over mass surveillance, U.S. tech companies warned President Barack Obama not to weaken increasingly sophisticated encryption systems designed to protect consumers' privacy.  In a strongly worded letter to Obama on Monday [6/8/2015], two industry associations for major software and hardware companies said, "We are opposed to any policy actions or measures that would undermine encryption as an available and effective tool."

Obama lawyers asked secret court to ignore public court's decision on spying.  The Obama administration has asked a secret surveillance court to ignore a federal court that found bulk surveillance illegal and to once again grant the National Security Agency the power to collect the phone records of millions of Americans for six months.  The legal request, filed nearly four hours after Barack Obama vowed to sign a new law banning precisely the bulk collection he asks the secret court to approve, also suggests that the administration may not necessarily comply with any potential court order demanding that the collection stop.

Head of U.S. Marshals Service Resigns Amid Investigation Of Domestic Surveillance Programs.  An underreported story today comes amid the resignation of Stacia Hylton, the head of the U.S. Marshals Service.  The timing of the resignation could not be more transparently tied to a growing investigation into domestic surveillance programs operated without oversight, and potentially unconstitutional.  For the past several years stories have been quietly surfacing about the USMS using stealth cell phone captures via drone and fixed unit operations known as "Stingray Devices".  Stingray technology secretly captures cell phone communication, data, voice and text from users without their knowledge.

NSA reportedly collaborated with Britain to steal cell phone codes.  Britain's electronic spying agency, along with the NSA, reportedly hacked into the computer networks of a Dutch company to steal codes, which allowed both governments to spy on mobile phones worldwide.  The documents given to journalists by Edward Snowden did not offer details on how the agencies used the eavesdropping capabilities.  However, it certainly shows how the NSA and Britain's spy organization will push the limit of their surveillance prowess.

Why We Can't Trust the NSA (And Why That's a Crisis).  No matter where you stand on the debate over renewing the USA Patriot Act, understand that the greatest threat to democracy is not the rise of ISIS, Iran, and "lone wolf" attacks.  While those are real and present dangers, the greater threat is this:  Americans no longer trusting the people and institutions protecting them.  A 50-year slide in the public's faith in government, which began with the dishonesty of the Vietnam War, continues with the duplicity of the post-9/11 "war on terrorism."  One example:  The National Security Agency began secretly collecting phone records of millions of Americans after the September 11, 2001, attacks and gained reauthorization, again in secret, by a special court under Section 215 of the Patriot Act.

Bill ending NSA phone data collection heads to Obama.  Congress on Tuesday [6/2/2015] rejected some of the sweeping intelligence-gathering powers it granted national security officials after the 9/11 terrorist attacks, with the Senate voting to end the government's bulk collection of private telephone records and to reform other surveillance policies.  The bill, known as the USA Freedom Act, passed on a 67-to-32 vote, against the will of Senate Republican leaders who wished to preserve existing spy programs.

US officials warn [there is] no way to monitor ISIS' online encrypted messages.  With ISIS distributing its propaganda and recruiting messages to as many as 200,000 people on social media worldwide, U.S. officials warned Wednesday [6/3/2015] there is no way to monitor their online encrypted communications.  The officials, appearing before the House Homeland Security Committee, said while there are only several thousand hardcore ISIS propagandists, technology was complicating efforts to monitor them.  "There are 200-plus social media companies.  Some of these companies build their business model around end-to-end encryption," said Michael Steinbach, head of the FBI's counterterrorism division.  "There is no ability currently for us to see that" communication, he said.

The Editor says...
If true, the claims made by the government in the article immediately above prove that the widespread use of encryption would completely stymie government surveillance of email if we all used it.

NSA architect: Feds won't stop spying on citizens.  A former high-ranking official at the U.S. National Security Agency said Sunday night the NSA will continue to spy on American citizens irrespective of any action taken by Congress on the Patriot Act.  William Binney, known to many as the architect of the NSA who became a whistleblower against the agency during the administration of George W. Bush, made the comment on Aaron Klein Investigative Radio.

NSA bulk phone records collection to end despite USA Freedom Act failure.  Even as the Senate remains at an impasse over the future of US domestic surveillance powers, the National Security Agency will be legally unable to collect US phone records in bulk by the time Congress returns from its Memorial Day vacation.  The administration, as suggested in a memo it sent Congress on Wednesday, declined to ask a secret surveillance court for another 90-day extension of the order necessary to collect US phone metadata in bulk.  The filing deadline was Friday [5/22/2015], hours before the Senate failed to come to terms on a bill that would have formally repealed the NSA domestic surveillance program.

House Votes to End N.S.A.'s Bulk Phone Data Collection.  The House on Wednesday [5/13/2015] overwhelmingly approved legislation to end the federal government's bulk collection of phone records, exerting enormous pressure on Senator Mitch McConnell of Kentucky, the majority leader, who insists that existing dragnet sweeps continue in defiance of many of those in his Republican Party.  Under the bipartisan bill, which passed 338 to 88, the Patriot Act would be changed to prohibit bulk collection by the National Security Agency of metadata charting telephone calls made by Americans.  In addition, the legislation would bar permitting bulk collection of records using other tools like so-called national security letters, which are a kind of administrative subpoena.

Intel chief 'absolutely' forgot about NSA data sweep program, attorney says.  The National Security Agency's massive data collection program has prompted lawsuits, internal reviews and a fierce congressional debate over whether to scrap it.  But Director of National Intelligence James Clapper apparently forgot the program even existed during a key hearing two years ago.

NSA's phone spying program ruled illegal by appeals court.  A U.S. spying program that systematically collects millions of Americans' phone records is illegal, a federal appeals court ruled on Thursday [5/7/2015], putting pressure on Congress to quickly decide whether to replace or end the controversial anti-terrorism surveillance.  Ruling on a program revealed by former government security contractor Edward Snowden, the 2nd U.S. Circuit Court of Appeals in Manhattan said the Patriot Act did not authorize the National Security Agency to collect Americans' calling records in bulk.

Top federal court rules against NSA's phone records program.  A federal court has decided that the National Security Agency's bulk, warrantless collection of millions of Americans' phone records is illegal.  The sweeping decision from the Second Circuit Court of Appeals on Thursday [5/7/2015] represents a major court victory for opponents of the NSA and comes just as Congress begins a fight over whether to renew the underlying law used to justify the program.

White House report offers more on NSA spying on Americans' calls, with Patriot Act set to expire.  With debate gearing up over the coming expiration of the Patriot Act surveillance law, the Obama administration on Saturday [4/25/2015] unveiled a 6-year-old report examining the once-secret program to collect information on Americans' calls and emails.  The Office of the Director of National Intelligence publicly released the redacted report following a Freedom of Information Act lawsuit by the New York Times.  The basics of the National Security Agency program had already been declassified, but the lengthy report includes some new details about the secrecy surrounding it.

Jeb Bush: NSA Snooping 'The Best Part of the Obama Administration'.  Plenty of Republicans (Rand Paul especially) have been railing against the NSA's bulk metadata collection for a while now, but not only does Jeb Bush support it, he thinks it's the best thing about the Obama administration.  Bush was defending NSA surveillance months ago as "hugely important program to use these technologies to keep us safe."  Today, he was on Michael Medved's radio show, and was asked directly what he considers the best part of the Obama administration.  Bush said, "I would say the best part of the Obama administration would be his continuance of the protections of the homeland using the big metadata programs."

The Editor says...
The government's job is to keep us free.  Whether we are safe or not is left up to the states, or to us individually.

State Dept. contractor allegedly paid by Chinese agent to spy on Americans — yet no charges filed.  Newly unsealed court documents obtained by Fox News show a State Department contractor allegedly was paid thousands by an individual thought to be a Chinese agent in exchange for information on Americans — but despite an FBI probe, the Justice Department declined to prosecute.  A November 2014 FBI affidavit, filed in the U.S. District Court for the District of Maryland, shows the bureau investigated the contractor for her admitted contact with individuals she believed to be Chinese intelligence officers.

McConnell introduces bill to extend NSA surveillance.  Senate Majority Leader Mitch McConnell introduced a bill Tuesday night [4/21/2015] to extend through 2020 a controversial surveillance authority under the Patriot Act.  The move comes as a bipartisan group of lawmakers in both chambers is preparing legislation to scale back the government's spying powers under Section 215 of the Patriot Act.

Marxists and Crony Capitalists Driving the Information Highway Bus.  By the time self-acclaimed whistleblower Edward Snowden blew the cover on the National Security Agency (NSA) forever more known as 'Spies are Us', it was already way too late for the privacy of online online private citizens.  Privacy, like commonsense and government altruism, doesn't live here anymore.  Before NSA, we were already big-time data-based with every nuance and details of our private lives spied upon and standby stored by Google, FaceBook and other unsavory social networks on the take.  Blowback from the Snowden-exposed NSA has über dominated the Big Brother spydom we've been talking about ever since.  Public outrage was guaranteed mostly because the NSA is a billion dollar government agency.

Wikipedia Is Suing the NSA.  Wikipedia filed a lawsuit on Tuesday [3/10/2015] challenging the constitutionality of the National Security Agency's mass surveillance of Internet communications, a sudden and striking challenge that comes nearly two years after Edward Snowden's disclosures first began.  The online encyclopedia's suit against the NSA and the Justice Department claims that the U.S. government's mass surveillance regime threatens freedom of speech under the First Amendment and the Fourth Amendment's protection against unreasonable search and seizures.

The law and unintended consequences.  Discovering such bugs in the mess of code that underpins the internet is not unusual.  But unlike most flaws, this one — dubbed FREAK (for "Factoring RSA Export Keys") — is not an accident.  Rather, it is a direct result of the American government's attempts to ensure, two decades ago, that it could spy on the scrambled communications of foreigners.  That is an idea which, following Edward Snowden's revelations about the long reach of Western spy agencies, is back in the news again.

The NSA spied on everyone — other than Hillary Clinton.  From the 'Believe it or Not Department' of the cunning Obama administration:  America's National Security Agency (NSA) retrieves and stockpiles millions of incoming and outgoing emails of government agencies and from the public at large — but not any coming in or going out from Hillary Clinton's private home email accounts! [...] During the Benghazi scandal, for which the Obama administration has yet to come clean, Clinton was the only one in the whole of America with guaranteed privacy from NSA.

NSA authorization to collect bulk phone data extended to June 1.  A U.S. secret court has extended until June 1 the controversial bulk collection of private phone records of Americans by the National Security Agency.  The government said it had asked for reauthorization of the program as reform legislation, called the USA Freedom Act, was stalled in Congress.  The bill would require telecommunications companies rather than the NSA to hold the bulk data, besides placing restrictions on the search terms used to retrieve the records.  An added urgency for Congress to act comes from the upcoming expiry on June 1 of the relevant part of the Patriot Act that provides the legal framework for the bulk data collections.

DHS Funds Installation of White Boxes That Can Track Population of Entire City.  Strange new off-white boxes popping up in downtown Seattle use wi-fi networks that can record the last 1,000 locations of a person using their cellphone's MAC address, but the Department of Homeland Security — which funded the network to the tune of $2.7 million dollars — has refused to address the nightmare privacy implications of a system that could lead to the permanent tracking of an entire city's population.

Hillary Clinton: people felt betrayed by NSA surveillance programmes.  Hillary Clinton has softened her criticism of Edward Snowden and said that people felt betrayed by the National Security Agency's mass surveillance programmes.  The former secretary of state dialled down her previous rhetoric about the whistleblower and hardened her tone towards the NSA while addressing a conference on women in Silicon Valley.  The presumptive Democratic frontrunner for the 2016 presidential race also endorsed the Federal Communications Commission's (FCC) plan for net neutrality regulations, [...]

Hack gave U.S. and British spies access to billions of phones: Intercept.  U.S. and British spies hacked into the world's biggest maker of phone SIM cards, allowing them to potentially monitor the calls, texts and emails of billions of mobile users around the world, an investigative news website reported.

Lawmakers Move to Shield Americans' E-mails From Government Snooping.  Remember that e-mail you got from your significant other six months ago — the one you read, replied to, and deleted?  Probably not, but if it's still stored on a server somewhere, as it may well be, Uncle Sam thinks it's fair game for his agents' prying eyes — and they don't even need to get a warrant to sneak a peek.  Under the Electronic Communications Privacy Act (ECPA) of 1986, electronic communications left on remote servers — "in the cloud," in today's parlance — for more than 180 days are considered abandoned and therefore not protected by the Fourth Amendment's requirement that government agents obtain a warrant before searching and seizing them.

Is our Constitution just a worthless piece of paper?  Last week, we learned how deep the disrespect for the Constitution runs in the government and how tortured is the logic that underlies it.  In a little-noted speech at Washington and Lee Law School, Gen. Michael Hayden, the former director of both the CIA and the NSA, told us.  In a remarkable public confession, he revealed that somehow he received from some source he did not name the authority to reinterpret the Fourth Amendment's protection of privacy so as to obliterate it.  He argued that the line between privacy and unbridled government surveillance is a flexible and movable one, and that he — as the head of the NSA — could move it.  This is an astounding audacity by a former high-ranking government official who swore numerous times to uphold the Constitution.

Homeland Security to be put in charge of info sharing.  President Obama will announce a new executive order on the sharing of cybersecurity threats and information at Friday's [2/13/2015] cybersecurity summit at Stanford University, the White House said.  Most importantly to Silicon Valley, the president's proposal is expected to cement the role of the Department of Homeland Security, rather than the National Security Agency, as the government lead for information-sharing with the private sector.  "Hopefully the rules will prohibit the use of the information shared being used for surveillance," said Greg Nojime, a senior counsel with the Center for Democracy and Technology in Washington D.C.

ACLU Report: Feds Using Mobile License Plate Readers To Scan Gun Show Vehicles For Database.  According to emails obtained by the American Civil Liberties Union, federal authorities planned to monitor gun show parking lots with automatic license plate readers.  The insight comes from a damning report released by the ACLU this week on a secretive program by the U.S. Drug Enforcement Administration to build a massive database of license plates['] images collected by automated license plate reader devices.

DEA and ATF cooperated to record gun show attendee license plates.  According to emails obtained by the American Civil Liberties Union, federal authorities planned to monitor gun show parking lots with automatic license plate readers.  The insight comes from a damning report released by the ACLU this week on a secretive program by the U.S. Drug Enforcement Administration to build a massive database of license plates images collected by automated license plate reader devices.  As part of this investigation, emails released through the Freedom of Information Act detailed a planned cooperation between the DEA's National License Plate Recognition initiative and the Bureau of Alcohol, Tobacco, Firearms and Explosives to scan and record the plates and vehicle images of gun show attendees.

FOIA Documents Reveal Massive DEA Program to Record American's Whereabouts With License Plate Readers.  The DEA is currently operating a National License Plate Recognition initiative that connects DEA license plate readers with those of other law enforcement agencies around the country.  A Washington Post headline proclaimed in February 2014 that the Department of Homeland Security had cancelled its "national license-plate tracking plan," but all that was ended was one Immigrations and Customs Enforcement solicitation for proposals.  In fact, a government-run national license plate tracking program already exists, housed within the DEA.  (That's in addition to the corporate license plate tracking database run by Vigilant Solutions, holding billions of records about our movements.)  Since its inception in 2008, the DEA has provided limited information to the public on the program's goals, capabilities and policies.  Information has trickled out over the years, in testimony here or there.  But far too little is still known about this program.

U.S. Spies on Millions of Drivers.  The Justice Department has been building a national database to track in real time the movement of vehicles around the U.S., a secret domestic intelligence-gathering program that scans and stores hundreds of millions of records about motorists, according to current and former officials and government documents.  The primary goal of the license-plate tracking program, run by the Drug Enforcement Administration, is to seize cars, cash and other assets to combat drug trafficking, according to one government document.  But the database's use has expanded to hunt for vehicles associated with numerous other potential crimes, from kidnappings to killings to rape suspects, say people familiar with the matter.

As You Drive, So You Are Watched.  Simply put, I am quite happy to live in a world in which, in the course of acting locally and in response to a discrete threat, the state is able to thwart the plans of those who would harm the innocent people.  At the same time, I do not want to live in a world in which the state films everybody in public as a matter of unprovoked routine.  As so often, the key here is necessity.  Can the security forces intrude upon my liberties in a genuine emergency?  Absolutely.  Should they be watching or recording the movements of private citizens absent a specific, time-limited, and easily explicable reason to do so?  No, they should not.

DEA Has Abandoned Plans to Track Cars at Gun Shows.  The head of the Drug Enforcement Agency announced yesterday [1/28/2015] that the agency had abandoned plans to use surveillance cameras to photograph license plates appearing in the vicinity of gun shows. [...] Why would the government even think it should "keep track" of law-abiding citizens participating in a purely legal social activity?  Cameras are everywhere now, on police cruisers, utility polls, traffic lights and mounted in front of private businesses.  Does the government have the right to catalog and monitor innocent comings and goings?

Also posted under License plate readers.

High tech government spying vs. your Constitutional right to privacy.  We already knew that the NSA, our 60,000 domestic spies, has captured and retained the contents of nearly all emails, text messages, telephone calls, bank statements, utility bills and credit card bills of all Americans since 2009.  We already knew that Obama has used CIA drones to kill Americans overseas and claims that he somehow can do so legally and secretly notwithstanding the express prohibitions in the Constitution. [...] Prior to 2001, the DEA intimidated, coerced and bribed telecom providers into making their telephone lines available to its agents.  Since 2001, it has no doubt taken advantage of the provisions of the so called Patriot Act that permit federal agents to write their own search warrants to custodians of records, in direct contravention of the Constitution, which requires warrants from judges.

WikiLeaks demands answers after Google hands staff emails to US government.  Google took almost three years to disclose to the open information group WikiLeaks that it had handed over emails and other digital data belonging to three of its staffers to the US government, under a secret search warrant issued by a federal judge.  WikiLeaks has written to Google's executive chairman, Eric Schmidt, to protest that the search giant only revealed the warrants last month, having been served them in March 2012.  In the letter, WikiLeaks says it is "astonished and disturbed" that Google waited more than two and a half years to notify its subscribers, potentially depriving them of their ability to protect their rights to "privacy, association and freedom from illegal searches".

Justice Department Reportedly Spies on Millions of Cars to Build National Database.  The U.S. Department of Justice secretly spies on millions of cars by gathering and storing information about motorists in order to build a national database to track movements, according to a new report in the Wall Street Journal.  The database was originally used by the Drug Enforcement Administration to hunt vehicles involved in drug crimes by tracking license plates, but according to the WSJ, the program expanded to hunt for criminals sought for crimes that were non-drug related.

CIA finds no wrongdoing in agency's search of computers used by Senate investigators.  An internal CIA panel concluded in a report released Wednesday [1/14/2015] that agency employees should not be punished for their roles in secretly searching computers used by Senate investigators, a move that was denounced by lawmakers last year as an assault on congressional oversight and a potential breach of the Constitution.  Rejecting the findings of previous inquiries into the matter, the CIA review group found that the agency employees' actions were "reasonable in light of their responsibilities to manage an unprecedented computer system" set up for Senate aides involved in a multiyear probe of the CIA's treatment of terrorism suspects.

NSA has VPNs in Vulcan death grip — no, really, that's what they call it.  The National Security Agency's Office of Target Pursuit (OTP) maintains a team of engineers dedicated to cracking the encrypted traffic of virtual private networks (VPNs) and has developed tools that could potentially uncloak the traffic in the majority of VPNs used to secure traffic passing over the Internet today, according to documents published this week by the German news magazine Der Speigel.  A slide deck from a presentation by a member of OTP's VPN Exploitation Team, dated September 13, 2010, details the process the NSA used at that time to attack VPNs — including tools with names drawn from Star Trek and other bits of popular culture.

No Warrant Needed to Track Cellphones in Public Places, FBI Says.  It is well known that law enforcement agencies sometimes use "stingrays" — devices that mimic cellphone towers — to collect everything from cell users' locations to their call logs.  But the details of such use, including when and how stingray technology is employed, remain shrouded in secrecy.  Now, two members of the Senate Judiciary Committee have reached out to Attorney General Eric Holder to question an FBI policy that makes major exceptions to requirements that search warrants be acquired before employing stingray technology.

FBI says search warrants not needed to use "stingrays" in public places.  The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed "stingrays," the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts.  The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa).  In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were "concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests" of Americans.

NSA phone searches increased by 50 percent in 2013, report finds.  The number of phone numbers searched under the National Security Agency's phone-data surveillance program increased by 50 percent last year, according to a report that otherwise provides scant new information on the numbers of Americans and foreigners subject to U.S. surveillance.  The report, by the Director of National Intelligence, focused on the mechanics of a network of surveillance programs that sweep up millions of American phone records and gain indirect access to 75 percent of the nation's telecom infrastructure to facilitate those searches.

Christmas Eve Document Dump Reveals NSA Wrongdoings.  While many Americans were sitting down for Christmas Eve meals and celebrations, the National Security Agency released redacted documents in which the agency admits to having "incorrectly acquired" surveillance data and violating the law over the past 12 years.  The documents, which detail many instances of wrongdoing from 2001 to 2013, were released following a Freedom of Information Act lawsuit brought forth by the American Civil Liberties Union.

NSA spy program targets mobile networks worldwide.  The NSA has conducted a covert campaign to intercept internal communications of operators and trade groups in order to infiltrate mobile networks worldwide, according to the latest revelations from documents supplied by Edward Snowden.

Verizon's New, Encrypted Calling App Plays Nice With the NSA.  Verizon is the latest big company to enter the post-Snowden market for secure communication, and it's doing so with an encryption standard that comes with a way for law enforcement to access ostensibly secure phone conversations.  Verizon Voice Cypher, the product introduced on Thursday with the encryption company Cellcrypt, offers business and government customers end-to-end encryption for voice calls on iOS, Android, or BlackBerry devices equipped with a special app.  The encryption software provides secure communications for people speaking on devices with the app, regardless of their wireless carrier, and it can also connect to an organization's secure phone system.

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide.  In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency.  An intelligence unit within the U.S. military's Africa Command needed help to hack into Libya's cellphone networks and monitor text messages.  For the NSA, the task was easy.  The agency had already obtained technical information about the cellphone carriers' internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks.

Why nanny statists hate the Fourth Amendment.  California Attorney General Kamala Harris weighed in on the wrong side in this year's unanimous Supreme Court decision that the Fourth Amendment prohibits warrantless searches of cell phones by police.  Nanny statist Ms. Harris more recently issued a regulation that allows her to unilaterally violate both the Fourth and First Amendments of some of her critics.  The nanny state is government with a big stick.  The "stick" is the threat of penalties such as fines, imprisonment, or for activities subject to license, the loss of the license.  With government doing so much harm these days, it is becoming clearer that nanny statists such as Kamala Harris are actually the biggest threat to the civil liberties of the greatest number of people of all races, creeds and conscience.

House Quietly Passes Monstrous, Privacy-Invading Intel Bill.  Privacy-crushing language was quietly incorporated into the intelligence authorization bill that passed the Senate on Tuesday and the House on Wednesday [12/10/2014].  Critics say the legislation "blesses the warrantless collection, dissemination and five-year retention of everyday Americans' phone and Internet communications."  A surprised Rep Justin Amash (R-MI) rallied to block the Intelligence Authorization Act at the last minute, saying it would give congressional backing to an antiquated decree that gives the president broad surveillance authority.  Amash described the measure on his Facebook page as "one of the most egregious sections of law I've encountered during my time as a representative" and warned the measure "grants the executive branch virtually unlimited access to the communications of every American."

NSA spy program targets mobile networks worldwide.  The NSA has conducted a covert campaign to intercept internal communications of operators and trade groups in order to infiltrate mobile networks worldwide, according to the latest revelations from documents supplied by Edward Snowden.  The U.S. National Security Agency ran two hitherto undisclosed operations, the Wireless Portfolio Management Office and the Target Technology Trends Center, operating under the aegis of a program called Auroragold, according to an article Saturday [12/6/2014] in The Intercept, which also published related documents.

Stonewalled: A Conversation with Sharyl Attkisson.  What directly happened to [Sharyl Attkisson] regarding government surveillance could be a plot straight out of a Vince Flynn or John Grisham novel.  Unfortunately, the bad guys are not Islamic terrorists but those in government today.  Instead of using guns and bombs, they use intimidation and harassment.  Attkisson has been targeted by a government agency or official that infiltrated her computer and cell phone and placed classified information on it.  They are not listening to terrorists plotting to kill Americans, but are trying to find out what information this CBS reporter has that will be damaging to them.

This is what a police state looks like:
More Federal Agencies Are Using Undercover Operations.  The federal government has significantly expanded undercover operations in recent years, with officers from at least 40 agencies posing as business people, welfare recipients, political protesters and even doctors or ministers to ferret out wrongdoing, records and interviews show.  At the Supreme Court, small teams of undercover officers dress as students at large demonstrations outside the courthouse and join the protests to look for suspicious activity, according to officials familiar with the practice.  At the Internal Revenue Service, dozens of undercover agents chase suspected tax evaders worldwide, by posing as tax preparers, accountants drug dealers or yacht buyers and more, court records show.

IRS is monitoring comment threads on conservative blogs.  The Internal Revenue Service, which claims to be so understaffed that it can't bother to collect unpaid taxes, or search backup tapes for Lois Lerner's "missing" emails, apparently has plenty of time to read the comment threads on conservative blogs that have been critical of the agency (Hi there, IRS agents!).

Utah lawmaker concerned over NSA spying on American citizens proposes cutting off the water supply to agency facility.  A Utah lawmaker concerned about government spying on its citizens wants to cut the water supply to a National Security Agency data storage facility outside Salt Lake City.  Republican representative Marc Roberts told a legislative committee meeting that he was concerned about privacy and surveillance conducted by the centre, and a number of residents who spoke at the meeting agreed.

Senate kills NSA surveillance reform bill.  Senate lawmakers on Tuesday voted to block a bill that aimed to rein in federal surveillance of electronic communications, all but killing prospects for the legislation to become law this year.  The Senate voted 58-42 against moving forward on the USA Freedom Act, failing to garner the requisite votes despite an unusual coalition of Democrats and Republicans eager to end the government's bulk collection and retention of the public's phone records.

Senate fails to advance legislation on NSA reform.  The Senate failed Tuesday evening to advance legislation on bipartisan surveillance reform, dealing a significant setback to the Obama administration's plans to end the National Security Agency's mass collection of Americans' communications records.  Although advocates vowed to continue to press for curbs, prospects are uncertain, some officials said privately as a GOP-controlled Congress takes over in January and as public attitudes might begin to shift because of renewed fears of terrorism.

Operation Dirtbox.  The public reaction to Snowden and its political reflection were interesting for what they mean about America and what it portends.  Much of the public political conversation was immediately negative, with commentators, news readers, and professional politicians of both major parties attacking him as a traitor.  Democratic members of congress were no better than their Republican counterparts. Liberal luminaries such as Al Franken tried to pacify dissenters by saying that the NSA was only acting to protect us, and Hillary Clinton lectured the fugitive about 'coming back to face the music.'  President Obama was on television, uncharacteristically awkward in reassuring the country that the NSA "isn't listening to your phone calls," which he knew to be false.  Politicians are in some ways just like everyone else:  they are uncomfortable with anything which might inconvenience them or even cost them their jobs.

Operation Dirtbox.  On Friday [11/14/2014], the Denver Post and other papers ran the story that the Justice Department is directing a massive spy operation which can suck up close to every cell phone communication in America.  They've done this by installing fake communications towers on a fleet of Cessnas, beginning in 2007.  Devices known as 'dirtboxes,' from the initials DRT of the Boeing unit which produces them, mimic cell towers of large telecom firms and trick cellphones into reporting their unique registration information.  Investigators can harvest data from tens of thousands of calls in a single flight.  The planes are said to cover most of the country.  According to the Post article by Devlin Barrett, "people with knowledge of the program wouldn't discuss the frequency or duration of such flights, but said they take place on a regular basis."

Dirtbox Devices: 5 Fast Facts You Need to Know.  Americans are outraged by news of "dirtbox devices."  Under this Justice Department program, planes are scanning the cell phones of ordinary Americans.  While this program is designed to capture fugitives and criminals, many Americans feel that these dirtbox devices are an invasion of privacy.  Here's what you need to know about the dirtbox device program.

'Dirtbox' planes masquerade as cell towers to collect smartphone data in sophisticated spying ops.  It's no secret anymore that governmental agencies in the U.S. and other countries have access to sophisticated tools that allow them to track and collect data from smartphones and other devices without users knowing anything is happening, and The Wall Street Journal has uncovered yet another such operation which uses a special "dirtbox" technology installed in special planes that can mimic cell phone towers and fool smartphones into believing they're connecting to a genuine carrier tower.

US government planes collecting phone data, report claims.  Devices that gather data from millions of mobile phones are being flown over the US by the government, according to the Wall Street Journal.  The "dirtbox" devices mimic mobile phone tower transmissions, and handsets transmit back their location and unique identity data, the report claims.  While they are used to track specific suspects, all mobile devices in the area will respond to the signal.  The US Justice Department refused to confirm or deny the report.

Americans' Cellphones Targeted in Secret U.S. Spy Program.  The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.

Maybe Big Data should play smaller role in our politics.  In the run-up to the midterms, the Democrats sent out letters to presumed Democratic voters in an effort to shame them into voting. [...] "We will be reviewing voting records ... to determine whether you joined your neighbors who voted in 2014."  The letter ends with a creepy, if not outright threatening, warning:  "If you do not vote this year, we will be interested to hear why not."  Am I the only one [who] thinks it's bizarre that we spend so much time fretting over how much government agencies can know about us, but we don't seem to care a bit about how much the politicians who run those agencies know about us?

NSA surveillance limits: The focus turns to courts.  While Congress mulls how to curtail the NSA's collection of Americans' telephone records, impatient civil liberties groups are looking to legal challenges already underway in the courts to limit government surveillance powers.

Where Is the Investigation Into Financial Corruption at the NSA?  Earlier this year, when Keith Alexander resigned as head of the National Security Agency, he began trying to cash in on expertise he'd gained while in government, pitching himself as a security consultant who could protect Wall Street banks and other large corporations from cyber-attacks by hackers or foreign governments.  Early reports focused on the eye-popping price tag for his services:  He reportedly asked for $1 million a month, later decreasing his rate to $600,000. [...] What, exactly, was he selling?  The explanation Alexander offered in an interview with Foreign Policy only raised more questions.

How The NSA Has Turned Into A Giant Profit Center For Corrupt Insiders.  Last week, two very important stories came out; one from Reuters and the other from Buzzfeed.  They both zero in on how current NSA employees are using their expertise and connections to make big money in the private sector while still working at the NSA.

Google Chairman: 'We're Going to End Up Breaking the Internet'.  Google Chairman Eric Schmidt warned Wednesday that the Internet will soon undergo massive upheaval if governments refuse to alter the way they spy on other countries.  Speaking at an event in California hosted by Sen. Ron Wyden, Schmidt said the Internet will splinter into walled-off fragments unless digital surveillance practices of the National Security Agency and foreign intelligence agencies are reformed.

FBI Chief: Citizens Should Be 'Deeply Skeptical' of Government.  [James] Comey, 53, who became FBI chief in September 2013, cautioned that courts must grant law-enforcement agencies permission to telephones if the information is deemed to be critical to a criminal case or national security.  His comments come in light of numerous leaks since last year by former NSA contractor Edward Snowden revealing that agency's extensive telephone and Internet surveillance programs and cell phones introduced last month by Apple Inc. that were designed to avoid surveillance by law enforcement.

Child-porn conviction is tossed: Navy surveillance is blamed.  Navy criminal investigators repeatedly and routinely peeked into the computers of private citizens in Washington state and elsewhere, a violation of the law so "massive" and egregious that an appeals court says it has no choice but to throw out the evidence against an Algona man sentenced to 18 years in prison for distribution of child pornography.

NSA/GCHQ/CSEC Infecting Innocent Computers Worldwide.  HACIENDA is a GCHQ program to port-scan entire countries, looking for vulnerable computers to attack.  According to the GCHQ slide from 2009, they've completed port scans of 27 different countries and are prepared to do more.  The point of this is to create ORBs, or Operational Relay Boxes.  Basically, these are computers that sit between the attacker and the target, and are designed to obscure the true origins of an attack.

The NSA and GCHQ Campaign Against German Satellite Companies.  Treasure Map is a vast NSA campaign to map the global internet.  The program doesn't just seek to chart data flows in large traffic channels, such as telecommunications cables.  Rather, it seeks to identify and locate every single device that is connected to the internet somewhere in the world — every smartphone, tablet, and computer — "anywhere, all the time," according to NSA documents.

The Surveillance Engine: How the NSA Built Its Own Secret Google.  The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a "Google-like" search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept.

Should Businesses Be Concerned about NSA Snooping?  After news hit the wires regarding the PRISM surveillance program, multiple companies spoke up, insisting that they refused to comply with NSA requests for customer data. [...] In a world that is run increasingly by data, how do everyday business owners face the idea that the government might request private consumer information?  Business leaders must come to terms with whether they'll comply and risk being exposed during whistleblowing operations, or refuse compliance protect consumer trust.

DEA paid Amtrak $854,460 for passenger lists it could have gotten for free.  The Drug Enforcement Administration paid an Amtrak secretary $854,460 over nearly 20 years to obtain confidential information about train passengers, which the DEA could have lawfully obtained for free through a law enforcement network, The Associated Press has learned.

Yahoo Is Making It Harder for the NSA to Read Your Emails.  Yahoo announced Thursday [8/7/2014] it will encrypt its email service by early next year, joining Google and Microsoft in an effort to create an email system that prevents government officials and hackers from reading users' messages.  It's a major step for Yahoo in the wake of the Edward Snowden leaks, and it reflects the commitment of the major technology companies to securing users' data.

Visit the Wrong Website, and the FBI Could End Up in Your Computer.  Security experts call it a "drive-by download": a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor.  It's one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers' clutches within minutes.  Now the technique is being adopted by a different kind of a hacker — the kind with a badge.  For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement's knottiest Internet problems:  how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.

CIA Director Brennan Should Resign.  CIA director John Brennan did the right thing Thursday in apologizing to the Senate Select Committee on Intelligence (SSCI) for CIA monitoring of computers being used by the committee's staff for an investigation of the Bush-era enhanced-interrogation program.  Nevertheless, heads must roll at the CIA over this scandal, including Brennan's.  While what the CIA did was not illegal, its actions were the result of reckless decisions by agency officials in response to misconduct by SSCI staff members.  The CIA should have handled this matter by raising it quietly with SSCI chairwoman Dianne Feinstein.  The agency didn't need another scandal at a time when all U.S. intelligence agencies were under fire in the aftermath of the Snowden leaks.

Public servants acting as public masters.  "Nothing could be further from the truth.  I mean, we wouldn't do that."  That was CIA Director John Brennan's answer in March when Sen. Dianne Feinstein, D-Calif., charged the CIA with breaking into computers used by Senate investigators looking into CIA misconduct.  It turns out that the CIA would do that — and, in fact, had done so.  Brennan's reassurances were false, and CIA spooks had been hacking into the committee investigators' computers looking for documents they thought the investigators shouldn't have, violating a promise not to.  So, first Brennan broke a promise.  Then, he either lied, or showed that he doesn't control his own agency, which in many ways would be worse.

Obama remains confident in CIA head John Brennan despite Senate spying.  President Obama remains confident in CIA Director John Brennan's leadership despite an independent investigation that concluded that the agency had overreached its authority by spying on Senate staffers.  White House spokesman Josh Earnest said the findings had not diminished Brennan's standing in the administration.  When asked whether it damaged his authority or credibility in any way, Earnest said:  "Absolutely not."

CIA confesses: Yeah, we hacked the Senate's computers.  In March, Sen. Dianne Feinstein (D-CA) revealed that CIA Director John Brennan told her that the intelligence agency he leads had improperly accessed Senate computers and secretly removed classified documents while the agency's War on Terror interrogation tactics were under investigation.  Feinstein alleged that Brennan told her the CIA took that action because the agency believed the Senate might have accessed documents that they were not authorized to see.  In a statement, Brennan said the Senate Intelligence Committee chairwoman had leveled "spurious allegations about CIA actions that were wholly unsupported by the facts."  While he confessed that the agency had made mistakes, the CIA director insisted that there was no merit to the charge that the agency had spied on members of Congress.

Despite Brennan's Lying and Usurpation of Law, President Obama Gives Strong Vote of Confidence In CIA Director John Brennan.  President Obama issued a strong defense of CIA Director John Brennan on Friday in the face of revelations that his agency spied on congressional staffers' computers.  "I have full confidence in John Brennan," Obama said in a White House press conference.

Why Obama Should Roll Heads at the CIA.  Heads should roll at the CIA, but not for the obvious reasons.  Let's review the cacophony of issues raised by the brutal post-911 interrogation program, including the CIA's lies, cover-ups, and a Constitution-bending spying operation against Senate staffers.

The government wants to wiretap online communications — or in some cases hack them.  In 1994, the government passed the Communications Assistance for Law Enforcement Act, which mandated that phone companies make their systems wiretap-ready.  Richard "Dickie" George, a former NSA technical director until he retired in September 2011, recalled how in the mid-1990s, "in the early days of CALEA," the NSA tested several commercial phone systems with intercept capabilities and "we found problems in every one."  Making the systems hack-proof, he said, "is really, really hard."

A Government Feared and Distrusted.  Deep in the desert of Utah is a government data center.  The center, comprised of long, low buildings spanning 1.5 million square feet, is filled with super-powered computers storing unbelievably massive amounts of information gathered secretly.  What information is being collected?  Information about you, Joe Average citizen.  Your phone calls and emails are being stored, all in the name of protecting our country from potential terrorists #8212; terrorists like you, even though your call or email is as banal as, "Honey I'll be home in 30 minutes."

Every iPad and iPhone on the planet has a secret back-door allowing unknown parties to take control.  I wonder who could be behind this?

Meet Executive Order 12333: The Reagan rule that lets the NSA spy on Americans.  Even after all the reforms President Obama has announced, some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them.  Public debate about the bulk collection of U.S. citizens' data by the NSA has focused largely on Section 215 of the Patriot Act, through which the government obtains court orders to compel American telecommunications companies to turn over phone data.  But Section 215 is a small part of the picture and does not include the universe of collection and storage of communications by U.S. persons authorized under Executive Order 12333.

In NSA-intercepted data, those not targeted far outnumber the foreigners who are.  Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post.  Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else.

Most online accounts investigated by NSA belong to ordinary Internet users, report claims.  Conversations intercepted by the National Security Agency are far more likely to have taken place between ordinary Internet users than legally targeted terror suspects, according to a published report.  The Washington Post reported late Saturday [7/5/2014] that while some intercepted messages were a source of valuable intelligence, many more missives contained nothing more than intensely personal details of people's lives, including more than 5,000 private photos.  In most cases, the information was retained despite being marked as useless by NSA analysts.

Senator: FISA snares American communications.  The Privacy and Civil Liberties Oversight Board, which began operating just last year, said the intelligence the government collects under Section 702 of the Foreign Intelligence Surveillance Act is valuable in the fight against terrorism and, at its root, the government uses it properly to go after foreign nationals outside the U.S.  But at the edges, the program is scooping up data about Americans, the board said in a nearly 200-page report that recommended some changes to get a handle on how often the program strays across constitutional boundaries.

NSA Internet spying program an 'effective tool,' bipartisan privacy board says.  Under a provision of the 1978 Foreign Intelligence Surveillance Act known as Section 702, the NSA uses court orders and taps on fiberoptic lines to target the data of foreigners living abroad when their emails, web chats, text messages and other communications traverse U.S. telecommunications systems.

The Editor says...
Nobody objects, as far as I know, to the feds listening to phone calls in other countries, or setting up wiretaps in the Middle East.  The problem here is that wiretaps in this country can easily be used against Americans.  And really, how many other countries make their telephone and internet connections through the United States?

Cellphone operator reveals scale of gov't snooping.  Government snooping into phone networks is extensive worldwide, one of the world's largest cellphone companies revealed Friday [6/6/2014], saying that several countries demand direct access to its networks without warrant or prior notice.  The detailed report from Vodafone, which covers the 29 countries in which it operates in Europe, Africa and Asia, provides the most comprehensive look to date at how governments monitor mobile phone communications.  It amounts to a call for a debate on the issue as businesses increasingly worry about being seen as worthy of trust.

British Spy Agencies Are Said to Assert Power to Intercept Web Traffic.  In a broad legal rationale for collecting information from Internet use by its citizens, the British government has reportedly asserted the right to intercept communications that go through services like Facebook, Google and Twitter that are based in the United States or other foreign nations, even if they are between people in Britain.

5 Obama Officials Who Lied, Then Lied About Lying.  Director of National Intelligence James Clapper.  Clapper testified before Congress in 2012 that the NSA was not collecting "any type of data at all on millions or hundreds of millions of Americans."  Clapper later said he had misspoken, after information from Edward Snowden proved that he had been lying.

Judge Orders NSA To Stop Destroying Evidence — For The Third Time.  U.S. District Court Judge Jeffrey White's ruling came at the request of the Electronic Frontier Foundation, which is in the midst of a case challenging NSA's ability to surveil foreign citizen's U.S.-based email and social media accounts.  According to the EFF, the signals intelligence agency and the Department of Justice were knowingly destroying key evidence in the case by purposefully misinterpreting earlier preservation orders by multiple courts, multiple times.

Internet Giants Erect Barriers to Spy Agencies.  Just down the road from Google's main campus here, engineers for the company are accelerating what has become the newest arms race in modern technology:  They are making it far more difficult — and far more expensive — for the National Security Agency and the intelligence arms of other governments around the world to pierce their systems.  As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited.

Cellphone operator reveals scale of gov't snooping.  Government snooping into phone networks is extensive worldwide, one of the world's largest cellphone companies revealed Friday [6/6/2014], saying that several countries demand direct access to its networks without warrant or prior notice.

How the NSA's Secret Elite Hacking Unit Works.  Snowden documents leaked to Der Spiegel in December 2013 describe a different type of NSA program from the sort that is usually publicized.  Rather than revealing software developed by the agency in order to access computers, these revelations describe a secret elite hacking unit, dubbed Tailored Access Operations, or TAO.

How the NSA Can Get Onto Your Computer.  Many of the NSA's programs revealed in the Snowden leaks describe the agency's ability to target specific pieces of software.  But as The New York Times and others reported earlier this year, there is a suite of programs, codenamed QUANTUM, which allows the NSA access to a much wider variety of computers.

Your Selfie Is A Mugshot For The NSA.  The selfie phenomenon is undoubtedly making the NSA's job easier by producing a mountain of tagged online data to feed its facial recognition algorithms.  A report in The New York Times, based on documents from 2011 obtained by the NSA whistleblower Edward Snowden, reveals that the US security agency's reliance on facial recognition technology has grown significantly under the Obama administration — coinciding with a rise in popularity of taking and tagging self portraits on online social networks.  The newspaper reports that the agency has turned to new software to process the flood of images being included in digital communication including social media, email, messaging, videoconferencing and other types of online comms.

NSA is 'creating huge facial recognition database by taking millions of images off the internet'.  The NSA is building a comprehensive facial recognition database through the intercepting of millions of photographs posted online everyday, according to a report from the New York Times published Saturday [5/31/2014].  According to the report, which cites top-secret documents leaked by former NSA contractor Edward Snowden, the NSA intercepts 'millions of images per day', which translates into approximately 55,000 'facial recognition quality images.'  According to a 2011 document cited in the report, this is regarded by the agency as 'tremendous untapped potential'.

New federal database will track Americans' credit ratings, other financial information.  As many as 227 million Americans may be compelled to disclose intimate details of their families and financial lives — including their Social Security numbers — in a new national database being assembled by two federal agencies.  The Federal Housing Finance Agency and the Consumer Financial Protection Bureau posted an April 16 Federal Register notice of an expansion of their joint National Mortgage Database Program to include personally identifiable information that reveals actual users, a reversal of previously stated policy.  FHFA will manage the database and share it with CFPB.  A CFPB internal planning document for 2013-17 describes the bureau as monitoring 95 percent of all mortgage transactions.

"Original" NSA Whistleblower Says Home Raid Was Retribution.  "We were a clear demonstration that official channels didn't work," said William Binney, one of a trio of National Security Agency employees who tired to "blow the whistle" on the NSA's domestic surveillance activities more than a decade before Edward Snowden delivered classified documents from the agency's files to The Guardian.  Binney, now retired, resigned from the NSA in 2001.  A year later he and two of his former colleagues asked Congress and the Department of Defense for an investigation of the agency for wasting money and violating privacy rights with a massive data collection program called "Trailblazer," the successor to an earlier program dubbed "Stellar Wind."  Binney believes that's the reason why the FBI five years later staged an armed raid of his home.

Afghan anger at US monitoring 'nearly all' phone calls.  Afghanistan on Sunday expressed anger at the United States for allegedly monitoring almost all the country's telephone conversations after revelations by the Wikileaks website.  Wikileaks editor Julian Assange said on Friday that Afghanistan was one of at least two countries where the US National Security Agency "has been recording and storing nearly all the domestic (and international) phone calls".

Glenn Greenwald to publish list of U.S. citizens that NSA spied on.  Glenn Greenwald, one of the reporters who chronicled the document dump by National Security Agency leaker Edward Snowden via the U.K. press, now said he's set to publish his most dramatic piece yet:  The names of those in the United States targeted by the NSA.  "One of the big questions when is comes to domestic spying is, 'Who have been the NSA's specific targets?'  Are they political critics and dissidents and activists?  Are they genuinely people we'd regard as terrorists?  What are the metrics and calculations that go into choosing those targets and what is done with the surveillance that is conducted?  Those are the kinds of questions that I want to still answer," Mr. Greenwald told The Sunday Times of London.

Guilty until proven innocent in the age of ubiquitous electronic surveillance.  Upon taking office, President Obama issued a memorandum on the subject of transparency:  "My Administration," he said, "is committed to creating an unprecedented level of openness in Government.  We will work together to ensure the public trust and establish a system of transparency, public participation, and collaboration.  Openness will strengthen our democracy and promote efficiency and effectiveness in Government."  Apparently, though, in spite of this stated goal, the Obama administration has been doing quite the opposite.  Instead of sharing information openly with the American people, they've been collecting information, in secret, about the American people, building the largest domestic spying infrastructure known to man.

This is slightly off-topic — I hope.
Facebook App Soon to Record All Sounds Entering User Smartphones.  A recent "improvement" to the Facebook mobile app is being praised by tech bloggers, but it seems the bigger, more sinister side of the upgrade is being ignored.  In the "coming weeks," the social media behemoth will roll out a service that, according to an announcement on its blog, will give users: ["]the option to use your phone's microphone to identify what song is playing or what show or movie is on TV.["]

Bill ending NSA bulk data collection clears U.S. House.  The measure, which passed 303-121, would end the National Security Agency's practice of gathering in bulk information on calls made by millions of Americans and storing them for at least five years.  It would instead leave such records in the custody of telephone companies and they could search those databases at the NSA's request.

The NSA records EVERY cell phone call in the Bahamas.  The NSA is listening in on every cell phone call made within or to the Bahamas, according to revelations contained with the documents leaked by whistleblower Edward Snowden.  As part of a program codenamed SOMALGET, the National Security Agency is recording millions of communications in the nation of 370,000 and they're even able to replay a given conversation for a month after it happens.

Cisco CEO asks Obama to curtail surveillance, according to reports.  Cisco chief executive John Chambers has sent a letter to President Obama calling for rules ensuring that both the needs of national security and his IT firm's product integrity are met, according to reports.  The Financial Times and Re/code are reporting that Chambers sent a letter dated May 15 to Obama, warning that confidence in an open Internet is being "eroded by revelations of governments' surveillance" and asking him to create new standards of conduct about how the government collects data.  Ars Technica reported last week that a document included in National Security Agency files released with Glenn Greenwald's new book "No Place to Hide" describes how the NSA intercepts servers and networking gear and covertly installs firmware on them before they are shipped out. There is a photo purporting to show NSA employees opening Cisco boxes.

Internet Subversion.  In addition to turning the Internet into a worldwide surveillance platform, the NSA has surreptitiously weakened the products, protocols, and standards we all use to protect ourselves.  By doing so, it has destroyed the trust that underlies the Internet.  We need that trust back.

NSA Metadata Snooping Challenged.  Metadata is transmission and billing information about whom you called, from what phone number, when, and for how long.  This can include your location, because billing records note which cell tower your mobile phone is connecting through.  George Orwell's book 1984 was meant as a warning.  But it is shocking how many people view 1984 as a "how to" manual or blueprint for expanding their power and influence over the country.  The book projects into the future how society has been heading towards a totalitarian society governed by pervasive government surveillance.

Attkisson to Beck: I was warned that I was 'probably being monitored'.  In an interview today [4/30/2014] with Glenn Beck, former CBS News investigative reporter Sharyl Attkisson again addressed the issue of her compromised computers, saying she was "outraged" that someone would attempt to hack them.  She also noted that she'd been warned that she was "probably being monitored" and that this particular tip came before the revelations from National Security Agency whistleblower Edward Snowden and the news that the Associated Press's phone records had been seized.

A Phone Company Fought the NSA — And the NSA Won.  An unnamed phone company recently resisted a National Security Agency demand for access to its subscribers' data, according to court documents declassified Friday [4/25/2014].  But on March 20, the Foreign Intelligence Surveillance Court rejected the company's motion and ordered it to continue turning the records over to the NSA.  The government redacted the name of the company and other information from the documents.  It was apparently the first time any phone company tried to fight the NSA's controversial mass-surveillance program.  A federal judge wrote last year that no phone company had resisted the program, which the NSA claims is authorized under Section 215 of the Patriot Act.

Shocking details of rampant racism, sexism prompt Rep. Sean Duffy to ask if it's time for CFPB's Richard Cordray to resign.  Consumer Financial Protection Bureau Director Richard Cordray's agency has been slammed in recent months for refusing to divulge to Congress details of its lavish spending on a new headquarters.  The CFPB has also been exposed by the Washington Examiner for running an NSA-like surveillance program that compromises the privacy of hundreds of millions of Americans' most intimate financial dealings.  Cordray's agency has even been taken to court by the Examiner in conjunction with the nonprofit group Judicial Watch for chronically refusing to make public even the most basic details of its spending of tax dollars.

Clapper: Yeah, we've checked out Americans' e-mail content, phone calls without warrants.  In a letter to NSA-skeptic Sen. Ron Wyden this week, DNI head James Clapper seems to confirm searches of the content of American citizens' communication the administration had previously suggested was off-limits.

U.S. confirms warrantless searches of Americans.  The Obama administration has conducted warrantless searches of Americans' communications as part of the National Security Agency's surveillance operations that target foreigners located outside of the U.S., the administration's top intelligence official confirmed in a letter to Congress disclosed Tuesday [4/1/2014].

Obama's NSA overhaul may require phone carriers to store more data.  President Barack Obama's plan for overhauling the National Security Agency's phone surveillance program could force carriers to collect and store customer data that they are not now legally obliged to keep, according to U.S. officials.

NSA still wants to collect records without probable cause.  Except for the definition and mechanism of proving treason, no area of the Constitution addressing the rights of all persons when the government is pursuing them is more specific than the Fourth Amendment.  The linchpin of that specificity is the requirement that the government demonstrate probable cause to a judge as a precondition to the judge issuing a search warrant.  The other specific requirement is identity:  The government must identify whose property it wishes to search or whose behavior it wishes to monitor, because the Fourth Amendment requires that all warrants specifically describe the place to be searched or the person or thing to be seized. [...] The Foreign Intelligence Surveillance Act (FISA) court has been issuing general warrants to the National Security Agency (NSA) since 1978, but it was not until last June that we learned that these general warrants have been executed upon the telephone calls, text messages, emails, bank records, utility bills and credit card bills of all persons in America since 2009.

The Surveillance State Is Well Protected and Winning.  The New York Times reported today [3/25/2014] that the White House will ask Congress to end the National Security Agency's open-ended collection of data about Americans' calling habits.  Under the proposal, the bulk records would stay in the hands of phone companies, which would not be required to retain the data for any longer than they normally would.  The NSA could seize specific records only with a judge's permission.

Navy database tracks civilians' parking tickets, fender-benders, raising fears of domestic spying.  A parking ticket, traffic citation or involvement in a minor fender-bender are enough to get a person's name and other personal information logged into a massive, obscure federal database run by the U.S. military. [...] LinX is a national information-sharing hub for federal, state and local law enforcement agencies.  It is run by the Naval Criminal Investigative Service, raising concerns among some military law experts that putting such detailed data about ordinary citizens in the hands of military officials crosses the line that generally prohibits the armed forces from conducting civilian law enforcement operations.

Gates Foundation Lobbies For Feds To Collect Data On College Graduates Lives.  A study released by the Gates Foundation is promoting a system that would track the careers of college graduates long after they receive their degrees, attacking the National Association for Independent Colleges and Universities for promoting laws that prevent up-close surveillance of students by the government.

Rand Paul gets standing ovation at Berkeley: 'Your right to privacy is under assault'.  Delivering a rare speech for a Republican at this bastion of liberalism, Kentucky Sen. Rand Paul on Wednesday was given multiple standing ovations by the left-wing audience after railing against government surveillance and warning the students:  "Your right to privacy is under assault."  "I am here to tell you that if you own a cell phone, you're under surveillance," he told the crowd. Paul's address at the Berkeley Forum on the campus of the University of California at Berkeley focused on the National Security Agency's collection of telephone metadata and the debate over privacy.

NSA surveillance program reaches 'into the past' to retrieve, replay phone calls.  The National Security Agency has built a surveillance system capable of recording "100 percent" of a foreign country's telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.  A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.  The voice interception program, called MYSTIC, began in 2009.

NRA: Federal surveillance policies could lead to gun registry.  The National Rifle Association has filed a friend-of-the-court brief in a case in federal court in New York challenging the federal government's data surveillance techniques, arguing the data collection violates the First Amendment and could undermine federal privacy laws that prohibit the formation of a registry of firearms or gun owners.

Lies, Spies, Leaks and DiFi.  These days it's a commonplace to diagnose a clash between two parts of our government and conclude that both are wrong.  The case at bar this week is the uncharacteristically rancorous fight between the CIA and Senate Select Committee on Intelligence Chairman Sen. Dianne Feinstein (D-Cal).

Privacy advocates call Feinstein's rant on CIA spying hypocritical.  Those who have long complained that neither Congress nor the intelligence community have done enough to safeguard the rights of private citizens find it ironic that, for months, the spy agency and the Intelligence Committee charged with its oversight have waged a behind-the-scenes battle accusing each other of improper snooping.  The Justice Department is weighing whether to investigate CIA claims that Intelligence Committee staffers accessed material they shouldn't have seen while reviewing millions of documents at a Virginia facility.  Those same advocates find the complaints of Feinstein, who has been one of the intelligence community's staunchest supporters, as especially disingenuous.

Sen. Feinstein's Awakening.  Here again is the problem of surveillance professionals operating within a highly technologized surveillance state:  If they can do it they will do it.  If they are able to take an action they will sooner or later take it, whether or not it's a good thing, even whether or not it is legal.  Defenders of the surveillance state as it is currently organized and constituted blithely argue that laws, rules, traditions and long-held assumptions will control or put a damper on the actions of those with the power to invade the privacy of groups or individuals.  They are very trusting people!  But they are wrong.

Issa Rips CIA Over Feinstein Spying Allegations: 'Treason'.  House Oversight Committee Chairman Darrell Issa said he is incensed about allegations the CIA spied on the Senate Intelligence Committee, calling it "treason."  "I think Senator Feinstein is as outraged as anyone and I share her outrage.  I think the violation of the Constitutional separation of powers should be an offense of the highest level — virtually treason," Issa told Breitbart News on Tuesday [3/11/2014].  "Spying on the executive branch — spying on Congress or violating the separation of powers as to the Supreme Court or as to Congress is effectively treason.

New study shows NSA phone metadata can reveal everything about your life.  New research published by Stanford Univeristy Wednesday reveal phone and Internet metadata collected by the NSA can expose far more information about an individual than the agency admits, including, "medical conditions, financial and legal connections, and even whether they own a gun."  Two of the school's computer science graduate students were able to uncover the sensitive personal details of individuals from phone data details, like the numbers of callers and recipients, the location of callers, phone serial numbers and the length of conversations — all of which are data the signals intelligence agency collects in bulk both domestically and internationally.  Of the 33,688 unique numbers called by the study's 546 study volunteers, students were able to positively identify a specific individual in 18 percent of those calls.

'Heads Should Roll!': Lawmakers Irate Over Alleged CIA Spying.  Tempers are flaring in Washington as one branch of government appears irate with another.  Amidst allegations that the Central Intelligence Agency (CIA) has been spying on Congressional staffers, a spat between the Executive Branch and the Legislative Branch appears to be brewing.  California Democrat Senator Dianne Feinstein is leading the charge as she ranted on Tuesday [3/11/2014] about the 2010 removal of documents from secure machines used by Senate Intelligence Committee staff.

CIA says it doesn't spy on the Senate.  The most serious fight between the Central Intelligence Agency and Congress to erupt during the Obama administration went very public on Tuesday as the Senate's top overseer of the CIA accused the agency of blocking an investigation into interrogation practices and possibly violating the Constitution.  In an extraordinary speech on the Senate floor, Intelligence Committee Chairwoman Dianne Feinstein (D-Calif.) said CIA personnel illicitly snooped on Senate staffers by examining computers they used as part of a long-running review of the agency's treatment of terrorism suspects under President George W. Bush.

Feinstein publicly accuses CIA of spying on Senate computers.  Sen. Dianne Feinstein, the head of the Senate Intelligence Committee, escalated a behind-the-scenes dispute with the CIA by publicly accusing the spy agency of secretly searching a Senate computer system, an act she said undermines congressional intelligence oversight and may have violated the law.

Senator: CIA improperly searched computer network.  The head of the Senate Intelligence Committee said Tuesday the CIA improperly searched a stand-alone computer network established for Congress in its investigation of allegations of CIA abuse in a Bush-era detention and interrogation program and the agency's own inspector general has referred the matter to the Justice Department for possible legal action.

Destructive Missions, Partially Accomplished.  First, there are the ongoing revelations about the government's accumulation of digital mountains of personal information on citizens' daily lives.  If there's a positive result from this, it would be that many Americans have become a bit more careful about their data trail.  But the good news ends there.  Our emails, Facebook posts, text messages and other communications are subject to easy scrutiny by government minders and anyone else to whom those apparatchiks might feel like conveying information.  The chilling effect on everyday speech, expression and interactions is a statist's dream come true.  Just wait until they integrate the Obamacare and Common Core data.

White House co-hosts MIT workshop as part of project on 'collecting, analyzing, and using' big data.  The Obama White House is co-hosting a Massachusetts Institute of Technology (MIT) workshop on "big data" as part of an administration effort to analyze how to collect and use complex data for public policy.  It comes as little surprise that the White House is analyzing "big data" collection considering the effectiveness of the 2012 Obama campaign's personality-tracking voter targeting database created through its "Project Dreamcatcher."  The information from that database is now held by Obama's nonprofit advocacy group Organizing for Action.

Judge Rules NYPD Spying on Muslims Didn't Hurt While It Was Secret.  A federal judge in Newark has tossed a lawsuit brought by eight Muslims who claimed the NYPD's post-9/11 surveillance of their mosques, schools, and other community locations violated their civil rights.  Instead, U.S. District Judge William Martini ruled that there was no harm done until the Associated Press reported on the program (earning itself a Pulitzer Prize along the way).  "The Associated Press covertly obtained the materials and published them without authorization," he wrote.

DHS cancels national license plate tracking plan.  Homeland Security Secretary Jeh Johnson on Wednesday [2/19/2014] ordered the cancellation of a plan by the Immigration and Customs Enforcement agency to develop a national license-plate tracking system after privacy advocates raised concern about the initiative.  The order came just days after ICE solicited proposals from companies to compile a database of license-plate information from commercial and law enforcement tag readers.  Officials said the database was intended to help apprehend fugitive illegal immigrants, but the plan raised concerns that the movements of ordinary citizens under no criminal suspicion could be scrutinized.

The Editor says...
The system is only there to catch illegal immigrants!  How could you possibly object to that?  Think ahead:  Suppose the system works perfectly and every illegal immigrant is captured and deported (Ha!).  Their surveillance system will still be in place, and the bureaucrats will need to think of something to do with it — probably hunting for "deadbeat dads," and people with outstanding warrants.

HHS Seeking Access to 'Full Twitter Historical Data'.  The Department of Health and Human Services (HHS) is seeking a "social media analytic tool" that will give the government access to "full Twitter historical data," according to a solicitation released on Tuesday [2/18/2014].  The agency is seeking feedback for a "possible future acquisition to provide near real time social media analysis."  HHS said it wants to use the tool for "ongoing monitoring" of public health issues.  HHS provides a long list of requirements, including "access to real-time social media posts," and "access to full Twitter firehose."

DNI: Phone surveillance would not have been 'shocking' if the NSA had come clean with the public soon after 9/11.  The White House's director of national intelligence admitted on Monday [2/17/2014] that the National Security Agency and other federal government departments should have been transparent with the American people when it first began collecting a broad swath of phone records.  James Clapper mused openly about how the PRISM program, authorized by Section 215 of the PATRIOT Act, was received by global media and the American public, conceding that the scandalous outcome would likely have been different if the government had been less secretive.

At Newark Airport, the Lights Are On, and They're Watching You.  Visitors to Terminal B at Newark Liberty International Airport may notice the bright, clean lighting that now blankets the cavernous interior, courtesy of 171 recently installed LED fixtures.  But they probably will not realize that the light fixtures are the backbone of a system that is watching them.  Using an array of sensors and eight video cameras around the terminal, the light fixtures are part of a new wireless network that collects and feeds data into software that can spot long lines, recognize license plates and even identify suspicious activity, sending alerts to the appropriate staff.

DHS Building National License Plate Reader Database.  The Department of Homeland Security (DHS) is seeking to build a national license plate reader database, according to a recent job posting for government contractors.  The posting, first reported by Ars Technica, seeks a contractor to build a national license plate recognition database for DHS and Immigrations and Customs Enforcement (ICE) agents.  Automated license plate recognition (ALPR) technology uses cameras to identify cars, alert police departments if they match a license plate on a "hot list," and track their movements.

The Editor says...
This sounds like a cover story planted in the malleable news media, to announce the formation of something that already exists.  I would be very surprised if such a system hasn't been in place for several years already.

Spy Chief: We Should've Told You We Track Your Calls.  Even the head of the U.S. intelligence community now believes that its collection and storage of millions of call records was kept too secret for too long.  The American public and most members of Congress were kept in the dark for years about a secret U.S. program to collect and store such records of American citizens on a massive scale.  The government's legal interpretation of section 215 of the Patriot Act that granted the authority for this dragnet collection was itself a state secret.

NSA spying undermines separation of powers.  [M]ost Americans figure, probably rightly, that the NSA isn't likely to be interested in their stuff.  (Anyone who hacks my e-mail is automatically punished, by having to read it.)  There is, however, a class of people who can't take that disinterest for granted:  members of Congress and the judiciary.  What they have to say is likely to be pretty interesting to anyone with a political ax to grind.  And the ability of the executive branch to snoop on the phone calls of people in the other branches isn't just a threat to privacy, but a threat to the separation of powers and the Constitution.

'Rand Paul v. Barack Obama' lawsuit hits federal court with 350,000 plaintiffs.  Kentucky Sen. Rand Paul is making good on his promise to sue the Obama administration over what he calls 'precisely the kind of overreach we fought a revolution over.'  His targets are the National Security Agency, the FBI and other federal government offices that snoop on private communications at home and abroad.

Rand Paul Suing President Obama.  Rand Paul's political action committee just announced that the Kentucky senator is suing President Obama. [...] "I am filing a lawsuit against President Barack Obama because he has publicly refused to stop a clear and continuing violation of the 4th Amendment," Paul said in a statement.  "The Bill of Rights protects all citizens from general warrants.  I expect this case to go all the way to the Supreme Court and I predict the American people will win."

Secret court approves phone surveillance changes.  National intelligence chief James R. Clapper said Thursday [2/6/2014] that the Foreign Intelligence Surveillance Court had approved two limits on how the government can use huge volumes of data it collects about Americans' phone use.  The new restrictions were among reforms promised last month by President Barack Obama to the controversial anti-terror surveillance program of the National Security Agency.

The Editor says...
How can any of us verify what the secret court really said?  And why is there a secret court in an ostensibly free country?

NSA Defender Explains How Even Though NSA Spies On Americans, It's OK To Say They Don't.  Benjamin Wittes of the Brooking Institution has become the go-to non-government NSA apologist.  One of his most recent articles is a true work of rhetorical artistry, in which he tries to explain why saying "the NSA doesn't spy on Americans" is acceptable shorthand for the fact that the NSA spies on pretty much every American.  It's a master class in political doubletalk.  First, it's the law's fault.  The law, you see, is too complicated for mere mortals not working for the NSA to understand, so that makes it okay to lie.

Federal consumer bureau data-mining hundreds of millions of consumer credit card accounts, mortgages.  Officials at the Consumer Financial Protection Bureau are conducting a massive, NSA-esque data-mining project collecting account information on an estimated 991 million American credit card accounts.  It was also learned at a Congressional hearing Tuesday [1/28/2014] that CFPB officials are working with the Federal Housing Finance Agency on a second data-mining effort, this one focused on the 53 million residential mortgages taken out by Americans since 1998.

Obama Team Stonewalls Democrat on Spying Questions.  Ron Wyden wanted direct answers on government spying programs during Wednesday's Senate Intelligence Committee hearing.  He didn't get many.  Director of Intelligence James Clapper, CIA Director John Brennan, and FBI Director James Comey largely avoided giving details on the agencies' spying activities, instead promising to provide more information as soon as possible.  In several cases, Wyden gave deadlines for them to answer his questions.  Wyden, an Oregon Democrat, is a vocal critic of the National Security Agency's program of gathering the phone data of millions of Americans.

US privacy watchdog advises NSA spying is 'illegal'.  The Privacy and Civil Liberties Oversight Board advised by a 3-2 majority that the programme should end.  In a major speech last week, President Barack Obama said he was ordering curbs on the use of such mass data.  But he said the US must continue collecting data to prevent attacks.

Independent review board says NSA phone data program is illegal and should end.  An independent executive branch board has concluded that the National Security Agency's long-running program to collect billions of Americans' phone records is illegal and should end.  In a strongly worded report to be issued Thursday [1/23/2014], the Privacy and Civil Liberties Oversight Board (PCLOB) said that the statute upon which the program was based, Section 215 of the USA Patriot Act, "does not provide an adequate basis to support this program."

White House Rejects Gov't Report that NSA Bulk Data Grab Is Illegal and Useless.  The Privacy and Civil Liberties Oversight Board (PCLOB) has released a scathing report listing off the various ways that the National Security Administration's meta data sweeps are illegal. [...] The board also rejected the notion that the NSA's data mining program is somehow "necessary" to fix the supposed intelligence gap that occurred from a failure to detect Al Qaeda in the U.S. prior to 9/11 — something that has been claimed many times to necessitate the program [...]

Four Questionable Claims Obama Has Made on NSA Surveillance.  [#1] There have been no abuses. [...] At press conferences in June, August and December, Obama made assurances that two types of bulk surveillance had not been misused.  In fact, the Foreign Intelligence Surveillance Court has reprimanded the NSA for abuses both in warrantless surveillance targeting people abroad, and in bulk domestic phone records collection.  In 2011, the FISA Court found that for three years, the NSA had been collecting tens of thousands of domestic emails and other communications in violation of the Fourth Amendment.

What would Patrick Henry do with the NSA?  In his speech of Friday last, President Obama laid out some nifty new review processes to see to it that the NSA behaves — our "reviewers" will now have "reviewers."  And therein lies the problem: government cannot be the judge of the extent of its own powers, that is what has led to this moment.

A new 'crypto-war' breaks out, as citizens and criminals learn to hide from government.  [Scroll down]  Smari McCarthy — whose eclectic activities include working with Julian Assange in the early days of Wikileaks and keeping the internet going in remote parts of Afghanistan — is part of a small group of developers building a free, user-friendly email service that has PGP encryption built in by default.  I interviewed McCarthy recently for my forthcoming book.  He calculated that it currently costs 13 cents per day to spy on every internet user in the world.  His plan is to push that to $10,000 by getting more people to use PGP. "

Rand Paul Mocks Obama's NSA Speech: 'If You Like Your Privacy, You Can Keep it'.  Sen. Rand Paul responded today [1/17/2014] to Obama's NSA speech in which Obama announced plans to reform the National Security Agency (NSA) surveillance program, which has been unconstitutionally spying on Americans, in direct violation of the Fourth Amendment.  Senator Paul, in a statement reiterated that he will continue to fight for his Fourth Amendment Restoration Act as well as his lawsuit against the Obama NSA.

Data Spying in the States: Public Safety or Invasion of Privacy?  Last month, USA Today reported that at least 125 police agencies in 33 states have used a variety of spy-worthy tactics and technologies to obtain information about thousands of cell phones and their users.  The newspaper's investigation found that one in four law enforcement agencies use a tactic known as a "tower dump" to get the identity, activity and location information of any cell phone that connects with a particular cell tower in a specific timespan.  Additionally, 25 law enforcement agencies used federal grants to purchase a piece of equipment developed for military and intelligence gathering purposes known as a "Stingray," which mimics a cell tower, allows police to track the movements of a specific cell phone and captures data from a cell phone, such as the phone numbers dialed and text messages received.

NSA can't say if it collected data on lawmakers, officials.  The National Security Agency said it is lawfully unable to search its database to determine if it has swept up phone records from members of Congress or other elected officials.  NSA Director Keith Alexander said, however, nothing the agency does can be fairly described as "spying on Members of Congress" or U.S. politicians, according to a letter dated Jan. 10.

The Editor says...
If the NSA "is lawfully unable to search its database," then why does the database exist?

NSA collects millions of text messages daily in 'untargeted' global sweep.  The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents.

Obama Picks Soros Crony to Lead NSA Probe.  When President Obama needs help, he can always turn to one of the Soros inner circle.  In a speech on Jan. 17, Obama announced that his new Presidential Counsel John Podesta will lead a "comprehensive review of Big Data and privacy," following the NSA privacy scandal that has dogged his administration.  What he didn't mention was that Podesta is the founder of the liberal Center for American Progress.  CAP has gotten $7.3 million from liberal billionaire George Soros since 2000 and was one of the keystone liberal think tanks founded after the Democrats lost the 2004 election.

Apple, Cisco, Dell unhappy over alleged NSA back doors in their gear.  Germany's Der Spiegel reports that the NSA has compromised a wide range of hardware for years to enable its spying.

The Real Purpose of Oakland's Surveillance Center.  City leaders have argued that Oakland needs a massive surveillance system to combat violent crime, but internal documents reveal that city staffers are also focused on tracking political protesters.

Cruz: Why didn't NSA spying stop Boston and Ft. Hood terror attacks?  In Tuesday's "Hearing on the Report of the President's Review Group on Intelligence and Communications Technologies" Texas Senator Ted Cruz grilled Obama NSA witnesses as to the effectiveness of the massive spying operation, which failed to stop the tragic terrorist attacks at both Fort Hood and the bombings in Boston.  Richard A. Clarke, Michael J. Morell, Professor Geoffrey R. Stone, Cass R. Sunstein and Professor Peter Swire were asked by Cruz if government surveillance programs have focused too much on gathering information on law-abiding citizens and too little on the actual "bad guys."

Obama's NSA Speech: More mush from the proto-tyrant.  Obama is behaving like a tyrant, but doing it sneakily, with the connivance of a mainstream media that refuses to present to their audience the alarming stories of what is really going on.  The low information majority is blissfully unaware that the organs of state power are being mobilized to suppress Obama's political opponents.  In this context, the NSA domestic spying apparatus is and remains a grave threat.

N.S.A. Devises Radio Pathway Into Computers.  The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.  While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

NSA has hacked into 100,000 computers around the world some of which are not connected to the internet.  The National Security Agency has implanted software in nearly 100,000 computers around the world — but not in the United States — that allows the U.S. to conduct surveillance on those machines, The New York Times reported Tuesday [1/14/2014].  The Times cited NSA documents, computer experts and U.S. officials in its report about the use of secret technology using radio waves to gain access to computers that other countries have tried to protect from spying or cyberattacks.

The Editor says...
That sounds like the kind of leakage that Tempest was supposed to prevent.

The NSA Even Spies on Congress.  Last week, Sen. Bernie Sanders, I-Vt., wrote to Gen. Keith Alexander, director of the National Security Administration (NSA), and asked plainly whether the NSA has been or is now spying on members of Congress or other public officials.  The senator's letter was no doubt prompted by the revelations of Edward Snowden to the effect that the federal government's lust for personal private data about all Americans and many foreigners knows no bounds, and its respect for the constitutionally protected and statutorily enforced right to privacy is nonexistent.

The Danger of NSA Spying on Members of Congress.  An executive-branch agency has been empowered to store revealing information about the communications of everyone in the legislature.

NSA statement does not deny 'spying' on members of Congress.  The National Security Agency on Saturday released a statement in answer to questions from a senator about whether it "has spied, or is ... currently spying, on members of Congress or other American elected officials", in which it did not deny collecting communications from legislators of the US Congress to whom it says it is accountable.

Rand Paul to Lead Class-Action Lawsuit Against Obama over NSA Spying.  Sen. Rand Paul (R-KY) is leading a class-action lawsuit with hundreds of thousands of Americans against President Barack Obama's National Security Agency (NSA) over its spying on the American people, Breitbart News has learned.

White House appeals ruling on constitutionality of NSA program.  The Justice Department asked a U.S. appeals court Friday [1/3/2014] to toss out a judge's ruling the National Security Agency surveillance is likely unconstitutional.

Secret spy court says NSA can keep collecting every American's phone records.  A secretive U.S. spy court has ruled again that the National Security Agency can keep collecting every American's telephone records every day, in the midst of conflicting decisions in two other federal courts about whether the surveillance program is constitutional.

This is how the NSA gets unrestricted access to your iPhone.  The National Security Agency has already demonstrated that it is willing to go to great lengths to swipe information from unsuspecting targets, from bulk-tapping phone records to more absurd stuff like monitoring potential threats in World of Warcraft.  The latest revelations, however, paint an increasingly troubling portrait of the NSA's surveillance capabilities, particularly if you're an iPhone owner.  Back in September, German newsmagazine Der Spiegel reported that the NSA had gained access to BlackBerrys, Androids, and iPhones.  And now we have a better idea of how backdoor access is unlocked.

Apple denies knowledge of NSA's 'complete' access to iPhone.  Apple on Tuesday [12/31/2013] vehemently denied suggestions from a security analyst that the company may have helped the NSA to develop backdoor access to the iPhone.  The statement came from security research Jacob Appelbaum, who revealed the existence of a secret program code-named DROPOUTJEEP by which the National Security Agency (NSA) appears to have nearly total access to the Apple iPhone.

The NSA Intercepts Laptops Purchased Online to Install Malware.  According to a new report from Der Spiegel on the National Security Agency's top team of hackers, the agency intercept electronics purchased online before delivery to install malware and other spying tools.

NSA's elite hacking unit intercepted computers ordered online and installed Spyware.  NSA spies have intercepted computer deliveries, exploited hardware vulnerabilities, and even hijacked Microsoft's internal reporting system all in the name of stealing data from some of their toughest targets.  These latest revelations to emerge about the undercover work of the National Security Agency focus on the work carried out by an elite team of hackers known as Tailored Access Operations (TAO).

NY judge rules NSA phone surveillance is legal.  A federal judge on Friday [12/27/2013] found that the National Security Agency's bulk collection of millions of Americans' telephone records is legal and a valuable part of the nation's arsenal to counter the threat of terrorism.

The Black Chamber.  Terrorism has made it necessary to the surveil persons communicating with, or commingled with US persons.  Hampering intelligence is not so nearly as important as ensuring pre-crime never becomes crime.  [Cass] Sunstein's recommendations have charted out a process that will cost billions yet do nothing to improve the situation for US persons, though they will be a tremendous boon to foreign agents.  The main structural problems that need to be fixed are the incentive structure among US intelligence agencies.  What really matters is the commingling to the intelligence function with the criminal system.  Intelligence should be permitted relatively unfettered access if the criminal justice system is not its de facto handmaiden.

Into Year 6, Obama admits he's clueless.  [Scroll down]  And that ever-lowering standard seems to apply to everything, including the U.S. government spying on Americans.  Asked about how he can justify a program that a federal judge said "had failed to cite a single instance in which analysis of the NSA's bulk metadata actually stopped an imminent attack," he countered:  "There have not been actual instances where it's been alleged that the NSA in some ways acted inappropriately in the use of this data."  Well, perfect.  No one has yet proven the clandestine program that no one knew about has trampled on Americans' constitutional rights.  Good enough!

The Air of Unreality in NSA Reform.  Grope through the Styrofoam pellets of rhetoric that surround the 46 recommendations in the report issued last week by the president's Review Group on Intelligence and Communications Technologies, and you will discover that the authors "have not uncovered any official efforts to suppress dissent or any intent to intrude into people's private lives without legal justification."  The panel's investigation of the National Security Agency found — as the Foreign Intelligence Surveillance Court found before them — that the occasional unintentional violations of guidelines were stopped once they were detected.

Susan Rice Defends James Clapper And The Indefensible.  The diplomat who blamed four American deaths in Benghazi on a video claims the denials by the director of national intelligence of blanket surveillance of Americans were inadvertent false representations.

Obama can't point to a single time the NSA call records program prevented a terrorist attack.  National Security Agency defenders, including President Obama, continue to cite the terrorist attack on Sept. 11, 2001 when defending the program that scoops up domestic call records in bulk.  But asked specifically, on Friday [12/20/2013], if he could identify a time when that program stopped a similar attack, President Obama couldn't.  That's because the program hasn't prevented a second 9/11.

Susan Rice: NSA Officials Didn't Lie, They 'Inadvertently Made False Representations'.  National Security Advisor Susan Rice appeared on Sunday night's 60 Minutes with Lesley Stahl, and one of the issues she addressed was the continued fallout from the Edward Snowden NSA leaks.  Rice argued that NSA officials didn't lie about intel dragnets, they just "inadvertently made false representations."  This statement comes as House Republicans are demanding a criminal probe for Director of National Intelligence James Clapper for his flat-out denial in March, three months before the Snowden leaks began, that the NSA collects data on hundreds of millions of Americans (a denial that Clapper later categorized as the "least untruthful" answer he could have provided).

When '60 Minutes' Checks Its Journalistic Skepticism at the Door.  [V]iewers expect the show to bring its A game, and deserve it, when it takes on a huge issue like the N.S.A., to serve as a stand-in for the American people and ask the uncomfortable questions.

White House Tries to Prevent Judge From Ruling on Surveillance Efforts.  The Obama administration moved late Friday [12/20/2013] to prevent a federal judge in California from ruling on the constitutionality of warrantless surveillance programs authorized during the Bush administration, telling a court that recent disclosures about National Security Agency spying were not enough to undermine its claim that litigating the case would jeopardize state secrets.

Feds declassify Bush-era surveillance docs.  Federal intelligence officials are declassifying eight documents about the origins of controversial surveillance systems created under former President George W. Bush.  The Office of the Director of National Intelligence (ODNI) announced on Saturday [12/21/2013] that it had declassified the court documents dating from 2007 to this year, which the federal government had used to justify keeping the surveillance program secret.

Mr. Obama's Disappointing Response.  By the time President Obama gave his news conference on Friday, there was really only one course to take on surveillance policy from an ethical, moral, constitutional and even political point of view.  And that was to embrace the recommendations of his handpicked panel on government spying — and bills pending in Congress — to end the obvious excesses.  He could have started by suspending the constitutionally questionable (and evidently pointless) collection of data on every phone call and email that Americans make.  He did not do any of that.

No greater act of loyalty to the Constitution.  Some government officials have taken cover in the 1979 Supreme Court decision Smith v. Maryland, which held that there is no reasonable expectation of privacy in non-content information held by a third party.  Yet others contend that current technology can use phone data to reveal everything about a person's life — from religious activities to personal health information.  This being so, is it possible that the Supreme Court could overturn precedent?

How much did NSA pay to put backdoors in RSA crypto? Try $10m — report.  The mystery of why RSA would use a flawed, NSA-championed algorithm as the default random number generator for several of its encryption products appears to be solved, and the answer is utterly banal, if true:  the NSA paid it to.  Reuters reports that RSA received $10m from the NSA in exchange for making the agency-backed Dual Elliptic Curve Deterministic Random Bit Generator (Dual EC DRBG) its preferred random number algorithm, according to newly disclosed documents provided by whistleblower Edward Snowden.

Officials' defenses of NSA phone program may be unraveling.  From the moment the government's massive database of citizens' call records was exposed this year, U.S. officials have clung to two main lines of defense:  The secret surveillance program was constitutional and critical to keeping the nation safe.  But six months into the controversy triggered by former NSA contractor Edward Snowden, the viability of those claims is no longer clear.  In a three-day span, those rationales were upended by a federal judge who declared that the program was probably unconstitutional and the release of a report by a White House panel utterly unconvinced that stockpiling such data had played any meaningful role in preventing terrorist attacks.

Obama's own review of the NSA is a victory for libertarians — and maybe terrorists.  Try as it might, the White House just cannot put the Edward Snowden story to rest:  the leaks keep on dribbling out and this week the US District Court in Washington ruled that the bulk collection of phone records is "Orwellian" and likely to be unconstitutional.  That (slightly histrionic) opinion will certainly be subject to appeal and review — ultimately by the Supreme Court — but whatever the eventual result, it means that the White House no longer has any hope of parking this story, as it might have hoped when it first broke.

Judge smacks Obama secrecy in unique FOIA case.  In a Freedom of Information Act victory, a federal judge has slapped the Obama administration for its secretive ways and ordered officials to turn over a bland-sounding foreign policy document.  Chastising what she called "the government's unwarranted expansion of the presidential communications privilege at the expense of the public's interest in disclosure," U.S. District Judge Ellen Seal Huvelle ruled the Presidential Policy Directive on Global Development is not exempt from FOIA.

NSA shouldn't keep phone database, review board recommends.  A panel appointed by President Obama to review the government's surveillance activities has recommended significant new limits on the nation's intelligence apparatus that include ending the National Security Agency's collection of virtually all Americans' phone records.  It urged that phone companies or a private third party maintain the data instead, with access granted only by a court order.

NSA Lawsuit Attorney: Ignore White House Panel.  The five-member panel released a 303-page report Dec. 18 containing 46 recommended changes to intelligence practices.  "It's a ruse," Klayman tells U.S. News.  "This is an age-old government practice:  When caught with their hand in the cookie jar, they come up with a 'solution.'"  The practice is somewhat similar to advocating a law outlawing murder after killing someone, he says.

White House task force recommends curbs to NSA surveillance.  America's spy chiefs should hand control of the country's sweeping telephone data record collection to private telecommunications companies, according to a task force set up by President Barack Obama to review the controversial surveillance programme.  The panel of five experts also recommended that future eavesdropping of foreign leaders should only be approved by a president, not intelligence officials, if "rigorous" tests were passed.

Merkel compared NSA to Stasi in heated encounter with Obama.  In an angry exchange with Barack Obama, Angela Merkel has compared the snooping practices of the US with those of the Stasi, the ubiquitous and all-powerful secret police of the communist dictatorship in East Germany, where she grew up.  The German chancellor also told the US president that America's National Security Agency cannot be trusted because of the volume of material it had allowed to leak to the whistleblower Edward Snowden, according to the New York Times.

A Powerful Rebuke of Mass Surveillance.  For the first time since the revelation of the National Security Agency's vast dragnet of all Americans' telephone records, a federal court has ruled that such surveillance is "significantly likely" to be unconstitutional.  In a scathing 68-page opinion peppered with exclamations of incredulity, United States District Judge Richard Leon, of the Federal District Court of the District of Columbia, found that the seven-year-old phone-data collection program — which was established under the Patriot Act and has been repeatedly reauthorized by a secret intelligence court — "almost certainly" violates the Fourth Amendment's prohibition against unreasonable searches.

Why Did 60 Minutes Let the Head of the NSA Fool Its Audience?  [Scroll down]  This is a classic technically-accurate-but-wildly-misleading NSA answer.  As best as I can understand the thought process behind Alexander's evasions, it's something like this:  No, the NSA isn't "tunneling" or "going into a facility."  It is copying data flows as they pass between facilities.  No, the NSA isn't "targeting Google" or Yahoo "as an entity."  Its "targets" — per the highly particular NSA meaning of that word — are users who communicate via Google and Yahoo.

Judge: NSA phone program likely unconstitutional.  A federal judge ruled Monday that the National Security Agency program which collects information on nearly all telephone calls made to, from or within the United States is likely unconstitutional.  U.S. District Court Judge Richard Leon found that the program appears to violate the Fourth Amendment ban on unreasonable searches and seizures.  He also said the Justice Department had failed to demonstrate that collecting the information had helped to head off terrorist attacks.

Court Finds Administration Trampled Fourth Amendment.  A federal court condemns the government's "collection and retention of personal data on virtually every single citizen."  This time it's the Fourth Amendment the president is violating.

Larry Klayman crows on NSA win: 'We hit the mother lode'.  [Larry] Klayman, the conservative legal activist well-known in Washington political circles a decade ago for his no-holds-barred court battles against the Clinton administration, was thrust back into the spotlight Monday after he obtained the first major ruling from a federal judge that the National Security Agency's surveillance program was constitutionally flawed.

Rand Paul Plots NSA Class-Action Lawsuit Options.  After months of consideration, Sen. Rand Paul, R-Ky., is moving closer to filing a lawsuit in federal court against National Security Agency surveillance programs.  A senior Paul staffer says U.S. District Court Judge Richard Leon's Monday [12/16/2013] decision that NSA opponents have standing to sue over the bulk collection of phone records makes Paul "much more likely" to file his own lawsuit.

U.S. Judge Slams Surveillance of Phones.  A federal judge ruled that the National Security Agency's collection of phone records "almost certainly" violates the U.S. Constitution, setting up a larger legal battle over long-secret counterterrorism programs.  U.S. District Judge Richard Leon's sharply worded opinion Monday labeled as "almost Orwellian" the NSA's bulk phone-surveillance program, one of several shots the judge took at the spying and its legal justifications.

The Judge and the NSA.  Federal Judge Richard Leon has become a sudden political celebrity after his remarkable opinion holding that antiterror surveillance is unconstitutional and, even more remarkably, enjoining the entire program.  If only his legal reasoning were as compelling as his new repute.

NSA Ruling Marks Larry Klayman's Biggest Legal Success.  Deciding on a lawsuit brought by Mr. Klayman, U.S. District Court Judge Richard Leon ruled that the NSA program "almost certainly" violated constitutional protections against unreasonable searches, setting the stage for a higher-court fight over the issue and giving new momentum to efforts in Congress to rein in such surveillance.

Second Federal Judge 'Skeptical' About Legal Case for NSA Phone-Record Collection.  Attorneys for the American Civil Liberties Union appeared in U.S. District Court Friday [12/13/2013] to argue for a preliminary injunction that would halt the National Security Agency's collection of all Americans' phone records.  Judge William Pauley did not set a time frame for when he might announce his decision — but as he reviews the case, NSA opponents may have cause for optimism.  ACLU legal fellow Brett Max Kaufman, one of the attorneys in court for the hearing, said Pauley seemed skeptical of the government's reliance on the Supreme Court's 1979 Smith v. Maryland decision.

Disarming Surveillance.  [Scroll down]  One of the worst proposals would effectively cripple the NSA's ability to collect, store and analyze telephony records, or the time, duration and originating and terminating numbers for phone calls.  This program was authorized by Section 215 of the Patriot Act and collects a vast amount of information, even if the database is only searched narrowly on the basis of specific facts as approved by judges on the Foreign Intelligence Surveillance Court, or FISC.  The minimization procedures are strict enough that the NSA only used the 215 program to make 300 queries in 2012.

The Editor says...
As I've said many times, I don't care if the federal government reads emails to and from Islamic terrorists anywhere in the world.  The objection that we sensible people have to the NSA's technique is that they scoop up all the metadata in the country in order to sift through it looking for "terrorists" — a term with a flexible definition:  Today that term refers to Islamic towel-heads with pressure cookers and dynamite, and tomorrow it could include well-armed patriots who just want to overthrow a tyrant and get out from under tyranny.

'NSA uses Google cookies to track targets,' reveals latest Snowden leak.  The National Security Agency has been accused of using Google cookies to pinpoint targets the government wants to hack.  In a NSA presentation slide released by Edward Snowden and seen by the Washington Post, the agency appeared to be using internet tracking techniques usually used by advertisers.

By cracking cellphone code, NSA has capacity for decoding private conversations.  The cellphone encryption technology used most widely across the world can be easily defeated by the National Security Agency, an internal document shows, giving the agency the means to decode most of the billions of calls and texts that travel over public airwaves every day.  While the military and law enforcement agencies long have been able to hack into individual cellphones, the NSA's capability appears to be far more sweeping because of the agency's global signals collection operation.

The Editor says...
They aren't "the public airwaves" any more.  The FCC sells RF bandwidth to cell phone companies.

Spooks off the Leash.  Apparently having decided to embark upon a course of self-parody, the National Reconnaissance Office [...] sent out a press release sharing the logo for its new spy-satellite program, NROL-39.  The image is that of an evil-looking giant octopus with its tentacles encircling the entire planet over the motto:  Nothing Is beyond Our Reach.

Cellphone data spying: It's not just the NSA.  Local police are increasingly able to scoop up large amounts of cellphone data using new technologies, including cell tower dumps and secret mobile devices known as Stingrays.

Tech companies call for an end to NSA online snooping.  Eight U.S. technology firms called for an end to online mass snooping by U.S. intelligence agencies Monday [12/9/2013] as new revelations emerged that the National Security Agency has even monitored Americans playing online computer games like "World of Warcraft."  Citing concerns about civil liberties, top executives from AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter and Yahoo said in an open letter to President Obama and Congress that the bulk collection of online communications by intelligence agencies should cease.

What has a shadowy US government spy agency just shot into space?  Despite ongoing anger about how the U.S. government is snooping on people around the world, one agency is still keen to boast about its spying — with a creepy cartoon octopus and an alarming logo.  A top-secret rocket carrying spy satellites for the National Reconnaissance Office launched from the central California coast late on Thursday [12/5/2013], and it had a large badge emblazoned on the side[.]  The new logo features a huge and sinister octopus, with just one angry eye visible, as it wraps its tentacles round the globe.  Written underneath is:  'Nothing Is Beyond Our Reach.'

Patriot Act author: Obama's intel czar should be prosecuted.  Rep. James Sensenbrenner Jr., the original author of the Patriot Act, says Director of National Intelligence James Clapper should be prosecuted for lying to Congress.  "Lying to Congress is a federal offense, and Clapper ought to be fired and prosecuted for it," the Wisconsin Republican said in an interview with The Hill.

NSA 'tracks mobile phones around the world'.  America's National Security Agency is tracking mobile phones around the world, according to the latest leaks from whistleblower Edward Snowden.  Almost five billion records a day are being gathered which allow intelligence officials to track individuals and map their relationships in ways previously unimaginable, the classified documents suggest.  The records and interviews with US officials, seen by the Washington Post, are said to show that the information feeds into a vast database which stores information on hundreds of millions of devices, providing agents with a mass surveillance tool.

Administration to review facial recognition technology.  The Obama administration on Tuesday said it plans to review the privacy implications of facial recognition technology.  Lawmakers and privacy advocates have expressed fears that tech companies and government agencies are using facial recognition technologies to track people, often without their knowledge.  The Commerce Department said it recognizes those concerns and will work with tech groups, privacy advocates and online advertising trade associations to identify them.

NSA tracking cellphone locations worldwide, Snowden documents show.  The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.  The records feed a vast database that stores information about the locations of at least hundreds of millions of devices, according to the officials and the documents, which were provided by former NSA contractor Edward Snowden.  New projects created to analyze that data have provided the intelligence community with what amounts to a mass surveillance tool.

'Thousands of NSA Analysts Can Listen to Domestic Phone Calls,' Read Emails, Texts, IMs.  The NSA claims "it does not need court authorization to listen to domestic phone calls."  The Fourth Amendment begs to differ.

With Tens of Millions of Phone Records Grabbed — It's the Government, Stupid.  The National Security Administration (NSA) has been forcing Verizon to turn over phone record data on millions of Americans.  Will the federal government use this unbelievably massive data grab against the American people they are supposed to serve — but instead increasingly lord over?

Latest Big Government Data Grab: Justice Sues to Get It Without Warrant.  Do You Want the Government Buying Your Data From Corporations?  Our government collects a lot of information about us.  Tax records, legal records, license records, records of government services received — it's all in databases that are increasingly linked and correlated.  Still, there's a lot of personal information the government can't collect.  Either they're prohibited by law from asking without probable cause and a judicial order, or they simply have no cost-effective way to collect it.  But the government has figured out how to get around the laws, and collect personal data that has been historically denied to them:  ask corporate America for it.

Google's Faux Outrage over NSA Spying.  Google Inc. clearly does not have the coercive sovereign power that the NSA has.  However, the evidence shows that it has a similar spying habits, legal positions, and attitudes; and that it also has had a decade-long record of cooperation with U.S. intelligence services.

N.S.A. May Have Hit Internet Companies at a Weak Spot.  The recent revelation that the National Security Agency was able to eavesdrop on the communications of Google and Yahoo users without breaking into either company's data centers sounded like something pulled from a Robert Ludlum spy thriller.  How on earth, the companies asked, did the N.S.A. get their data without their knowing about it?  The most likely answer is a modern spin on a century-old eavesdropping tradition.

Official releasing what appears to be original court file authorizing NSA to conduct sweeps.  The director of national intelligence on Monday night released what appeared to be the original court document authorizing the National Security Agency to conduct sweeping collections of Americans' communications records for counterterrorism purposes. [...] The documents also describe the NSA's failure to abide by court-imposed rules to protect Americans' privacy, and show that the agency was more interested in collecting cell site location data than it had previously acknowledged.

Americans' personal data shared with CIA, IRS, others in security probe.  U.S. agencies collected and shared the personal information of thousands of Americans in an attempt to root out untrustworthy federal workers that ended up scrutinizing people who had no direct ties to the U.S. government and simply had purchased certain books.  Federal officials gathered the information from the customer records of two men who were under criminal investigation for purportedly teaching people how to pass lie detector tests.  The officials then distributed a list of 4,904 people — along with many of their Social Security numbers, addresses and professions — to nearly 30 federal agencies, including the Internal Revenue Service, the CIA, the National Security Agency and the Food and Drug Administration.

C.I.A. Is Said to Pay AT&T for Call Data.  The C.I.A. is paying AT&T more than $10 million a year to assist with overseas counterterrorism investigations by exploiting the company's vast database of phone records, which includes Americans' international calls, according to government officials.  The cooperation is conducted under a voluntary contract, not under subpoenas or court orders compelling the company to participate, according to the officials.

The Hemisphere Project.  [Scroll down]  Smaller government agencies got into the spy game as well.  The New York Times reported recently that for at least six years, law enforcement officials had been working on a counter-narcotics program called the Hemisphere Project, a partnership between federal and local drug officials and AT&T, which gives the government routine access to an enormous database containing the records of decades of Americans' phone calls — the scale and longevity of which is unequalled, even by the NSA's collection.  The program apparently began in 2007 and has been carried out in great secrecy.  While the NSA stores the data for nearly all calls in the United States for five years, AT&T supplies law enforcement with phone data from as far back as 1987.  Approximately four billion call records are added to the database every day.  And unlike the NSA data, the Hemisphere data includes information on the locations of callers.

Obama's 1984.  [Edward] Snowden was charged by federal prosecutors for violating the Espionage Act of 1917, while Obama went on national television to claim that "we don't have a domestic spying program" and "there is no spying on Americans."  However, the many thousands of documents that Snowden leaked revealed a complex web of spy programs which intercepted Internet and telephone conversations from over a billion users in dozens of countries.  The intrusive secret data-mining didn't end there.  A top-secret communications surveillance program called PRISM enabled the U.S. intelligence community to access the servers of nine Internet behemoths such as Google, Yahoo, YouTube, Skype and Facebook for a wide range of digital data.  That NSA service grew exponentially under Obama at the same time he was trumpeting the end of Bush's War on Terror.

How the Government Spied on Me.  More recent revelations of National Security Agency spying suggest that the government's invasion of citizens' privacy is increasingly common.  Millions of innocent Americans should be very concerned about Washington's massive surveillance apparatus, which seems to know no bounds.

Government 'Mining' Social Media for Information on Health Behavior.  The National Library of Medicine (NLM) is "mining" Facebook and Twitter to improve its social media footprint and to assess how Tweets can be used as "change-agents" for health behaviors.  The NLM, a division of the Department of Health and Human Services (HHS), will have software installed on government computers that will store data from social media as part of a $30,000 project announced last week.

Rep. Joe Wilson Vindicated.  [A]s we look back on 5 years of Barack Obama, we see that Obama and his Administration do lie.  And they lie a lot. [...] The President and the National Director of Intelligence reassured the American people time and time again that the phone calls and emails of Americans were not being monitored and recorded as part of our intelligence programs.  We know that to be false and, further, we now know that our electronic spying is international in scope and technologically sophisticated.

Thousands march on Capitol Hill to protest NSA monitoring .  Protesters marched Saturday in Washington, D.C., to protest government surveillance programs revealed this year by Edward Snowden on the 12th anniversary of the law that made them legal.  Carrying signs reading:  'Stop Mass Spying,' 'Thank you, Edward Snowden' and 'Unplug Big Brother,' people gathered at the foot of the Capitol to demonstrate against the online surveillance by the National Security Agency.

NSA spied on 124.8 billion phone calls in just one month: watchdog.  The National Security Agency monitored nearly 125 billion phone calls in just one month, according to a number of new reports.  And while the majority of calls reportedly originated in the Middle East, an estimated 3 billion of the calls originated in the U.S.

Stop Watching You? Why?  Congress should indeed provide transparency, accountability and reform of the NSA's mass domestic surveillance that collects and stores the phone records and Internet activity of people in the United States.  There is no reason for the NSA to be conducting surveillance on such a massive basis; it is a symptom of the pervasive refusal to face the reality and magnitude of the jihad threat.  Because the NSA cannot admit that there is a particular threat coming from people who would be likely to frequent mosques and Islamic centers, it has to conduct surveillance on virtually everyone.

State Department Will Not Answer If The NSA Spied On Obama.  Following yesterday's [10/23/2013] allegation that the NSA had been spying on German Chancellor Angela Merkel, State Department Deputy Press Secretary Marie Harf was asked if the NSA had tapped President Obama's phone.  Harf seemed to find the question rather amusing, but was unable to give the reporter a definitive yes or no answer on the matter.

Reining in the snoops.  The Obama administration is doing all it can, short of dispatching a squad of park rangers to barricade the justices' parking spaces, to prevent the Supreme Court from reviewing the National Security Agency's domestic spying enterprise.  The administration's lawyers insist that lower courts can deal with the spy program, since the issue is too new to bother the high court with it.  This is an argument too clever by half, since the administration further argues that lower courts have no jurisdiction in the first place.  At issue is the government collusion with telephone companies in gathering the "metadata" for every telephone call placed in the United States.

Your life, under constant surveillance.  Historically, surveillance was difficult and expensive.  Over the decades, as technology advanced, surveillance became easier and easier.  Today, we find ourselves in a world of ubiquitous surveillance, where everything is collected, saved, searched, correlated and analyzed. [...] The result of all this is we're now living in a world where both corporations and governments have us all under pretty much constant surveillance.

Why the NSA's Defense of Mass Data Collection Makes No Sense.  The U.S. intelligence community claims it's not spying on citizens until someone actually looks at the data it collects.  That argument is deeply flawed.

Turns out, the NSA is also collecting all your Contacts, IM lists and group-chat pals.  Last June when Edward Snowden had just begun releasing his IED's, Intelligence Exposing Devices, Americans were shocked to learn that Obama's National Security Agency was collecting the telephone numbers of pretty much every single call made by any American.  Of course, being Americans and federal employees with top secret clearances, it would never occur to anyone to abuse that authority, except for the guys who tracked their exes and new loves.  But that's an exception, you understand.  Then we learn that the NSA is also collecting pretty much every single email sent by pretty much any American.  All in the interests of triangulating terrorists and any domestic connections, you understand.

I'm From the Government and I'm Here to Spy on You.  The big portals showing the masses what the government is really up to all came last April, and until Obama's gone from the White House, civilian life will never be the same.  It was last April when a judge in Texas denied a request by the Federal Bureau of Investigation for what he described as a warrant to remotely "hack a computer suspected of criminal use", raising questions about the legal requirement for the government to use computer hacking techniques in investigations.  (Wall Street Journal, April 23, 2013).  "By "surreptitiously installing software" — a technique typically associated with computer hackers — investigators are able to infiltrate computers and gather extensive information, according to a document in the case.

NSA collects millions of e-mail address books globally.  The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden.  The collection program, which has not been disclosed before, intercepts e-mail address books and "buddy lists" from instant messaging services as they move across global data links.

NSA Collects Online Address Books and Buddy Lists.  Senior intelligence officers and leaked documents from National Security Agency whistleblower Edward Snowden reveal that the NSA is amassing millions of contacts via online address books and instant-messaging buddy lists.  The program, under NSA's Special Source Operations branch, collects more than 250 million contacts in its database per year.  A single day's data found that the agency accumulated 444,743 email address books from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from miscellaneous providers, the Washington Post reports.

Growing Backlash to Government Surveillance.  From Silicon Valley to the South Pacific, counterattacks to revelations of widespread National Security Agency surveillance are taking shape, from a surge of new encrypted email programs to technology that sprinkles the Internet with red flag terms to confuse would-be snoops.

Obamacare Marketplace: Personal Data Can Be Used For 'Law Enforcement and Audit Activities'.  Maryland's Health Connection, the state's Obamacare marketplace, has been plagued by delays in the first days of open enrollment.  If users are able to endure long page-loading delays, they are presented with the website's privacy policy, a ubiquitous fine-print feature on websites that often go unread.  Nevertheless, users are asked to check off a box that they agree to the terms.

Congress now is expected to revise NSA, FISA court operations.  Twenty-two standalone bills have surfaced on Capitol Hill since Snowden's leaks in June, ranging from minor changes to massive policy overhauls for the NSA and its metadata collection programs.  The sheer number signals a collective agreement from lawmakers that some kind of legislative response is needed to curb growing public concern over the nation's intelligence practices.

NSA director admits to misleading public on terror plots.  In so many words, NSA director Keith Alexander admitted Wednesday [10/2/2013] that the Obama administration had issued misleading information about terror plots and their foiling to bolster support for the government's vast surveillance apparatus.  During Wednesday's [10/2/2013] hearing, Senate Judiciary Committee Chairman Patrick Leahy pushed Alexander to admit that plot numbers had been fudged in a revealing interchange: [...]

Secret NSA documents show campaign against Tor encrypted network.  On Nov. 1, 2007, the National Security Agency hosted a talk by Roger Dingledine, principal designer of one of the world's leading Internet privacy tools. [...] According to a top-secret NSA summary of the meeting, Dingledine told the assembled NSA staff that his service, called Tor, offered anonymity to people who needed it badly — to keep business secrets, protect their identities from oppressive political regimes or conduct research without revealing themselves.  In the minds of NSA officials, Tor was offering protection to terrorists and other intelligence targets.

NSA using Firefox flaw to snoop on Tor users.  An NSA presentation released by Edward Snowden contains mixed news for Tor users.  The anonymizing service itself appears to have foxed US and UK government snoops, but instead they are using a zero-day flaw in the Firefox browser bundled with Tor to track users.  "These documents give Tor a huge pat on the back," security guru Bruce Schneier told The Register.  "If I was a Tor developer, I'd be really smiling after reading this stuff."

NSA and GCHQ target Tor network that protects anonymity of web users.  Top-secret NSA documents, disclosed by whistleblower Edward Snowden, reveal that the agency's current successes against Tor rely on identifying users and then attacking vulnerable software on their computers.  One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets' computers, including access to files, all keystrokes and all online activity.

NSA director admits agency trawls Twitter and Facebook.  The director of the National Security Agency admitted today [10/2/2013] that the agency collects data from social networks and other private databases to hunt terror suspects but is not using the information to build dossiers, or personal files, on Americans.  NSA Director Gen. Keith Alexander testified during a Senate Judiciary Committee hearing Wednesday that not all social network searches are authorized by a secret Foreign Intelligence Surveillance court, but the agency's actions are proper and audited internally.

The NSA has been creating maps of American citizens' social networks.  The NSA has been graphing American's social networks and plotting them as they do organized crime since at least 2010, according to the latest published Edward Snowden leak.  The highly secretive intelligence agency has been mapping out American citizens' social connections — identifying associates, determining locations, and logging who they talk to — by taking advantage of loosened rules previously meant to restrict surveillance actions.

N.S.A. Gathers Data on Social Connections of U.S. Citizens.  Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans' social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials.

Sen. Ron Wyden, D-Ore., asked if NSA ever collected or planned to collect cellphone data.
Official sidesteps questions on NSA and cellphones.  The head of the National Security Agency sidestepped questions Thursday [9/26/2013] from a senator about whether the NSA has ever used Americans cellphone signals to collect information on their whereabouts that would allow tracking of the movements of individual callers.

Declassified documents show NSA listened in on MLK, Muhammad Ali and Art Buchwald.  Amid raging anti-Vietnam War protests that bedeviled two presidential administrations, snoops at the National Security Agency tapped the overseas communications of war critics including Martin Luther King Jr., Muhammad Ali, Sen. Frank Church (D-Idaho), and even Washington Post humor columnist Art Buchwald, according to newly declassified NSA documents released Wednesday [9/25/2013].

The Many Ways the Government Is Spying On Us.  For example, the government is photographing the outside information on every piece of snail mail.  The government is spying on you through your phone ... and may even remotely turn on your camera and microphone when your phone is off.  As one example, the NSA has inserted its code into Android's operating system ... bugging three-quarters of the world's smartphones.  Google — or the NSA — can remotely turn on your phone's camera and recorder at any time.

Why NSA Surveillance Will Never Foil Mass Murders.  In July, NSA director Keith Alexander claimed that the wholesale surveillance of American electronic communications had "disrupted" 54 terrorist plots.  Later, in testimony before the Senate Judiciary Committee, Alexander's deputy, John Inglis, admitted that in reality only one such "plot" was thwarted thanks to the bulk collection of phone records.  Given their pathological habit of lying — even under oath — it is impossible to know how many, if any, planned attacks on the United States have been avoided.

NSA disguised itself as Google to spy, say reports.  If a recently leaked document is any indication, the US National Security Agency — or its UK counterpart — appears to have put on a Google suit to gather intelligence.

Independent Review of NSA Surveillance Not Exactly 'Independent'.  A panel of so-called independent experts appointed by President Obama to review the federal government's surveillance programs "has effectively been operating as an arm of the Office of the Director of National Intelligence, which oversees the NSA and all other U.S. spy efforts," according to a report from the Associated Press.

The Man In Charge Of The NSA Modeled His Office After The Bridge Of The Starship Enterprise.  These are the voyages of the NSA, as it enters every computer and pries whatever data can be stolen and recorded in perpetuity.  Its ongoing mission:  to explore the internet and all TCP/IP packets, to seek out new emails, phone records, backdoors, webcams and bank accounts, to boldly go where no man with or without a search warrant has gone before.

Close ties between White House, NSA spying review.  [W]ith just weeks remaining before its first deadline to report back to the White House, the review panel has effectively been operating as an arm of the Office of the Director of National Intelligence, which oversees the NSA and all other U.S. spy efforts.

NSA Spying Is Lawless and Destructive.  Not to worry, the government's apologists offered, this is only telephone macro-metadata, meaning information about who spoke to whom, when they talked and for how long, and where they were when they talked, but not what they actually said to each other.  When Gen. Keith Alexander, the head of the NSA, stated under oath at a House hearing that his spies lack the authority to capture content, he avoided addressing whether they have the ability to do so, because he knows they do.

Four Washington Scandals That Still Matter Despite the Distractions.  [E]ver since the first Edward Snowden disclosures back in May, Obama has been on the defensive on the issue of domestic surveillance.  Often, the president's statements have turned out to be untrue or deceptive when new revelations come out.  And four months after the first ones, they continue, with effects both domestically and abroad.  In July, the House voted on an effort to defund the NSA's illegal domestic activities, the Amash Amendment.  It failed by a remarkably small margin of seven votes.

Justice Dept. watchdog never probed judges' NSA concerns.  The Justice Department's internal ethics watchdog says it never investigated repeated complaints by federal judges that the government had misled them about the NSA's secret surveillance of Americans' phone calls and Internet communications.  Two judges on the court that oversees the spying programs separately rebuked federal officials in top-secret court orders for misrepresenting how the NSA was harvesting and analyzing communication records.

Phone companies remain silent over legality of NSA data collection.  America's top telecommunications companies are refusing to say whether they accept that the bulk collection of their customers' phone records by the National Security Agency is lawful.  The phone companies are continuing to guard their silence over the controversial gathering of metadata by the NSA, despite the increasingly open approach by those at the center of the bulk surveillance programme.  On Tuesday [9/17/2013] the secretive foreign intelligence surveillance (Fisa) court declassified its legal reasoning for approving the NSA telephone metadata program periodically over the past six years.

IRS spied on tea party after granting tax-exempt status.  Republicans investigating the IRS targeting scandal said Wednesday [9/18/2013] that the agency continued to conduct secret surveillance on tea party groups even after approving them for tax-exempt status.  Acting Commissioner Danny Werfel said he shut down the monitoring program after he found out about it, and said he has halted all audits of tax-exempt organizations based on political activity as he tries to get a handle on the embattled agency.

The Editor says...
Foot-dragging and extra scrutiny for one group, while giving another group speedy service and sure approval, is one thing.  Spying on people is an entirely different matter.  It's bad enough that the IRS is being used as a weapon for political purposes, but now it appears it is just another domestic surveillance agency — motivated by left-wing politics, and lacking the usual "national security" candy coating.

Is there a con man in the Oval Office?  The media headlines should be about the NSA scandal aimed at violating the civil rights and invading the privacy of every American citizen.  But with Syria hogging the media spotlight, we have all forgotten that Obama listens to every phone call, watches every email.  Big Brother rules our lives.  Obama has turned out to be worse than Bush when it comes to civil liberties, but with Syria in the headlines, we don't hear a word about the NSA scandal anymore.

NSA Needs To Give Its Rank-and-File New Talking Points Defending Surveillance.  It would appear that the NSA's latest PR trick is to get out beyond the top brass — James Clapper, Keith Alexander, Michael Hayden and Robert Litt haven't exactly been doing the NSA any favors on the PR front lately — and get some commentary from "the rank and file."  ZDNet apparently agreed to publish a piece from NSA mathemetician/cryptanalyst Roger Barkan in which he defends the NSA using a bunch of already debunked talking points.

Senators Wyden & Udall Ask...
If The NSA Is So Confused About Its Own Capabilities, Why Do We Trust Them With All That Data?  As you may remember, one of the points made by the NSA in its defense was that its surveillance systems were so complex that no one person actually understood them all.  That leads to a rather obvious question... If the NSA can't even keep track of how its systems work, how can we trust them to know that the system isn't being abused (or that it's accurately doing what the NSA claims)[?]

FISA Court Pretends Every Member Of Congress Was Told Details Of Bulk Surveillance, Even Though They Weren't.  Part of the FISC's explanation is that Congress explicitly approved this type of activity.  The FISC notes that Congress reauthorized this program in 2011, even knowing specifically that it was used to justify bulk metadata collection on all phone calls.  The FISC points out that while national security programs may have details kept secret from Congress, that wasn't the case here.

The NSA Is Also Grabbing Millions Of Credit Card Records.  In addition to everything else it's collecting, the NSA also has millions of international credit card transactions stashed away in its databases, according to documents viewed by Spiegel.

NSA Spies on International Payments.  The United States' NSA intelligence agency is interested in international payments processed by companies including Visa, SPIEGEL has learned.  It has even set up its own financial database to track money flows through a "tailored access operations" division.

MN State Rep Joins 17 Others In Suing State For Illegally Accessing Drivers License Data.  You know you've gone too far in abusing access to the public's data when you've got a local politician doing something more than yelling about it on the campaign trail.  Earlier this year, a report by state auditors discovered that more than half of Minnesota's 11,000 law enforcement agents had misused the Driver and Vehicle Services (DVS) database.

Freedom of the Press is now an Entitlement?  Diane Feinstein and a few other well meaning Senators are in the process of defining who qualifies for 1st Amendment rights, or privileges as she put it, as the Senate Judiciary Committee attempts to iron out a "shield law for reporters or journalists" from having to divulge their sources.  This rush for an immediate fix regarding the press has nothing to do with a recent scandal in which the NSA ran rough shod over individual rights or private records and which the Justice Department claimed to have no knowledge; no there's no connection, move along.

E-ZPasses Get Read All Over New York — Not Just At Toll Booths.  After spotting a police car with two huge boxes on its trunk — that turned out to be license-plate-reading cameras — a man in New Jersey became obsessed with the loss of privacy for vehicles on American roads.  The man, who goes by the Internet handle "Puking Monkey," did an analysis of the many ways his car could be tracked and stumbled upon something rather interesting:  his E-ZPass, which he obtained for the purpose of paying tolls, was being used to track his car in unexpected places, far away from any toll booths.

How NSA's cyber sabotage puts us all at risk.  [J]ust last week, the New York Times, Guardian and ProPublica revealed that the National Security Agency has leveraged its "cooperative relationships with specific industry partners" to insert vulnerabilities into Internet security products.

You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements.  A little noticed surveillance technology, designed to track the movements of every passing driver, is fast proliferating on America's streets.  Automatic license plate readers, mounted on police cars or on objects like road signs and bridges, use small, high-speed cameras to photograph thousands of plates per minute.  The information captured by the readers — including the license plate number, and the date, time, and location of every scan — is being collected and sometimes pooled into regional sharing systems.

NSA Leak Leaves Crypto-Math Intact but Highlights Known Workarounds.  When a New York Times report appeared Thursday [9/5/2013] saying the National Security Agency had "circumvented or cracked much of the encryption" protecting online transactions, computer security professionals braced for news of breakthroughs undermining the fundamentals of their field.  However, cryptography experts tell MIT Technology Review that a close reading of last week's report suggests the NSA has not broken the underlying mathematical operations that are used to cloak online banking or e-mail.

Texas law gets tough on public, private drone use.  More than 40 state legislatures have debated the increasing presence of unmanned aircraft in civilian airspace, with most of the proposals focused on protecting people from overly intrusive surveillance by law enforcement.

More about cops and drones.

NSA surveillance program almost shut down by judge in 2009.  A federal judge who oversaw a secret U.S. spy court almost shut down the government's domestic surveillance program designed to fight terrorism after he "lost confidence" in officials' ability to operate it, documents released Tuesday show.  U.S. District Judge Reggie Walton issued a blistering opinion in March 2009 after discovering government officials had been accessing domestic phone records for nearly three years without "reasonable, articulate suspicion" that they were connected to terrorism.

Declassified court documents highlight NSA violations.  The National Security Agency for almost three years searched a massive database of Americans' phone call records attempting to identify potential terrorists in violation of court-approved privacy rules, and the problem went unfixed because no one at the agency had a full technical understanding of how its system worked, according to new documents and senior government officials.  Moreover, it was Justice Department officials who discovered the problem and reported it to the court that oversees surveillance programs, the documents show, undermining assertions by the NSA that self-reporting is part of its culture.

Five Revelations From New NSA Documents.  Ever since Edward Snowden hit the front pages in early June with his leaks to the U.K.'s Guardian newspaper and other media outlets, it's been known that the National Security Agency had a huge surveillance program collecting data about nearly every American's phone calls.  And officials have conceded that the operation of that program wasn't always perfect.  Documents released Tuesday [9/10/2013] fill in some of the blanks.

The NSA Machine: Too Big for Anyone to Understand.  The National Security Agency set it in motion in 2006 and the vast network of supercomputers, switches and wiretaps began gathering Americans' phone and Internet records by the millions, looking for signs of terrorism.  But every day, NSA analysts snooped on more American phone records than they were allowed to.

Johns Hopkins University Falls Victim to the NSA Chilling Effect.  What does a DIY t-shirt with a dumb joke on it have in common with a thoughtful article written by a noted researcher at Johns Hopkins University?  Both were pulled offline out of fear that they crossed the government's hazy lines demarcating acceptable behavior.  The researcher's name is Matthew Green. [...] The news outlet asked Green to speculate on how and if the NSA might be able to decrypt network data.  The ensuing reports, Green writes, indicate that "the worst possible hypothetical I discussed appear to be true."

A Few Thoughts on Cryptographic Engineering.  If you haven't read the ProPublica/NYT or Guardian stories, you probably should.  The TL;DR is that the NSA has been doing some very bad things.  At a combined cost of $250 million per year, they include:
  1.  Tampering with national standards (NIST is specifically mentioned) to promote weak, or otherwise vulnerable cryptography.
  2.  Influencing standards committees to weaken protocols.
  3.  Working with hardware and software vendors to weaken encryption and random number generators.
  4.  Attacking the encryption used by 'the next generation of 4G phones'.
  5.  Obtaining cleartext access to 'a major internet peer-to-peer voice and text communications system' (Skype?)
  6.  Identifying and cracking vulnerable keys.
  7.  Establishing a Human Intelligence division to infiltrate the global telecommunications industry.
  8.  And worst of all (to me):  somehow decrypting SSL connections.

The NSA Is Breaking Most Encryption on the Internet.  The new Snowden revelations are explosive.  Basically, the NSA is able to decrypt most of the Internet.  They're doing it primarily by cheating, not by mathematics. [...] Remember this:  The math is good, but math has no agency.  Code has agency, and the code has been subverted.

iSpy: How the NSA Accesses Smartphone Data.  The US intelligence agency NSA has been taking advantage of the smartphone boom.  It has developed the ability to hack into iPhones, android devices and even the BlackBerry, previously believed to be particularly secure.

Internet experts want security revamp after NSA revelations.  Internet security experts are calling for a campaign to rewrite Web security in the wake of disclosures that the U.S. National Security Agency has developed the capability to break encryption protecting millions of sites.

Obama administration had restrictions on NSA reversed in 2011.  The Obama administration secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agency's use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans' communications in its massive databases, according to interviews with government officials and recently declassified material.

Surveillance and Arrogance.  President Obama has said that he welcomes a debate over the proper place of surveillance in a digital society.  Perhaps such a debate would be fruitful and informative, and both sides would contribute toward some kind of mutually acceptable compromise.  The president has also claimed, essentially, that the government should be able to decide unilaterally what information is available to facilitate that debate.  When someone like Edward Snowden makes information available independently, the administration has argued, we are all less safe.  Those two arguments seem contradictory, since for a debate to be meaningful, everyone needs to be able to adduce evidence.

Patriot Act author says NSA's bulk data collection is "unbounded in its scope".  In one of the most prominent legal challenges to government intelligence gathering since the Edward Snowden disclosures, the American Civil Liberties Union (ACLU) has filed a lawsuit against four top Obama Administration officials.  The case, known as ACLU v. Clapper, asks a federal judge to declare the entire metadata sharing program unlawful, halt it, and purge all related records.

US won't let Microsoft, Google reveal more data on FISA orders.  Microsoft and Google have not been able to convince the Department of Justice (DOJ) to let the tech companies reveal how many Foreign Intelligence Surveillance Act (FISA) orders they must comply with.

Is the collection of metadata really as harmless as Big Brother claims?
In ACLU lawsuit, scientist demolishes NSA's "It's just metadata" excuse.  Unlike the actual contents of calls and e-mails, the metadata about those calls often can't be hidden.  And it can be incredibly revealing — sometimes moreso than the actual content.  Knowing who you're calling reveals information that isn't supposed to be public.  Inspectors general at nearly every federal agency, including the NSA, "have hotlines through which misconduct, waste, and fraud can be reported."  Hotlines exist for people who suffer from addictions to alcohol, drugs, or gambling; for victims of rape and domestic violence; and for people considering suicide.  Text messages can measure donations to churches, to Planned Parenthood, or to a particular political candidate.  [Professor Edward] Felten points out what should be obvious to those arguing "it's just metadata" — the mostimportant piece of information in these situations is the recipient of the call.

Google argues for right to continue scanning Gmail.  Google's attorneys say their long-running practice of electronically scanning the contents of people's Gmail accounts to help sell ads is legal, and have asked a federal judge to dismiss a lawsuit that seeks to stop the practice.

NSA and GCHQ unlock privacy and security on the internet.  The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic — "the use of ubiquitous encryption across the internet".  Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and — the most closely guarded secret of all — collaboration with technology companies and internet service providers themselves.  Through these covert partnerships, the agencies have inserted secret vulnerabilities — known as backdoors or trapdoors — into commercial encryption software.

N.S.A. Foils Much Internet Encryption.  The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.  Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way.  The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, [...]

The Editor says...
You might as well concede and stipulate that the NSA can crack your encrypted email messages, unless you are using an encryption scheme of your own design — and even then, in almost every case, because your computer is no match for theirs.  In order to exchange encrypted email with someone else, you must use a well-known off-the-shelf method of encryption like PGP.  (Otherwise you would have to distribute your proprietary home-brewed encryption system to all your correspondents.)  Eventually, the government will crack your password, if they think it's worth the trouble to discover the contents of your messages, so the encryption only delays the inevitable.  If that delay amounts to several years, it might be long enough to justify the use of encryption.

The only thing that would keep the government from reading everybody's email would be the universal encryption of all email messages, no matter how routine, and an option in every email program (application) to send out encrypted dummy messages (containing strings of random numbers and letters), to some dead-end destination, every day.  Even that wouldn't last long, because encryption would then be outlawed, and the most stubborn and persistent users of encrypted email would get a visit from the local SWAT team, a show trial, and a prison sentence.

NRA Signs On to ACLU Lawsuit, Claims NSA Starting 'National Gun Registry'.  The National Rifle Association (NRA) joined the American Civil Liberties Union's (ACLU) lawsuit against the National Security Agency (NSA) Wednesday, claiming the federal agency's "database of phone numbers amounts to 'a national gun registry.'"  According to The Hill, the NSA "acknowledged that it collects records on virtually all U.S. phone calls."  The NRA and ACLU see tyranny in this.

Fears of gun registry prompt NRA to back lawsuit against surveillance.  The National Rifle Association said on Wednesday [9/4/2013] it supports a lawsuit brought by civil rights groups to strike down the U.S. government's broad telephone surveillance program, citing potential violations of gun owners' privacy rights.

Obama defends NSA's surveillance.  President Obama on Wednesday defended the National Security Agency's surveillance at home, responding to a question from a reporter in Sweden, where the public has voiced concerns about the program.  "I can give assurances to the publics in Europe and around the world that we're not going around snooping at people's e-mails or listening to their phone calls," he said at a press conference in Stockholm.

The Editor says...
That would be easier to believe if Mr. Obama had a reputation as an honest man, which he does not.  And once again, there is no way to verify such a statement because it involves a secret(ive) government agency. You and I would never get inside the NSA building (maybe not even the parking lot), and probing for evidence to support Mr. Obama's rash pronouncement would lead to nothing but trouble.

Judge undoes key ruling on expanded surveillance.  A federal judge in a Chicago terrorism case has undone a key ruling where she found the government need not divulge whether its investigation relied on expanded phone and Internet surveillance programs — opening the sensitive issue back up to debate.

Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.'s.  For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans' phone calls — parallel to but covering a far longer time than the National Security Agency's hotly disputed collection of phone call logs. [...] Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy.

Nowhere to run, nowhere to hide.  Hacked off at the South Carolina Department of Revenue?  You should be.  The DOR's stunning incompetence allowed our financial records — and Social Security numbers — to be stolen in the murky cyber realm last year.  Creeped out by the National Security Agency?  You should be.  The NSA's "counter-terror" pretense grabs huge volumes of personal email and phone records.  What's worse?  The clueless DOR's failure to protect tax data or the overzealous NSA's mission to invade privacy?

Clapper to Publish Numbers of Secret Spying Orders.  The nation's top intelligence official said Thursday [8/29/2013] that he'll now release figures every year on how many new top secret court orders and national security letters are issued and how many people are targeted because of them.

The Editor says...
Who is going to verify General Clapper's figures?

The Staggering Power of NSA Systems Administrators.  If NBC's reporting is accurate, Alexander's assurance that "we can audit the actions of our people 100 percent, and we do that," is a lie.  To be more precise:  We've long known that the NSA doesn't audit all its employees 100 percent, since what Edward Snowden took is still unknown.  NBC suggests that the NSA isn't even capable of fully auditing systems administrators.

Maybe I Do Have Something to Hide.  Were the representatives of the American colonies at the First Continental Congress wrong to meet in secret to discuss a response to the Intolerable Acts?  Should they have allowed representatives of the British government to attend the meetings, take notes, and collect the names and correspondence of all those in attendance?  After all, "One who hasn't done anything wrong has nothing to hide."

NSA paid millions to cover Prism compliance costs for tech companies.  The National Security Agency paid millions of dollars to cover the costs of major internet companies involved in the Prism surveillance program after a court ruled that some of the agency's activities were unconstitutional, according to top-secret material passed to the Guardian.

NSA Pays for Data.  Google Among Those Reimbursed for Data Info The National Security Agency has paid millions of dollars to reimburse technology firms for complying with requests for user data, according to documents from former NSA contractor Edward Snowden shared with the Guardian newspaper.

NSA employees spied on their lovers using eavesdropping programme.  The employees even had a code name for the practice — "Love-int" — meaning the gathering of intelligence on their partners.  Dianne Feinstein, a senator who chairs the Senate intelligence committee, said the NSA told her committee about a set of "isolated cases" that have occurred about once a year for the last 10 years.  The spying was not within the US, and was carried out when one of the lovers was abroad.  One employee was disciplined for using the NSA's resources to track a former spouse, the Associated Press said.

NSA analysts knowingly broke surveillance rules.  The National Security Agency acknowledged Friday that some of its analysts knowingly violated the agency's rules, after the incidents were included in an inspector general report.  "Over the past decade, very rare instances of willful violations of NSA's authorities have been found, but none under FISA or the Patriot Act," the NSA said in a statement.

NSA Staffers Have Spied on Lovers.  National Security Agency officers on several occasions have channeled their agency's enormous eavesdropping power to spy on love interests, U.S. officials said.  The practice isn't frequent — one official estimated a handful of cases in the last decade — but it's common enough to garner its own spycraft label:  LOVEINT.

NSA Analysts Knowingly Broke Rules.  The National Security Agency acknowledged Friday that some of its analysts knowingly violated the agency's rules, after the incidents were included in an inspector general report.  "Over the past decade, very rare instances of willful violations of NSA's authorities have been found, but none under FISA or the Patriot Act," the NSA said in a statement.

Is America Inching Toward a Police State?  [In his new book, John W. Whitehead] talks about the often criticized "fusion centers" — data collection agencies created after the terrorist attacks of Sept. 11 that fall under DHS supervision.  These centers, with help from the NSA, monitor everything from web searches to text messages, emails, and phone calls.  This data is then passed on to government agencies like the CIA and the FBI.  As of 2009, the government has admitted to having at least 72 fusion centers.  Shortly following the creation of fusion centers, their focus shifted from this exclusive interest in the dissemination of terrorism-related intelligence to one of "all hazards" to the public — a broad term used to describe virtually anything that may be deemed a threat to the public.

NSA Critics, Right All Along.  Barton Gellman's explosive story in last Thursday's Washington Post revealed an unnerving audit of the National Security Agency that showed, among other things, that the federal government "broke privacy rules thousands of times per year" in conducting extensive and "unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order."  Thus was put convincingly to bed the now-obselete notion that the NSA's claim on the privacy of the righteous was merely declaratory.

NSA collected thousands of US communications.  One of the documents that intelligence officials released Wednesday came because a court ordered the National Security Agency to do so.

Secret Court Rebuked N.S.A. on Surveillance.  A federal judge sharply rebuked the National Security Agency in 2011 for repeatedly misleading the court that oversees its surveillance on domestic soil, including a program that is collecting tens of thousands of domestic e-mails and other Internet communications of Americans each year, according to a secret ruling made public on Wednesday [8/21/2013].

FISA Court: An NSA email program that went on for years found unconstitutional.  I will ask the question again; if there is oversight, who has been disciplined for this outrageous breach of American liberties?  Who's been fired?  Who's been suspended?  Did anyone even get a sternly worded letter placed in their permanent file?  The simple reason the NSA pulls this [nonsense] is that they can get away with it.

EPA critic to NSA: Hey, want to share?  A conservative gadfly who has made a crusade of uncovering embarrassing emails at the Environmental Protection Agency wants to tap a new potential evidence trove: the National Security Agency's electronic snooping program.  Attorney Chris Horner has filed a Freedom of Information Act request, asking the NSA to turn over any information it might have gleaned from former EPA Administrator Lisa Jackson's personal Verizon email account.

What You Need to Know on New Details of NSA Spying.  Although the system is focused on collecting foreign communications, it includes content of Americans' emails and other electronic communications, as well as "metadata," which involves information such as the "to" or "from" lines of emails, or the IP addresses people are using.  At key points along the U.S. Internet infrastructure, the NSA has worked with telecommunications providers to install equipment that copies, scans and filters large amounts of the traffic that passes through.

NSA collected 56,000 emails that had nothing to do with terror.  The nation's top intelligence official is declassifying three secret U.S. court opinions that reveal yet more details about how the National Security Agency has spied on Americans, it was announced on Wednesday [8/21/2013].  The shocking documents show how the NSA inadvertently scooped up as many as 56,000 emails annually over three years, even though they were written by people with no connection to terrorism.

Obama Asks SCOTUS for Warrantless Cellphone Searches.  Last week, the Obama administration asked the Supreme Court to rule that the Fourth Amendment allows for warrant-less cell phone searches.  The administration filed a petition asking the SCOTUS to hear a 2007 case in which information was retrieved from a cell phone that was used to obtain evidence against the defendant.

Scandals costing us American exceptionalism.  Meanwhile, new revelations of NSA lawbreaking have come out.  As the Washington Post reported, the NSA violated privacy rules thousands of times per year.  It appears that despite assurances that there was no domestic spying program, the NSA was, in fact, hoovering up vast numbers of phone calls, emails, etc. in order to spy on Americans.  (New White House talking point:  Hey, it's not a domestic spying program, it's just a program that does a lot of domestic spying!)

Report: NSA Can Review 75 percent of US Domestic Web Traffic.  More details on "filtering" capabilities and processes.  Note well the bits about content interception and data storage.

New Details Show Broader NSA Surveillance Reach.  The National Security Agency — which possesses only limited legal authority to spy on U.S. citizens — has built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say. [...] In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

Time for Answers from the NSA.  The Washington Post opened a can of worms last Friday when it reported that, in 2012, an internal NSA audit found that the agency had violated privacy rules 2,776 times within just one year.  The audit counted only violations at NSA's Washington facilities — nearly 20 other NSA facilities were not included.

Next Up: Privacy Moms.  As for the National Security Agency, I suspect it is probably gathering huge amounts of data and doing very little useful work with it.  See Mark Steyn's "Idiot Big Brother."  But we've learned from the IRS scandals that bureaucrats sitting around with nothing to do can easily be conscripted into harassing and spying on the administration's opponents, particularly if the opponents are Republicans.  So let's junk the NSA.  Next time we need an NSA we'll get the Big Data boys from Silicon Valley to mash up something overnight, just like they did for the Obama campaign.

The NSA leaks ended the power of Obama officials to ration access.  No self-respecting journalist believes what they say.
The White House credibility deficit.  In his address about Egypt's military coup — or whatever bowdlerizing euphemism is permitted this week in Washington — Obama condemned the notion that "security trumps individual freedom."  Really?  After his press conference announcing an oversight commission for the NSA, it emerged that the NSA's truth-challenged director of national intelligence, James Clapper, would apparently oversee the oversight.  The White House had to explain the joke, and then said Clapper would merely facilitate. [...] That is the punchline of the Snowden affair:  when we can't trust what government tells us, we come to trust those whom government doesn't trust.  Thus, we no longer necessarily care what the official line is and who delivers it.

What We Lose if We Give Up Privacy.  They log your calls here, they can listen in, they can read your emails.  They keep the data in mammoth machines that contain a huge collection of information about you and yours.  This of course is in pursuit of a laudable goal, security in the age of terror.  Is it excessive?  It certainly appears to be.  Does that matter?  Yes.  Among other reasons:  The end of the expectation that citizens' communications are and will remain private will probably change us as a people, and a country.

Dems Warn NSA Violations Just 'Tip of a Larger Iceberg'.  A pair of civil-liberties Democrats whom the White House tried to appease in a closed-door meeting warned today that fresh reports of thousands of privacy violations by the National Security Agency are just the "tip of a larger iceberg."  On Thursday [8/15/2013], the Washington Post published its report of a May 2012 audit leaked by former contractor Edward Snowden that found 2,776 violations over the previous year of executive orders and Foreign Intelligence Surveillance Act provisions governing spying on Americans or foreign targets in the U.S.  These included both computer and operator errors.

Lavabit Founder Says He Had 'Obligation' to Shut Service.  Ladar Levison was not yet 20 years old when Congress passed the Patriot Act after the Sept. 11 terror attacks.  It gave him a start-up idea:  an e-mail service for what he thought of as "a tech-savvy crowd" that cared about privacy.  "I've always sort of believed it's important for Americans to have private conversations with other Americans," Mr. Levison said in a telephone interview Monday, "and not fear that their conversations were being monitored by the government."  His start-up thrived for nearly 10 years until Thursday [8/15/2013], when he abruptly shut it down, leaving little more than an ominous note on the site.

What if the president lied to us?  With the latest major revelation about National Security Agency surveillance, there's a huge taboo question that needs to be put out on the table:  Has President Obama been deliberately lying about the NSA, or have his statements just been repeatedly "wrong"?

NSA abuses contradict Obama and congressional claims of oversight.  Since the public learned in June about sweeping National Security Agency programs, government officials from President Obama on down have insisted the nation's surveillance programs are subject to layers of oversight. [...] However, the latest revelation that the NSA violated privacy rules thousands of times, as documented in an internal report — an internal report withheld from at least one leader in Congress responsible for oversight — proves the president and several others in Washington were wrong.

Just before Snowden Leaks, Obama fired most of his intel advisers.  Remember last week's press conference, where President Obama insisted that he had already kicked off the process of a major review of the way we do intelligence and surveillance in this country — and about how he was going to set up an "outside" review group to look all this over?  The same review group that will be set up by and report to James Clapper (but, the White House assures us, not run by him)?  Right, so a few people pointed out that President Obama already has an independent group that's supposed to do that thing: called the President's Intelligence Advisory Board (PIAB).

NSA oversight overstated, overrated.  On Thursday [8/15/2013], the Washington Post's revelation of thousands upon thousands of National Security Agency violations of both the law and supposed privacy protections included this fascinating detail:  A "large number" of Americans had their telephone calls accidentally intercepted by the NSA when a top-secret order to eavesdrop on multiple phone lines for reasons of national security confused the international code for Egypt (20) with the area code for Washington (202).

Sen. Feinstein Threatens Press Freedom.  The NSA's indiscriminate collection of telephone metadata is of dubious utility and faces dubious oversight from the hamstrung Foreign Intelligence Surveillance Court.  Yet [Senator Dianne] Feinstein, a senior member of the judiciary committee as well, insists the agency does nothing illegal.  They have nothing to hide, so please stop asking what they are hiding.  Now, after taking shots at the Second, Fourth, and Fifth Amendments, she has set her sights on the First.

New NSA Revelations Stir Congressional Concern.  New revelations from leaker Edward Snowden that the National Security Agency has overstepped its authority thousands of times since 2008 are stirring renewed calls on Capitol Hill for serious changes to NSA spy programs, undermining White House hopes that President Barack Obama had quieted the controversy with his assurances of oversight.

What is really going on at the NSA?  The [Washington] Post reported, "The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents." [...] [B]ut the hysteria is disproportionate to what we know.  That is the NSA's fault because it has tried to get by with generalities and platitudes.  However, an internal audit is a sign that there were efforts to reduce or eliminate the error rate.

Court: Ability to police U.S. spying program limited.  The leader of the secret court that is supposed to provide critical oversight of the government's vast spying programs said that its ability to do so is limited and that it must trust the government to report when it improperly spies on Americans.  The chief judge of the Foreign Intelligence Surveillance Court said the court lacks the tools to independently verify how often the government's surveillance breaks the court's rules that aim to protect Americans' privacy.

WH Tried to Interfere with WaPo's NSA StoryThe Washington Post's article detailing the fourth amendment abuses by the NSA got some push back from the administration who attempted to "edit" the article before publication.  The internal audit referenced in the article was obtained by the WaPo from Edward Snowden.  The details of the audit indicated repeated and growing privacy violations by the NSA, violations which included obtaining thousands of American citizen's communications records and using methods of information collection that were later deemed unconstitutional by a court.

Senate to hold hearings on NSA privacy violations.  The Senate's most senior lawmaker said Friday that the intelligence community is still not being truthful about its snooping activities and how they may be picking up communications from Americans, and vowed to hold hearings when Congress returns from its summer vacation.  "The American people rely on the intelligence community to provide forthright and complete information so that Congress and the courts can properly conduct oversight," Sen. Patrick J. Leahy, Vermont Democrat, said.  "I remain concerned that we are still not getting straightforward answers from the NSA."

Lawbreaking at the NSA: Bring On a New Church Committee.  Under cover of secrecy, government agents will commit abuses with impunity for years on end, and only intrusive Congressional snooping can stop them.  Why is another Church Committee needed now?  For more than a decade, the NSA has repeatedly engaged in activity that violated the law and the Constitutional rights of many thousands or perhaps millions of Americans.

With Tens of Millions of Phone Records Grabbed — It's the Government, Stupid.  We're all James Rosens, now.  The National Security Administration (NSA) has been forcing Verizon to turn over phone record data on millions of Americans.  Will the federal government use this unbelievably massive data grab against the American people they are supposed to serve — but instead increasingly lord over?

Latest Big Government Data Grab: Justice Sues to Get It Without Warrant.  [A] Secret lawsuit in Manhattan filed last month asks judge to force Google to cough up user data without a search warrant.  A different court has already ruled that the process is unconstitutional.  When the Obama Administration wants information on We the Peasants, they keep kicking down doors until they get it.

Obama faces Dem backlash over latest NSA revelations.  The Obama administration faced a backlash from congressional Democrats on Friday [8/16/2013] following revelations that the National Security Agency broke privacy rules and overstepped its authority thousands of times since 2008.

Yes, the NSA Violated Surveillance Privacy Rules — at Least 2,776 Times.  We may now also know a little more detail about the one incident where the Foreign Intelligence Surveillance Court discovered the NSA violating the rules.  The Electronic Frontier Foundation has sued to get this information, which is scheduled to be released next week.

The NSA is Commandeering the Internet.  It turns out that the NSA's domestic and world-wide surveillance apparatus is even more extensive than we thought.  Bluntly:  The government has commandeered the Internet.  Most of the largest Internet companies provide information to the NSA, betraying their users.  Some, as we've learned, fight and lose.  Others cooperate, either out of patriotism or because they believe it's easier that way.  I have one message to the executives of those companies:  fight.

Report: NSA spying broke privacy rules many times.  The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, The Washington Post reported Thursday [8/15/2013].

NSA broke privacy rules thousands of times per year, audit finds.  Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order.  They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls.

Insider's View Of The Administration's Response To NSA Surveillance Leaks.  [General] Hayden's remark goes to the heart of what I continue to find most offensive about the Administration's handling of the NSA surveillance programs, which is their repeated insinuation that anyone who raises concerns about national security programs doesn't care about national security.

How the president uses language as a cover for the abuse of power.  On Aug. 9, with his approval rating at a near all-time low of 41 percent, facing sharp scrutiny over the National Security Agency's dragnet data-collection plan, Obama held a press conference where he insisted:  "I want to make clear once again that America is not interested in spying on ordinary people."  At the same time, Obama's Justice Department released a white paper defending the proposition that the PATRIOT Act allowed the covert collection of all Americans' phone records for a period of seven years because, under the language of Section 215, they're "relevant to an authorized investigation" of international terrorism.

The Debate Obama Never Wanted.  Edward Snowden has put words in President Obama's mouth.  Words like transparency, reform, openness, and debate.  This is not necessarily cause for celebration or condemnation.  It is, however, a fact.  That the White House refuses to acknowledge this is testament to the policy-altering effect of Snowden's leaks of classified documents about the National Security Agency's wide-ranging Internet and phone surveillance programs.

Obama privately derides controversy over NSA surveillance.  President Barack Obama privately derided the controversy over the blockbuster June 6 revelation of the National Security Agency's far-reaching capabilities as "noise rather than something that's real and meaningful," said Education Secretary Arne Duncan.  Duncan revealed Obama's dismissive attitude to the dramatic claims by a former defense contractor, Edward Snowden, in a Washington Post report on a White House program to increase Internet use in schools.

The Lies Aren't What Makes Obama's NSA Stance So Awful.  President Obama's repeated comments that "there is no spying on Americans" and that "we don't have a domestic spying program," as he told Jay Leno, were contradicted by two revelations at the end of last week.  On Thursday, the New York Times reported that the NSA is "searching the contents of vast amounts of Americans' e-mail and text communications into and out of the country," looking not only for Americans who communicate with foreigners under surveillance but also for those who mention information about them.

Former Ron Wyden aide challenges Obama's surveillance claims.  A former senior aide to Sen. Ron Wyden, D-Ore,. in a searingly critical essay has called out the Obama administration and the president himself for saying Friday that he welcomed a public debate on the government's surveillance programs and the privacy concerns they provoke.

Senate intelligence panel could seek to declassify documents; it just doesn't.  Outspoken members of the Senate Intelligence Committee have said frequently that they wanted to warn the public about the National Security Agency's sweeping collection of telephone records but the program's highly classified nature prevented them from making public reference to the programs.  That, however, is not the full story.  Buried in the pages of Senate Resolution 400, which established the Senate Select Committee on Intelligence in 1976, is a provision that allows them to try.  Across those nearly 40 years, it's never been used.

Double talk from the spymasters.  Since Mr. Snowden's June 6 revelations about massive NSA spying, we have learned that all Americans who communicate via telephone or the Internet (and who doesn't?) have had all of their communications swept up by the federal government for two-plus years.  The government initially claimed that the NSA has gathered only telephone numbers and billing data.  Now we know that the NSA has captured and stored the content of trillions of telephone conversations, texts and emails, and can access that content at the press of a few computer keys.

What NSA reforms?  President Obama's message about the government's massive electronic surveillance programs came through loud and clear:  Get over it.  The president used more soothing words in his pre-vacation news conference Friday, but that was the gist.  With perhaps the application of a fig leaf here and a sheen of legalistic mumbo jumbo there, the snooping will continue.

Classic Obama charade: Appoint a crony to investigate himself.  James Clapper, Obama's Director of National Intelligence, will digest his groups' findings on what national intelligence has been doing under James Clapper and James Clapper will report them to his boss Obama, who's already said publicly there are no abuses.  We're going way out on a mid-summer limb today to predict that Clapper will absolve Clapper and his community of any abuses and Obama will agree.  Completely.  Probably sometime during the holiday season when, like now, fewer people are paying attention.

The NSA-DEA police state tango.  In the latest post-Snowden bombshell about the extent and consequences of government spying, we learned from Reuters reporters this week that a secret branch of the DEA called the Special Operations Division — so secret that nearly everything about it is classified, including the size of its budget and the location of its office — has been using the immense pools of data collected by the NSA, CIA, FBI and other intelligence agencies to go after American citizens for ordinary drug crimes.  Law enforcement agencies, meanwhile, have been coached to conceal the existence of the program and the source of the information by creating what's called a "parallel construction," a fake or misleading trail of evidence.  So no one in the court system — not the defendant or the defense attorney, not even the prosecutor or the judge — can ever trace the case back to its true origins.

Double talk from the spymasters.  The government initially claimed that the NSA has gathered only telephone numbers and billing data.  Now we know that the NSA has captured and stored the content of trillions of telephone conversations, texts and emails, and can access that content at the press of a few computer keys.  All of this happened in the dark, with the permission of President Obama, with the knowledge and consent of fewer than 20 members of Congress who were forbidden from doing anything about it by the laws they themselves had written, and based on secret legal arguments accepted by a secret court that keeps its records secret even from the judges who sit on the court.

NSA snooping far more intense than previously thought.  As each revelation about NSA snooping is published, you have to wonder where the bottom is on this scandal.  In truth, we're nowhere near it yet.  The New York Times is reporting that the NSA is vacuuming up huge amounts of data collected from Americans who send emails overseas and Americans overseas who send emails back home.  No warrant, of course, and that 2008 FISA "reform" statute, where the NSA says they get the authority, is looking worse all the time.

Obama doesn't understand distrust of government surveillance, but vows to address it.  Before taking another week off on Martha's Vineyard, President Obama held a news conference, announcing preemptive moves to restore public trust shattered by the recent stream of revelations about broad government surveillance of civil society and its myriad communications.  Obama again assured the country there were ample checks in place to prevent official abuse, but said the sensational manner in which these classified secrets have leaked out piece by piece has unnecessarily raised fears and caused many to ask questions.

Barack Obama pledges greater surveillance transparency.  President Barack Obama has promised "appropriate reforms" to guarantee greater oversight of controversial US surveillance programmes.  At a White House news conference, he proposed "safeguards against abuse", including amending legislation on the collection of telephone data.  Mr Obama also urged appointing a lawyer to challenge the government at the nation's secretive surveillance court.  He has been defending the programmes since they were leaked in June.

Documents shed light on U.S. surveillance programs.  The Obama administration released two documents on Friday describing the scope of National Security Agency data collection programs, a bid to quiet criticism they violate privacy rights.  An NSA memorandum describes the beginnings of the agency's collection of so-called telephone metadata of nearly every American under a provision of the Patriot Act, and the agency's monitoring of foreign Internet traffic.

The Mother of All Scandals.  No one knows much about the NSA mess.  But already there are some disturbing developments.  How can Director of National Intelligence James Clapper outright lie under oath without consequences after he assured the Congress that the agency did not monitor the communications of American citizens?  After the president's press conference last week, an embarrassing paradox arose:  the president promised all sorts of new NSA reforms.  But why now, and for what reason the sudden worry?

Obama's Bill Clinton Moment: 'We Don't Have a Domestic Spying Program'.  Like Clinton's famous sidestep [...] this is clever.  It's not false if you use the words in a certain way and only in that way:  If spying is narrowly construed to mean, say, warrantless wiretaps on Americans, then it's apparently true that there's no domestic spying program.  But it's also not really true, and it suggests a sort of smirking contempt on the president's part for his interlocutors, and citizens.

Put On a Smiley Face.  Nidal Hasan — the Fort Hood mass murderer now on trial — began his court martial defense with the statement that the evidence will show he is guilty.  What the evidence will also show, by omission, is how our government institutions ignored the sort of evidence the NSA is supposedly looking for in its global search of telephone data, emails, and other electronic communication.

Breaking Through Limits on Spying.  It was bad enough in 2008 when Congress allowed the agency to spy without a warrant on e-mails and text messages between Americans and foreign targets of an investigation.  That already strained the Fourth Amendment's protections against illegal searches, but lawmakers decided it was justified as part of a terror investigation.  It turns out, as Charlie Savage revealed in The [New York] Times on Thursday [8/8/2013], that the N.S.A. went far beyond those boundaries.  Instead, it copies virtually all overseas messages that Americans send or receive, then scans them to see if they contain any references to people or subjects the agency thinks might have a link to terrorists.

Local cops operate in collusion with Big Brother:
NSA tips off law enforcement, asks them to keep the practice secret.  Just days after the NYT wrote about the NSA denying other federal intelligence agencies access to their surveillance tools comes the disclosure that a US Drug Enforcement Administration unit called Special Operations Division (SOD) has been channeling information collected by the NSA to law enforcement agencies in order to help them start investigations of suspected criminals.  The SOD, whose existence is little known to the greater public, is a sort of middleman that receives information regarding traditional criminal activities and suspected perpetrators gathered by the NSA via wiretaps, informants, intelligence intercepts, and decides how much of it to share with which field offices and agents.

NEW Spying Scandal — Is This One the Last Straw?  The NSA is spying on you and sharing this information with the DEA.  The DEA is then sharing this information with local law enforcement.  If you get arrested because of this, abandon all hope because [#1] Law enforcement is hiding where the evidence came from[, and #2] This means you cannot effectively challenge the evidence in court.  But it gets worse... The DEA unit responsible for this program — the ominous sounding Special Operations Division — is a secret organization.  It cannot be investigated by defense attorneys or called into court.  Even the location of the Special Operations Division is classified.

This was also filed under Abuse of power by ordinary cops.

Government Police Raise Issues on Liberty.  Earlier this year, agents from the Department of Homeland Security, presenting themselves as national "police," were deployed across the country to "monitor" Tea Party activists who were peacefully protesting the Obama administration regarding the targeting of conservative groups by the IRS.  From California to Florida, armed DHS functionaries, according to protesters in attendance, were turned out to intimidate and spy on them.  These DHS agents arrived in large Homeland Security vehicles that were emblazoned with large letters reading "police" and were dressed in "police" uniforms.  Exactly who are these DHS "police?"  They are part of the Federal Protection Service (FPS), a division of the National Protection and Programs Directorate of the DHS.

ObamaCare Poses a Massive Privacy Risk.  As far back as December 2012, Obama administration officials were insisting that the data hub at the center of the ObamaCare exchanges was nearly finished.  Yet all the while, they were pushing back deadlines or missing them altogether, to the point where, unless ObamaCare's launch is delayed, millions of people's privacy will be at risk.  Obama officials may, in fact, have flat-out lied to lawmakers about the data hub's progress.

N.S.A. Said to Search Content of Messages to and From U.S.  The National Security Agency is searching the contents of vast amounts of Americans' e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance, according to intelligence officials.  The N.S.A. is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, a practice that government officials have openly acknowledged.  It is also casting a far wider net for people who cite information linked to those foreigners, like a little used e-mail address, according to a senior intelligence official.

NYT: No spying on Americans? Au contraire.  On Tuesday, Barack Obama insisted that the US government isn't spying on Americans by surveilling the contents of their communications.  Less than two days later, the New York Times makes hash of that claim.  The NSA, reports Charlie Savage, sifts through the content of "vast amounts" of electronic communications between Americans and people abroad in their search for links to terrorism, and not just the metadata.

Obama: 'We Don't Have a Domestic Spying Program'.  President Obama tells comedian Jay Leno that "We don't have a domestic spying program."  He made the comment during a taping of Leno's TV show.  Obama also says the U.S. is not overreacting by closing some U.S. embassies for a week.  The president tells Leno, "The odds of dying in a terrorist attack are a lot lower than they are of dying in a car accident, unfortunately."

Made-up Threat Rehabilitates the Big Brother.  The U.S. State Department issued a global alert about the terrorist threat allegedly posed by Al-Qaeda in Yemen.  The USA announced the closure of its missions in the Middle East and Africa, and their example was followed by France, Britain, and Germany. However, this was only an attempt to justify the activities of the National Security Agency.

Exclusive: U.S. directs agents to cover up program used to investigate Americans.  A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Report: NSA info withheld from members of Congress.  The House Intel Committee is stonewalling Congress's efforts to access information about the National Security Agency's bulk data collection program affecting millions of Americans, the Guardian reports.  Both Virginia Republican Representative Morgan Griffith and Democratic Florida Representative Alan Grayson have tried to obtain information about the NSA's phone and Internet surveillance programs first disclosed by former NSA contractor Edward Snowden.

DEA Surveillance: Turning Citizens Into Criminals.  The government says spying on U.S. citizens is acceptable since it's merely a means of fighting foreign terrorists.  But what if the government used espionage in investigations of common criminals?  It seems that's really happening.  According to a Reuters exclusive, "A secretive U.S. Drug Enforcement Administration (DEA) unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans."

Other Agencies Clamor for Data N.S.A. Compiles.  The National Security Agency's dominant role as the nation's spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.  Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency's vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

Recovering lost freedom.  The government's ability to track 316 million Americans without a warrant rests on a flimsy premise upheld Tuesday [7/30/2013] by the 5th U.S. Circuit Court of Appeals.  The judges, intentionally or not, move us into the shadow of the total surveillance society.  Throughout history, totalitarian regimes dreamed of tracking at will the exact whereabouts of enemies of the state.  This power is now reality; police officers and bureaucrats can tap into the GPS-style location technology built into every cellphone, with no warrant required.

We're living '1984' today.  It appears that the police now have a device that can read license plates and check if a car is unregistered, uninsured or stolen.  We already know that the National Security Agency can dip into your Facebook page and Google searches.  And it seems that almost every store we go into these days wants your home phone number and ZIP code as part of any transaction.

Laws Are Not Enough.  [Scroll down]  Is there more to the story?  Does the NSA apply other barriers to abuse?  The agency hints that it does.  Responding to the report on XKeyscore, the NSA assures us that "there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse."  That's nice, but hints won't do.  None of the topics we're asking about — storage, access, justification, audits — poses any threat to national security.  Tell us exactly how you're protecting us.  We'll be the ones who decide what's enough.

FBI Taps Hacker Tactics to Spy on Suspects.  Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal wiretap into the cyber age.  Federal agencies have largely kept quiet about these capabilities, but court documents and interviews with people involved in the programs provide new details about the hacking tools, including spyware delivered to computers and phones through email or Web links — techniques more commonly associated with attacks by criminals.

Google Pressure Cookers and Backpacks, Get a Visit from the Feds.  Michele Catalano was looking for information online about pressure cookers.  Her husband, in the same time frame, was Googling backpacks.  Wednesday morning [7/31/2013], six men from a joint terrorism task force showed up at their house to see if they were terrorists.  Which prompts the question:  How'd the government know what they were Googling?

With 3 'Hops', NSA Gets Millions of Phone Records.  Exactly how many phone records of Americans does the National Security Agency collect in its massive surveillance program?

Big Transparency for the NSA.  'Big data" is one name for the insight that collecting all the information in a massive database will uncover facts that collecting only some of the information cannot.  This is not news to Gen. Keith Alexander, director of the National Security Agency.  Gen. Alexander is a zealous advocate of getting it all whenever practically and legally possible.  He sees increased agility in uncovering terrorist connections by acquiring vast databases of telephone records, including those of American citizens.

NSA training guide shows how analysts like Snowden read American email exchanges and chatroom history without a warrant.  With only thin justifications, NSA agents have been spying on Americans online without a warrant — reading emails, chats and browsing histories.  Today, The Guardian broke down the process by which NSA analysts tap internet activity by publishing a training guide used to introduce new analysts to X-Keyscore.  Described as the 'widest-ranging' database, X-Keyscore allows analysts to wiretap basically anyone.

XKeyscore: NSA tool collects 'nearly everything a user does on the internet'.  A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.  The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet.

Warrantless Cellphone Tracking Is Upheld.  In a significant victory for law enforcement, a federal appeals court on Tuesday said that government authorities could extract historical location data directly from telecommunications carriers without a search warrant.  The closely watched case, in the United States Court of Appeals for the Fifth Circuit, is the first ruling that squarely addresses the constitutionality of warrantless searches of historical location data stored by cellphone service providers.

U.S. Outlines N.S.A.'s Culling of Data for All Domestic Calls.  Senators of both parties on Wednesday sharply challenged the National Security Agency's collection of records of all domestic phone calls, even as the latest leaked N.S.A. document provided new details on the way the agency monitors Web browsing around the world.

Momentum Builds Against N.S.A. Surveillance.  Representatives Jim Sensenbrenner, Republican of Wisconsin, and Zoe Lofgren, Democrat of California, have begun work on legislation in the House Judiciary Committee to significantly rein in N.S.A. telephone surveillance.

The NSA's two new spying facilities storing your data is seven times the size of the Pentagon.  The NSA is now building a facility that will make it more than seven times the size of the Pentagon, making the secretive compounds the biggest in the country.  In addition to building a $1.9 billion data center in Utah, crews also started construction on a computing center that is expected to cost $792 million near Baltimore.

Feds tell Web firms to turn over user account passwords.  The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.  If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user.

Blinded by the war on terrorism.  "This is a great time to be a white-collar criminal."  An assistant U.S. attorney I know startled me with this remark in 2002.  The bulk of her FBI investigators, she explained, had been pulled off to work on terrorism, which left traditional crime investigations sorely understaffed.  Little has changed since then.  For more than a decade, the U.S. government has been focused on one type of threat above all others:  terrorism.  This obsession has not only been used to justify an erosion of Americans' privacy, it has opened them to other dangers and, paradoxically, made it easier for terrorists to achieve success.

White House attacks plans to curb NSA data collection.  With a key vote coming up, President Barack Obama's spokesman said curbs on the NSA would "hastily dismantle" a vital counter-terrorism tool.  NSA chief Gen Keith Alexander spent Tuesday lobbying Congressmen to vote against the proposed measure.  Critics say NSA phone data collection is an unwarranted invasion of privacy.

Your Place in the Database.  Regarding the American surveillance state, it seems that the truth comes out a little at a time.  We learned about the FBI's Carnivore in the 1990s, which the copied internet data of people whom the agency deemed "reasonably suspicious." [...] We found out about NSA domestic wiretapping from a brave AT&T whistleblower in 2006. [...] For me, the most stomach-churning signpost on our nation's road to tyranny has been the completion of the Utah Data Center.  The center holds data on the scale of yottabytes.  One yottabyte could account for 30 million gigabytes per U.S. man, woman, and child.  It's a staggering capacity.

The Dangerous ObamaCare Data Hub.  Under the guise of expanding Americans' access to healthcare, "the federal government is planning to quietly enact what could be the largest consolidation of personal data in the history of the republic," Stephen T. Parente and Paul Howard asserted in a USA Today column.  That consolidation is called the Federal Data Services Hub, and it is being assembled as part of ObamaCare's insurance exchange implementation.

Obamacare data hub a 'honey pot' for ID thieves, warn critics.  The data hub President Obama's health care team is creating to exchange personal health and financial information on Obamacare users will be a ripe target for computer hackers and identity thieves, charge critics who claim it hasn't been tested for security flaws.  "It's the greatest collection of private identification information ever assembled on Americans that will be put into one place," said Rep. Patrick Meehan, who chairs a House cybersecurity subcommittee.  "It is every bit of sensitive information one would need to know to completely take over the identification of a person," said the Pennsylvania lawmaker.

Secret U.S. Court Extends NSA Authority to Collect Phone Metadata.  A chief U.S. intelligence official affirmed Friday [7/19/2013] that the National Security Agency (NSA) has been granted authority to continue collecting phone records of millions of Verizon customers.  The verdict from the court, authorized by the U.S. Foreign Intelligence Surveillance Act (FISA), renewed the controversial data-collection campaign that has posed serious threats to Americans' right to privacy and, in turn, the U.S. Constitution.  In an action propelled by a disclosure in June of the NSA's collection of Verizon metadata, the Office of the Director of National Intelligence (ODNI) released a statement asserting that the program has been renewed.

Should 3rd Amendment prevent government spying?  If the government places a surveillance device in your home, is that sufficiently like quartering troops there to trigger Third Amendment scrutiny?  What if it installs spyware on your computer or your cable modem?  What if it requires "smart meters" that allow moment-to-moment monitoring of your thermostat settings or toilet flushes?

Obamacare's Branch of the NSA.  President Obama has had a poor record of job creation, but at least one small economic sector is doing well: community organizing.  The Department of Health and Human Services is about to hire an army of "patient navigators" to inform Americans about the subsidized insurance promised by Obamacare and assist them in enrolling.  These organizers will be guided by the new Federal Data Hub, which will give them access to reams of personal information compiled by federal agencies ranging from the IRS to the Department of Defense and the Veterans Administration.

Cops usually need warrant to get cellphone locations, NJ Supreme Court rules in Middletown case.  The state Supreme Court has ruled that police need a warrant to get cellphone location data in most cases.  With Thursday's [7/18/2013] ruling, the court overturned an appellate decision, which said that a defendant in a Middletown burglary case did not have an expectation that the location information would be private.

A Government of Voyeurs.  The news this week that governments across America have tracked and scanned tens of millions of license plates into databases shocks only in that it doesn't shock.  During the summer that we discovered PRISM, the Mail Isolation Control and Tracking program, and that the attorney general believes reporter James Rosen a "flight risk," one comes to expect as much.  Call it, in the words of the president who launched many of the surveillance state's most intrusive programs, "the soft bigotry of low expectations."  His successor who pledged to undo that overreach has instead doubled down on it.

Court Sides With Yahoo in Data Collection Case.  Yahoo has won a court fight that could help the public learn more about the government's efforts to obtain data from Internet users.

A Parody of Liberal Faith in Bureaucrats.  Rest easy, America. Before, federal bureaucrats weren't focusing on the marital status of their coworkers.  Now they've been instructed to monitor all of them constantly.

Lies and the Lying Spiers Who Tell Them.  Documents leaked by former NSA contractor Edward Snowden have consistently contradicted the bureaucratic line, forcing revisions that reliably conflict with subsequent revelations.  And these are lies, as surely as the sky is blue.  No amount of tortured rhetoric or blatant falsehood can change the fact that, on a daily basis, the NSA archives the location of every domestic person who uses a phone, or that it reads innumerable citizens' private Internet communications without intervening judicial review.  The documents that reveal this were published weeks ago, but intelligence leaders are essentially betting the public will not fully grasp them.

The NSA slide you haven't seen.  The overall heading of the slide is "FAA 702 Operations" — a reference to a 2008 law that enabled collection on U.S. soil of communications of foreigners thought to be overseas without an individual warrant from a court, including when the foreigners are communicating with someone in the United States.  The law says the collection may be for a foreign intelligence purpose, which includes terrorism, nuclear weapons proliferation or cyber-security.  The slide also shows a crude map of the undersea cable network that carries data from either side of North America and onto the rest of the world.  As a story in Sunday's Post made clear, these undersea cables are essential to worldwide data flows — and to the surveillance capabilities of the U.S. government and its allies.

The price of surveillance: Gov't pays to snoop.  How much are your private conversations worth to the government?

Security-Enhanced Android: NSA Edition.  Tech giants listed as part of the National Security Agency's Prism spying program have gone to some lengths to convince the world they aren't in bed with the U.S. government.  Google has filed a request with the U.S. Foreign Intelligence Surveillance Act court asking permission to disclose more information about the government's data requests.  So there's a certain irony that NSA programmers are now refining code that Google has approved for the company's mobile operating system, Android.

DNI Clapper Won't Resign Over Misleading Congress on NSA Surveillance.  Director of National Intelligence James Clapper has no plans to resign following disclosures to the Senate Intelligence Committee that he misled Congress on widespread National Security Agency electronic surveillance of Americans.

They're up in arms of the NSA database, but what about ObamaCare and health records?  Self-proclaimed civil libertarians are up in arms over the National Security Agency's massive database containing information about whom we call and what we do on the Web.  Defenders of the program say, "So what?"  Unless you're a terrorist, no one in the government will ever bother to access that information.  That's not good enough, say civil libertarians.

Is FISA Out of Line?  The American surveillance apparatus has come under more scrutiny than ever before in the wake of the Edward Snowden revelations.  On Saturday [7/6/2013], the New York Times expanded on this theme with a new piece arguing that the FISA courts, which review the constitutionality of the government's data collection programs, have effectively become a "parallel Supreme Court" with little oversight from the public or the rest of the legal system.

How to Change One-Party Bifurcation into a Two-Party System.  Most of us don't like being spied on — and any "spy" who reveals universal, systematic spying by a government on its citizenry is a hero to us.  Upon reflection, we don't really buy the "but government only wants to keep us safe" argument.  The chances that highly dangerous terrorists have already slipped across our southern border in large numbers are immensely greater than the chances that vital intel will be lost if NSA doesn't monitor our email.  Our security officers were warned by Russian intelligence about the Tsarnaevs and did absolutely nothing preemptive.

NSA recruitment drive goes horribly wrong.  On Tuesday, the National Security Agency called at the University of Wisconsin on a recruitment drive.  Attending the session was Madiha R Tahir, a journalist studying a language course at the university.  She asked the squirming recruiters a few uncomfortable questions about the activities of NSA:  which countries the agency considers to be "adversaries", and if being a good liar is a qualification for getting a job at the NSA.

Privacy group to petition Supreme Court to kill NSA spy program.  The Electronic Privacy Information Center said Thursday [7/4/2013] it will petition the U.S. Supreme Court to abolish the law that lets the National Security Agency collect data on Americans' telephone calls.  The Domestic Surveillance Project, an arm of the EPIC, will file the petition on Monday, Raw Story reported.  Domestic Surveillance Project Director Amie Stepanovich said, "EPIC truly believes that this Foreign Intelligence Surveillance Court exceeded its authority, is not acting in accordance with the law and needs to be overturned — and cannot be allowed to continue conducting this surveillance," Raw Story reported.

Data Mining and Elections.  The Obama administration has been collecting enormous amounts of communications and other data on Americans.  The justification which is offered (and which is being accepted on both sides of the aisle) is the need to monitor this information to protect us in the age of modern terrorism.  The most credible complaint we hear is that they're gathering data on their political opposition.  The IRS scandal gives weight to this thought.  But an overlooked motive will play a pivotal role in 2014:  this data-mining effort, in significant part, is a vehicle for getting votes.

Trust Your Government, Lose Your Liberties.  It sounded like a well-crafted conspiracy theory.  "The National Security Agency developed a pilot program in the late 1990s that would have enabled it to gather and analyze massive amounts of communications data ... The mass collection of relatively unsorted data, combined with system flaws that sources say erroneously flag people as suspect."  The excerpt above is from a Baltimore Sun article published on May 18, 2006.  Accusations that our government engaged in unconstitutional searches and seizures were dismissed by many, especially on the right, as an attack on the administration of George W. Bush by anti-war, lefty crackpots.

An opposing viewpoint:
The NSA Program in Real-World Perspective.  The Supreme Court has long held constitutional the disclosure by phone companies to law enforcement of to-and-from numbers on phone calls.  In 1979, the Court upheld police installation of a pen register that recorded all phone numbers called from a suspected robber's home — without search warrant.  The reasoning:  the Fourth Amendment does not protect a person's right to keep private information that person has voluntarily conveyed to a third party.  When a person makes a call, it is known the number being called, as well as the caller's number, is necessarily conveyed to the phone company and its employees.

The Editor retorts...
Every time you use a cell phone, your approximate location is known to the cell phone provider.  With a little effort, your exact location can be determined by comparing signals from multiple cell phone receiver sites.  But that doesn't mean you've given the provider permission to reveal your current location (or the number you called) to anyone who asks for it.  Similarly, the telephone company that administers a land-line (POTS) telephone can listen in on it at any time, but — for almost a century — the customers have had a reasonable expectation that the telephone company would not do so en masse, nor would they disclose the contents of private conversations for a fee.

France 'runs vast electronic spying operation using NSA-style methods'.  An investigation by the French daily [Le Monde] found that the DGSE, France's external intelligence agency, had spied on the French public's phone calls, emails and internet activity.  The agency intercepted signals from computers and phones in France as well as between France and other countries, looking not so much at content but to create a map of "who is talking to whom", the paper said.  Le Monde said data from emails, text messages, phone records, accessing of Facebook and Twitter, and internet activity going through sites such as Google, Microsoft or Yahoo! was stocked for years on vast servers on three different floors in the basement of the DGSE headquarters.

Government tracking all snail-mail, no warrant required.  The United States Postal Service photographs every piece of mail it processes under a program that started after the anthrax attacks of 2001, according to a report Wednesday in the New York Times.  That's 160 billion purchases, letters, bills, gifts — everything you've ever mailed or had mailed to you in the past decade or more is on record somewhere with the government under the Mail Isolation Control and Tracking program, The Times reports.

European firms 'could quit US internet providers over NSA scandal'.  European businesses are likely to abandon the services of American internet providers because of the National Security Agency surveillance scandal, the European commission has warned.  Neelie Kroes, the commission vice-president who speaks on digital affairs, predicted that providers of cloud services, which allow users to store and access data on remote servers, could suffer significant loss of business if clients fear the security of their material is under threat.

Gov't Collects Logs Of Every Piece Of Mail Sent in The United States, NYT Reports.  If the government collecting tons of metadata on phone and online communications has made you consider sticking with the Postal Service, then you may want to read this first.  The New York Times reports today [7/3/2013] on how government law enforcement agencies are collecting logs on every single piece of mail sent within the United States.  USPS computers take photos of the outside of every piece of mail (they need a warrant to actually read the contents) and send them to the agencies that request the information.

U.S. government tracks your snail mail, too.  The United States Postal Service photographs and records the information on the outside of every piece of mail sent in America — 160 billion every year — the New York Times reported Wednesday [7/3/2013].  Under the auspices of a program called Mail Isolation Control and Tracking, the USPS stores the details of physical correspondences in a way that some have characterized as analogous to the National Security Agency's collection of telephone "metadata."  Unlike the details of the much-publicized NSA program, however, many aspects of the USPS system, called "mail covers," remain unclear.

France operates spy network like PRISM, report says.  According to Le Monde, data on "all emails, SMSs, telephone calls, Facebook and Twitter posts" are collected and stored in a massive three-floor underground bunker at the DGSE's headquarters in Paris.

The 'Privacy vs. Security' Canard.  One of the standard claims of those who would defend "well-intentioned" police-state practices such as the NSA's universal secret monitoring of telephone and e-mail data is that the enhancement of "security" provided by these programs warrants the sacrifice of "some privacy."  That argument is being worked to a frazzle of late, as the Obama administration and others seek to justify the ever-growing litany of revelations about the levels of surveillance to which the U.S. federal government is subjecting everyone.  This framing of the issue as "privacy vs. security" is a canard which loads the dice in tyranny's favor.

U.S. Postal Service Logging All Mail for Law Enforcement.  Leslie James Pickering noticed something odd in his mail last September:  a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home.  "Show all mail to supv" — supervisor — "for copying prior to going out on the street," read the card.  It included Mr. Pickering's name, address and the type of mail that needed to be monitored.  The word "confidential" was highlighted in green.

Spying Scandal: Obama Owes Us an Explanation.  Americans tend to be more open-minded than Germans about Big Data — at least for now.  The kind of mass data collection being conducted around the world by the NSA could eventually backfire for President Obama at home, however.

DNI chief Clapper apologizes for 'erroneous' answer on NSA surveillance.  Director of National Intelligence James Clapper has apologized for telling Congress the National Security Agency doesn't gather data on millions of Americans.  The apology comes after former NSA contractor Edward Snowden gave top-secret information to newspapers that last month published stories about the federal government collecting the data from phone calls and such Internet communications as emails.  Clapper apologized in a letter to Senate Intelligence Committee Chairwoman Dianne Feinstein that was posted Tuesday [7/2/2013] on the website of Clapper's office.

Does the US think that only Americans have a right to privacy?  The whole American political class — not just the Obama administration — is tying itself into self-contradictory knots over the Snowden affair.  And it is a great misfortune that this has now become "the Snowden affair":  i.e., about the man himself, rather than the shocking information that he has disclosed.  But this is where we are, so let's look closely at what seems set to be the latest Ugly American chapter of US diplomatic relations with the world.

Clapper under pressure despite apology for 'erroneous' statements to Congress.  The US director of national intelligence, James Clapper, has attempted to head off criticism that he lied to Congress over the extent of government surveillance on American citizens, with a letter to senators in which he apologised for giving "erroneous" information.  Two weeks after telling NBC news that he gave the "least untruthful answer possible" at a hearing in March, Clapper wrote to the Senate intelligence committee to correct his response to a question about whether the National Security Agency "collected data on millions of Americans".

Germans Loved Obama. Now We Don't Trust Him.  [Scroll down]  Germans have experienced firsthand what happens when the government knows too much about someone.  In the past 80 years, Germans have felt the betrayal of neighbors who informed for the Gestapo and the fear that best friends might be potential informants for the Stasi.  Homes were tapped.  Millions were monitored.  Although these two dictatorships, Nazi and Communist, are gone and we now live in a unified and stable democracy, we have not forgotten what happens when secret police or intelligence agencies disregard privacy.

How the NSA is still harvesting your online data.  A review of top-secret NSA documents suggests that the surveillance agency still collects and sifts through large quantities of Americans' online data — despite the Obama administration's insistence that the program that began under Bush ended in 2011.  Shawn Turner, the Obama administration's director of communications for National Intelligence, told the Guardian that "the internet metadata collection program authorized by the Fisa court was discontinued in 2011 for operational and resource reasons and has not been restarted."

Senators Ask if NSA Collected Gun Data.  Senators are questioning whether the National Security Agency collected bulk data on more than just Americans' phone records, such as firearm and book purchases.  A bipartisan group of 26 senators, led by Sen. Ron Wyden (D., Ore.) asked Director of National Intelligence James Clapper to detail the scope and limits of the National Security Agency's surveillance activities in a letter released Friday [6/28/2013].  "We are concerned that by depending on secret interpretations of the PATRIOT Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," the senators wrote in the letter.  The NSA's surveillance program has come under intense scrutiny following a leak revealing the agency harvested the phone metadata of millions of American citizens.

Verizon Was Ordered To Turn Over Millions of Americans' Phone Records To NSA.  Glenn Greenwald at The Guardian has an incredible scoop:  a court order from the secretive Foreign Intelligence Surveillance Court instructing Verizon to turn over metadata from all calls originating in the U.S. over a three-month period (ending July 19, 2013) to the National Security Agency (NSA) on a daily basis.

Declassified gov't report details decades of NSA computer spying.  The clandestine National Security Agency is partly responsible for the modern PC era, a newly declassified document reveals, thanks to decades of custom computers built for one thing:  espionage.  Declassified by the NSA on May 29 and posted online on Monday, the 344-page report "It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis, 1930s-1960s," details the unknown high-tech history of computers so secretive even their code names were kept confidential.  Until now.  It's a never-before seen history of code-breaking, spying and its role in the birth of the computer.

NSA collected US email records in bulk for more than two years under Obama.  The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans, according to secret documents obtained by the Guardian.  The documents indicate that under the program, launched in 2001, a federal judge sitting on the secret surveillance panel called the Fisa court would approve a bulk collection order for internet metadata "every 90 days".  A senior administration official confirmed the program, stating that it ended in 2011.  The collection of these records began under the Bush administration's wide-ranging warrantless surveillance program, collectively known by the NSA codename Stellar Wind.

An everyman's guide for going invisible on the internet.  Let's get this out of the way first:  It's impossible to go 100 percent invisible online if you use the internet in any capacity.  We still don't completely understand the scope and power of the NSA's surveillance capabilities, and it's highly unlikely that any single individual, no matter how resilient their encryption protocols, could withstand a rigorous investigation by the U.S. government.  Still, there are ways ordinary users can better protect their privacy online.

Feds collecting personal, confidential data on consumer's credit cards, bank transactions.  The Obama administration, already under fire for the IRS scandal and National Security Agency snooping of the computers and cellphones of Americans, is also spending millions to have private contractors conduct a dragnet for confidential and personal credit and bank transactions without a warrant.  Newly obtained documents from the Obama-created Consumer Financial Protection Bureau reveal that the administration has OK'd a project to accumulate the personal financial data of some 5 million and share it with other agencies to build a "nationally representative panel of credit information on consumers for use in a wide range of policy research projects."  The documents obtained by public watchdog group Judicial Watch and provided to Secrets also indicate that those picked in the dragnet will be chosen randomly, meaning every American is subject to the raid on their information.

The personal side of taking on the NSA: emerging smears.  When I made the choice to report aggressively on top-secret NSA programs, I knew that I would inevitably be the target of all sorts of personal attacks and smears.  You don't challenge the most powerful state on earth and expect to do so without being attacked.  As a superb Guardian editorial noted today:  "Those who leak official information will often be denounced, prosecuted or smeared.  The more serious the leak, the fiercer the pursuit and the greater the punishment."

The IRS, the NSA, and Obama's Dirty Tricks.  [Scroll down]  The NSA — the National Security Agency — admitted that it has been involved in spying on Americans.  Their huge Utah data center is a storage house of personal information on almost all Americans.  This information can be used to attack political opponents, and Barack Obama has not been reluctant to attack opponents for their personal behavior, even when the information is illegally/improperly obtained.

Is it Really about Surveillance or is it About the Government?  You need to keep in mind that the government is collecting or has access to about everything you do.  A short list is DNA, retinal scans, facial recognition, finger prints, phone calls, emails, internet cookies and the like.  Do you trust your government with all this information?  When you log on to the internet browser or the server there is always a footprint as to where you have been.

How much damage has Prism done to US tech giants?  The fallout from the Prism leak continues.  As people digest what the leaks mean, ripples are going out into the business community.  Firms were moving towards free, American, reliable cloud-based services; now things are screeching to a halt, as they think "do we want the NSA having access to this?"  It's more than just idle fear.

ACLU to Obama: 'We are tired of living in a nation governed by fear'.  Under President Obama, the United States is "a nation governed by fear," the American Civil Liberties Union says in an open letter that echoes the criticisms Obama has made of George W. Bush's national security policies.

Email snooping corralled in Texas; other states may follow.  Texas has become the first state in the nation to require law enforcement to obtain a warrant to read people's email, and privacy advocates are hoping the move will help quicken the passage of a similar proposal in Congress.  Texas Gov. Rick Perry signed the privacy bill last week.

For secretive surveillance court, rare scrutiny in wake of NSA leaks.  Wedged into a secure, windowless basement room deep below the Capitol Visitors Center, U.S. District Court Judge John Bates appeared before dozens of senators earlier this month for a highly unusual, top-secret briefing.  The lawmakers pressed Bates, according to people familiar with the session, to discuss the inner workings of the United States' clandestine terrorism surveillance tribunal, which Bates oversaw from 2006 until earlier this year.

Obama Moved For Broad Domestic Surveillance Early.  President Obama, who campaigned against George W. Bush's surveillance policies, bolstered the National Security Agency's domestic spying powers astoundingly early in his presidency.  Was it really to protect us?

How Skype developed a secret program called 'Project Chess'.  The web-based calling service Skype allegedly developed a secret program called 'Project Chess' to make it easier for the government to spy on its users.  The program, set up about five years ago, studied the legal and technical issues in making Skype's calls available to law enforcement officials, according to the New York Times.  Skype has also reportedly been involved in the Prism program since February 2011.

Mysterious privacy board touted by Obama has deep government ties.  The body charged by President Obama with protecting the civil liberties and privacy of the American people exists in shadows almost as dark as the intelligence agencies it is designed to oversee.  The Privacy & Civil Liberties Board (PCLOB) was due to meet Obama at the White House on Friday afternoon [6/21/2013] at 3pm in the situation room to discuss growing concerns over US surveillance of phone and internet records — or, at least, that's what unnamed "senior administration officials" said would happen.

Obama meets with privacy watchdog panel — in private.  President Obama's Friday meeting with a newly reformed privacy watchdog panel will take place behind the closed doors of the White House Situation Room, according to administration officials.  It's the president's first sit-down with the recently constituted and little-known Privacy and Civil Liberties Oversight Board, created nearly a decade ago but dormant for the entirety of the Obama presidency.

Napolitano: NSA Testimony on Surveillance Programs 'Bogus'.  Former state court Judge Andrew Napolitano said on Tuesday [6/18/2013] that officials from the National Security Agency "answered questions professionally" in their testimony before Congress — "but I still think it's bogus."  "There was none of this as we got from Attorney General [Eric] Holder and FBI Director [Robert] Mueller," Napolitano told Neil Cavuto on Fox News.

Bombshell: Fmr. Intelligence Agent Accuses NSA, Obama Of Lying, Alleges Broader Spying Programs.  On Friday [6/21/2013], MSNBC anchor Craig Melvin interviewed former U.S. Air Force intelligence Agent Russell Tice about the revelations surrounding the National Security Agency's monitoring of Americans' digital and electronic communications.  Tice accused a variety of administration officials, including President Barack Obama, of disseminating outright falsehoods in their efforts to explain those programs.  He added that those programs are far broader than any government official has said up to this point.

Meet the 16 People Responsible for Protecting Your Privacy.  There are two groups specifically appointed with the task of ensuring that the government doesn't exceed its mandate in its push to fight terror activity and other crime.  The first is the Foreign Intelligence Surveillance Court, a secret court comprised of judges with heavy background in prosecution.  The second is a civilian panel which the president is meeting with for the first time today [6/21/2013].  Feel better?

Bush-Era NSA Whistleblower Makes Most Explosive Allegations Yet About True Extent of Gov't Surveillance.  Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday [6/19/2013] that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats.  He also made another stunning allegation.  He says the NSA had ordered wiretaps on phones connected to then-Senate candidate Barack Obama back in 2004.

Revealed: the top secret rules that allow NSA to use US data without a warrant.  Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders which allow the NSA to make use of information "inadvertently" collected from domestic US communications without a warrant.  The Guardian is publishing in full two documents submitted to the secret Foreign Intelligence Surveillance Court (known as the Fisa court), signed by Attorney General Eric Holder and stamped 29 July 2009.

Lawyers eye NSA data as treasure trove for evidence in murder, divorce cases.  The National Security Agency has spent years demanding that companies turn over their data.  Now, the spy agency finds the shoe is on the other foot.  A defendant in a Florida murder trial says telephone records collected by the NSA as part of its surveillance programs hold evidence that would help prove his innocence, and his lawyer has demanded that prosecutors produce those records.

FBI under pressure to explain drone use, as Obama names new director.  As President Obama nominates a new FBI director, the bureau is coming under rising pressure from lawmakers to explain the limits of its recently disclosed drone fleet.  Civil liberties-minded senators on both sides of the aisle have fired off sharply worded letters and statements in recent days criticizing the FBI for deploying surveillance drones without clear guidance on how to protect privacy rights.

The Truth Behind the Spying.  [Scroll down]  There may be those who still think that the government spy program, PRISM, is actually about seeking out terrorists but I'm not that naïve nor is it even about seeking out criminal activity.  Why does the government want our telephone data?  Criminals and terrorists communicate via untraceable prepaid cell phones.  They do not sign up for cell service,; ordinary law abiding citizens do.  The miscreants are under the radar always.

Rand Paul: DNI Clapper 'Just Decided to Lie'.  Appearing on The Mike Church Show on Sirius XM Patriot 125, Senator Rand Paul (R-KY) said that Director of National Intelligence James Clapper had lost all credibility on the National Security Agency's snooping on American citizens.

No Cones of Silence in the Surveillance State.  Originally designed to spy on foreigners and track the foreign correspondence of suspected terrorists, today the National Security Agency digitally frisks U.S. citizens, capturing and storing their communications data for as long as five years.  Under the 1978 Foreign Intelligence Surveillance Act and the post-9/11 Patriot Act, the NSA now claims the authority to systematically — and without warrants or court orders — sweep "metadata" into its dragnet, sourced from private telecom and server companies that enjoy immunity from civil liability or criminal prosecution.

We're all potential suspects and should be treated as such, apparently.  Earlier today [6/19/2013], a Washington Examiner editorial warned that "if phone records are useful now in stopping terrorist attacks, how long before politicians and bureaucrats decide archiving the entire phone call would be even more useful?  How long before the limitations and safeguards now in place are set aside?"  Within a few hours, King provided an illustration of precisely what the [Washington] Examiner editors fear.  Responding to a question by Fox News' Bill Hemmer about why the government needs everyone's phone numbers and not just suspects', King said, "Because if you don't have all of them, the system is incomplete."

Have there been any prosecutions if the NSA detected and stopped 50 terrorist plots?  You know the answer.
Will the Real Traitor Please Stand Up?  [Scroll down]  Gen. [Keith B.] Alexander swore to uphold and defend the U.S. Constitution. Gen. Alexander shredded the Constitution and then deceived the U.S. Congress and the public about it on June 18.  On June 18, the NSA Director told us that "these programs" stopped specific threats of terrorism.  Approximately 50 acts of terrorism were prevented.  Whoa, there, cowboy!  Yellow penalty flag on the field!  We're not talking about "these programs" — but about one program in particular.

Living in Fear: Welcome to Fascist America.  I don't want to admit it, but it's true.  Every phone call I make, every email I send, every text I message, every article I write including this one, I imagine being bugged or recorded. [...] Just today I was going to follow up on some information about the wretched prevarications surrounding Benghazi and hesitated.  Should I email the source?  Telephone?  Send a letter?  Snail mail would take too long.  What about buying one of those throwaway phones at Radio Shack?  But then I would be compromising the recipients of my calls.  I would be implicating them.

The NSA state of secrecy must end.  The "war on terrorism" has gone on for 12 years, and while President Obama says it must end sometime, there is no end in sight.  Secret bureaucracies armed with secret powers and emboldened by the claim of defending the nation have proliferated and expanded.  The surprise of legislators at the scope of NSA surveillance shows that checks and balances have broken down.

Liberty, Security, Privacy, Big Brother, and the Concept of the Common Good.  The once mocked conspiracy theory of the all-knowing Big Brother state has shown itself to be far more of an ugly reality than a silly fantasy.  He who has called the War on Terror basically over has now been forced to admit that his administration has vastly expanded the concept of the security state in the name of 'public safety.'  The 'trust us' stance of government is no longer a working defense for such actions as this administration, and the federal agencies under its control, have shown that they simply cannot be trusted.

Government Secrets and the Need for Whistleblowers.  We don't know a lot about how the government spies on us, but we know some things.  We know the FBI has issued tens of thousands of ultra-secret National Security Letters to collect all sorts of data on people — we believe on millions of people — and has been abusing them to spy on cloud-computer users.  We know it can collect a wide array of personal data from the Internet without a warrant.  We also know that the FBI has been intercepting cell-phone data, all but voice content, for the past 20 years without a warrant, and can use the microphone on some powered-off cell phones as a room bug — presumably only with a warrant.

Big Brother is Listening: Granting DHS Domestic Spying Capabilities Will Open Citizens to Arrest.  [F]ar from apologizing for the betrayals of the public's trust, the Obama Administration has thrown another log onto the fire of public outrage.  According to a Reuters report, the Obama Administration is considering granting the Department of Homeland Security the same kind of powers the NSA has used to monitor the phone usage of millions of Americans who have done nothing more to arouse suspicion than use a cell phone.

Why you should worry about the NSA.  My concerns are twofold.  First, the law under which President George W. Bush and now President Obama have acted was not intended to give the government records of all telephone calls.  If that had been the intent, the law would have said that.  It didn't.  Rather, the law envisioned the administration coming to a special court on a case-by-case basis to explain why it needed to have specific records.  I am troubled by the precedent of stretching a law on domestic surveillance almost to the breaking point.  On issues so fundamental to our civil liberties, elected leaders should not be so needlessly secretive.

Witch Hunting, 2013: NSA, IRS, Justice.  The NSA gathers data on hundreds of millions of US citizens, without a warrant, through the corporate bend-over by Verizon (and who knows which other companies?), and then says that "surveillance has led to the thwarting of terrorist plots in the US and 20 other countries" as some kind of justification.  The NSA hasn't made any kind of case for the efficacy of these dragnets in the supposed thwart-ings.  There is no cause and effect; only a logically-unsupportable post hoc argument is offered.

Growing Distrust Of Obama Makes It Tough To Judge NSA Scandal.  The belated recognition of this administration's contempt for the truth, for the American people and for the Constitution of the United States, has been long overdue.  But what if the NSA program has in fact thwarted terrorists and saved many American lives in ways that cannot be revealed publicly?

The Editor says...
If that were indeed the case, there would be a long trail of arrests and trials resulting from the government's successful investigations — unless the secrecy of the wholesale data collection was more valuable than the prosecution of several dozen known (low-level?) terrorists.  This brings up another question:  If the FBI uncovered a plot to commit a violent act of terrorism and intercepted (arrested) the people involved, something would happen to those would-be terrorists.  The captured criminals would now be accumulating in "indefinite detention" somewhere.  (And it would have to be some place where they couldn't get together and deduce the common reason for their capture, i.e., cell phone tracking.)  Is that happening, or is the claim of dozens of preempted terrorist attacks simply untrue?

Government compromises our trust.  It looked bad last week, but it looks much, much worse now.  The federal government has been spying and lying.  The only comfort is that, apparently, it's been largely incompetent at both:  Nobody believes the lies, and the spying wasn't even able to catch the Tsarnaev brothers.

Exposure of NSA surveillance draws attention to Mueller remark about real time email tracking.  With the growing scrutiny of government databases and the extent of domestic surveillance, new questions are being raised about a program FBI Director Robert Mueller once said could pull in emails from U.S. citizens on domestic soil "as they come in."  Mueller's comments came during a routine Senate Judiciary Oversight Committee hearing in March 2011.  He said "technological improvements" to an existing database meant the agency would not miss important investigative leads found in email traffic.

Surveillance programs divide Democrats.  Revelations about the Obama administration's expansive domestic surveillance programs have opened a chasm between Democratic elected officials and their progressive base — one that could be tricky for the party's future presidential hopefuls to bridge.

"Officials" never lie.
Officials: NSA Doesn't Collect Cellphone-Location Records.  The National Security Agency sweeps up data on millions of cellphones and Internet communications under secret court orders.  But as it mounts a rigorous defense of its surveillance, the agency has disclosed new details that portray its efforts as tightly controlled and limited in scope, while successful in thwarting potential plots.  On Sunday [6/16/2013], officials said that though the NSA is authorized to collect "geolocational" information that can pinpoint the location of callers, it chooses not to.

The Editor says...
I find it difficult to believe that the NSA walks right up to an imaginary line, but never crosses it.  Of course they deny pinpointing specific cell phones' locations, but denial is what the NSA does best.  Until recently they probably denied the existence of the agency itself.

President Obama: NSA Spying Programs 'Transparent'.  President Obama said that two National Security Agency programs recently revealed through leaked secret documents were "transparent" and, in an interview with PBS's Charlie Rose on Sunday [6/16/2013], he dismissed concerns that the programs were vulnerable to abuse by government officials.

The False Excuse of National Security.  Does the Obama Administration actually want to fight terrorism all that much?  Or are they primarily interested in gathering vast amounts of information about American citizens?  Do their actions tell us where their attention is focused?  The proof, they say, is in the notorious pudding.  The government is being highly successful in invading the privacy of Americans and increasing control and surveillance.  The government is not doing so well fighting terrorism.  The actual behavior of the government points to development of a 'Big Brother" surveillance state and exposes national security as a phony excuse.

A Warped Prism.  [Scroll down]  There's also the problem of self-imposed filters, which we know exist in the NSA as they do in the TSA, Homeland Defense, Justice, and every other branch of government.  Namely, that we're not supposed to look at Muslims, Arabs, or Middle Easterners in search of terrorists.  It's a trap — don't fall for it.  Instead, closely watch evangelicals, Catholics, Tea Party members, and the like — and don't forget the nuns.  This explains how the Tsarnaevs and Nidal Hassan, independent quanta of evil, slipped through the ultimate information system totally undetected.  So the PRISM program is ultimately worth little, the billions spent on it as wasted as if the Manhattan Project had been intent of building a bomb using phlogiston.

NSA snooping: Facebook reveals details of data requests.  Facebook received 9,000-10,000 requests for user data from US government entities in the second half of 2012.  The social-networking site said the requests, relating to between 18,000 and 19,000 accounts, covered issues from local crime to national security.  Microsoft meanwhile said it received 6,000 and 7,000 requests for data from between 31,000 and 32,000 accounts.  Leaks by a former computer technician suggest the US electronic surveillance programme is far larger than was known.

Massive San Antonio NSA Data Center Raises Eyebrows.  Even as reports break about the size and scope of the National Security Agency's vast data storage center in Utah, new details are emerging about a second massive NSA center in San Antonio, Texas. [...] Originally, the NSA was much more transparent about the project, actually holding a job fair to promote their expansion in San Antonio.  But from 2007 on, the news about the site has been nonexistent.

Pentagon bracing for public dissent over climate and energy shocks.  Top secret US National Security Agency (NSA) documents disclosed by the Guardian have shocked the world with revelations of a comprehensive US-based surveillance system with direct access to Facebook, Apple, Google, Microsoft and other tech giants.  New Zealand court records suggest that data harvested by the NSA's Prism system has been fed into the Five Eyes intelligence alliance whose members also include the UK, Canada, Australia and New Zealand.  But why have Western security agencies developed such an unprecedented capacity to spy on their own domestic populations?

Keywords:  STELLARWIND, MAINWAY, MARINA, NUCLEON, PRISM.
U.S. surveillance targets Internet, phone metadata.  On March 12, 2004, acting attorney general James B. Comey and the Justice Department's top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal.  President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain.  That morning marked the beginning of the end of Stellarwind, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades.  It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.

Obama is Abrading the Social Fabric.  [Scroll down]  In any event, with the FBI having ignored specific warnings from the Russians about the Boston bombers and the administration announcing it will provide military support for the Syrian rebels just as they in turn announce their affiliation with Al Qaeda, the need for this elaborate record-gathering becomes ever less clear.  From the outside it seems as if in Syria, Libya, Afghanistan, Iran, and Egypt we are doing everything in our power to strengthen our enemies.  What's the point then creating this expensive apparatus to permit listening to their communications as if we still regarded them as enemies?

NSA can 'listen to U.S. phone calls' without a warrant, according to congressman.  The National Security Agency can listen to domestic phone calls without a warrant, according to a disclosure by Representative Jerrold Nadler, a New York Democrat, made during a briefing to members of Congress last Thursday [6/13/2013].  Listening to phone calls without a warrant is illegal — but according to Mr Nadler, the NSA does not obtain a warrant to listen to calls.

Nadler Backtracks: NSA Does Need Court Order.  It turns out that the surveillance of Americans may be even more dangerous and unsupervised than had been heretofore acknowledged — but the powers that be aren't willing to admit it.  The National Security Agency (NSA) admitted in a secret briefing that its analysts can decide to listen to Americans' phone calls without legal authorization.  Rep. Jerrold Nadler, a New York Democrat, revealed that during the briefing to members of Congress, the NSA allowed that phone calls could be monitored "simply based on an analyst deciding that."  This means low-ranking analysts may be listening to Americans willy-nilly.

NSA admits listening to U.S. phone calls without warrants.  The National Security Agency has acknowledged in a new classified briefing that it does not need court authorization to listen to domestic phone calls, a participant said.  Rep. Jerrold Nadler, a New York Democrat, disclosed on Thursday that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed "simply based on an analyst deciding that."

The 'scandalanche' & the data-mining.  The data-mining program first started at least seven years ago, under the authorization of the Patriot Act — after a similar Pentagon-based data-collection program was killed in 2003.  Fact is, the NSA — once so secret that its very existence went officially unacknowledged — has been quietly monitoring Americans for years.  Indeed, domestic monitoring without a warrant was explicity OK'd in the 2008 amendments to the Foreign Intelligence Surveillance Act, so long as the ostensible purpose was to track plots originating outside the country.

How did mainstream media get the NSA PRISM story so hopelessly wrong?  If you don't understand the technical workings of these surveillance programs, you can't understand whether they're working as intended, you can't identify where the government has overstepped its bounds, and you can't intelligently debate the proper response.  The fact that the government has maintained rigid secrecy compounds the problem. [...] The basic facts in that story aren't news.  We've known since at least 2006 that the U.S. security establishment is collecting details of phone calls and mining that data to identify calling patterns consistent with terrorist activity.

Senators skip classified briefing on NSA snooping to catch flights home.  A recent briefing by senior intelligence officials on surveillance programs failed to attract even half of the Senate, showing the lack of enthusiasm in Congress for learning about classified security programs.  Many senators elected to leave Washington early Thursday afternoon [6/13/2013] instead of attending a briefing with James Clapper, the Director of National Intelligence, Keith Alexander, the head of the National Security Agency (NSA), and other officials.

Surveillance and Its Discontents.  The ObamaCare mandate-tax that commands Americans to buy a private product is far more offensive to the Constitution than NSA reading the emails of terrorists overseas.  The regulatory agencies claim — and use — the power to seize property and control individual conduct.  The very administration of the entitlement state depends on tracking (Social Security numbers), data-processing (Medicare benefits) and individual scrutiny (tax audits).  The IRS knows far more about American citizens than the NSA does, and while there is much speculation about the potential for surveillance abuse, we now have real evidence of corruption at the IRS.  So which is the greater scandal?

Sens. Wyden & Udall: We Have Seen No Evidence NSA Surveillance Has Prevented 'Dozens Of Terrorist Events'.  During yesterday's [6/12/2013] Congressional hearings on the NSA, agency head General Keith Alexander claimed that the NSA's massive surveillance program has successfully prevented "dozens of terrorist events," but did not go into specifics.  Today Democratic senators Ron Wyden and Mark Udall called on Alexander to clarify those remarks, saying in a joint statement that neither of them have seen any evidence to support what he said.

Metadata helps find terrorists — and Obama voters.  Great cries of shock and disillusionment are echoing across many precincts of President Obama's political base, particularly among academics, civil libertarians, nonprofit activists and media celebrities.  The howls of distress stem from the chief executive's stunning reversal on the scope and constitutionality of domestic surveillance programs at the National Security Agency and elsewhere in the federal government.  Although he vociferously opposed these programs while campaigning for president in 2008 and before, Obama began singing quite a different tune once he began working in the Oval Office.

The Way They Are.  [Scroll down]  The Obama administration has already engaged in systematic and widespread hiring of left-wing political activists into career government positions at the Department of Justice and presumably elsewhere.  Taking this into account, it is merely logical to assume that over the past four years many of the administration's activist worms have found their way into the woodwork at NSA and its contractors.  Given recent revelations, it is also common sense to suspect that at least some federal and private sector people with "PRISM access" clearance are individuals willing and able to use and abuse their power for political purposes.

Americans who cherish freedom must push back against government surveillance.  On Thursday, I held a news conference announcing my intent to pursue legal action against the federal government for infringing on Americans' Fourth Amendment rights.  The National Security Agency's collection of Verizon's client data probably only scratches the surface.  A court order that allows the government to obtain a billion records a day and does not name an individual target is clearly beyond the scope of the Fourth Amendment, which states clearly that warrants must be specific to the person and the place.

Fearless Fosdick at work.  The Obama administration and its well-meaning defenders, including several Republican members of Congress, argue that just because the government can discover intimate details about everyone's life, beliefs, politics, sexual orientation, health, diseases and sexual infidelities doesn't mean it would, with the click of a computer mouse, ever identify and mark this person for personal attention.  (We trust the IRS, don't we?)  If the snoopery were as innocent as these defenders claim, the government wouldn't have gone to so much trouble — in "the least most untruthful manner" — to hide what it was doing.

U.S. Agencies Said to Swap Data With Thousands of Firms.  Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.  These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency.

Privacy Isn't All We're Losing.  The U.S. surveillance state as outlined and explained by Edward Snowden is not worth the price.  Its size, scope and intrusiveness, its ability to target and monitor American citizens, its essential unaccountability — all these things are extreme.  The purpose of the surveillance is enhanced security, a necessary goal to say the least.  The price is a now formal and agreed-upon acceptance of the end of the last vestiges of Americans' sense of individual distance and privacy from the government.

How Yahoo Fought PRISM — And Lost.  Yahoo, one of the companies named as part of the NSA's PRISM data collection program, didn't go quietly, according to a New York Times scoop posted late Thursday [6/13/2013].  The company was behind a 2008 court challenge to fight a court order requiring the company to give them data without a warrant, which they lost.  That, according to the Times, ushered the company into PRISM.

Tea Party on NSA Snooping: We Told You Not to Trust Big Government!  Everyone knows the IRS is a bunch of jerks.  But the NSA combing through people's phone calls and emails?  That's a whole different level of sinister.

Lawmakers tire of playing '20 questions'in surveillance briefings.  Some members of the Congress say that getting straight answers from intelligence agencies about top-secret surveillance is like playing the game "20 Questions," where answers come only if a questioner knows exactly what to ask.

Spying on Americans: the Legal Status of Emails.  This topic has several main issues.  At the top of the list is President Obama's outrageous statement that Americans may need to give up some freedom for security from terrorism.  The president has no right to decide what degree of freedom Americans can have.  The freedom Americans have is defined not by any one elected official but by the Constitution.  The Fourth Amendment of the Constitution has very precise language that directly applies to the NSA's seizure of personal information.

The Founders warned us.  [Scroll down]  I was reminded of this exchange the other day when an author and one of the strongest backers of the Patriot Act, Rep. F. James Sensenbrenner Jr., reacted angrily to the news that the Obama administration has been secretly monitoring, compiling and analyzing phone records from literally millions of Verizon customers and other cellphone and email user — all in the name of national security.  Even early champions such as Mr. Sensenbrenner never contemplated the broad seizure of data now being justified under laws they passed in the name of national security.

Blame Wyden, not Clapper, for 'lie' to Congress on NSA surveillance.  Outrage is brewing on the Left and Right over charges that Director of National Intelligence James Clapper lied to Congress about NSA data collection.  But the outrage is misdirected.  What is outrageous is not that Clapper tried to protect classified information in an open session, but that Senator Ron Wyden asked him the question in open session the first place.  Wyden, an opponent of the NSA program, asked Clapper in front of television cameras:  "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?"  Wyden knew the answer.  He knew the answer was classified.  He knew that Clapper could not answer it in open session.  Yet he asked it anyway.

Lindsey Graham Says He Would Suggest Censoring The Mail, If He 'Thought It Necessary'.  Yahoo's Chris Moody reports that outspoken security hawk Sen. Lindsey Graham (R-SC) would propose censoring American postal mail if he thought it a "necessary" method to protecting the United States from future terror attacks.  The senator compared the hypothetical situation to World War II, in which all Americans had a "mentality" that their way of life was "at risk," and thus surveillance was necessary.

The Editor says...
Brilliant idea, Senator.  The Postal Service can barely deliver the mail, with machines reading the zip codes to sort it all out.  Senator Graham's idea would bring mail delivery to a standstill — with the exception of unsolicited junk mail.

Intelligence chief Clapper: I gave 'least untruthful' answer on U.S. spying.  Director of National Intelligence James Clapper is really struggling to explain why he told Congress in March (see video above) that the National Security Agency does not intentionally collect any kind of data on millions of Americans.  His latest take:  It's an unfair question, he said, like "When are you going to stop beating your wife?"  And it seems to depend on the meaning of "collect."  "I responded in what I thought was the most truthful, or least untruthful, manner by saying 'no,'" Clapper told NBC News on Sunday [6/9/2013].

Obama administration under pressure as US senators demand end to secrecy.  A bill, to be introduced in the Senate on Tuesday, would force the US government to disclose the opinions of a secretive surveillance court that determines the scope of the eavesdropping on Americans' phone records and internet communications.  Separately, a leading member of the Senate intelligence committee came close to saying that James Clapper, the US director of national intelligence, misled him on the scope of government surveillance during a March hearing.

Sharpton: You Can't Blame Obama for Secret Surveillance.  Rev. Al Sharpton said Monday that President Barack Obama is not to blame for the National Security Agency's secret surveillance program — former President George W. Bush is, because laws allowing it were enacted under his administration.  These are laws put into effect under President Bush.  There are plenty of Democrats who are upset about this too.  I do not agree with the Patriot Act, but you can't blame President Obama for it," Sharpton said on MSNBC's "PoliticsNation."

Director of National Intelligence James Clapper jokes about reading people's emails at black-tie dinner.  Foot-in-mouth-prone Director of National Intelligence James Clapper spoke at a black-tie dinner honoring former CIA and National Security Agency chief Michael Hayden on Friday night and — just days after admitting that he'd provided false testimony to Congress in regards to the Prism program — started cracking jokes about reading people's emails.

Yahoo, Google, Facebook and more face fight to salvage reputations over NSA leaks.  Google. Apple. Facebook. Microsoft:  they are the brands that want the world to trust them with personal information, emails, photos, documents — yet they are now facing a battle to maintain that trust after disclosures that the US government was given access to their customers' data online via the Prism programme operated by the NSA.  The companies involved — Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple — vigorously deny giving the Obama administration backdoor access to users' internet information, but the potential damage to their brand reputation has left the companies floundering for a way to respond.

Google wants to tell you more about the info spy agencies are seeking.  Google is asking the Obama administration for permission to disclose more information about requests it gets from national intelligence agencies for its users' emails and other online communications.  The technology giant made the request in a letter to Atty. Gen. Eric H. Holder Jr. and FBI Director Robert S. Mueller III on Tuesday [6/11/2013].  Google is trying to counteract damaging media reports that the company allows the National Security Agency access to users' online communications.

Liberty vs security.  The row over government surveillance that is convulsing America has inevitably prompted questions about Britain's own online snooping.  That is only natural:  GCHQ is by far the largest (and most secretive) of our intelligence organisations, and its links with the National Security Agency are practically umbilical — central not just to the Special Relationship, but to keeping us safe from terrorists and foreign hackers.

NSA Debate Pits Far Left, Right Against the Middle.  Revelations of massive government collections of Americans' phone and email records have reinvigorated an odd-couple political alliance of the far left and right.

Obama tracking whatever you say and do. You're Americans?  [Scroll down]  Under the court order, "the information is classed as 'metadata,' or transactional information, rather than communications, and so does not require individual warrants to access" ("NSA collecting phone records of millions of Verizon customers daily," Greenwald, The Guardian, June 5).  Furthermore, the Verizon court order is covered by "the so-called 'business records' provision of the Patriot Act ... That is the provision which (Sen. Ron) Wyden and (Sen. Mark) Udall have repeatedly cited when warning the public of what they believe is the Obama administration's extreme interpretation of the law to engage in excessive domestic surveillance."

Let's Rescue Metadata From the Spy Agencies.  Once the civil libertarians have had their say, let's hope the really interesting questions start being asked.  What is surveillance of telecommunications metadata really costing us?  Remember, this is not the same as listening to phone calls and reading emails, but collecting the outward characteristics of various electronic transactions and seeing how they relate to other transactions.  Does it yield actionable warnings?  Is it really a cost-effective contribution to security?  And the most interesting question of all:  If meta-surveillance is worth doing, who says the national-security types who have taken ownership of the technology are the best ones to extract the social gains from it?

What we know about the NSA's secret data data warehouse in Utah.  The long, squat buildings span 1.5 million square feet, and are filled with super-powered computers designed to store massive amounts of information gathered secretly from phone calls and emails.

The Fuse Has Been Lit: Seven Critical Points on Uncle Sam's Spying ProgramFirst, if the PRISM program and all the rest of the government's surveillance programs were so good and necessary, then why didn't the feds catch the Tsarnaev brothers, who earlier this year blew up the Boston Marathon?  Or Major Hassan, the 2009 Fort Hood mass-murderer?  Or the "underwear bomber," also from 2009, who nearly succeeded in blowing up the passenger jet flying into Detroit?  Second, if and when everything is revealed about PRISM and all the rest, it's likely that we will learn of important and inculpating connections between the National Security Agency (NSA), on the one hand, and many civilian agencies, on the other.

How can Google (or anyone) prove something is not happening in the super-secret NSA, or prove that the NSA can't do something extraordinary?
Exclusive: Google to DOJ: Let us prove to users that NSA isn't snooping on them.  There is a "serious misperception" about the National Security Agency's PRISM program, Google chief legal officer David Drummond said in an exclusive interview with Fox News.  On Tuesday [6/11/2013] the company pushed back against the layers of secrecy surrounding the agency's alleged blanket snooping on American citizens.  "We were as shocked about those revelations as anyone," Drummond told Fox News, in an interview with Fox News' Chief Intelligence Correspondent Catherine Herridge.

Obama-knows-best goes bust.  "Trust me" is President Barack Obama's preferred mode of action in times of crisis — and his go-to comment to nervous staffers has always been some version of "Relax, I got this."  But that message is an increasingly hard sell for Obama in his second term, following revelations that the man who once railed against the Bush administration over civil liberties abuses has himself surreptitiously quarterbacked the greatest expansion of electronic surveillance in U.S. history.

CNN's Jake Tapper Dismisses GOP Rep. Peter King's 'Slippery Slope' Demand NSA Journalists Be Prosecuted.  On Tuesday [6/11/2013], Rep. Peter King (R-NY) told CNN host Anderson Cooper that he believed the journalists who broke the story relating to the National Security Agency's communications monitoring programs should be prosecuted.  CNN host Jake Tapper addressed this claim on the network's morning show Starting Point where he dismissed King's claim saying that it was simply not a feasible course for the government to pursue.

Ted Cruz: Obama targeting enemies, can't be trusted.  Texas Sen. Ted Cruz on Tuesday decried the spread of unaccountable federal agencies like the IRS and National Security Agency caught prying into American lives, charging that President Obama's promise that his administration isn't snooping on citizens can't be trusted.  What's more, Cruz said that by spreading a broad net to include average Americans in its search for terrorists via the NSA, the administration missed catching actual U.S. enemies such as the Boston Marathon bombers and the Fort Hood, Texas killer.

Philadelphia Couple Join Class-Action Lawsuit Against NSA's Verizon Spying.  A Philadelphia couple has joined the first class-action lawsuit against the Obama administration over the National Security Agency's collection of millions of customer phone records from Verizon.  The plaintiffs are calling the domestic spy operation a breach of privacy.  Filed in federal court in Washington, DC on Sunday, the lawsuit names a host of heavy hitters including President Obama, the NSA, and the Department of Justice.

NSA revelations only 'the tip of the iceberg,' says Dem lawmaker.  The federal surveillance programs revealed in media reports are just "the tip of the iceberg," a House Democrat said Wednesday [6/12/2013].  Rep. Loretta Sanchez (D-Calif.) said lawmakers learned "significantly more" about the spy programs at the National Security Agency (NSA) during a briefing on Tuesday with counterterrorism officials.  "What we learned in there," Sanchez said, "is significantly more than what is out in the media today."

White House: If lawmakers didn't know about NSA program, that's their fault.  Congressional ignorance about the National Security Agency's phone record collection exists because lawmakers skipped briefings on the program, according to President Obama's spokesman, who maintained that the program had sufficient congressional oversight.  "I think it's been amply demonstrated that with regards to both sections of the Patriot Act and the programs that exist under those authorities that members of Congress were briefed or had the opportunity to be briefed on them," White House Press Secretary Jay Carney told reporters during the gaggle today [6/12/2013].

Sensenbrenner: Obama Administration's NSA Assurances 'a Bunch of Bunk'.  Representative Jim Sensenbrenner, who introduced the PATRIOT Act on the House floor in 2001, has declared that lawmakers' and the executive branch's excuses about recent revelations of NSA activity are "a bunch of bunk."  In an interview on Laura Ingraham's radio show Wednesday morning, [6/12/2013] the Republican congressman from Wisconsin reiterated his concerns that the administration and the secret Foreign Intelligence Surveillance Act court have gone far beyond what the PATRIOT Act intended.  Specifically, he said that Section 215 of the act "was originally drafted to prevent data mining" on the scale that's occurred.

Did someone mention the Patriot Act?

NSA Built Back Door In All Windows Software by 1999.  In researching the stunning pervasiveness of spying by the government (it's much more wide spread than you've heard even now), we ran across the fact that the FBI wants software programmers to install a backdoor in all software.  Digging a little further, we found a 1999 article by leading European computer publication Heise which noted that the NSA had already built a backdoor into all Windows software.

The domino effect begins:
Atty. In Fla. Robbery Case Seeks NSA Phone Records.  The lawyer for a man on trial in a South Florida armored car robbery is seeking cellphone records possibly produced by a recently revealed National Security Agency surveillance program, according to federal court documents.

Fox's Brit Hume Dismisses NSA Uproar As 'Misplaced Hysteria'.  Appearing on FoxNews.com Tuesday afternoon [6/11/2013], Fox senior political analyst Brit Hume dismissed the uproar over the National Security Agency's snooping revelations as "misplaced hysteria," adding that he sees no "abuse" whatsoever in what has been revealed.  If anything, he said, NSA leaker Edward Snowden is the one who committed an abuse.  "Of the abuses that [Snowden] claims exist in this program," Hume continued, "his explanation has been vague to the point of non-existent."  He then told host Chris Stirewalt he doesn't see anything wrong with what has been revealed about the NSA's surveillance programs.

I suppose we will have to take his word for it because apparently it's all secret.
NSA chief: Surveillance programs thwarted 'dozens of terrorist plots'.  The director of the National Security Agency portrayed the collection of millions of U.S. telephone records each day as a limited program designed to thwart terrorist plots, but made it clear that the NSA needed only a "reasonable suspicion" of a terrorist link to search the vast databank, not a separate court order.

Obama's 2007 Promise: 'No More Illegal Wiretapping of American Citizens'.  His administration would not "spy on citizens who are not suspected of a crime, " then-Senator Obama promised in a Woodrow Wilson International Center, Council on Foreign Relations speech on August 1, 2007:  "I will provide our intelligence and law enforcement agencies with the tools they need to track and take out the terrorists without undermining our Constitution and our freedom.["]  [Video clip]

It's The U.S. Constitution, Stupid!  The Obama administration has thrown out all the rules, insisting that when you are looking for a needle in a haystack, it's OK to seize the haystack, keep it permanently on record and to look for whatever needle they want at any time they want.  They say they're looking for terrorists but can't find or stop those they have in plain sight.  Such sweeping surveillance did not catch the "underwear" bomber who, thanks to sheer luck and alert passengers, failed to bring down an airliner over Detroit.  It did not catch the Tsarnaev brothers as they freely traveled to the terrorist haven they called home before bombing the Boston Marathon.  It did not stop Maj. Nidal Hasan before he slaughtered U.S. soldiers and civilians at Ft. Hood.  It has not found those responsible for the attack in Benghazi.

Washington's dark secrets.  The secret court that apparently authorized this program operates nothing like the judicial branch contemplated by the Constitution as a check on abuses of governmental power and a neutral evaluator of whether governmental conduct complies with the Constitution.  Its decisions are made in secret and not generally subject to appellate review.  And there is no role built into the system for someone to counter the government's arguments.

ACLU Sues U.S. Over Phone Data Collection.  The National Security Agency's broad collection of U.S. phone customer data received its first significant legal challenge since the disclosure of the program last week.  The American Civil Liberties Union filed a lawsuit in federal court Tuesday, alleging that the National Security Agency was violating the ACLU's constitutional rights.  The ACLU said it is a customer of Verizon Communications Inc.'s Verizon Business Network Services and it said metadata from the ACLU's phone calls are being collected.

A.C.L.U. Sues to Bar 'Dragnet' Collection of Phone Records.  The American Civil Liberties Union on Tuesday [6/11/2013] filed a lawsuit against the Obama administration over its "dragnet" collection of logs of domestic phone calls, contending that the once-secret program — whose existence was exposed by a former National Security Agency contractor last week — is illegal and asking a judge to both stop it and order the records purged.

The Editor says...
The Muslim terrorists know the government monitors phone calls and correlates the numbers.  That's why they buy a thousand cell phones at a time and use them only once.

Is the American surveillance state out of control?  This week's Telegram is a highly charged debate about America and security.  Tim Stanley says the information released by Edward Snowden shows an Obama administration exercising "weird and creepy" control over its citizens.  Dan Hodges says the libertarian Left and Right are in an "unholy alliance", trying to scare voters about legitimate security measures.

US allies "stunned" at scope of NSA surveillance.  Who can blame them?  As the scope of the NSA surveillance programs became a little clearer since their exposure last week, the ostensible targets abroad turned out to be a little unhappy with Uncle Big Brother, too.

Hoyer: No comparison between Obama, Bush secret surveillance.  Rep. Steny Hoyer (D-Md.) on Tuesday defended the Obama administration's domestic spying programs, arguing that, unlike the secret surveillance under President George W. Bush, the current programs appear legal.

Progressives, Democrats must stand with New York Times against Obama on NSA phone records collection.  The events of the past month — from the Associated Press subpoena to the James Rosen search warrant to the revelation that our government has been indiscriminately collecting phone records data — have forced liberals to make a choice between complacency and outrage, between keeping silent because one of our own is in the White House and calling him out on betraying the principles for which we have fought for so long.

Two times the government used its anti-terrorism powers to target Americans not engaged in terrorism.  The revelations detailing the extent of the National Security Agency's espionage capabilities raises the specter that their powers could be misused to target Americans who have nothing to do with terrorism.  In fact, allegations of such misconduct already exist.  Here are two examples where anti-terrorism powers granted to law enforcement were allegedly used to target American citizens not engaged in terrorism.

Even law-abiding people should oppose surveillance.  [W]hy should law-abiding citizens mind federal surveillance?  The answer begins with this distressing reality:  None of us scrupulously obeys the law.  Technically speaking, we're all criminals.  Federal and state criminal statutes have multiplied like rabbits over the decades, and so now everyone breaks the law, probably every day. [...] Citizens that the federal government wants to indict, the federal government can indict if it monitors them closely enough.  That's why it's so disturbing to learn that the federal government doesn't need to obtain a warrant on us in order to get our emails and phone records.

The Totalitarianism at the Heart of the Obama Scandals.  [Scroll down]  Then of course the National Security Agency was caught recently collecting the telephone records of millions of Verizon customers.  But the intrusive secret data-mining didn't end there.  Through a top-secret communications surveillance program called PRISM, instituted during the War on Terror years of the Bush administration, the U.S. intelligence community can access the servers of nine Internet behemoths such as Google, Yahoo, YouTube, Skype and Facebook for a wide range of digital data.  That NSA service has grown exponentially under Obama, which is curious since he declared the War on Terror to be over.

Was President Obama the leaker?  [Scroll down]  But the Obama administration didn't release the details on these programs.  In fact, they've pursued an energetic war on the kinds of leaks that have led to details on these programs.  So for Obama to say he "welcomes" this debate is a bit rich.  He did everything in his power to keep it from happening.  He may still try and throw the people who did create this debate in jail.  Unless, of course, he actually was the leaker.

The Patriot Act is merely a fig leaf to cover what tyrants would do anyway.
Document: Sen. Obama Opposed 'Government Fishing Expeditions' Under Patriot Act.  A "Dear Colleague" letter signed by then-Senator Barack Obama (D-IL) in 2005 urged an end to "government fishing expeditions" under Section 215 of the Patriot Act to gather records on American citizens indiscriminately.  The letter was also signed by eight other Senators, including John Kerry (D-MA) and Chuck Hagel (R-ND), who currently serve in President Obama's Cabinet as Secretary of State and Secretary of Defense, respectively.

Big Brother Really Is Watching Us.  When Americans expressed outrage last week over the seizure and surveillance of Verizon's client data by the National Security Agency, President Obama responded:  "In the abstract, you can complain about Big Brother ... but when you actually look at the details, I think we've struck the right balance."  How many records did the NSA seize from Verizon?  Hundreds of millions.  We are now learning about more potential mass data collections by the government from other communications and online companies.  These are the "details," and few Americans consider this approach "balanced," though many rightly consider it Orwellian.

Verizon's Top Secret Deal With Pentagon Was Made Public in Regular, Annual Filing With SEC.  The Verizon explanation is not in the vague and cryptic memo the company issued last week after the Guardian exposed its program.  It came, instead, in the company's annual filing with the Securities and Exchange Commission, included in Verizon's annual report to shareholders.

What If China Hacks the NSA's Massive Data Trove?  In the wrong hands, it could enable blackmail on a massive scale, widespread manipulation of U.S. politics, industrial espionage against American businesses, and other mischief I can't even imagine.  The plan is apparently to store the data indefinitely, just in case the government needs it for future investigations.  Don't worry, national security officials tell us, we won't ever look at most of it.  Do you trust the government to keep it secure, forever, if others try to look?

Rasmussen: Only 30% of Americans Trust the Government over Surveillance.  According to a new Rasmussen poll, only 30% of Americans trust the government to use the Constitution as a guide for surveillance issues, while 52% of respondents do not.  When asked whether they believed Barack Obama when he said the government was not listening to their phone calls, 68% of those polled said that it was at least somewhat likely that Obama was not telling the truth.

All the Infrastructure a Tyrant Would Need, Courtesy of Bush and Obama.  To an increasing degree, we're counting on having angels in office and making ourselves vulnerable to devils.  Bush and Obama have built infrastructure any devil would lust after.  Behold the items on an aspiring tyrant's checklist that they've provided their successors [...]

Where's the evidence that data mining saves lives?  We know that complete strangers are looking at our Facebook pages.  Should we be surprised that the government is too?  Probably not.  But you might be surprised to find out that all this information the NSA and other agencies are collecting is not very useful for stopping terrorists, which is why it's being collected in the first place.  To date, there have been practically no examples of a terrorist plot being pre-emptively thwarted by data mining these huge electronic caches.

White House Plays Down Data Program.  The Obama administration tried Saturday [6/8/2013] to marshal new evidence in defense of its collection of private Internet and telephone data, arguing that a secret program called Prism is simply an "internal government computer system" designed to sort through court-supervised collection of data, and that Congress has been briefed 13 times on the programs since 2009.

The horses have escaped the barn, and now Big Brother now tries to deny there were any horses.
U.S. Official Releases Details of Prism Program.  A top U.S. intelligence official on Saturday declassified some details about the purpose and operations of an effort that obtains information from U.S. Internet companies as part of foreign-surveillance efforts.  James R. Clapper, director of National Intelligence, issued a statement and fact sheet to correct what he characterized as "significant misimpressions" in articles by the Washington Post and Guardian newspapers, which asserted that the government had direct access to computer systems of nine technology companies.  The papers based their reports on a presentation from the National Security Agency that used a previously undisclosed term Prism.

Total surveillance society: The government claims the right to read everything.  We knew this administration didn't like the Second Amendment.  We knew it has reservations about the First Amendment, and now we learn that it has dispensed with the Fourth Amendment.  The only amendment the administration really likes is the Fifth.  The more we learn about the government's extraordinary ability to read emails, listen to telephone calls and track individual movements, the more frightened everyone should be.  New code names, such as Prism, the National Security Agency program that directly mines all information from Gmail, Facebook and other services, have replaced Echelon and Carnivore as scare words.

It's A Small Step From Obama's Surveillance To Orwell.  President Obama says his domestic surveillance practices are "modest encroachments on privacy."  Sure.  And, as in Orwell's "1984," "Freedom Is Slavery" and "Ignorance Is Strength."  Barack Obama is now not only following George Orwell's model in his newly uncovered domestic spying practices; he's copying one of the most shocking aspects of the dystopian society Orwell conjured:  telling people the exact opposite of the truth with a straight face.  He boasted an executive branch with "the toughest transparency rules of any administration in history."

What the feds can learn from your digital crumbs.  If you've signed into Google and searched, saved a file in your Dropbox folder, made a phone call using Skype, or just woken up in the morning and checked your email, you're leaving a trail of digital crumbs. [...] Raytheon's Rapid Information Overlay Technology (or RIOT) software was built to make some of this searching easier.  Its government customers use it to compile case files of location data scraped from checkins on Twitter, Facebook, Foursquare and other public social outlets.

The Totalitarian Left is Back.  Nothing in the Patriot Act authorizes the government-wide abuse of power by the IRS, EPA, FBI, DOJ, and other agencies with the coercive powers against Americans and foreigners.  The fault is not in the Patriot Act, but in Obama's Chicago-style one-party machine style of governance.  And rather than defending our freedoms, the leftist media colluded with abuse of power until after the election of 2012.  The New York Times is the biggest gear in the Obama Machine and they know it.

Admitting the NSA is out of control is just the first step.  Members of Congress are expressing their concern and outrage over the latest revelations of widespread data gathering by the NSA.  It is astonishing that they have only just discovered this problem; it has a history going back 50 years, and they voted for much of the legislation which enabled this kind of widespread violation of citizen rights.

The NSA Squirrel!  The NSA snooping revelations create a huge fuss that distracts the press and prevents the public (especially conservatives) from learning the grueseome details of the 1000 page Schumer-Rubio immigration disaster now on the Senate floor — yet doesn't hurt Obama's approval ratings like the IRS scandal does.

The NSA's secret tool to track global surveillance data.  The Guardian has acquired top-secret documents about the NSA datamining tool, called Boundless Informant, that details and even maps by country the voluminous amount of information it collects from computer and telephone networks.  The focus of the internal NSA tool is on counting and categorizing the records of communications, known as metadata, rather than the content of an email or instant message.

Obama Ordered List of Foreign Targets for Cyberwar AttackThe Guardian has uncovered a Presidential Policy Directive in which Obama ordered national security and intelligence officials to compile a list of overseas targets for U.S. cyber attacks.  The directive — number 20 — was issued in October 2012 but never published.

It's about to get very ugly.  [Scroll down]  "If anyone thinks that what's going on right now with all of this surveillance of American citizens is to fight some sort of foreign enemy, they're delusional.  If people think that this 'scandal' can't get any worse, it will, hour by hour, day by day. [..."]

Justice Department Fights Release of Secret Court Opinion Finding Unconstitutional Surveillance.  In the midst of revelations that the government has conducted extensive top-secret surveillance operations to collect domestic phone records and internet communications, the Justice Department was due to file a court motion Friday [6/7/2013] in its effort to keep secret an 86-page court opinion that determined that the government had violated the spirit of federal surveillance laws and engaged in unconstitutional spying.

Tech Companies Concede to Surveillance Program.  When government officials came to Silicon Valley to demand easier ways for the world's largest Internet companies to turn over user data as part of a secret surveillance program, the companies bristled.  In the end, though, many cooperated at least a bit.  Twitter declined to make it easier for the government.  But other companies were more compliant, according to people briefed on the negotiations.

PRISM Biggest Contributor to Obama Intel Briefings.  The National Security Agency's top-secret slide presentation detailing the PRISM system that collects the contents of emails, video and web chat, and photos states that PRISM is the biggest contributor of information to President Barack Obama's daily intelligence briefing, known officially as the President's Daily Brief (PDB).  In the last year, PRISM data was cited in Obama's PDB 1,477 times.

Prism: first they came for the online extremists.  Why worry when the government isn't ever going to be bothered about what you personally do?  But what you do online, who you choose to email, what you choose to watch, what you read, listen to and comment on, doesn't matter until the day it suddenly does.  You can raise your eyebrows at wholesale surveillance efforts until it's you that ends up wrongly flagged on a watch list or monitored closely because of your political beliefs or those of people you are acquainted with.

Lawmakers rebut Obama's data defense.  President Barack Obama's chief defense of his administration's wide-ranging data-gathering programs Friday:  Congress authorized them, with "every member" well aware of the details.  Not so, say many members of Congress — Democrats and Republicans alike.

Dem. Senator disputes Obama's claim that Congress was briefed.  Sen. Jeff Merkley (D-Ore.) on Friday disputed a claim President Obama made at a press conference only moments earlier, when the president said that every member of Congress had been briefed on the National Security Agency's (NSA) domestic phone surveillance program.  Merkley said only select members of the House and Senate Intelligence Committees had been briefed on the program, and that he was only aware of it because he obtained "special permission" to review the pertinent documents after hearing about it second-hand.

Mystery deepens: Are tech behemoths participating in PRISM voluntarily?  Go look at this post at TechCrunch rounding up reaction from Google, Facebook, Apple, etc.  All of them deny giving the feds "direct access" to their servers; some of them claim never to have even heard of PRISM until WaPo's story yesterday.  "But wait," you say, "what if they're being slippery in their statements and they actually gave the feds indirect access to their servers?"  That's possible.  Other people have noticed that loophole too.

Massive secret surveillance betrays Americans.  By any measure, the government's secret seizure of hundreds of millions of Americans' phone records over the past seven years is outrageous.  But it shouldn't be the least bit surprising.  When a panicked Congress, driven by a panicked electorate, hands the government nearly unlimited power to collect people's records — then makes sure the intrusion will be kept secret — overreach is guaranteed.

President Obama Doesn't Welcome Debate, He Actively Thwarts It.  President Obama kept the data collection in question a highly classified state secret.  If it were up to the White House, we wouldn't know of the program's existence, ever.  As a consequence, there would have been no debate about its appropriateness.  If Obama values debate, he doesn't value it as much as keeping secrets that inevitably make debate impossible.

How to Keep the NSA at Bay: The Tricks From Privacy Experts.  You think because you live in the suburbs and you work at an insurance company that Big Brother will never come for you? [...] What if they transpose a digit or two and mix you up with a suspected terrorist and break down your door in the middle of the night and shoot your dog?

US officials long denied massive data trawling.  For years, top officials of the Bush and Obama administrations dismissed fears about secret government data-mining by reassuring Congress that there were no secret nets trawling for Americans' phone and Internet records.

Now It's Credit Cards and Correspondence; What Next?  The initial revelations about NSA's collection of metadata on telephone calls has triggered an avalanche of stories about previously unknown, or only suspected, surveillance projects.  First the Washington Post reported (maybe inaccurately) on the PRISM project; then the Wall Street Journal reported that the NSA also collects "purchase information from credit-card providers;" today it came out that the post office photographs the front and back of every piece of mail, and preserves the images for criminal/terrorist investigations.  Who knew?

Feds: Postal Service photographs every piece of mail it processes.
Ricin Suspect Was Tracked Via Mail Scanners.  [Scroll down]  According to FBI Agent James Spiropoulos, investigators accessed a Postal Service computer system that incorporates a Mail Isolation Control and Tracking (MICT) program which photographs and captures an image of every mail piece that is processed."  Agents were able to obtain front and back images of about 20 mail pieces that had been processed "immediately before the mail piece addressed to Mayor Bloomberg."

NSA taps in to internet giants' systems to mine user data, secret files reveal.  The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.  The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.

U.S. intelligence mining data from nine U.S. Internet companies in broad secret program.  The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.

Mark Levin On NSA Tracking: "We Have The Elements Of A Police State Here".  On Thursday's broadcast of Fox News Channel's "Your World with Neil Cavuto," conservative talk show host Mark Levin reacted to recent revelations that the National Security Agency had been collecting the phone records of millions of Verizon customers.  He said that the NSA news in addition to other openings for intrusion by the federal government are the makings of a "police state."

New Phone Record Seizures Raise Fundamental Issues.  First we learn the federal government is harassing anti-big-government organizations and spying on journalists.  Now we find it collecting all phone records of over 100 million Americans.  Is this "limited government"?

Why the gov't source leaked PRISM.  "They quite literally can watch your ideas form as you type," the officer said.

Sources: NSA sucks in data from 50 companies.  In a statement, Director of National Intelligence James Clapper said that programs collect communications "pursuant to section 702 of the Foreign Intelligence Surveillance Act," and "cannot be used to intentionally target any U.S. citizen, any other U.S person, or anyone within the United States."  He called the leaks "reprehensible" and said the program "is among the most important" sources of "valuable" intelligence information the government takes in.

Apple, Google Deny Giving NSA 'Back Door' Access To Systems, Claim 'Never Heard Of PRISM'.  In light of revelations about the top secret PRISM program used by the FBI and NSA to mine data from users of nine of the largest American Internet companies, two of those companies are now denying any cooperation with the government on such a program.  Spokespeople for both Apple and Google have released statements that indicate if the government is obtaining data from their systems it is doing it without the companies' involvement.

'Fascism!': The Five's Beckel Explodes At Obama Administration Over 'Deplorable' NSA Phone Records Grab.  "I think it is one of the most outrageous examples of the stepping on the Constitution I've heard," Beckel began.  "They have no right to the phone records...  It is illegal, it is unconstitutional and it is deplorable.  I didn't like it when they did it during the Bush administration and I don't like when they're doing it now."  "They have taken this PATRIOT Act, which I think was the most dangerous act passed, and they have taken it and abused it," Beck added.

US Declassifies Phone Program Details After Uproar.  President Barack Obama declared Friday [6/7/2013] that America is "going to have to make some choices" balancing privacy and security, launching a vigorous defense of formerly secret programs that sweep up an estimated 3 billion phone calls a day and amass Internet data from U.S. providers in an attempt to thwart terror attacks.

'No Such Agency' spies on the communications of the world.  The National Security Agency, nicknamed "No Such Agency" because of its ultra-secrecy, is the government's eavesdropper-in-chief.  Charged primarily with electronic spying around the globe, the NSA collects billions of pieces of intelligence from foreign phone calls, e-mail and other communications.  But in the past two days, the focus has shifted to its role in compiling massive amounts of the same information on millions of ordinary Americans.

U.S. Collects Vast Data Trove.  The National Security Agency's monitoring of Americans includes customer records from the three major phone networks as well as emails and Web searches, and the agency also has cataloged credit-card transactions, said people familiar with the agency's activities.

Phone Record Gathering Story Blown Out of Proportion.  Now, we begin to see the wages of having an administration that abuses its awesome powers, then, as night follows day, stonewalls and misleads Congress and the public.  Crucial national security measures, which operate on the forgiving assumption that government officials will conduct themselves honorably, are put at risk.  The Washington Post publishes a wildly exaggerated report this morning about the government's collection of telephone records for national security purposes.  Mind you, I said collection of telephone records, not wiretapping of telephone conversations, a critical distinction.

Thank You for Data-Mining.  Well, another day, another Washington furor.  This one is over a National Security Agency phone data monitoring program, but unlike the other White House scandals there seems to be little here that is scandalous.  The existence of the program was exposed years ago and such surveillance is a core part of the war on terror, if we can still use that term.

How Outraged Should You Be About the NSA Grabbing Your Phone Logs?  Washington is reeling after a court order was uncovered last night showing Verizon has secretly been handing over reams of customer phone records to the National Security Agency on a daily basis.  The records don't contain the content of phone calls — so, just to be clear, this isn't wiretapping — but they do contain information such as phone numbers, the location and duration of calls, and subscriber and handset ID numbers, all of which fall under the category of "telephony metadata."

The Editor says...
I beg to differ:  To wiretap someone's phone is "to make a connection to a telegraph or telephone wire in order to obtain information secretly."*  If I put a device across my neighbor's phone wires and recorded the numbers they called, without recording the voices on the line, I can assure you the District Attorney would still call it a wiretap.

Dems: Obama admin spying 'un-American, 'alarming'.  Bay State Democrats are slamming the Obama administration's actions as "un-American" for secretly collecting phone records from millions of average citizens, demanding the federal government stop its sweeping spy programs.  "This is absolutely un-American as far as I'm concerned, and I'm a strong supporter of the president," said U.S. Rep. Michael Capuano, D-Somerville.

The Editor says...
Well, Mr. Capuano, you voted for the guy, I didn't.  If it is "un-American" and Obama's doing it, and you are "a strong supporter of the president," then you are a strong supporter of that which is un-American.  Unless you'd like to lead the charge for impeachment, you should spare us your outrage.

Scope of phone records seizure causes alarm; data collection goes beyond Verizon.  The Obama administration on Thursday defended its secret seizure of the phone records of millions of U.S. citizens as part of counterterrorism efforts, while privacy advocates blasted the move as illegal and a debate erupted in Congress over the intended scope of a key surveillance law.  In a new development, the National Security Agency and the FBI are tapping into the central servers of nine leading U.S. Internet companies in real time, obtaining audio and video chats, photographs, e-mails and other information, various news outlets reported.  The program is code-named PRISM.

Obama administration pushes back on NSA document leaks.  On top of a Guardian newspaper report that revealed how authorities were collecting phone records from millions, a Washington Post report detailed another program that scours major Internet companies including Google and Facebook for data.  A former senior NSA official confirmed to Fox News that the program was started in 2007 by the FBI and NSA and allows them to tap into top U.S. Internet companies to pull audio, video and other data.

Fear the cyber enemy within or without?  What is more troubling — governments that apparently disregard the privacy of our phone calls and online activity in the interests of national security, or governments that seem to put a higher priority on hi-tech inward investment than on protecting national security?  In the past 24 hours, we have had alleged examples of both.

Time to Dial Up Some Healthy Skepticism.  It's important to emphasize that the NSA isn't listening to the content of these calls.  Indeed, it couldn't if it wanted to, given the sheer volume of conversations.  It'd be like one person trying to eavesdrop on every single conversation in a packed football stadium.

The Editor says...
How is anyone outside the government able to state with any certainty that "the NSA isn't listening to the content of these calls"?  A week ago, nobody knew they were keeping track of the phone numbers being called, so if the NSA is recording as many calls as they can, it's obviously still secret, but that doesn't mean it isn't happening.

Report: U.S. Agents Tapping Servers of Leading Internet Companies.  The U.S. government is reportedly mining data from at least nine leading Internet companies through a secret program code-named PRISM that is aimed at sifting through foreign communications traffic to track potential terrorists.  On the heels of a report earlier this week revealing the U.S. is collecting phone records from Verizon (VZ), the news is likely to raise the heat in a renewed debate about the government's surveillance authority.

If Mr. Obama had a closer relationship with the truth, I might give him the benefit of the doubt.
Obama: Surveillance programs involve 'modest encroachments' on privacy, help fight terror.  President Obama defended the government's internet surveillance as a "modest encroachment" on the privacy of Americans, but he maintained that the programs initiated by George W. Bush help keep Americans safe, adding that he increased oversight of the surveillance.

We should be shocked at the American tapping scandal, and shocked that Obama doesn't seem to care.  You know all those bearded survivalist types holed up in places like Idaho with their paranoid anti-government conspiracy theories?  Suddenly they're looking rather less paranoid.  The rest of us, by contrast, are rushing to adjust our world view.  The revelation that the U.S. Government systematically taps online communications challenges the way we think about freedom, the way we think about privacy, the way we think about the Internet and, not least, the way we think about America.

Dem. Senator Contradicts Obama: 'I Had No Idea' About PRISM.  Appearing on MSNBC's Now with Alex Wagner, Sen. Jeff Merkley (D-OR) said that he was never briefed on the National Security Agency's sweeping PRISM program which databases electronic communications data.  Merkley said that he had no idea about the program and he suspects that a small number of members of the congressional intelligence committees were the only individuals informed of the program.

Your Computer is Bugging Your House.  The computer you are sitting at right now probably has a microphone.  It probably also has a camera looking at you this moment.  Is it sending sound and pictures from inside your house to the PRISM program at NSA?  Who knows?  But one thing is for sure — the technology is sitting there, on your desk.  Welcome to Winston's world.

Obama sponsored bill that would have made Verizon order illegal.  President Obama co-sponsored legislation when he was a member of the Senate that would have banned the mass collection of phone records that his administration is now engaged in.  The SAFE Act, introduced by former Sen. Larry Craig (R-Idaho), would have amended the Patriot Act to require that the government have "specific and articulable facts" to show that a person is an "agent of a foreign power" before seizing their phone records.

Libertarians to Obama: Can You Hear Me Now?  [Scroll down]  First reported [in The Guardian] and then subsequently confirmed by a lack of denial and background confirmations, the Obama administration has been mining the data of America's largest wireless provider, Verizon, which boasts some 115 million mobile subscribers.  The feds also seem to have been combing through phone records of the company's 14 million landlines, mostly in the Mid-Atlantic region.  But the massive cell network is the real data trove for federal agents.

Obama: Phone, Internet data collection not 'Big Brother'.  President Obama, speaking publicly for the first time about his administration's mass collection of phone and Internet data, said Friday that the programs have made a difference in tracking terrorists and are not tantamount to "Big Brother."

The Editor says...
Everybody wants the government to track terrorists, and either lock them up or deport them.  But the rubbery language being used to defend the PRISM program talks about tracking "potential terrorists," which could be anyone who disagrees with the government and its heavy-handed tactics.  The same terrorist-tracking computer systems are probably being used (or soon will be) to find people who cheat on their taxes, grow marijuana in their basements, or don't pay child support.  That's the way law enforcement people are when they get bored:  No offense is too petty to overlook.

Obama: If you can't trust government, we're going to have some problems.  President Obama this afternoon addressed recent reports of the National Security Agency secretly obtaining phone records and private data for surveillance.  During his speech he indicated that Americans needed to trust the system of government set up to thwart abuse.  "If people can't trust not only the executive branch but also don't trust Congress, and don't trust federal judges, to make sure that we're abiding by the Constitution with due process and rule of law, then we're going to have some problems here."

Is this where your personal information will be stored?  The personal data and private online conversations that the National Security Administration is accused of mining could be stashed in a one million square-foot, $1.9 billion facility in the Utah Valley.  Concerns over what the government will store at the Utah Data Center have been reinvigorated by the revelation that U.S. intelligence agencies have been extracting audio, video, photos, e-mails, documents and other information to track people's movements and contacts.

Obama defends NSA's secret 'data-mining' and tries to dismiss it as 'a modest encroachment'.  President Obama delivered a passionate defense on Friday [6/7/2013] of national security programs that secretly acquire information about Americans' phone calls, saying criticism of them is all 'hype.'  'My assessment and my team's assessment was that [the programs] help us prevent terrorist attacks and that the modest encroachments on privacy that are involved in getting phone numbers or duration [of calls] without a name attached... It was worth us doing.'  Obama made the remarks at a press conference in response to revelations about two separate programs used to spy on American citizens and foreign nationals.

Why PRISM is Different and Scarier Than Other NSA Spying.  The metadata collected by the National Security Agency from Verizon and other phone companies is an aggregation of phone numbers and lengths of calls, and does not harvest the content of the calls.  PRISM, first disclosed Thursday night by The Washington Post and The Guardian, is different.  According to the intelligence official who leaked the information to The Post:  "They quite literally can watch your ideas form as you type."

New York Times Editorial Board: 'The Administration Has Now Lost All Credibility'.  Reacting to the news that the administration's National Security Agency has been collecting the phone records of every American customer of at least one telephone service provider, the New York Times minced no words in a scathing editorial criticizing the practice and the lack of forthrightness from the White House.  "The administration has now lost all credibility," the Times editorial read.  "Mr. Obama is proving the truism that the executive will use any power it is given and very likely abuse it."

Update:
New York Times quietly changes published editorial to make it less [critical] of Obama.  The New York Times edited its damning editorial condemning the Obama administration for collecting phone call data from Americans to make it less stinging shortly after the editorial was published online Thursday afternoon.  The editorial originally declared that the Obama "administration has lost all credibility" as a result of the recently revealed news that the National Security Agency and the Federal Bureau of Investigation have been secretly collecting call data from American users of Verizon under the authority of the Patriot Act.

If You Think Obama's Defense of NSA Monitoring Is 'Laughable,' You're Not Alone.  Constitutional law expert Jonathan Turley told Megyn Kelly he is "astonished" at President Obama's dismissive attitude toward criticism of NSA monitoring.

NSA Whistleblower: 'Metadata' of Phone Call Can Be More Revealing Than Listening In.  Megyn Kelly got some revealing insights today from two NSA whistleblowers. [Video clip]

Obama's agenda scorched in firestorm.  [Scroll down]  In recent weeks, it has fueled outrage over the targeting by the Internal Revenue Service of conservative Tea Party groups seeking non-profit status, and over the use of secret subpoenas and search warrants against the Associated Press and Fox News in Justice Department investigations of news leaks.  Now the headlines are focused on governmental monitoring that touches not just reporters but, apparently, just about anyone who makes a phone call.  Thursday began with explosions over a story in The Guardian in London of a broad secret U.S. warrant for phone records from Verizon.

Mark Levin: 'We have the elements of a police state'.  On Thursday's [6/6/2013] broadcast of Fox News Channel's "Your World with Neil Cavuto," conservative talk show host Mark Levin reacted to recent revelations that the National Security Agency had been collecting the phone records of millions of Verizon customers.  He said that the NSA news in addition to other openings for intrusion by the federal government are the makings of a "police state."  "I tell you what I make of this — we have the elements of a police state here, and I'm not overstating it," Levin said.

NSA collecting daily phone logs of millions of Verizon customers.  It's beginning to look like the Obama administration is not at all interested in targeting domestic surveillance in any way that might attempt to mitigate its violations of privacy or increase its odds of actually finding people doing something illegal.  Attorney General Eric Holder's Department of Justice cast a wide net in his search of AP phone logs, was the picture of intrusiveness in the James Rosen case, and now NSA is targeting millions of Americans for daily data collection?

Report: NSA is Collecting Phone Records of Verizon Customers.  The U.S. National Security Agency is reportedly collecting millions of Verizon (VZ) phone records after the government obtained a top-secret court order requiring the carrier hand over call data on all phone calls in its systems.  The White House on Thursday didn't back away from the report in the U.K.'s <>i>Guardian, with a senior Obama administration official defending the practice in general terms.

GCHQ 'has been accessing intelligence through internet firms'.  The Guardian newspaper claimed that it had obtained documents that show that GCHQ, based in Cheltenham, has had access to the system since at least June 2010, and generated 197 intelligence reports from it last year.  Intelligence reports from GCHQ are normally shared with Britain's security services MI5 and MI6.

NSA's Verizon Spying Order Specifically Targeted Americans, Not Foreigners.  The National Security Agency has long justified its spying powers by arguing that its charter allows surveillance on those outside of the United States, while avoiding intrusions into the private communications of American citizens.  But the latest revelation of the extent of the NSA's surveillance shows that it has focused specifically on Americans, to the degree that its data collection has in at least one major spying incident explicitly excluded those outside the United States.

President Obama's Dragnet.  [Scroll down]  The administration has now lost all credibility.  Mr. Obama is proving the truism that the executive will use any power it is given and very likely abuse it.  That is one reason we have long argued that the Patriot Act, enacted in the heat of fear after the 9/11 attacks by members of Congress who mostly had not even read it, was reckless in its assignment of unnecessary and overbroad surveillance powers.  Based on an article in The Guardian published Wednesday night [6/5/2013], we now know the Federal Bureau of Investigation and the National Security Agency used the Patriot Act to obtain a secret warrant to compel Verizon's business services division to turn over data on every single call that went through its system.

Did someone mention the Patriot Act again?

Verizon providing all call records to U.S. under court order.  The National Security Agency appears to be collecting the telephone records of tens of millions of American customers of Verizon, one of the nation's largest phone companies, under a top-secret court order issued in April.  The order appears to require a Verizon subsidiary to provide the NSA with daily information on all telephone calls by its customers within the United States and from foreign locations into the United States.

Verizon scandal: Barack Obama's national security state is now beyond democratic control.  Of course, it isn't the first time that a US administration has spied on its own people.  The origins of this particular order lie first in the 1978 Foreign Intelligence Surveillance Act and then in Section 215 of the Patriot Act, backed by George W Bush and passed by Congress after 9/11.  Normally, domestic surveillance only targets suspicious individuals, not the entire population, but in 2006 it was discovered that a similarly wide database of cellular records was being collected from customers of Verizon, AT&T and BellSouth.  There was plenty of outrage and plenty of lawsuits, but the National Security Agency never confirmed that the programme had been shut down.

Al Gore calls Obama administration's collection of phone records 'obscenely outrageous'.  Former Vice President Al Gore on Wednesday night leveled some rare and harsh criticism at the Obama administration, attacking its reported collection of phone records for millions of Americans.  The Guardian's Glenn Greenwald reported Wednesday evening that the National Security Agency has used a secret court order issued in April to collect the records of all phone calls made on the Verizon network.

Thank You, Unknown Patriot, for Exposing the Spying on Verizon Customers.  The federal government forced Verizon to turn over information on the phone calls of millions of innocent Americans and forbade them from telling anybody about it, The Guardian reports.  Kudos to Glenn Greenwald, Ewen MacAskill, and Spencer Ackerman for the impressive scoop, and for posting the evidence here.  Who helped the journalists obtain that "top-secret" court order?  Hopefully, that's going to stay secret for a long time.  As Charlie Savage and Edward Wyatt note in the New York Times, "The order was marked TOP SECRET//SI//NOFORN, referring to communications-related intelligence information that may not be released to noncitizens. [...] In other words, it was likely leaked by someone who took a personal risk exposing it.

Senators: NSA phone sweeping has been going on since 2007.  The leaders of the Senate Intelligence Committee on Thursday said senators were informed of the administration's sweeping surveillance practices, which they said have been going on since 2007.  "Everyone's been aware of it for years, every member of the Senate," said Sen. Saxby Chambliss (Ga.), the ranking Republican on the Senate Intelligence Committee.

Obama administration defends phone record collection.  The Obama administration on Thursday defended its collection of the telephone records of millions of Americans as part of U.S. counterterrorism efforts, re-igniting a fierce debate over privacy even as it called the program critical to warding off an attack.

NSA out of control: We the people at fault.  Today, the front page of every major national news website is featuring reactions to Glenn Greenwald's explosive report on the FISA court order that "requires Verizon on an "ongoing, daily basis" to give the NSA information on all telephone calls in its systems, both within the US and between the US and other countries."  That means that the government is collecting information on every call made on Verizon's service, regardless of probable cause or any suspicion that the parties have committed a crime.  The Fourth Amendment was written specifically to prohibit this activity by the government.  But they're doing it, unapologetically.

GOP Sen. Graham says he's 'glad' NSA is collecting phone records.  Sen. Lindsey Graham said Thursday that he is "glad" that the National Security Agency is collecting millions of telephone records — including his own — from one of the nation's largest telecommunications companies in an attempt to combat terrorism.  Mr. Graham said that he is a Verizon customer and has no problem with the company turning over records to the government if it helps it do its job.  The South Carolina Republican said that people who have done nothing wrong have nothing to worry about because the NSA is mining the phone records for people with suspected ties to terrorism.

Sen. Rand Paul slams government phone spying.  Sen. Rand Paul said that it is "an astounding assault on the Constitution" for the National Security Agency to secretly collect telephone records from millions of Verizon customers.  The Kentucky Republican and likely 2016 presidential candidate suggested that the NSA's data collection of Verizon customers, detailed in a report Thursday [6/6/2013] in The Guardian, a British newspaper, violates Fourth Amendment protections against unreasonable search and seizure.

From Verizon's 'Can you hear me now' to NSA's "Yes, every eavesdropped word".  When "Big Brother is Watching You" was the cold war mantra of the day, there were no cellphones, no iPads, no satellite communications of any kind in the hands of the unwashed masses.  Today Big Brother is not watching you, he's stalking and harassing you — right in the place you call home.  There's nowhere to hide; nowhere to run to and no one to turn to in a world where a government that has learned how to slip being held accountable has all the tools on its side.

How Extensive is the NSA Domestic Surveillance of U.S. Media? Is it legal?  Just like the Posse Comitatus laws prohibit the use domestically of the military and militarized weapons inside the United States or against U.S. citizens, reserving those authorities and tools to policing agencies, the NSA's tools are restricted domestically from use against U.S. citizens and businesses.  A fact which is apparently lost on the Obama administration, as we already see in Jewel vs. NSA, as the Electronic Frontier Foundation is meticulously documenting.

NSA reportedly collecting phone records of millions, though officials had denied holding 'data' on Americans.  Director of National Intelligence James Clapper was asked at a March hearing whether the National Security Agency collects any data on millions of Americans.  "No sir ... not wittingly," Clapper responded, acknowledging there are cases "where inadvertently, perhaps" the data could be collected.  NSA Director Gen. Keith Alexander also told Fox News last year that the agency does not "hold data on U.S. citizens."

The Editor says...
Now that we know the government collects phone records, how is it possible to believe the assurances that the government doesn't listen to the phone calls of ordinary Americans?  More broadly, how many other "internet conspiracy theories" are actually true?

Author of Patriot Act says NSA phone records collection 'never the intent' of law.  The author of the Patriot Act said Thursday [6/6/2013] that a secret program under which the Obama administration was collecting phone records from millions of Americans is "excessive" and beyond the scope of the law.  Rep. Jim Sensenbrenner, R-Wis., who wrote the 2001 law, was among a host of lawmakers on both sides of the aisle who raised alarm over the practice.

The Editor says...
If you can't foresee unintended consequences, you shouldn't write laws.

Revealed: NSA collecting phone records of millions of Americans daily.  The National Security Agency is currently collecting the telephone records of millions of US customers of Verizon, one of America's largest telecoms providers, under a top secret court order issued in April.  The order, a copy of which has been obtained by the Guardian, requires Verizon on an "ongoing, daily basis" to give the NSA information on all telephone calls in its systems, both within the US and between the US and other countries.

NSA Collecting Phone Records of Millions of Americans Daily.  Well here's another scandal ready for the Obama administration.  It was revealed today that the National Security Agency is currently collecting the telephone records of millions of US customers of Verizon.  This top secret order was issued in April.

Privacy of World Citizens Wiped Out by USA.  The ribbon-cutting ceremony invite, sent to a select group of Utah politicians and dignitaries for the massive Utah Data Centre in Bluffdale, Utah, was as mysterious as the facility itself.  Canada Free Press (CFP) could find no pictures, no accounts of the event anywhere on the Internet today even though an earlier media release said reporters would be there.  The bigger-than-the-CIA National Security Agency (NSA) had previously stated that the facility would start operations in September, 2013.

Obama Scandal Brush Fires Spread.  [Quoting Cal Thomas: "]Remember it was conservative President Bush who wrote an executive order authorizing the National Security Agency to intercept the communications of Americans by e-mail and phone without a warrant.  That's worse than the AP phone record intrusion."

The Stasi IRS?  It's often been said the Internal Revenue Service is the most feared bureaucracy in the United States.  Little wonder. [...] Deep in the subterranean bowels of the IRS, there are electronic folders full of deeply personal, private information about nearly every American and every tax exempt organization.  We now know this treasure trove of information is exponentially expanding and has been put to the use for the aims of a corrupt administration interested in crippling political opposition such as the Tea Party movement.  The harassment of the Richmond Tea Party group, which applied for tax exempt status, exemplifies the badgering many conservative groups have received over the last few years.

Your Phone Records May Have Been Seized, Too — But You'll Never Know.  Members of the press and defenders of civil liberties are rightfully outraged over the Justice Department's seizure of phone records from Associated Press reporters.  But for those familiar with the strange new world of digital surveillance, the secret acquisition of phone logs and emails is only an unusually public example of something that is disturbingly widespread, highly secret[Scroll down]  and completely legal.

Are all telephone calls recorded and accessible to the US government?  The real capabilities and behavior of the US surveillance state are almost entirely unknown to the American public because, like most things of significance done by the US government, it operates behind an impenetrable wall of secrecy.  But a seemingly spontaneous admission this week by a former FBI counterterrorism agent provides a rather startling acknowledgment of just how vast and invasive these surveillance activities are.

DOJ Won't Require Warrants for Email, Chat Seizures.  In blatant violation of the Fourth Amendment protections against unreasonable search and seizure, the Department of Justice has apparently declared that they do not require warrants for grabbing Americans' emails and Facebook chats.  The ACLU has gotten hold of the documents from the FBI and DOJ that show that a subpoena, which comes from a prosecutor, is all that is necessary to seize emails and chats.

ALL Digital Communications In The United States Are Being "Captured" By Government Surveillance Systems.  You may be reading this article in the privacy of your own home, but somewhere in a National Security Agency control center your every move is being tracked.  What time you logged on this morning, the web site you visited, how long you stayed and even what you said in the comments section — all of it — has been cataloged and possibly even flagged for suspicious activity.

Biometric Database of All Adult Americans Hidden in Immigration Reform.  The immigration reform measure the Senate began debating yesterday would create a national biometric database of virtually every adult in the U.S., in what privacy groups fear could be the first step to a ubiquitous national identification system.  Buried in the more than 800 pages of the bipartisan legislation is language mandating the creation of the innocuously-named "photo tool," a massive federal database administered by the Department of Homeland Security and containing names, ages, Social Security numbers and photographs of everyone in the country with a driver's license or other state-issued photo ID.

Automated License Plate Readers Threaten Our Privacy.  Law enforcement agencies are increasingly using sophisticated cameras, called "automated license plate readers" or ALPR, to scan and record the license plates of millions of cars across the country. [...] Photographing a single license plate one time on a public city street may not seem problematic, but when that data is put into a database, combined with other scans of that same plate on other city streets, and stored forever, it can become very revealing.

CIA, Other Spy Agencies Could Be Snooping on You and Your Bank Accounts.  The Central Intelligence Agency, National Security Agency, and other United States government spy agencies could receive full access to huge amounts of financial data on Americans and others who do banking in the United States, according to a report from the Reuters news agency.  Reuters reports its personnel have read a March 4 Treasury Department document that describes a developing plan by the Obama administration to allow government spy agencies to obtain, track and analyze the financial records of anyone with a bank account in the United States.  The CIA and other spy agencies have never been allowed to operate inside the nation's borders except in rare case-by-case instances.

Ruling Protects Bank, Phone, Other Records from FBI 'Security Letters'.  A federal judge in San Francisco has declared "national security letters" from the Federal Bureau of Investigation to banks, phone companies, and other businesses to be unconstitutional.  The March 15 ruling by U.S. District Judge Susan Illston declared the letters do not "serve the compelling need of national security."  The FBI has been issuing thousands of letters annually on its own authority and with no judicial review to obtain confidential customer information.  The letters also order the companies not to disclose the demands for information to targeted customers or others.  The FBI began issuing the letters after the USA Patriot Act became law in 2011.

Are all telephone calls recorded and accessible to the US government?  The real capabilities and behavior of the US surveillance state are almost entirely unknown to the American public because, like most things of significance done by the US government, it operates behind an impenetrable wall of secrecy.  But a seemingly spontaneous admission this week by a former FBI counterterrorism agent provides a rather startling acknowledgment of just how vast and invasive these surveillance activities are.

Big Government Mind-Readers.  A massive new NSA data center in Utah is under construction, which will be awfully handy for Big Government or anyone else who seeks the power that comes with control over information and the gateways to the networks it uses — all in one convenient, central location.  So far, many questions about NSA's "spy center" have gone unanswered as "classified" and "secret."

FBI Pursuing Real-Time Gmail Spying Powers as "Top Priority" for 2013.  Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time.  But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a "top priority" this year.

Silly extremist: the government has no designs on your firearms.  See?  No black helicopters here.  Just the innocent sharing of data between states and the federal government.  For the children!

National Databases: Collecting Student-Specific Data is unnecessary and Orwellian.  Home School Legal Defense Association has long opposed the creation of a national database of student-specific data.  We believe that such national databases threaten the privacy of students, could be abused by government officials or business interests that may gain access to the data, threaten the safety of young people if their data is breached, and are not necessary in order to educate young people.

ATF Seeks 'Massive' Database of Personal Info: 'Assets, Relatives, Associates and More'.  A recent solicitation from the Bureau of Alcohol, Tobacco and Firearms (ATF) reveals that the agency is seeking a "massive" online database capable of pulling up individuals' personal information, connections and associates.

Police Militarization, Abuses of Power, and the Road to Impeachment.  Ironically, while SWAT teams probably got their biggest boost initially from conservatives, many fear law enforcement is becoming a tool to enforce leftist ideology.  University criminal justice programs turn out graduates indoctrinated in liberal theology, which carries into modern law enforcement bureaucratic culture.  Today this trend is reflected in reports coming out of the Department of Homeland Security, the military, and various law enforcement "fusion" centers, that identify gun-owners, patriots, ex-military, Christians, pro-life activists, and tea party members as "potential domestic terrorists."

Why Data Mining Won't Stop Terror.  In the post-9/11 world, there's much focus on connecting the dots.  Many believe data mining is the crystal ball that will enable us to uncover future terrorist plots.  But even in the most wildly optimistic projections, data mining isn't tenable for that purpose.  We're not trading privacy for security; we're giving up privacy and getting no security in return.

US plan calls for more scanning of private Web traffic, email.  The U.S. government is expanding a cybersecurity program that scans Internet traffic headed into and out of defense contractors to include far more of the country's private, civilian-run infrastructure.  As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and Web surfing scanned as a precaution against cyber attacks.

Obama's Tyranny: Petty or Something More Sinister?  We have a Department of Homeland Security that has become one of the largest bureaucracies in the history of our government in the space of 11 years.  There is very little accountability and DHS has extraordinary powers to infringe the constitutional rights of our citizenry.  Drones, computer monitoring, and wiretaps are all allowed under the Obama Administration's overwhelming control of the mechanisms of state.  Just the other day, DHS announced plans to scan even more private e mail traffic.  There is a simple word for all of this; tyranny.

How Many Millions of Cellphones Are Police Watching?  In response to a congressional inquiry, mobile phone companies on Monday finally disclosed just how many times they've handed over users' cellphone data to the FBI and other law enforcement agencies.  By the New York Times' count, cellphone companies responded to 1.3 million demands for subscribers' information last year from law enforcement.  Many of the records, such as location data, don't require search warrants or much court oversight.  Both police and cell service providers had long resisted releasing details on the scope of cellphone surveillance.

Judge strikes down federal surveillance law.  A federal judge has ruled unconstitutional national security provisions that permit federal investigators to access customer information from some companies without court approval.  The provisions 'suffer from significant constitutional infirmities,' and violate the First Amendment and separation of powers, Judge Susan Illston of the District Court for the Northern District of California wrote in an order on Thursday [3/14/2013].

Judge rules secret FBI national security letters unconstitutional.  A federal judge has struck down a set of laws allowing the FBI to issue so-called national security letters to banks, phone companies and other businesses demanding customer information.  U.S. District Judge Susan Illston said the laws violate the First Amendment and the separation of powers principles and ordered the government to stop issuing the secretive letters or enforcing their gag orders, The Wall Street Journal reported.

Federal Judge Finds National Security Letters Unconstitutional, Bans Them.  Ultra-secret national security letters that come with a gag order on the recipient are an unconstitutional impingement on free speech, a federal judge in California ruled in a decision released Friday [3/15/2013].  U.S. District Judge Susan Illston ordered the government to stop issuing so-called NSLs across the board, in a stunning defeat for the Obama administration's surveillance practices.  She also ordered the government to cease enforcing the gag provision in any other cases.  However, she stayed her order for 90 days to give the government a chance to appeal to the Ninth Circuit Court of Appeals.

Homeland Security Releases Binder Detailing Internet Monitoring.  The binder includes an extensive list of key words and search terms carefully watched by analysts in multiple agencies including the Directorate for National Protection and Programs, Directorate for Science and Technology, Office of Health Affairs, the Transportation Security Administration (TSA), the Federal Emergency Management Agency (FEMA) and others.

Congress Has Enough Time to Keep Spying on You, Forever.  You will be utterly unsurprised to learn that the same United States Senate that hasn't passed a (legally required) budget resolution since 2009, that legislates via perpetual self-made crises and lards nearly all laws with brazenly fictitious sunset provisions and distant spending cuts, has managed to fit into its busy schedule of anti-gun press conferences and drunk-driving arrests an "unusual special session" to reauthorize the FISA Amendments Act of 2008 before the law turns into a pumpkin on Jan. 1.

Why Are People More Scared of Facebook Violating Their Privacy than Washington?  The traditional media response to the [FISA] reauthorization battle has been remarkably nonexistent.

Senate Approves Warrantless Phone Tapping for Next Five Years.  In 2007, the Senate voted to grant blanket immunity to companies like AT&T, which conspired with the NSA to monitor American digital conversations without government oversight after 9/11.  Today's vote continues that immunity, and provides further carte blanche for the American intelligence-gathering apparatus.  Phone calls, texts, and emails are all fair game — and a judge doesn't have to give the OK, so long as it's in the name of counterterrorism.  Which is a very easy guise.

Remember When the Left Used to Freak Out About News Like This?  The One campaigned in 2008 under a platform of getting rid of Bush's policies in this area (and almost every other area for that matter), but in fact warrantless wiretaps have skyrocketed under Obama.

Why We Should All Care About Today's Senate Vote on the Warrantless Domestic Spying Bill.  The FISA Amendments Act continues to be controversial; key portions of it were challenged in a case before the U.S. Supreme Court this term.  In brief, the law allows the government to get secret FISA court orders — orders that do not require probable cause like regular warrants — for any emails or phone calls going to and from overseas.  The communications only have to deal with "foreign intelligence information," a broad term that can mean virtually anything.

Congress Approves the FISA Warrantless Spying Bill for Five More Years.  Today, after just one day of rushed debate, the Senate shamefully voted on a five-year extension to the FISA Amendments Act, an unconsitutional law that openly allows for warrantless surveillance of Americans' overseas communications.  Incredibly, the Senate rejected all the proposed amendments that would have brought a modicum of transparency and oversight to the government's activities, despite previous refusals by the Executive branch to even estimate how many Americans are surveilled by this program or reveal critical secret court rulings interpreting it.

Prez wants to spy on US.  Can you imagine what would have happened if the Bush administration had implemented "no-probable-cause" searches like these?  Actually they tried to.  The Republican Congress stopped it.  So Obama's doing it the "executive order" way:  He's launched widespread spying on we the people, directly from the White House, without going through our elected representatives.  And where are the liberals?  Where are Michael "War Crimes" Moore and Keith "Bush Is A Fascist" Olbermann?

New Anti-Crime Cameras Being Installed Downtown.  Officials said 38 anti-crime cameras will soon be installed in downtown Los Angeles.  In the coming weeks, this new equipment will replace cameras which have been broken or failing for years.

Federal Judge OKs Installation of Surveillance Cameras Without a Warrant.  On October 29, a federal district court judge ruled that police can enter onto privately owned property and install secret surveillance cameras without a warrant.  The judge did set forth a few guidelines that must be followed before such activity would be permissible, but the fact that such a scenario is accepted as constitutional by a federal judge is a serious setback for privacy and for the Fourth Amendment.

DHS Fusion Centers Spend Much, Learn Little, Mislead a Lot.  A network of 77 "fusion" intelligence centers, set up around the country under the auspices of the federal Department of Homeland Security, has over the past decade uncovered little information that could be useful in defending the nation against terrorism.  It also created numerous reports on the legal, everyday of activities of ordinary Americans, according to a Senate report released Tuesday.

Federal Support For and Involvement In State and Local Fusion Centers.  The Subcommittee investigation found that DHS-assigned detailees to the fusion centers forwarded "intelligence" of uneven quality — oftentimes shoddy, rarely timely, sometimes endangering citizens' civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism.  The Subcommittee investigation also found that DHS officials' public claims about fusion centers were not always accurate.  For instance, DHS officials asserted that some fusion centers existed when they did not.

Senate Permanent Subcommittee on Investigations Federal Support for Fusion Centers Report.  The Subcommittee investigation found that DHS-assigned detailees to the fusion centers forwarded "intelligence" of uneven quality — oftentimes shoddy, rarely timely, sometimes endangering citizens' civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism.

Explosive findings about DHS operations in congressional report.  An explosive 141-page investigative report was quietly released just after midnight by the U.S. Senate Permanent Subcommittee on Investigations, Committee on Homeland Security and Governmental Affairs is an indictment of the practices and procedures of the U.S. Department of Homeland Security. [...] Of the 386 unclassified reports reviewed during this investigation, only 94 were found to relate "in some way" to potential terrorist activity, or the activities of a known or suspected terrorist.  Of those 94 reports, the usefulness of those reports were deemed as "questionable."

In Cell Phone Privacy Case, Government's Arguing a Theory of the Fourth Amendment 'That No One's Ever Heard Of'.  A federal appeals court in New Orleans is set to hear a case on whether the government can take possession of an individual's cell phone records from their carrier without a search warrant.  A federal court has already denied the government's bid to obtain the records without a warrant.  Judge Andrew Napolitano weighed in on Fox Business Network this morning [10/1/2012], saying the government's argument represents a new theory of the Fourth Amendment "that no one's ever heard of in 230 years."

Justice Department's Warrantless Spying Increased 600 Percent in a Decade.  The Justice Department use of warrantless internet and telephone surveillance methods known as pen register and trap-and-trace has exploded in the last decade, according to government documents the American Civil Liberties obtained via a Freedom of Information Act claim.

ACLU: Obama Has Quadrupled Warrantless Wiretaps.  The ACLU released a report this week that shows that under Obama and his Attorney General Eric Holder, warrantless wiretapping and monitoring of American's electronic communications is "sharply on the rise."

Welcome to the National Counterterrorism Center! We Already Know All About You!  The American Civil Liberties Union (ACLU) wants to warn you about "the biggest new spying program you've probably never heard of" at the National Counterterrorism Center (NCTC).

Govt May Now Collect, Catalog, and Store All Private Information.  Imagine that the U.S. government had the power to scour the reams of public records and collect and collate every bit of personal information about every citizen of this country.  Now imagine that any of the various intelligence and security agencies within the government could combine that data with any other information about a person that has been posted to a social media website or compiled by one of the many data aggregating companies that keep tabs on all of us.  Finally, imagine that all this data could be passed among these agencies and that the ability of anyone inside or outside the government to challenge this surveillance was all but eliminated.

Feds Sue Telecom for Fighting Warrantless Search.  The Justice Department is suing a telecommunications company for challenging a request from the Federal Bureau of Investigation for customer information — despite the fact that the law authorizing the request explicitly permits such challenges. [...] Clearly the Justice Department is unaccustomed to having to defend its attempts to obtain customer data on its own say-so; and it isn't taking this fight lying down.

Covert FBI Power to Obtain Phone Data Faces Rare Test.  Early last year, the Federal Bureau of Investigation sent a secret letter to a phone company demanding that it turn over customer records for an investigation.  The phone company then did something almost unheard of:  It fought the letter in court.  The U.S. Department of Justice fired back with a serious accusation.  It filed a civil complaint claiming that the company, by not handing over its files, was interfering "with the United States' sovereign interests" in national security.  The legal clash represents a rare and significant test of an investigative tool strengthened by the USA Patriot Act, the counterterrorism law enacted after the attacks of Sept. 11, 2001.

National Reconnaissance Office accused of illegally collecting personal data.  One of the nation's most secretive intelligence agencies is pressuring its polygraphers to obtain intimate details of the private lives of thousands of job applicants and employees, pushing the ethical and legal boundaries of a program that's designed instead to catch spies and terrorists.  The National Reconnaissance Office is so intent on extracting confessions of personal or illicit behavior that officials have admonished polygraphers who refused to go after them and rewarded those who did, sometimes with cash bonuses, a McClatchy investigation found.

Is US government reading email without a warrant? It doesn't want to talk about it.  In March, the American Civil Liberties Union caused a nationwide stir when the advocacy group released the results of its year-long investigation into law enforcement use of cellphone tracking data.  After issuing hundreds of Freedom of Information Act requests, the ACLU learned that many local police departments around the country routinely pay mobile phone network operators a small fee to get detailed records of historic cell phone location information.  The data tell cops not just where a suspect might have been at a given moment, but also create the possibility of retracing someone's whereabouts for months.

NSA chief defends agency against domestic spying charges.  The head of the National Security Agency on Monday denied reports that NSA's new data center in Utah would collect and store data about Americans, including their e-mails and web-browsing habits.  The $2 billion data center in Bluffdale, Utah, will house massive supercomputers capable of storing and analyzing vast quantities of data when it comes online next year, but U.S. Army Gen. Keith B. Alexander reiterated NSA's insistence it does not unlawfully conduct surveillance of Americans.

Supreme Court to Decide Whether NSA Domestic Wiretapping Is Beyond the Law.  On Monday [6/4/2012], the Supreme Court of the United States granted a petition to hear a lawsuit calling for an end to another case challenging the constitutionality of the government's warrantless wiretapping program.  This Orwellian (and unconstitutional) surveillance scheme was established in the wake of the attacks of September 11, 2001, and was explicitly authorized by an act of Congress passed in 2008.

Senators Demand DOJ Release Secret Spy Court Rulings.  Two Democratic senators urged the Obama administration Thursday [3/15/2012] to declassify secret court rulings that give the government far wider domestic spying powers under the Patriot Act than intended.  The 10-year-old measure, hastily adopted in the wake of the 2001 terror attacks, grants the government broad surveillance powers with little oversight that can be used domestically.

DHS Conducts 'Drive-by' Surveillance.  What's Next?  [Scroll down]  The Electronic Privacy Information Center, or EPIC, has made public a series of government contracts that reveal that the Department of Homeland Security has been paying millions of dollars to develop and implement several radical programs that allow for an even broader, even spookier form of covert surveillance, namely "drive-by" surveillance from innocuous looking vans.  In its own words this allows the Department of Homeland Security to conduct "covert inspection of moving subjects," which includes people, places, and things.  According to a former Homeland Security officer who spoke on the condition of anonymity, DHS has been conducting this "drive-by" surveillance of American citizens since at least 2007, using a technologically advanced vehicle called a Z Backscatter Van, or ZBV for short.

As application approvals drop, work on secret wiretaps grows, U.S. government sources say.  Even as the Justice Department reports a two-year decline in the number of wiretap applications approved by a secret U.S. intelligence court, the workload of Justice Department lawyers assigned to request and oversee such sensitive surveillance activities appears to be growing.

Fall back, Big Brother.  Americans can be excused for a slight paranoid feeling that someone is following them.  Omnipresent surveillance cameras, especially in Chicago, record our daily movements.  If we use our cell phones, we announce where we are.  Our online communications can be monitored or resurrected from the distant past.  Congress is thinking about installing data-gathering "black boxes" in every car.  And now two U.S. senators — Chuck Schumer (D-N.Y.) and John Cornyn (R-Texas) — have introduced a bill to require people to produce identification before buying pre-paid cell phones.

Don't squeeze the telecoms.  Certain Democratic senators are doing their Pavlov's dog routine again, responding to the bell of the trial lawyers who finance their campaigns.  In this instance, they are reopening a fight to make telecommunications companies liable for trillions of dollars for complying with a presidential directive to assist in a "warrantless surveillance" program against suspected terrorists.

Abolish the DHS.  Many of the contracts that DHS considers a success have funded a growing federal assault on privacy.  The fishing village of Dillingham, AK (pop. 2,400), is too small for a streetlight, but thanks to a homeland security grant, it now has 80 surveillance cameras.  The town of Ridgely, MD (pop. 1,400), got a grant for cameras as well.  "It was difficult to be able to find something to use the money for," said Ridgely's police chief, but "if you don't ask, you aren't going to get a thing."

Illegal wire-tapping suit now in Obama's court.  President-elect Barack Obama dismayed civil liberties groups last summer when he voted to authorize President Bush's clandestine wiretapping program after publicly denouncing it.  Now, thanks to a ruling by a San Francisco federal judge, Obama must take a stand on whether the Bush administration violated Americans' rights when it intercepted their phone calls and e-mails without seeking a court's permission.

With CCTV everywhere no wonder we're all scared stiff.  The proliferation of surveillance equipment such as CCTV cameras (of which we have more than the rest of Europe put together) only makes people more worried of the very things the cameras are designed to tackle:  crime and terrorism.  It is ironic that something which is supposed to put our minds at rest has exactly the opposite effect.

How £500m of CCTV cameras does 'next to nothing' to cut crime.  The millions of CCTV cameras on Britain's streets have done virtually nothing to cut crime, Home Office research has revealed.  Cameras in town centres, housing estates and on public transport 'did not have a significant effect', a report concluded.

A Look Inside the Surveillance Society.  Is England a police state? It's hard not to think so given that the nation's public spaces brim with 4.2 million surveillance cameras.  Indeed, the United Kingdom seems an extreme case.  They use 20 percent of the world's closed-circuit television (CCTV) cameras but monitor only one percent of its population.

Britain To Put CCTV Cameras Inside Private Homes.  As an ex-Brit, I'm well aware of the authorities' love of surveillance and snooping, but even I, a pessimistic cynic, am amazed by the governments latest plan:  to install Orwell's telescreens in 20,000 homes.  £400 million ($668 million) will be spend on installing and monitoring CCTV cameras in the homes of private citizens.  Why?  To make sure the kids are doing their homework, going to bed early and eating their vegetables.

US court:  Monitoring Muslims was constitutional.  A federal appeals court says it was constitutional for the United States to require visitors from two dozen Arab and Muslim countries and North Korea to register with immigration authorities.  The 2nd U.S. Circuit Court of Appeals in Manhattan issued its ruling Wednesday [9/24/2008] in cases brought by several men who claimed their constitutional rights were violated.

Domestic spying far outpaces terrorism prosecutions.  The number of Americans being secretly wiretapped or having their financial and other records reviewed by the government has continued to increase as officials aggressively use powers approved after the Sept. 11 attacks.  But the number of terrorism prosecutions ending up in court — one measure of the effectiveness of such sleuthing — has continued to decline, in some cases precipitously.

Surveillance Showdown:  Would any sane country purposefully limit its ability to spy on enemy communications in time of war?  That is the question Congress must answer as it takes up reform of the Foreign Intelligence Surveillance Act.  Privacy activists, civil libertarians and congressional Democrats argue that both foreign and domestic eavesdropping must be subject to judicial scrutiny and oversight, even if this means drastically reducing the amount of foreign intelligence information available to the government, without ever acknowledging the costs involved.  It is time the American people had an open and honest debate on the relative importance of privacy and security.

A diffeerent kind of domestic surveillance...
Camera convicted him but raised battle over privacy.  Farmers beware:  Big Brother may be watching.  Eastern Shore soybean farmer Steve VanKesteren learned that the hard way when he was charged with taking two red-tailed hawks, a violation of the federal Migratory Bird Act.  The evidence against him was a video recording showing him dispatching the birds with an ax.  Game wardens had put a hidden camera in a tree, pointed at VanKesteren's soybean fields, after receiving a complaint about protected birds getting caught in predator traps.

Bush Asks Congress to Extend NSA Program.  President Bush today [9/19/2007] called on Congress to make permanent a law that gives the government broad authority to eavesdrop without warrants on phone calls, e-mail and other communication between people in the United States and suspected terrorists abroad.  The president wants Congress to extend the law, set to expire in February, that allows spy agencies to intercept the communications of suspected terrorists that pass through U.S. switching facilities.

Phone Companies Refuse to Provide Data on Spy Program.  Three of the largest U.S. telephone companies declined to answer lawmakers' questions about Bush administration efforts to spy on Americans' phone calls and e-mails, saying the government forbade them from doing so.

NSA Style Eavesdropping Thwarts 9/11 Anniversary Terror Attack.  It appears that the very methods of phone call monitoring the Democrats have made their life's mission to impede have once again saved the day. … Unfortunately, there's no reason to believe that Democrat leaders the likes of Senate Judiciary Committee Chairman Pat Leahy will be any less likely to rebuke the use of "secret" (is there any other effective kind?) wiretaps now than before.  Even at the cost of American lives.

Listening In:  When the German government announced arrests this week in a terrorist plot against American and German targets inside Germany, one telling detail got little notice:  Two of the suspects were identified, in part, based on telephone conversations intercepted by American intelligence.

House approves foreign wiretap bill.  The House handed President Bush a victory Saturday, voting to expand the government's abilities to eavesdrop without warrants on foreign suspects whose communications pass through the United States.

Victory for Bush Administration in Spying Case.  A federal appeals court ordered the dismissal Friday [7/6/2007] of a lawsuit challenging President Bush's domestic spying program, saying the plaintiffs had no standing to sue.  The 2-1 ruling by the 6th Federal Circuit Court of Appeals panel vacated a 2006 order by a federal judge in Detroit, who found that the post-Sept. 11 warrantless surveillance aimed at uncovering terrorist activity violated constitutional rights to privacy and free speech and the separation of powers.

The Editor is quick to point out...
The word "privacy" is not in the Constitution.

Wiretap Tales.  Democrats and former Deputy Attorney General James Comey put on quite a Senate show Tuesday [5/15/2007] over the National Security Agency's wiretapping program.  With New York's Chuck Schumer directing, the players staged a full length docudrama to create the impression that the Bush Administration broke the law in reauthorizing the program to eavesdrop on al Qaeda. … News stories have suggested a pattern of White House misdeeds to accomplish an ultimately illegal end.  The transcript tells a different story.

Wiretap Debacle:  The U.S. homeland hasn't been struck by terrorists since September 11, and one reason may be more aggressive intelligence policies.  So Americans should be alarmed that one of the best intelligence tools — warrantless wiretapping of al Qaeda suspects — has recently become far less effective and is in danger of being neutered by Congressional Democrats.

The Editor says...
I disagree insofar as the notion that no terrorist attacks have taken place in America since 9/11/2001 is easily disproven.

Networks Distort Terrorist Surveillance Into 'Domestic Spying'.  The announcement Wednesday from Attorney General Alberto Gonzales, that the Foreign Intelligence Surveillance Court (FISA) would now approve of surveillance actions under the "Terrorist Surveillance Program," prompted a return to the bad network habit of describing as "domestic spying" and "domestic eavesdropping" the effort to monitor communication between people inside the United States and suspected terrorists abroad.

Let's Have a FISA Fight.  Here's something I never thought I'd say:  Three cheers for Chris Dodd!  With his bid for the Democrats' presidential nomination canceled for lack of interest, Connecticut's senior senator is back to doing what he does best:  making the United States vulnerable to foreign threats.  The editors of the Wall Street Journal report that Dodd is blocking a deal to overhaul the dangerously obsolete Foreign Intelligence Surveillance Act (FISA).

FBI turns to broad new wiretap method.  Instead of recording only what a particular suspect is doing, agents conducting investigations appear to be assembling the activities of thousands of Internet users at a time into massive databases, according to current and former officials.  That database can subsequently be queried for names, e-mail addresses or keywords. … "What they're doing is even worse than Carnivore," said Kevin Bankston, a staff attorney at the Electronic Frontier Foundation who attended the Stanford event.  "What they're doing is intercepting everyone and then choosing their targets."

Did someone mention Carnivore?  What kind of words and phrases could the FBI be hoping to find?

Did the Clinton Administration Engage in "Domestic Spying" Against Princess Diana?  The first thing to remember in trying to evaluate reports that U.S. intelligence services wiretapped Princess Diana is that British press accounts can be notoriously unreliable. … But if the reports out now are accurate, the Diana case could raise questions for veterans of the Clinton administration similar to those facing the Bush administration today.

Gonzales attacks ruling against domestic spying.  Attorney General Alberto Gonzales contended Saturday that some critics of the Bush administration's warrantless surveillance program were defining freedom in a way that presents a "grave threat" to U.S. security.  Gonzales was the second administration official in two days to attack a federal judge's ruling last August that the program was unconstitutional.  Vice President Dick Cheney on Friday [11/17/2006] called the decision "an indefensible act of judicial overreaching."

Court says eavesdropping program can continue.  The government can continue to use its warrantless domestic wiretap program pending the Justice Department's appeal of a federal judge's ruling outlawing the program, an Appeals Court in Cincinnati ruled on Wednesday [10/04/2006].  The ruling overturned District Judge Anna Diggs Taylor's decision last week to deny a lengthy stay in the case, which is expected to end up with the Supreme Court.

A Perverse and Dangerous Ruling.  By striking down the Terrorists Surveillance Program (TSP) Judge Anna Diggs Taylor has hopefully opened the eyes of the American public to the Leftist political insurgency that is undermining the United States' ability to defend itself against future terrorist attacks.

Senate Panel Rejects Democrat's Attempt to Rein In Wiretapping Program.  Senate Republicans blocked Democratic attempts to rein in President Bush's domestic wiretapping program Wednesday [9/13/2006], endorsing a White House-supported bill that would give the controversial surveillance legal status.

A terror plot is exposed by the policies many American liberals oppose.  British antiterrorism chief Peter Clarke said at a news conference that the plot was foiled because "a large number of people" had been under surveillance, with police monitoring "spending, travel and communications."  Let's emphasize that again:  The plot was foiled because a large number of people were under surveillance concerning their spending, travel and communications.  Which leads us to wonder if Scotland Yard would have succeeded if the ACLU or the New York Times had first learned the details of such surveillance programs.

More FISA Fear-Mongering:  The New York Times strikes again.  In Times parlance, such monitoring of international enemy contacts, routinely carried out by every wartime president in history, somehow becomes "domestic spying" when George W. Bush employs it against an enemy that has managed to attack the United States — and, according to the intelligence community's latest assessment, is working feverishly to do it again.

White House invokes secrets privilege in eavesdropping cases.  The Bush administration has asked federal judges in New York and Michigan to dismiss a pair of lawsuits filed over the National Security Agency's domestic eavesdropping program, saying litigating them would jeopardize state secrets.

The ACLU v. National Security.  The fundamental defect of the case of ACLU v. NSA is that it is wholly contrived.  Faked from beginning to end.  The claim of standing is for conduct that simply does not exist.

To connect the dots, you have to see the dots.  The jihadists are not "primitives".  They're part of a sophisticated network:  They travel the world, see interesting places, meet interesting people — and kill them.  They're as globalized as McDonald's — but, on the whole, they fill in less paperwork.

Information Please.  It's not 1942.  It's 2006, and these three phone giants are about to be excoriated for cooperating with the war on terror.  Senate Judiciary Committee chairman Arlen Specter has demanded that ATT, Verizon, and BellSouth testify under oath about their assistance to the National Security Agency's counterterrorism programs; 50 House Democrats are demanding a criminal investigation by special counsel.

Excellent!
Terrorist Surveillance and the Constitution:  While the totality of the executive powers and actions is meant to be checked and balanced by the other two branches, the notion that every single executive activity, particularly in the national security area, has to be checked either by Congress or by the judiciary, is absurd.

Dialing and the Democrats:  No sooner had the man who ran the National Security Agency for years been nominated to head the CIA than USA Today rushed out details of our efforts to use technical means to find terrorists using the phones.  And no sooner had USA Today disclosed details of an apparent attempt by the National Security Agency to defend Americans from terrorists than the Democratic Party and its leading politicians and interest groups went on the attack.  Not against the terrorists but against President Bush.

TV Jumps on Stale NSA Database Story.  Like the TV coverage, USA Today's story insinuated that the existence of the database was a major violation of Americans' privacy rights and evidence that the President was lying last December when he described the NSA's eavesdropping on suspected terrorist communications as limited and targeted.

The Editor says...
Just for reference, here is the USA Today article:

NSA has massive database of Americans' phone calls.  The three telecommunications companies are working under contract with the NSA, which launched the program in 2001 shortly after the Sept. 11 terrorist attacks, the sources said. The program is aimed at identifying and tracking suspected terrorists, they said. The sources would talk only under a guarantee of anonymity because the NSA program is secret.

A Smelly NSA "Scoop" at USA Today.  It appears the basic flaw in the story, as suggested by the entire Verizon statement, is the assumption that phone companies passed along records of local calls to the NSA when the company says such records may not even exist in most cases.

The database double standard.  Here is the most insincere question a liberal TV news star can ask:  How can President Bush turn around his poll numbers? … The media's crocodile tears are not even laughable, just nauseating.  Pushing down the president's approval rating seems to be their daily task.

Media Crank Call:  Ever since USA Today broke a story on May 11 about the National Security Agency's secret review of millions of phone records, the media and civil libertarians alike have gotten their knickers in a twist.  But here's the problem: the story isn't news, it isn't accurate, and it isn't (or shouldn't be) troubling.

Update — USA Today backpedals.
USA Today:  Call Database Not So Broad.  USA Today acknowledged in a "note to our readers" Friday [6/30/2006] that it could not establish that BellSouth or Verizon contracted with the National Security Agency to provide it with customer calling records, as it previously reported.

On the other hand...
Is the NSA's phone call database legal because the President says so?  As USA Today pointed out when it revealed the existence of this program, phone numbers can readily be linked to names and addresses using publicly available information.  The claim that there's really nothing personal or private about the phone call records — which tell the NSA who calls whom, when, and for how long — is therefore a tenuous basis for defending the legality of data collection that ordinarily requires a court order or the customer's consent.

Secret Mistakes.  It's no secret:  Critics of the Bush administration's prosecution of the war on terror have grown increasingly livid with each leaked report of alleged civil liberties abuses.  Less known, but no less true, is that the latest round of criticism has relied on discredited data.

Data-mining is the President's Duty.  The latest outbreak of controversy over Bush administration efforts to protect our nation from terrorist attack starkly demonstrates that the left and civil liberties extremists are determined to alter the system the Framers bequeathed us in fundamental and dangerous ways.

Connecting dots:  NSA needs phone records.  Despite the nonsense that the politically motivated mainstream media and the left have been spouting on the NSA program, this critical counterterrorism effort isn't intrusive, illegal — or unnecessary.

Loose lips sink ships.  Intentional, or even unintentional, leaks dry up productive intelligence-gathering techniques; Americans are placed at risk. … Have we as a nation forgotten the basics of the art of war?  Are we so misguided as to believe that the ACLU will protect us better than the NSA in this era of terrorism?

The Truth About Secrets:  Virtually every aspect of the war on terror has been met with a lawsuit.  Recently the Center for Constitutional Rights (CCR) and the ACLU sued the federal government over the NSA's surveillance of international phone calls involving persons inside the United States.  They seek court orders ceasing and disclosing the surveillance.

Hysteria at the ACLU.  You would never know from all this heavy breathing that the data supplied to the NSA consisted of phone numbers only, stripped of any identifying names or addresses.  Or that the calls themselves weren't actually monitored — no one was wiretapping any conversations.  Or that the Supreme Court has ruled that the government doesn't need a warrant to collect phone records, since information voluntarily disclosed to a third party (such as the phone company) isn't protected by the Fourth Amendment.

Did someone mention the ACLU?

Point of no return:  There is a large and gleeful audience in the Arab world for these gross brutalities, just as there was glee and cheering among the Palestinians when the televised destruction of the World Trade center was broadcast in the Middle East.  Yet what are we preoccupied with or outraged about?  Whether the American government should intercept the phone calls of these cutthroats to people in the United States.

Telephoning the Enemy:  By its own court filings, the Council on American-Islamic Relations conclusively established its multiple communications with persons suspected of connections with terrorists.

FISA judges say Bush is within the law.  A panel of former Foreign Intelligence Surveillance Court judges yesterday [3/28/2006] told members of the Senate Judiciary Committee that President Bush did not act illegally when he created by executive order a wiretapping program conducted by the National Security Agency (NSA).

House panel blocks probe of NSA cost.  The House Intelligence Committee on Thursday [3/30/2006] rejected a proposal to withhold money from the National Security Agency if the White House did not reveal information about the cost of the agency's warrantless surveillance program.

Point of no return.  The way the question is posed by many in the media and in politics, you would think our intelligence agencies were listening in on you talking on the phone to your aunt Mabel.  Be serious!  There are more than a quarter of a billion people in the United States.  Intelligence agencies have neither the manpower, the time, the money, nor the interest to listen in on you and your aunt Mabel.

Censure Feingold.  Unlike Sen. Russell Feingold, the Wisconsin Democrat seeking to censure President Bush for ordering the interception of communications in and out of the U.S. involving persons with suspected links to al Qaeda, Democratic President Franklin Roosevelt had no qualms about warrantless eavesdropping to protect the U.S. against attack.  Neither did Harry Truman.  There is a difference, however, between the eavesdropping Roosevelt and Truman authorized and the eavesdropping Bush is doing.  Roosevelt and Truman did it in peacetime without congressional authorization.  Bush is doing it during a war that Sen. Feingold voted on Sept. 14, 2001 to authorize.

Feingold Calls Warrantless Wiretaps an Impeachable Offense.  "I think it is right in the strike zone of what the Founding Fathers talked about when they talked about high crimes and misdemeanors," said Feingold, who introduced a resolution on Monday [3/13/2006] to censure the president for his authorizing the National Security Agency's electronic terrorist surveillance program.

[Where was Mr. Feingold's great concern about high crimes and misdemeanors seven or eight years ago?]

Do the Democrats know we're at war?  Many that oppose President Bush are claiming that he has authorized illegal wiretapping and should be impeached.  These actions have been wrongly termed "domestic spying" or "domestic surveillance."  From my view, these terms are purposefully wrong.  The use of the wrong terms is directly tied to the media and unhinged Democrats.

You're under surveillance.  In the midst of all the hypocritical and self-righteous talk about the fact that the National Security Agency actually listens to calls from known or suspected terrorists talking to someone in the United States or vice versa, is the fact that every single American is under surveillance these days.  It begins with the Social Security number that is issued to newborn infants!

If al Qaeda phones, tell them we can't take the call.  The issues at the center of this dispute are in fact intellectually interesting, having to do with separation of powers, legal rules versus legal discretion, and competing interpretations of the Fourth Amendment and Article II of the Constitution.  But let us here consider something that tends to fall outside legal considerations — effective management.

Springtime for Nixon.  Liberals in the 1970s began suggesting that virtually all American spying is unconstitutional.  Soviet and Chinese spies were to be expected, but we shouldn't "be like them."  A similar double standard exists today in much of the big media and among certain liberal politicians of both parties.  The enemy does what it wants without restraint.  We put shackles on ourselves and are shocked when those without any attack us.  Then we ask, "What went wrong?"

Security choices:  Democrats ought to be concerned by polls that show most Americans want the government to intercept al Qaeda communications, even — perhaps especially — those involving persons living here, as were all of the 9/11 attackers before they flew airplanes into our buildings.

Leaks Damage U.S. Intelligence Efforts.  In the most recent case addressing this issue, the 1980 Truong case, the Court upheld the Executive Branch's warrant-less electronic surveillance in the United States for foreign intelligence purposes.  The Court explicitly recognized a foreign intelligence exception to the warrant requirement based on the President's constitutional authority and responsibility to protect national security.  Incidentally, the President under whose authority that warrant-less search, or eavesdropping, was conducted was Jimmy Carter.

Has the New York Times Violated the Espionage Act?  The President, for his part, has not only stood firm, insisting on both the legality and the absolute necessity of his actions, but has condemned the disclosure of the NSA surveillance program as a "shameful act."  In doing so, he has implicitly raised a question that the Times and the President's foes have conspicuously sought to ignore — namely, what is, and what should be, the relationship of news-gathering media to government secrets in the life-and-death area of national security.  Under the protections provided by the First Amendment of the Constitution, do journalists have the right to publish whatever they can ferret out?

Jimmy Carter allowed surveillance in 1977.  In 1977, Mr. Carter and his attorney general, Griffin B. Bell, authorized warrantless electronic surveillance used in the conviction of two men for spying on behalf of Vietnam.  The men, Truong Dinh Hung and Ronald Louis Humphrey, challenged their espionage convictions to the U.S. Court of Appeals for the 4th Circuit, which unanimously ruled that the warrantless searches did not violate the men's rights.  In its opinion, the court said the executive branch has the "inherent authority" to wiretap enemies such as terror plotters and is excused from obtaining warrants when surveillance is "conducted 'primarily' for foreign intelligence reasons."

The opposite of intelligence:  If anyone can show me that the National Security Agency, under order from President Bush or top aides, eavesdropped on Hillary Clinton or Ted Kennedy or some prominent partisan critic, I'll change my tune and see what this administration is doing as a threat to civil liberties.

Amnesiac America:  Not that the president and commander-in-chief needed congressional permission to defend the country, thanks to the foresight of those who wrote the Constitution.  But in a joint resolution passed three days after the September 11th attacks, Congress made the point explicitly, recognizing that "the President has authority under the Constitution to take action to deter and prevent acts of international terrorism against the United States."

'Domestic' abuse:  I hereby expressly consent to the NSA eavesdropping on any telephonic, Internet or other electronic forms of communications I may have — whether I initiate or am on the receiving end of the communication — with any person or persons the government has reasonable basis to conclude is a member of al Qaeda, affiliated with al Qaeda or a member of an organization affiliated with al Qaeda.

NYT Still Struggles to Understand NSA Program; Ignores History.  What is so hard to grasp here?  Terrorism is a clandestine business.  Should we be calling the terrorists we're monitoring to let them know they are being monitored?  Have there been any wrongful deaths, convictions or violations in connection with the NSA program?  No.  Do the American people support it?  Yes.

Civil liberties v. al Qaida nukes:  Despite their best efforts to turn President George Bush's authorization of the NSA program into a criminal case, it turns out that no laws were broken, and most Americans actually want their government to track communications between domestic Islamist groups and al Qaida principals around the world — not to mention capturing or killing the latter.

The President is honoring his oath.  Are critics of President Bush's electronic-surveillance practices concerned with the Constitution?  Or are they just using any excuse they can find to accuse him of abusing his power?  If they are concerned with constitutional issues, why didn't they object to President Clinton's advocacy of warrantless searches — even for physical searches as opposed to electronic surveillance — for national security reasons?

Stuck in the '70s.  The press and partisan attacks on NSA surveillance of suspected terrorists' calls to the United States has not convinced most Americans that their rights are in peril.

Bush hits foes who say spying broke the law.  President Bush yesterday [1/23/2006] took direct aim at Democratic critics on Capitol Hill who charge that a secret spy program he ordered in 2002 is illegal, saying, "If I wanted to break the law, why was I briefing Congress?"

Live and let spy.  If we must engage in a national debate on half-measures: After 9-11, any president who was not spying on people calling phone numbers associated with terrorists should be impeached for being an inept commander in chief.

And so what if you are?  Here's what happened.  After 9/11, authorities found a bunch of e-mail addresses and phone numbers in the phones and computers of confirmed terrorists.  They tracked down those leads.  Most of the people the NSA started eavesdropping on — about 7,000 — lived overseas, and their phone calls were to other foreigners living abroad.

Spying on Americans Seems to be OK if Democrats Do It.  The New York Times, which is currently scourging the Bush Administration over concerns it's "abusing" surveillance powers, blythely ignored evidence of greater "abuse" of such powers by the Clinton Administration.

Under Clinton, the NY Times called surveillance "a necessity".  The controversy following revelations that U.S. intelligence agencies have monitored suspected terrorist related communications since 9/11 reflects a severe case of selective amnesia by the New York Times and other media opponents of President Bush.  They certainly didn't show the same outrage when a much more invasive and indiscriminate domestic surveillance program came to light during the Clinton administration in the 1990's.

Nut-shelling Privacy Issues.  Some good friends on the Right and many nutcases on the Left are raising issues about our privacy in the wake of reports that the feds are listening in on cell phones and reviewing emails in the war on terrorism. … We don't have to join forces with the ACLU to stand up for individual liberty.  Clearly they don't care about the concept of "rights" unless it serves their decidedly hard-left agenda.

Are you scared of Alito?  In the matter at hand, there isn't a substantial public outcry, measured as squeals or yells from citizens imposed upon.  This is so because not enough citizens are subject to surveillance to bring on anything like a national alarm.  To begin with, those who are subject to special surveillance are overwhelmingly non-citizens.  A second reason for the general tranquility is that there is not much of a record of abuse.

Gonzales to back wiretapping in Senate testimony.  Attorney General Alberto R. Gonzales will testify next month before a Senate committee on the legal justifications behind a domestic eavesdropping program approved by President Bush.

The Editor says...
While the word "wiretap" is used by the dumbed-down news media for the benefit of the poorly educated masses, the interception of telephone calls by the feds is done without making connections to actual wires.  This issue is about eavesdropping on international phone calls, and almost all international calls are carried by microwave and satellite links which are easy to listen in on.

Why We Don't Trust Democrats With National Security.  The Democratic Party has decided to express indignation at the idea that an American citizen who happens to be a member of al Qaeda is not allowed to have a private conversation with Osama bin Laden.  If they run on that in 2008, it could be the first time in history a Republican president takes even the District of Columbia.

'Warrantless' searches are not unprecedented.  Previous administrations, as well as the court that oversees national security cases, agreed with President Bush's position that a president legally may authorize searches without warrants in pursuit of foreign intelligence.

It's not that hard to grasp, folks:  'Spying' saves lives.  The argument for allowing the National Security Agency to spy on Americans is simple:  It works.

Spies like us.  Try as I might, I can't muster outrage over what appears to be a reasonable action in the wake of 9/11.  As a rule, I'm as averse as anyone to having people "spying" on me.  I'm also as devoted to protecting civil liberties as any other American.  But the privilege of debating our constitutional rights requires first that we be alive.  If federal agents want to listen in on suspected terrorists as they plot their next mass murder, please allow me to turn up the volume.

Liberal judge:  Federal District Judge James Robertson, who resigned from the Foreign Intelligence Surveillance (FISA) court in protest over secret wiretaps ordered by President Bush, is regarded in Washington legal circles as one of President Bill Clinton's most liberal and partisan judicial appointments.

The Left's privacy hypocrites.  The hindsight hypocrisy of the civil-liberties absolutists never ceases to amaze.  And their selective outrage over privacy violations never ceases to aggravate. … The left believes the government should do whatever it takes to fight terrorists — but only when the terrorists look like Timothy McVeigh.  If you're on the MCI Friends and Family plan of Osama bin Laden and Abu Zubaydah, you're home free.

The anti-anti-terrorists:  The current hysteria over the president's authorization of some domestic intercepts by the National Security Agency reminds me of similar reaction by liberals to the Cold War.  Instead of recognizing communism as a clear and present danger to freedom and liberty here and abroad, many liberals decided the real threat to those values came from anti-communism itself.

None Dare Call it Hypothetical.  In Washington, D.C., a local talk-radio host poses a provocative question:  What if international terrorists were plotting a Super 9/11 that would kill not just 3,000 Americans — mere child's play for these nuts — but might wipe 30,000, 300,000, or even "a city of 3,000,000 off the face of the planet"?  Would the president then be justified in a few technically illegal wiretaps to detect them in time?  The question practically answers itself.

Secret court modified wiretap requests.  Government records show that the administration was encountering unprecedented second-guessing by the secret federal surveillance court when President Bush decided to bypass the panel and order surveillance of U.S.-based terror suspects without the court's approval.  A review of Justice Department reports to Congress shows that the 26-year-old Foreign Intelligence Surveillance Court modified more wiretap requests from the Bush administration than from the four previous presidential administrations combined.

Let Bush, NSA do their jobs.  Like it or not — and you can bet the Defeatist Party does not — Bush was right on when he insisted in a recent press conference that he most certainly does have the constitutional authority to order such warrantless surveillance, an opinion he has based correctly and, in no small part, on the permission slip Congress signed when lawmakers authorized him to conduct the war on terror.

On the other hand...
One branch of government is so much more efficient than three.  [President] Bush has shown an alarming tendency to cut the legislative and judicial branches out of decisions about how to prosecute a war on terrorism that will continue long after he leaves office.  This combination of unilateralism with a perpetual state of emergency is a recipe for tyranny.

Wiretaps fail to make a dent in terror war; al Qaeda used messengers.  The Bush administration's surveillance policy has failed to make a dent in the war against al Qaeda.  U.S. law enforcement sources said that more than four years of surveillance by the National Security Agency has failed to capture any high-level al Qaeda operative in the United States.  They said al Qaeda insurgents have long stopped using the phones and even computers to relay messages.  Instead, they employ couriers.

The Agency That Could Be Big Brother.  Thirty years ago, Senator Frank Church, the Idaho Democrat who was then chairman of the select committee on intelligence, investigated the [NSA] and came away stunned.  "That capability at any time could be turned around on the American people," he said in 1975, "and no American would have any privacy left, such is the capability to monitor everything:  telephone conversations, telegrams, it doesn't matter.  There would be no place to hide."  He added that if a dictator ever took over, the N.S.A. "could enable it to impose total tyranny, and there would be no way to fight back."

Clinton Lawyer Claims Bush Doesn't Have Same Powers He Asserted Clinton Had.  There's a new lexicon that's developed, "domestic spying," which is contemptible.  It's not what this is all about.  The press has done an intentionally miserable job at explaining this program and the law and the history surrounding the program.

MRC Study:  Evening News Shows Claim NSA Spies on "Americans," Not "Terrorists".  Over at www.mrc.org, we've just posted a new study of how ABC, CBS and NBC have covered the NSA surveillance story. It's just as awful as you expected — most network stories were framed around the idea that the program is probably illegal and a shocking violation of Americans' civil liberties.

Sometimes in Polling, It's All in the Question.  What does the public think about the Bush administration's wiretapping program?  It depends on how you ask the question.  A half dozen polls on the issue have turned up different conclusions, and a key distinction appears to be the way pollsters identify the people who might have their emails and phone calls monitored as part of an effort to fight terrorism.  Recent poll questions have referred to "suspected terrorists," "people in the United States" and "American citizens."

US sues New Jersey over phone company subpoenas.  The U.S. government has sued the New Jersey Attorney General's office on grounds of security concerns to prevent it from asking telephone companies if they gave customer call records to the National Security Agency.

Justice Department's Warrantless Spying Increased 600 Percent in a Decade.  The Justice Department use of warrantless internet and telephone surveillance methods known as pen register and trap-and-trace has exploded in the last decade, according to government documents the American Civil Liberties obtained via a Freedom of Information Act claim.

ACLU: Obama Has Quadrupled Warrantless Wiretaps.  The ACLU released a report this week that shows that under Obama and his Attorney General Eric Holder, warrantless wiretapping and monitoring of American's electronic communications is "sharply on the rise."

Say good-bye to privacy thanks to Stellar Wind.  The American republic, or any society so desiring emancipation to have its citizens live free and unfettered lives, must allow liberated and confidential communication.  Liberty and human dignity demand nothing less.  All of this is about to change.

New Details on NSA's 'Spy Center' and Secrets From Domestic Eavesdropping Operation 'Stellar Wind'.  [Scroll down]  Wired also includes a former NSA official going on the record for the first time on the secret, domestic spying program Stellar Wind and its role in data communication collection, which when the Bluffdale facility is complete will be stored there.  Former senior NSA "crypto-matematician" William Binney, who helped develop NSA's spying capabilities before leaving in 2001, explains how the NSA deliberately violated the Constitution, which was the reason why he left, in setting up warrentless wiretapping to the extent that they did.  Wired reports that much of NSA's wiretapping practices now were made legal under the FISA Amendments Act of 2008.

NSA keeping details about data center quiet.  The agency building 1 million square feet of enclosed space, including 100,000 square feet of space just for computers that will gather and digest intelligence information, continues to do what it does best — keep secrets — when asked about the project.  The NSA sent a short statement to the Deseret News on Friday [3/16/2012], but only after Wired Magazine compiled a voluminous story published the same day.

NSA's Spy Program "Stellar Wind" Exposed.  The National Security Agency, awash with funds provided by Congress, is nearly finished constructing its Utah Data Center as the collection point for data provided from around the country and around the world.  Its purpose:  "to intercept, decipher, analyze and store vast swaths of the world's communications ... [including] all forms of communication, including the complete contents of private emails, cell phone calls and Google searches."

NSA Building is the Largest Spy Center Ever.  NSA spy centerIn the little town of Bluffdale, Utah, between the Wasatch Range and the Oquirrh Mountains, the National Security Agency (NSA) is building what will be the nation's largest spy center, reports Wired, a print magazine and online publication reporting on technological developments and their effects, including electronic privacy.

Big Brother FBI Data-Mining Programs Resurrect "Total Information Awareness".  From the wholesale use of informants and provocateurs to stifle political dissent, to Wi-Fi hacking and viral computer spyware to follow our every move, the FBI has turned massive data-mining of personal information into a growth industry.  In the process they are building the surveillance state long been dreamed of by American securocrats.

The Stellar Wind is Blowing.  The former NSA official held his thumb and forefinger close together:  "We are that far from a turnkey totalitarian state."

Big Brother Goes Live September 2013.  George Orwell was right.  He was just 30 years early.

Data-Mining for Terrorists Not 'Feasible,' DHS-Funded Study Finds.  The government should not be building predictive data-mining programs systems that attempt to figure out who among millions is a terrorist, a privacy and terrorism commission funded by Homeland Security reported Tuesday [10/7/2008].  The commission found that the technology would not work and the inevitable mistakes would be un-American.  The committee, created by the National Research Council in 2005, also expressed doubts about the effectiveness of technology designed to decide from afar whether a person had terrorist intents, saying false positives could quickly lead to privacy invasions.

NSA's Domestic Spying Grows As Agency Sweeps Up Data.  Five years ago, Congress killed an experimental Pentagon antiterrorism program meant to vacuum up electronic data about people in the U.S. to search for suspicious patterns.  Opponents called it too broad an intrusion on Americans' privacy, even after the Sept. 11 terrorist attacks.  But the data-sifting effort didn't disappear.  The National Security Agency, once confined to foreign surveillance, has been building essentially the same system.

FBI's Data-Mining System Sifts Airline, Hotel, Car-Rental Records.  Headquartered in Crystal City, Virginia, just outside Washington, the FBI's National Security Branch Analysis Center (NSAC) maintains a hodgepodge of data sets packed with more than 1.5 billion government and private-sector records about citizens and foreigners, the documents show, bringing the government closer than ever to implementing the "Total Information Awareness" system first dreamed up by the Pentagon in the days following the Sept. 11 attacks.

Report: NSA's Warrantless Spying Resurrects Banned 'Total Information Awareness' Project.  Total Information Awareness — the all-seeing terrorist spotting algorithm-meets-the-mother-of-all-databases that was ostensibly de-funded by Congress in 2003, never actually died, and was largely rebuilt in secret by the NSA, according to the Wall Street Journal's Siobhan Gorman.

Homeland Security Officials Caught Hiding Online Spying Program from Congress.  Writers aren't the only group to be watched by the never-blinking eye of Homeland Security.  According to the report, "anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional and/or social media in real time to keep their audience situationally aware and informed" may also be spied on and have their "usernames and passwords" recorded for future reference.  How many people might be shoe-horned into one of those categories if the federal government decided it wanted to put them under online surveillance?

List reveals keywords feds monitor on Facebook, Twitter.  Have you ever wondered if the government — or more specifically, the Department of Homeland Security — is monitoring your Twitter or Facebook posts?  If the answer's "yes," give yourself a pat on the back because you're right and not simply paranoid.  There's even a list of keywords for which subcontractors hired by the DHS check social networks.

Words like Cyber Command, 2600, spammer, phishing, rootkit, phreaking, dransp, dirty bomb, enriched, nuclear, chemical weapon, biological weapon, ammonium nitrate
EPIC Obtains New Documents on DHS Media Monitoring, Urges Congress to Suspend Program.  EPIC has submitted a letter to Congress following a hearing on DHS monitoring of social networks and media organizations.  In the letter, EPIC highlights new documents obtained as a result of a FOIA lawsuit and points out to inconsistencies in DHS' testimony about the program.  Though DHS testified that it does not monitor for public reaction to government proposals, the documents obtained by EPIC indicate that the DHS analysts are specifically instructed to look for criticism of the agency and then to redirect reports that would otherwise be circulated to other agencies.

The Department of Homeland Security Is Searching Your Facebook and Twitter for These Words.  The Department of Homeland Security monitors your updates on social networks, including Facebook and Twitter, to uncover "Items Of Interest" (IOI), according to an internal DHS document released by the EPIC.  That document happens to include a list of the baseline terms for which the DHS — or more specifically, a DHS subcontractor hired to monitor social networks — use to generate real-time IOI reports.

FBI Pursues Social Media Surveillance to Gather Intelligence.  In a formal "request for information," the Federal Bureau of Investigation (FBI) asked software companies for a digital tool that would systematically scan the entire social media realm to find potential terrorist-related threats and intelligence information.  While hundreds of intelligence analysts are already probing overseas Facebook and Twitter posts, U.S. law enforcement officials claim digital software could sift through more data than humans ever could.

Privacy May Be a Victim in Cyberdefense Plan.  A plan to create a new Pentagon cybercommand is raising significant privacy and diplomatic concerns, as the Obama administration moves ahead on efforts to protect the nation from cyberattack and to prepare for possible offensive operations against adversaries' computer networks.  President Obama has said that the new cyberdefense strategy he unveiled last month will provide protections for personal privacy and civil liberties.  But senior Pentagon and military officials say that Mr. Obama's assurances may be challenging to guarantee in practice...

The NSA Is still Listening to You.  This summer, on a remote stretch of desert in central Utah, the National Security Agency will begin work on a massive, 1 million-square-foot data warehouse.  Costing more than $1.5 billion, the highly secret facility is designed to house upward of trillions of intercepted phone calls, e-mail messages, Internet searches and other communications intercepted by the agency as part of its expansive eavesdropping operations.  The NSA is also completing work on another data warehouse, this one in San Antonio, Texas, which will be nearly the size of the Alamodome.

Massive FBI Data Mining Revealed, Set to Expand.  Recently declassified documents obtained by Wired magazine reveal a massive Federal Bureau of Investigation (FBI) data mining operation.  It already possesses over 1.5 billion records from government and private-sector sources.  That figure is expected by the FBI to balloon to over 6 billion within a few years.  And it is not just terrorists they are after.

Report on the Investigative Data Warehouse.  The Investigative Data Warehouse is a massive data warehouse, which the Bureau describes as "the FBI's single largest repository of operational and intelligence information."  As described by FBI Section Chief Michael Morehart in 2005, the "IDW is a centralized, web-enabled, closed system repository for intelligence and investigative data."  Unidentified FBI agents have described it "one-stop shopping" for FBI agents and an "uber-Google."

Is the NSA's 'Perfect Citizen' the Ultimate Spying Tool?  Could the NSA's new "Perfect Citizen" actually be used for spying on every citizen in the U.S.? ... The NSA's new cyber-security program Perfect Citizen will monitor nuclear power plants, train stations, and the electric power grid to safeguard against cyber-assaults. ... According to [a] report, Raytheon was awarded a $100M contract to develop Perfect Citizen.  (Raytheon declined to comment to FoxNews.com, as did the NSA other than describing Perfect Citizen in an official statement as a "research and risk-assessment" project that does not use sensors.)

10 ways your voice and data can be spied on:
1. Wireless keyboard eavesdropping
2. Wired keyboard eavesdropping
3. Laptop eavesdropping via lasers
4. Commercial keyloggers
5. Cell phones as remotely activated bugs
6. Cell phone SIM card compromise
7. Law enforcement wiretapping based on voice print
8. Remote capture of computer data
9. Cable TV as an exploitable network
10. Cell phone monitoring

'Eavesdropper' satellite rides huge rocket from Florida.  The US National Reconnaissance Office has launched what is reputed to be the largest satellite ever sent into space.  The spacecraft was put into orbit on a Delta-4 Heavy rocket from Cape Canaveral Air Force station on Sunday [11/21/2010].  The NRO gave no details about the payload but it is understood the satellite will be used to eavesdrop on enemy communications.

Air Force Launches Massive, Secret Spy Satellite.  A powerful Delta 4 rocket roared to life and climbed away from the Cape Canaveral Air Force Station Sunday evening on a high-priority mission to boost a National Reconnaissance Office spy satellite into orbit. ... Once on station, the satellite presumably will unfold a huge, lightweight antenna to tap into targeted military or civilian communications networks.

Monitoring America: How the U.S. Sees You.  Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators.  The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing.

A hidden world, growing beyond control.  The top-secret world the government created in response to the terrorist attacks of Sept. 11, 2001, has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.

The NSA Is Building the Country's Biggest Spy Center.  Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency.  A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade.  Its purpose:  to intercept, decipher, analyze, and store vast swaths of the world's communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.  The heavily fortified $2 billion center should be up and running in September 2013.

NSA Won't Disclose How Many Americans are Being Spied On.  As the sprawling surveillance site being constructed by the National Security Agency (NSA) in Utah grows larger and nearer completion every day, the domestic spy service remains tightlipped about just how much and what kind of personal electronic data they have already collected and collated.  Not only does the NSA refuse to provide such information, it insists that it cannot be forced to.

Is US government reading email without a warrant? It doesn't want to talk about it.  In March, the American Civil Liberties Union caused a nationwide stir when the advocacy group released the results of its year-long investigation into law enforcement use of cellphone tracking data.  After issuing hundreds of Freedom of Information Act requests, the ACLU learned that many local police departments around the country routinely pay mobile phone network operators a small fee to get detailed records of historic cell phone location information.  The data tell cops not just where a suspect might have been at a given moment, but also create the possibility of retracing someone's whereabouts for months.

NSA chief defends agency against domestic spying charges.  The head of the National Security Agency on Monday denied reports that NSA's new data center in Utah would collect and store data about Americans, including their e-mails and web-browsing habits.  The $2 billion data center in Bluffdale, Utah, will house massive supercomputers capable of storing and analyzing vast quantities of data when it comes online next year, but U.S. Army Gen. Keith B. Alexander reiterated NSA's insistence it does not unlawfully conduct surveillance of Americans.

National Reconnaissance Office accused of illegally collecting personal data.  One of the nation's most secretive intelligence agencies is pressuring its polygraphers to obtain intimate details of the private lives of thousands of job applicants and employees, pushing the ethical and legal boundaries of a program that's designed instead to catch spies and terrorists.  The National Reconnaissance Office is so intent on extracting confessions of personal or illicit behavior that officials have admonished polygraphers who refused to go after them and rewarded those who did, sometimes with cash bonuses, a McClatchy investigation found.

The Most Powerful, Well Connected Company You've Never Heard Of.  Have you ever heard of a tech company called Neustar?  Probably not, and that's just the way the government wants to keep it.  Neustar is a relatively new company that is playing a large, albeit secret, role in the expansion of the surveillance state.  According to published reports, Neustar handles the law enforcement surveillance and user data requests for over 400 telecommunications companies.  To accommodate their clients' demands, Neustar maintains a database containing information on every cell phone in the United States — including yours.

Govt May Now Collect, Catalog, and Store All Private Information.  Imagine that the U.S. government had the power to scour the reams of public records and collect and collate every bit of personal information about every citizen of this country.  Now imagine that any of the various intelligence and security agencies within the government could combine that data with any other information about a person that has been posted to a social media website or compiled by one of the many data aggregating companies that keep tabs on all of us.  Finally, imagine that all this data could be passed among these agencies and that the ability of anyone inside or outside the government to challenge this surveillance was all but eliminated.

Did Bush's Broadband Deregulation Upend His Own NSA Wiretapping?  As Congress prepares to reauthorize the controversial FISA Amendments Act of 2008 — which effectively legalized the notorious warrantless wiretap program launched by President Bush — much about the law remains shrouded in secrecy:  The National Security Agency has refused to give legislators even a rough estimate of how many Americans' communications have been swept up in the digital dragnet.  Yet even four years after the FAA's passage, one of the biggest mysteries isn't how the law has been used, but why it was necessary in the first place.  One surprising — but surprisingly plausible — explanation points to the unexpected consequences of broadband deregulation.

Whistle-Blower's Evidence, Uncut.  Former AT&T technician Mark Klein is the key witness in the Electronic Frontier Foundation's class-action lawsuit against the telecommunications company, which alleges that AT&T cooperated in an illegal National Security Agency domestic surveillance program.  In a public statement Klein issued last month, he described the NSA's visit to an AT&T office.  In an older, less-public statement recently acquired by Wired News, Klein goes into additional details of his discovery of an alleged surveillance operation in an AT&T building in San Francisco.

FISA Fight.  The Obama administration is pushing for the reauthorization of a law allowing warrantless wiretaps and prolonging Freedom of Information Act (FOIA) requests despite campaigning against such measures and promising to be the most transparent administration ever.  In a statement of administration policy released Monday [9/10/2012], the Obama administration announced it "strongly supports" reauthorizing the FISA Amendments Act, on which the House is expected to vote Wednesday.  The act "allows the Intelligence Community to collect vital foreign intelligence information about international terrorists and other important targets overseas, while providing protection for the civil liberties and privacy of Americans," according to the statement.

DOJ domestic phone, email, Internet surveillance of Americans skyrocketed under Obama.  A new report from the American Civil Liberties Union shows a dramatic increase in the U.S. Department of Justice's electronic surveillance of Americans under the Obama administration.  Documents obtained by the ACLU through a Freedom of Information Act request revealed that under President Obama between 2009 and 2011, warrantless electronic surveillance requests by the Justice Department to spy on phone communications increased 60 percent from 23,535 to 37,616.  The number of people whose phone calls were subject to such surveillance during that same time period tripled.

There's quite a bit we don't know about FBI investigations.  If there is any upside to the scandal that brought down the CIA director, it is probably that Americans have an extremely memorable reason to be careful about what they put in an email.  The Federal Bureau of Investigation has exposed the techniques its cyber forensics unit uses to track down the sources of emails, and even, indirectly, has given the public a glimpse of the assumptions or thresholds they use to widen the scope of any particular investigation.  Some of the details are technical, but everyone should avail themselves of the opportunity to learn about them.

How Did Feds Listen In on Blagojevich?  Court records from the investigation into Illinois Gov. Rod Blagojevich are filled with recorded conversations of the governor allegedly offering to sell an appointment to President-elect Barack Obama's former U.S. Senate seat.  How did the government find out what he was saying?

Government Spying Out of Control.  FISA [the Foreign Intelligence Surveillance Act] gives the government unchecked authority to snoop on all Americans who communicate with any foreign person, in direct contravention of the Fourth Amendment.  The right to privacy is a natural human right.  Its enshrinement in the Constitution has largely kept America from becoming East Germany.  Moreover, everyone in Congress has taken an oath to uphold the Constitution, which could not be more clear:  "The right of the people to be secure in their persons, houses, papers, and effects..." shall not be violated, except via a warrant issued by a neutral judge upon the judge finding probable cause of crime.

Great news: Your permanent record is now available on demand.  Remember when government needed something called a warrant or even probable cause to look at your records?  Good times, good times.  I'm nostalgic for the halcyon days of, er, February of this year, before the Attorney General of the United States signed off on an order allowing the government to access pretty much everything it wanted in the name of counterterrorism.

U.S. Terrorism Agency to Tap a Vast Database of Citizens.  Top U.S. intelligence officials gathered in the White House Situation Room in March to debate a controversial proposal.  Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens — even people suspected of no crime. [...] The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them.  That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation.

Attorney General Secretly Granted Gov. Ability to Develop and Store Dossiers on Innocent Americans.  In a secret government agreement granted without approval or debate from lawmakers, the U.S. attorney general recently gave the National Counterterrorism Center sweeping new powers to store dossiers on U.S. citizens, even if they are not suspected of a crime, according to a news report.  Earlier this year, Attorney General Eric Holder granted the center the ability to copy entire government databases holding information on flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and other data, and to store it for up to five years, even without suspicion that someone in the database has committed a crime, according to the Wall Street Journal, which broke the story.

The government already controls too much.  Last week, a lengthy article in the Wall Street Journal detailed how the federal government's "little-known National Counterterrorism Center" can now, under new authority, examine "the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them."  It "can copy entire government databases — flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others," keeping "data about innocent U.S. citizens for up to five years ... to analyze it for suspicious patterns of behavior."

NYPD to probe internet to detect future shooters.  Senior officers from The New York City Police Department met late last week to discuss a plan to monitor internet sites in search of clues that might prevent future mass-casualty shootings.  The NYPD intends to create algorithms that scan the text of conversations in chat rooms, social media and emails for clues on potential 'apolitical or deranged killers', according to an article in the New York Times.

CALEA Is Watching YOU!  Eric Holder, his Department of Justice (DOJ) and the Obama administration want to expand existing CALEA laws to require all services that enable communications including encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct "peer to peer" messaging like Skype to be technically capable of complying if served with a wiretap order.

Presumed Guilty in the Name of Fighting Terrorism.  [Scroll down]  The change in the standards by which the NCTC now is able to troll data means every action a person takes that is logged into a government database, is subject to scrutiny for criminal behavior.  Probable cause or reasonable suspicion — constitutional standards for invading a person's privacy by government snooping — are irrelevant in such a scenario.  We are all presumed guilty of engaging in potential terrorist acts.

Obama signs warrant-less surveillance bill.  U.S. President Obama Sunday [12/30/2012] signed a five-year extension of the law allowing warrant-less electronic surveillance of suspected terrorists, the White House said.

President Obama Quietly Renews Warrantless Wiretap Law for 5 Years.  As everyone's attention is focused on the slew of taxes set to increase in 2013, President Barack Obama has quietly signed into law a five-year extension to the warrantless intercept program that monitors the overseas activity of suspected spies and terrorists.

The NSA's warrantless domestic spying program has turned America into the most surveilled society.  in history, eclipsing conditions of East Germans under the Stasi.  Two high-profile NSA whistleblowers, Thomas Drake and William Binney, have revealed the extent of the collateral damage to our rights from the Big Brother surveillance dragnet.  In their own words, the government is illegally monitoring (in real time) activities not tethered to any suspicious or illegal conduct — for example, phone calls, purchases, email, text messages, Internet searches, social media communications, health information, employment history, travel, and student records — and creating dossiers on everyone (even senators, congressmen, and decorated generals).

Who (or What) Are They Looking For?  In response to the events of September 11, 2000 and after designating an axis of evil yet carefully navigating around the question of Islam and its fanatics, the federal government in Washington rushed to increase surveillance and security measures to guard against Al-Qaeda and the threat of terrorism.  We, the citizens who are not responsible for terrorism, are saddled 12 years later with the Department of Homeland Security, the Transportation Safety Administration and a surveillance technology that is everywhere, all the time.  Nine trillion dollars later are we more secure?



The United States is spying on its allies.
Not exactly a news bulletin, except to Barack H. Obama, who says he had no idea!

Obama orders curbs on NSA spying on U.N. headquarters.  President Barack Obama recently ordered the National Security Agency to curtail eavesdropping on the United Nations headquarters in New York as part of a review of U.S. electronic surveillance, according to a U.S. official familiar with the decision.

Is Obama a Dupe or a Totalitarian, Megalomaniacal Liar?  [Scroll down]  One could understand the NSA's propensity to listen to the conversations of those foreign leaders who wish us ill.  And one would expect that it would do so.  But the urge to listen to the leadership of our allies serves no discernible intelligence-gathering purpose.  Rather, it fuels distrust between our nations and in the case of Merkel exacerbates memories of the all-seeing and all-hearing Stasi, which was the East German version of the KGB that ruled that police state from the end of World War II until it collapsed in 1989.  [German Chancellor Angela] Merkel was raised in East Germany, and she has a personal revulsion at the concept of omnipresent state surveillance.

Officials Claim Obama Unaware of Foreign Spying Program Until Revealed in the Press.  Following an internal review, U.S. officials announced on Sunday [10/27/2013] that they were ending a National Security Agency program which netted the communications of German Chancellor Angela Merkel as well as a number of other world leaders.  According to the Wall Street Journal's reporting on Sunday night, President Barack Obama was not aware of the scale of the spying programs until they were uncovered in the press.

White House To Stop Spying on Allies, Dianne Feinstein Promises.  Continuing to play Obama like a fiddle, the Snowden revelations have done more to change US foreign policy in a few short months, than all laws passed since the advent of the Patriot Act.

NSA monitored calls of 35 world leaders after US official handed over contacts.  The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden.  The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems.

Merkel calls Obama about 'US spying on her phone'.  German Chancellor Angela Merkel has called US President Barack Obama after receiving information that the US may have spied on her mobile phone.  A spokesman for Mrs Merkel said the German leader "views such practices... as completely unacceptable".  Mrs Merkel called on US officials to clarify the extent of their surveillance in Germany.

NSA monitored calls of 35 world leaders, claims latest Snowden leak.  The National Security Agency has monitored the phone conversations of at least 35 world leaders after being given their numbers by an official in another government department, according to a classified document leaked by whistle-blower Edward Snowden.  The confidential memo reveals that senior officials in 'customer' departments such the White House and the Pentagon were encouraged to share their 'Rolodexes' of contact details with the NSA.  The agency then added the phone numbers of the foreign politicians to their surveillance systems and started to monitor them.

The Editor says...
I don't really have a problem with the CIA and NSA spying on other countries.  Even our allies sometimes communicate with countries that are hostile to the U.S.  It's the wholesale spying on Americans in North America to which I object.

The Americans should be congratulated for bugging the phones of 35 world leaders.  When the dust has settled on the media frenzy over allegations that America's National Security Agency NSA) succeeded in bugging the mobile phones of 35 world leaders, surely the agency should given an award for undertaking one of the most remarkable feats of intelligence-gathering of modern times, rather than subjected to universal condemnation.

White House OKd spying on allies, U.S. intelligence officials say.  The White House and State Department signed off on surveillance targeting phone conversations of friendly foreign leaders, current and former U.S. intelligence officials said Monday [10/28/2013], pushing back against assertions that President Obama and his aides were unaware of the high-level eavesdropping.

Obama accused of misleading voters on Benghazi, Obamacare, Merkel. There's a pattern here.  There are conflicting reports over whether or not Obama knew about the tapping of Angela Merkel's phone.  The Wall Street Journal says that he was "unaware" this was going on.  The German newspaper Bild am Sonntag says that he's the one who ordered the bugging in the first place.  As TechCrunch points out, either narrative looks bad for the Prez.  If he did give the order then he's an authoritarian who snoops on his allies.  If he didn't, then he's not entirely in control of his own administration.

White House refuses to confirm Obama didn't know until a few weeks ago that NSA spied on German Chancellor's phones.  The White House refused on Monday [10/28/2013] to confirm a report that President Obama first learned this summer that the U.S. was spying on German Chancellor Angela Merkel's cell phones.  Press Secretary Jay Carney shied away from a perfectly teed-up chance to legitimize a Wall Street Journal story that also had Obama ending the National Security Agency program immediately when he learned that the agency was surveilling foreign leaders.  Carney's grilling came as Spanish media reported that the NSA had also monitored millions of phone calls in Spain, and a German newspaper wrote that the U.S. had hacked into Mexican president Felipe Calderon's emails in 2010.

Inspector Clouseau's White House: Obama was also unaware of phone taps on foreign leaders.  Conventional political wisdom in America is that as commander-in-chief, the president of the United States knows all and sees all.  Barack Obama's press office is constantly announcing his briefings on everything from global threats to hurricane preparations, wildfires and floods.  Recent revelations about the National Security Agency's ubiquitous monitoring of every phone call and email would seem to indicate that's Obama's goal too.  But over recent months the Obama administration has developed a peculiar pattern of behavior in this area.  Obama himself and unidentified aides using news leaks have boasted of the president's ignorance of things that an ordinary person outside the Oval Office bubble would think a chief executive should know.

Birds, Bees and NSA Spies.  [Scroll down]  The German case is more sensitive even if the details remain unclear.  Nobody doubts Mrs. Merkel's personal bona fides as a friend of the U.S.  But there are good reasons the U.S. would want to eavesdrop on German chancellors, going back decades.

It's not arrogance, just stupidity.  The Germans are in a frenzy over the disclosure that the National Security Agency (NSA) tapped Angela Merkel's private telephone, along with the telephones of three-dozen other world leaders.  It's an embarrassment of the second magnitude, and all Barack Obama knows about it is what he reads in the newspapers.  "Senior government officials" tell The Wall Street Journal that the spooks didn't tell the president about the wiretaps "because it wouldn't have been practical to brief him on all of them."  (He was working on his hook shot and couldn't be disturbed.)

NSA Scandal Shames the U.S. Media.  The American media are the biggest losers in the latest revelations in the National Security Agency scandal.  Not because domestic journalists could have been expected to discover closely-guarded state secrets such as a spy program that targeted foreign heads of state (still less to reveal it, if they did not).  Rather, the U.S. media's lack of interest in holding the Obama administration accountable is being exposed by the foreign press.

Obama Throws Intel Community Back Under the Bus.  The revelations about NSA spying on allied leaders are now officially a scandal.  No, that scandal isn't that the U.S. spies on its allies — all nations do that and some go further than that. [...] No, the scandal is that, faced with embarrassing allegations, President Obama is trying to throw General Keith Alexander, the head of the NSA, and the rest of the intelligence community under the bus by claiming that he had no idea what was going on.  Not surprisingly, anonymous leakers in the intelligence community are pushing back to shred the White House alibi.



Snowden II
More of the same.

US spy worker stole 'astonishing quantity' of data: prosecutors.  US prosecutors said they expected to file espionage charges against a private contractor for the National Security Agency suspected of stealing an "astonishing quantity" of classified information.  Harold Martin III was arrested August 27 in Maryland and poses a "grave danger" to the United States, prosecutors wrote in a filing ahead of a detention hearing set for Friday [10/21/2016] in Baltimore.  Martin, who has now been fired, worked for Booz Allen Hamilton — the same firm that hired the NSA whistleblower Edward Snowden.

NSA contractor to face espionage charges for alleged data theft.  Government lawyers on Thursday [10/20/2016] said they would prosecute a former National Security Agency contractor accused of stealing classified information under an espionage law, a move carrying far more severe penalties than previously announced charges.

It's Time to Rename NSA the National INsecurity Agency.  It's happened again.  An employee at the National Security Agency, our largest and most powerful intelligence service, has gone off the rails, stealing documents on an unprecedented scale.  When the case of Harold Thomas Martin III, an NSA contractor, broke earlier this month, I explained that the fact the FBI caught him taking classified information home was a bad sign, since it's often a tell that espionage may be involved. [...] Martin, who was arrested in late August, was not initially charged with espionage, rather with mishandling classified information, a far less serious crime.  An overweight nerd, he gave the impression of being the sort of "weirdo" I described rather than a mole.

Ex-NSA contractor committed 'breathtaking' theft of secrets, feds say.  A former National Security Agency contractor's theft of top secret government information was "breathtaking in its longevity and scale," federal prosecutors said in a court filing Thursday [10/20/2016] aimed at keeping the man locked up as the case moves forward.

Has the Russian Mole Inside NSA Finally Been Arrested?  Six weeks ago in this column I explained that the National Security Agency, our nation's most secretive spy service, almost certainly remains penetrated by one or more Russian moles.  Not only is Edward Snowden hardly the super-spy he's claimed to be, in truth he's no more than a patsy whose purpose has been to distract attention from the real Russian intelligence penetrations of NSA.  The idea that the Kremlin has more moles lurking inside NSA made front-page news in August with the public appearance of Top Secret hacking tools apparently stolen from the Agency.  Embarrassingly, those were posted online by the mysterious "Shadow Brokers," which gave every appearance of being yet another front for Moscow and its spy services.  How had it obtained such closely guarded secrets?

After Edward Snowden, US government now fears it has new mole.  The US government fears that the US intelligence agencies have a second mole who is feeding top secret information to journalists, it has been reported.  The existence of a second high-level leaker — separate from the former defence contractor Edward Snowden — has been mooted in intelligence and journalistic circles for some weeks, but was confirmed by US officials, according to a report by CNN.

New Post-Snowden Leaks Reveal Secret Details of U.S. Terrorist Watchlist.  The U.S. government believes that someone other than former National Security Agency contractor Edward Snowden has recently leaked secret national-security documents to the media, an official confirmed Tuesday [8/5/2014].  The documents, published by the Intercept on Tuesday [8/5/2014], detail the growth of federal terrorist watch lists.  They were drafted after Snowden fled prosecution in the U.S. for Russia, when he no longer had access to classified intelligence networks.



Snowden III
Ditto.

Another NSA Contractor Said to Have Stolen Nation's Most Classified Info.  According to an indictment released Wednesday [2/8/2017], the information stolen by Harold Martin, a former N.S.A. contractor who was arrested in August of last year, may be far more damaging to the U.S. intelligence community than anything taken by Edward Snowden.  On October 5, the New York Times broke the story that the F.B.I. had arrested an employee of the intelligence community over suspicions the worker had stolen highly classified computer code.



Edward Snowden:
Hero, traitor, genius, mad man?  All of the above?

Snowden Claims to Have Been in Contact with President Obama's White House.  Edward Snowden said that from contacts he has had with those in the White House and in President Obama's orbit, "we've come to understand that [Obama] was personally wounded as a result of these disclosures," which prompted Snowden to seek asylum outside the country.  This revelation was made during the question and answer portion of Snowden's keynote address at Estoril Conference on migration on Tuesday [5/30/2017].  Snowden also addressed the notion of President Obama pardoning him.  Based on communications he had with Obama's White House and those in the former president's orbit, Snowden realized he would not receive a pardon because the information Snowden leaked significantly damaged Obama's legacy.

Report: Russia Willing To Extradite NSA Spy Edward Snowden.  President Obama previously requested Snowden's return, Russia said no.  Obama was angry.  Now that President Obama is out of office Russia wants to give Snowden back, and President Trump has never even asked for him.  Apparently, Snowden has worn out his welcome.

The Editor says...
I suspect Donald Trump is exerting some kind of leverage on the Russians to get Snowden sent back, or else Snowden is being returned to put gentle pressure on Trump.  Either way, Snowden is a pawn.

Snowden as Putin's Love Offering to Trump?  Whiff of Fake News.  [Edward] Snowden, you recall, is the little punk who once had it made:  Living in a Hawaiian paradise, he had a $100,000 a year Booz Allen Hamilton job, no college degree, a security clearance, and as the cherry on top, a pole-dancing live-in girlfriend.  He threw it all away and fled the U.S. in 2013 with a massive treasure trove of U.S. intelligence in squirrelled away on laptops and thumb drives taken illicitly.  After that, he made a cockamamie claim about merely being motivated by concern about NSA spying on Americans, which in fact was nothing but meta-data of no consequence to the average American.

Notorious defendants hope to capitalize on Obama's record-setting leniency.  Pressure is mounting on President Obama to grant eleventh-hour mercy in the high-profile national security cases of accused Army deserter Sgt. Bowe Bergdahl, exiled NSA whistleblower Edward Snowden and transgender military secrets leaker Chelsea Manning.  Lawyers for Sgt. Bergdahl and Manning have written to Mr. Obama in recent days requesting clemency, while a celebrity-studded group including liberal billionaire George Soros is pushing for an unlikely presidential pardon for Mr. Snowden.  While it's common for lame-duck presidents to receive a flood of clemency requests before their term expires, the pleas in these notorious cases are landing on the desk of a president who has set a record for leniency with more than 1,000 commutations, exceeding the previous 11 presidents combined.

Information Warfare:  Communist Takeover of U.S. Entertainment Industry.  National security experts have determined that [Edward] Snowden has done incalculable damage to the NSA and American national security.  A former member of the Counsel to the President's Intelligence Oversight Board has confirmed that people have already lost their lives thanks to Snowden and "countless more are likely to lose theirs now that our enemies know our most closely guarded sources and methods of communications intelligence collection."  Snowden has caused devastation, security experts say, and he may very well be the most injurious traitor in American history.  That would make it illegal to profit from his crimes and the Department of Justice (DOJ) should confiscate all money made by the violators.

Snowden Is a Traitor and a Fraud, Period.  At a time of extreme partisanship in our country and in the midst of what may be the most contentious presidential election in U.S. history, a congressional committee did something extraordinary:  It issued a bipartisan and unanimous report on an extremely divisive issue.  This issue is whether former National Security Agency technician Edward Snowden, who stole 1.5 million classified documents and leaked thousands to the news media, is a true whistleblower or a traitor.  The report by the House Permanent Select Committee on Intelligence (where I worked for five years) found what many of us have long argued:  Snowden is not a whistleblower; he is a disgruntled former intelligence employee who did enormous damage to U.S. national security.

Call Snowden's Bluff.  It looks like it's time for President Obama to call Edward Snowden's bluff.  The fugitive spy has deigned to announce that he is, as summarized by the Associated Press, "willing to be extradited to the United States if the federal government would guarantee he would get a fair trial."  Let Attorney General Lynch inform Mr. Snowden's lawyers that Congress and all 50 states have agreed to be bound in law to the condition in writing.

Snowden says he's offered to go to jail in exchange for return to US.  Edward Snowden says he has offered to return to the United States and go to jail for leaking details of National Security Agency programs to intercept electronic communications data on a vast scale.

What Edward Snowden has wrought.  Think of Edward Snowden's vast leaks as a how-to guide for head-choppers looking to keep their own heads far from U.S. bombs.  Reported The New York Times this week:  "The Islamic State has also studied revelations from Edward J. Snowden, the former National Security Agency contractor, about how the United States gathers information on militants.  A main result is that the group's top leaders now use couriers or encrypted channels that Western analysts cannot crack to communicate, intelligence and military officials said."  While ISIS leaders already tried to practice operational security, there's little doubt that copious reporting on the work our intelligence services do — within the Constitution — gives aid and comfort to those who would do the United States harm.

US should hang Edward Snowden, says former spy panel senator.  The U.S. should publicly hang leaker Edward Snowden if and when he falls into the government's hands, according to the former top Republican on the Senate Intelligence Committee.  "We need to hang him on the courthouse square as soon was we get our hands on him," retired Sen. Saxby Chambliss (R-Ga.) — who served as vice chairman of the powerful intelligence panel before stepping down from Congress last year — said during an appearance at the University of Georgia this month.  "I hope none of you have any sympathy for him," he told students at the Terry College of Business.

Eric Holder: The 'Possibility Exists' That Edward Snowden Could Come Home.  In a subtle yet remarkable shift in tone, former Attorney General Eric Holder said Monday that the "possibility exists" that the Justice Department could forge a deal with fugitive leaker Edward Snowden that could bring him home.  Speaking to Yahoo News, Holder said "we are in a different place as a result of the Snowden disclosures," adding that Snowden's revelations about the size and scope of the National Security Agency's sweeping surveillance programs "spurred a necessary debate.["]

Eric Holder claims US could strike deal with Edward Snowden to bring him back from exile.  Eric Holder believes America could strike a deal with former NSA contractor Edward Snowden to see him return from exile in Russia to the United States.  The former Attorney General, who charged Snowden with three felony counts of espionage for leaking thousands of government papers to the press, told Yahoo News it is a 'possibility' as he acknowledged the case prompted a 'necessary debate' about secrecy.

'Edward Snowden has blood on his hands': MI6 is forced to pull spies out of hostile countries.  MI6 has pulled its spies out of 'hostile countries' and America's intelligence agencies are on high alert after Russia and China cracked encrypted files leaked by fugitive whistleblower Edward Snowden.  The top-secret documents contain information that could lead to the identification of British and American spies, according to senior officials in Downing Street, the Home Office and the security services.

Snowden's Lies About Principle Snowball.  Britain's MI-6 says that it has had to roll up its spy networks in Russia and China based on the vast intelligence trove leaked by NSA contractor Edward Snowden.  So much for his claim he acted on principle.

The Snowden Story Slowly Unravels.  [Scroll down]  Although Snowden has presented himself as a "spy" at the heart of NSA's global espionage network, the mundane truth is that he was an IT contractor who never actually worked on NSA's signals intelligence program.  In his last assignment, Snowden analyzed Chinese cyber capabilities against the United States — which may appear suspicious given the recent unprecedented hacking of U.S. Government databases, an apparent Chinese operation — but that job was on the Agency's defensive side, protecting sensitive government communications.  Snowden is no expert on NSA's collection of foreign communications.

Snowden is a Fraud.  As a prosecutor explained, Snowden provided "no evidence that he has his own knowledge" (keine Hinweise dafür, dass er über eigene Kenntnisse verfügt).  In other words, Ed doesn't actually know what he's talking about.  This is not news to anybody who understands how NSA and the Allied SIGINT system actually work.  Snowden was an IT guy, not a SIGINT analyst, and in his final position he was working as a contracted infrastructure analyst for NSA's Information Assurance arm, i.e. the Agency's defensive side, which protects classified U.S. communications networks.  Snowden was never a SIGINTer, working on the intelligence collection side of the house, and he doesn't seem to understand how that complex system, built over decades, actually functions.

Apple co-founder says Snowden gave up his life to reveal NSA surveillance.  Apple co-founder Steve Wozniak gushed over former National Security Agency contractor Edward Snowden, calling him a "total hero" and saying he "gave up his life" to reveal the agency's surveillance programs.  In a wide ranging interview with Arabian Business, Wozniak spoke about surveillance, hacking, privacy and security, in addition to Snowden.  Wozniak was in Dubai this month for the Gartner Symposium, and when he was asked whether he thinks Snowden is a hero or a villain, he was unequivocal.  "Total hero to me; total hero," Wozniak said.

Why NSA surveillance is worse than you've ever imagined.  Last summer, after months of encrypted emails, I spent three days in Moscow hanging out with Edward Snowden for a Wired cover story.  Over pepperoni pizza, he told me that what finally drove him to leave his country and become a whistleblower was his conviction that the National Security Agency was conducting illegal surveillance on every American.  Thursday [5/7/2015], the Second Circuit Court of Appeals in New York agreed with him.

Is The Guardian Holding Back The New York Times' Snowden Stories?  A source at the Times tells The Daily Beast the paper feels 'shackled' over The Guardian's total control over the cache of Edward Snowden NSA documents — and how they are used.

Edward Snowden Revealed In Chilling 'Citizenfour'.  Seamless and as darkly riveting as any John le Carré or Graham Greene thriller, Laura Poitras' Citizenfour puts an indelibly human face on NSA whistleblower Edward Snowden, while ripping away any mask of pretense that the most massive and sophisticated breach of privacy in American history had grounding in reality, let alone the law.

NSA losing interest in deal for Snowden.  The Obama administration is increasingly less inclined to make a deal to allow Edward Snowden to come back to the United States, according to a top National Security Agency official.  "As time goes on, the utility for us of having that conversation becomes less," NSA No. 2 Rick Ledgett said this weekend at Aspen Security Forum in Colorado, according to Politico.

Edward Snowden urges professionals to encrypt client communications.  The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world.  "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe.  Any communications should be encrypted by default," he said.

Background check firm faces fraud, bonus pay investigation.  The background check company that vetted Edward Snowden and faces fraud accusations from the Justice Department has refused a congressional request for details about executive bonus payouts and the identities of some former officials.

Benny, Ed and the death of treason.  Call me old-fashioned, but I will never swoon over a self-declared whistleblower who puts American lives at risk because he doesn't personally approve of policies put in place to make us safer in an ever more dangerous world.  Nor do I care that Snowden leaked the secrets to the media, as if that having them publicly available made them less dangerous.  Indeed, Snowden has now provided cover to every spy who follows him.  Rather than deliver secrets directly to the Kremlin or Tehran, enemies of America can now follow the Snowden protocol and simply email their dirty secrets to the New York Times.

A Ticker-tape Parade for Treason?  "For the foreseeable future," says President Obama, "the most direct threat to America at home and abroad remains terrorism."  Yet his remarks at the United States Military Academy Commencement Ceremony included no acknowledgement that NSA traitor Edward Snowden has made this kind of terrorism more likely.  And there were no demands for Moscow to turn him over to U.S. authorities to face espionage charges.

The attack of the lawyers.  [Scroll down]  The Chinese threat to counter-expose US efforts may involve Edward Snowden, whose last post was in Hong Kong.  It is conjectured Snowden's target, or at least the unit he worked with, was China.  Now that Snowden is on the other side, he may have a tale or two to tell.  Moreover, the Daily Caller notes that Obama gratuitously took credit for deploying the Stuxnet worm when he wanted to appear gung-ho against Iran, itself a confession of offensive cyber-operations.

Edward Snowden: the unacknowledged author of an NSA reform bill.  It's called the USA Freedom Act, but a more fitting name might be Edward's Law — as in Edward Snowden, the former National Security Agency contractor charged with violating the Espionage Act.  I'm referring to a bill cleared by the House Intelligence Committee that would end the NSA's bulk collection of telephone metadata:  information about the source, destination and duration of calls.  The bill, identical to a measure approved by the Judiciary Committee, addresses what was probably Snowden's most sensational revelation:  that the government was indiscriminately collecting the phone records of vast numbers of Americans under an expansive interpretation of the Patriot Act.  The database could then be "queried" or searched for matches when investigators came into possession of a phone number thought to be related to foreign terrorism.

Former NSA contractor Snowden expects to remain in Russia.  Former National Security Agency contractor Edward Snowden, who fled to Moscow last year after revealing details of massive U.S. intelligence-gathering programs, expects his asylum status in Russia to be renewed before it expires this summer, his lawyer said on Wednesday [4/30/2014].

A Pitiful Pulitzer Pick.  The award of the Public Service prize to the Washington Post and the Guardian for serving as a mouthpiece for Edward Snowden is an attempt by the journalistic establishment to put its stamp of approval on the actions of one of the most destructive traitors in U.S. history — a former NSA contractor who has done untold damage to American intelligence gathering efforts against Russia, China, Al Qaeda, and other essential targets by revealing some of the most secret information that the U.S. government possesses.

Snowden Charade: Why the fugitive leaker got softball treatment at conference.  Put aside that Ed Snowden did the interview against the backdrop of an oversized Constitution, holding forth about the evils of American spying and the mendacity of top U.S. officials.  Put aside that the man interviewing him, Ben Wizner, is an ACLU official.  He is also Snowden's legal adviser.  Why on earth would the South by Southwest conference allow this charade?

Edward Snowden nominated for Nobel peace prize.  Two Norwegian politicians say they have jointly nominated the former National Security Agency contractor Edward Snowden for the 2014 Nobel peace prize.

Echoes of Marc Rich in Edward Snowden case.  Attorney General Eric Holder, FBI Director James Comey and new Obama White House counselor John Podesta all played roles in the Rich saga, wrestling with the complex questions of what tactics and compromises officials should consider when an American is holed up overseas, beyond the reach of the U.S. justice system.

Snowden snow job.  [N]o responsible federal official would do anything other than laugh off pleas for clemency for self-exiled leaker Edward Snowden.  He is being depicted as a martyr who advanced the public's knowledge of privacy abuses.  Nuts to that.  Snowden gave America's enemies detailed security information, including publishing the government's intelligence spending plan.

Snowden Lied About [His] China Contacts.  Yesterday, the New York Times urged the Obama administration to offer Edward Snowden "a plea bargain or some form of clemency."  The paper called the former NSA contractor "a whistle-blower" for his exposure of "the vast scope" of the NSA's "reach into the lives of hundreds of millions of people in the United States and around the globe."  Perhaps Snowden is what the Times portrays him to be, a hero of sorts, yet the editors of the paper rushed to judgment.  In their editorial they did not even raise the possibility that he passed along vital national security secrets to China.  It is likely he did so.

U.S. Loses Multibillion-Dollar Contract Because of Administration Spying.  The U.S. lost a fighter jet contract with Brazil worth $4.5 billion in the wake of the South American country's anger over revelations that President Obama's intelligence agencies spied on the personal communications of President Dilma Rousseff.  Boeing was considered to be the front-runner for the contract with its F/A-18 Super Hornet until the leak from former National Security Agency contractor Edward Snowden.

The Case for Arresting Glenn Greenwald.  If Edward Snowden can be charged with espionage and threatened with arrest if he returns to the U.S., why can't his associate, Glenn Greenwald, be charged as well?

Snowden Snowed In.  Mrs. O'Leary's cow was lost to history after it ignited the Chicago Fire because the fire was vastly more important than the cow.  Having ignited a global fire around the U.S. intelligence community, NSA leaker Edward Snowden is inevitably being condemned to the same fate for the same reason.  He isn't at all happy about it.

Just How Badly Has Snowden Wrecked American Power?  The damage done by the leaks to intelligence collection will be short lived, but the damage to American influence could easily endure.  The leaks have done more harm than we recognize.  Snowden is the latest in a long line of American naïfs — gullible, self-righteous, with a dislike for America that blinds them to the world's larger dangers.  Like the unfortunate Bradley Manning, Snowden was exploited by those whose intent is to damage American influence and power.

Edward Snowden: The Terrorists' Useful Idiot.  Britain's new MI-5 intelligence chief has blasted NSA leaker Edward Snowden's indiscriminate revelations as "a gift to the terrorists."  How pathetic that we aren't seeing the same clarity from the U.S.

Treason Chic.  There is a word for men like Agee and Snowden — men who betray their country, their country's allies, their comrades, and defect to a hostile state.  It is an ancient one:  traitor.

Fisa judge: Snowden's NSA disclosures triggered important spying debate.  The court that oversees US surveillance has ordered the government to review for declassification a set of secret rulings about the National Security Agency's bulk trawls of Americans' phone records, acknowledging that disclosures by the whistleblower Edward Snowden had triggered an important public debate.

Snowden impersonated NSA officials, sources say.  Edward Snowden accessed some secret national security documents by assuming the electronic identities of top NSA officials, said intelligence sources.  "Every day, they are learning how brilliant [Snowden] was," said a former U.S. official with knowledge of the case.  "This is why you don't hire brilliant people for jobs like this.  You hire smart people.  Brilliant people get you in trouble."

NSA Leaker "Outed" as Russian Agent.  The media have been given important new information in the case of NSA leaker Edward Snowden and don't seem to know what to do with it.  Snowden has been "outed" by the Russians as their agent.  The Washington Post reports that "Before American fugitive Edward Snowden arrived in Moscow in June — an arrival that Russian officials have said caught them by surprise — he spent several days living at the Russian Consulate in Hong Kong, a Moscow newspaper reported Monday."  In other words, the Russians were in on the deception all along.

Britain's secret listening post based in the Middle East is revealed in Snowden leaks.  Britain is operating a secret listening post based in the Middle East which collects emails, phone calls and web traffic on behalf of Western intelligence agencies, it has been reported.  The existence of the facility reportedly came to light following the leaks made by US fugitive Edward Snowden.  The site accesses web traffic by tapping into underwater fibre optic cables connecting the region to the internet.  The location of the site has not been reported.

Snowden suspected of bypassing electronic logs.  Such logs would have showed what information Snowden viewed or downloaded.

A lover and a mule.  Let's be clear about the material swiped by the ex-CIA employee Edward Snowden and marketed by the radical journalist Glenn Greenwald and the documentarian Laura Poitras:  The Snowden material was stolen.  Yes, what Snowden put on thumb drives and took out of CIA computers were digital files, not jewelry or cash or weapons.  No matter.  By the very definition of thievery, he is a thief, pure and simple:  He took things that didn't belong to him.

US doesn't know what Snowden took, sources say.  More than two months after documents leaked by former contractor Edward Snowden first began appearing in the news media, the National Security Agency still doesn't know the full extent of what he took, according to intelligence community sources, and is "overwhelmed" trying to assess the damage.

The Editor says...
I have an easy solution:  Just tell us everything he might have walked out with, and could disclose any minute now, embarrassing the government, and we'll sort it out.

Edward Snowden Leaks Again — And It's a Bombshell.  In 2008, the National Security Agency illicitly — if accidentally — intercepted a "large number" of phone calls from Washington, D.C. because an error confused Egypt's country code — "20" — with, yes, "202."  That fact, one of many startling ones from Barton Gellman's new blockbuster Washington Post story based on documents given to him by Edward Snowden, is so catchy and memorable that I almost worry about it.  That is, I worry people will just think of that and fail to grasp that this was actually one of the more anodyne NSA abuses revealed by these newly disclosed top-secret documents, including an internal audit.

Someone within the US Senate edited Edward Snowden's Wikipedia page.  A member of the US Senate was caught this week trying to make a rather conspicuous edit to Edward Snowden's Wikipedia page.  In a move sure to grind the gears of conspiracy theorists everywhere, a member of the US Senate recently edited Snowden's Wikipedia page from describing him as a 'dissident' to a traitor, according to the entry's changelog.  The user's IP address was quickly traced back to the US Senate.  It is not clear if the person is an active Senator, a staffer or an intern, but the change certainly came from the Senate.

Iceland proposal would grant NSA leaker Snowden citizenship.  [Edward] Snowden is believed to be stuck in a Moscow airport transit area.  At one point, he told the Guardian newspaper that he was inclined to seek asylum in a country that shared his values — and that "the nation that most encompasses this is Iceland."  But to apply for asylum in Iceland, Snowden would have to reach the island nation's soil.

Is It Possible That Snowden Is A Hero?  Until I began reading Brad Thor's thriller, "Black List", I was undecided about whistleblower Edward Snowden.  The plot of this novel is eerily similar to the NSA scandal and involves an IT whiz who discovers that the government is collecting data on American citizens, not terrorists, to control our lives and she steals the proof but is hunted down and killed.  Maybe Snowden blew the whistle because the extent of the data collection and how it is being used by this administration terrified him.  The irony is that the book was published in 2012 before the IRS and AP scandals.

Greenwald Slams Obama On Fox And Friends: Targeting Snowden 'To Intimidate Future Whistle Blowers'Guardian reporter Glenn Greenwald made a rare Fox News appearance Tuesday morning [7/2/2013], teasing new national security revelations and harshly criticizing the Obama administration for targeting NSA leaker Edward Snowden so as to discourage future disclosures.

The Anti-American Far Left Rallies to Edward Snowden's Defense.  Know Edward Snowden by taking a look at who his friends are.  As it becomes more and more obvious that Mr. Snowden is not a civil-libertarian whistle-blower, but someone committed to engaging in espionage, his list of supporters is beginning to dwindle.

Obama admin bungled Snowden extradition.  The Obama administration's "smart diplomacy" wasn't able to get the paperwork done properly in extraditing Edward Snowden from Hong Kong.  At least that's the story the Hong King government is telling. [...] This should be a deep embarrassment for anyone with the chutzpah to claim the label of smart diplomacy, but one has to go overseas to find it reported.  My guess is that only conservatives will be informed of the bungling, ghettoizing information that is is harmful to the Obama administration.

Breach.  Intelligence agencies in China and Russia gained access to highly classified U.S. intelligence and military information contained on electronic media held by renegade former National Security Agency (NSA) contractor Edward Snowden, according to U.S. officials.  The exact compromise of the secret data held on Snowden's laptop computers remains unknown but is the subject of an ongoing damage assessment within NSA and other intelligence agencies, said officials familiar with the case.

Greenwald: Snowden's Files Are Out There if "Anything Happens" To Him.  As the U.S. government presses Moscow to extradite former National Security Agency contractor Edward Snowden, America's most wanted leaker has a plan B.  The former NSA systems administrator has already given encoded files containing an archive of the secrets he lifted from his old employer to several people.  If anything happens to Snowden, the files will be unlocked.

Obama's turning point has arrived.  [Scroll down]  Snowden then leaked the goods to the Washington Post and Britain's Guardian newspapers, and began a hide-and-seek game that has taken him to Hong Kong and Russia so far, and perhaps to Cuba and Ecuador next.  Even if the information Snowden released is something the American people need to know, the way he did it belies his claim to be a hero.  Whistle-blowers and patriots don't go to these countries, spies and traitors do.  And when they go they have to pay the price of admission — by turning over information that country wants.

The Age of American Impotence.  At this writing, Edward J. Snowden, the fugitive National Security Agency contractor indicted on espionage charges, is in Moscow, where Vladimir Putin's spokesman insists his government is powerless to detain him.  "We have nothing to do with this story," says Dmitri Peskov.  "I don't approve or disapprove plane tickets."  Funny how Mr. Putin always seems to discover his inner civil libertarian when it's an opportunity to humiliate the United States.

Cold war: U.S. tells Russia to give back Snowden, or else.  Does this mean Snowden really did get on a plane to Russia?  Because if it turns out he didn't and the whole Russia-to-Cuba-to-Ecuador thing was just a ruse, then we should dismantle the NSA on principle.  If they can't locate America's most wanted man, who can't bear to be apart from his computer, after he's absconded with a treasure trove of intelligence, then they're not so useful that we need to keep this eye in the sky afloat.

Snowden Snowballs Into Colossal Embarrassment for Obama and his Foreign Policy.  Buoyed by NSA leaker Edward Snowden's revelations of U.S. intelligence activities and after reportedly milking the hard drives of four laptops he carried into his Hong Kong hotel, the Chinese government defied a Washington extradition request and let Snowden leave the former British territory.  Once safely at the airport in Moscow, his U.S. passport revoked, Snowden had cover from Russia as he obtained financial and legal assistance from WikiLeaks and petitioned Ecuador for asylum.

How Could a Goofy Techie Expose Our Government's Incompetence?  The goofy techie, of course, is Ed Snowden, and the question might seem hard to answer if the Obama administration's incompetence were not on display for all to see.  The international press, belatedly catching on to the fact that our president is a fool, is having fun with the U.S.  Thus, Reuters headlines, with a snicker:  "Questions turn to U.S. competence in Snowden saga."  As well they might.

U.S. officials don't know how much secret material Snowden took.  U.S. intelligence agencies are worried they do not yet know how much highly sensitive material is in the possession of former National Security Agency contractor Edward Snowden, whose whereabouts are unclear, several U.S. officials said.

What Snowden Knew.  I'm still a bit confused about the brouhaha surrounding Edward Snowden.  I'm not sure what he has said that is really new.  I mean, what did we think was going on in all those mammoth NSA installations? [...] But he may have done us a favor, putting an exclamation point on the activities of the NSA so there are no doubts.  He also has made obvious the utter contempt with which Russia and China treat the Obama administration.

Washington keeps getting worse for whistleblowers.  With espionage charges now laid against Edward Snowden, the former National Security Agency contractor who revealed government collection of data on all Americans' phone calls, the Obama administration has initiated prosecutions of more than twice as many leakers as all previous presidential administrations combined.

Obama administration bungles Snowden, leaves great power diplomacy in shambles.  As Sarah Palin might ask:  How's that "smart diplomacy" workin' out for ya'?  The former NSA contractor and his famous thumb drives apparently remain in Moscow as of this writing.

U.S. files criminal complaint against Snowden over leaks: report.  The government has filed sealed criminal charges against former National Security Agency contractor Edward Snowden, who admitted leaking secrets about classified U.S. surveillance programs, U.S. sources said on Friday [6/21/2013].

Ex-Contractor Is Charged in Leaks on N.S.A. Surveillance.  Edward J. Snowden, the former National Security Agency contractor whose leak of agency documents has set off a national debate over the proper limits of government surveillance, has been charged with violating the Espionage Act and stealing government property for disclosing classified information to The Guardian and The Washington Post, the Justice Department said on Friday [6/21/2013].

Scenarios for Snowden: Escape, arrest, asylum.  A narrow window of time is closing quickly for Edward Snowden, the former National Security Agency contractor who has infuriated the U.S. government by leaking details of surveillance programs after fleeing the country.  As FBI agents gather evidence against him, the 29 year old is racing to find a permanent refuge while hiding out in Hong Kong on what's thought to be a 90-day tourist visa which could expire in early August.

Will the Real Traitor Please Stand Up?  [Scroll down]  Many say Snowden helped our enemies.  Hogwash.  Anyone engaged in terrorism, espionage, or crime already knew that the government can get a warrant — based on probable cause — to wiretap their phones and even plant a hidden microphone.  This changes nothing for people engaged in "probable cause" eligible behavior.  And, they will never know if the government is on to them.

Snowden: A Fool, Not a Spy.  It would make things so much easier for everyone if Edward Snowden were working for China.  And that's certainly a possibility.  His decision to flee to Hong Kong — a Chinese vassal — was an odd one, given that China is hardly a bulwark of transparency and civil rights.  It's a bit like complaining that Boston is too Catholic and then moving to Vatican City in protest.

The "Apolitical" Fantasy and the IRS.  The ongoing saga of Edward Snowden has at least been moving in the right direction for President Obama.  Snowden may once have tried to position himself as a whistleblower, but he has since devolved into ingratiating himself with authoritarian regimes by plying them with American national security secrets.  While Pete [Wehner] is correct that the NSA story seems to be hurting voters' opinion of Obama's trustworthiness, Americans are by now realizing that they would be foolish to go the other extreme and place that trust in Snowden.

NSA Chief: Intel Leak Caused 'Irreversible and Significant Damage'.  National Security Agency Director Gen. Keith Alexander told the House Intelligence Committee on Tuesday [6/18/2013] that the NSA whistleblower that leaked classified information on the agency's surveillance program caused "irreversible and significant damage" to the nation and helped America's enemies.

Snowden Continues to Discredit Himself.  Edward Snowden seems to be afraid that the CIA, NSA and other parts of the U.S. intelligence apparatus will mount a massive campaign to discredit him.  Actually, they don't have to bother.  He's doing an excellent job of discrediting himself. [...] In reality the programs he disclosed are focused primarily on foreigners and operate under strict safeguards to avoid violations of Americans' privacy.

The Sickening Snowden Backlash.  Since Edward Snowden came forward to identify himself as the leaker of the National Security Agency spying programs, the D.C. mandarins have been working overtime to discredit the man many view as a hero for revealing crucial information the government had wrongfully kept secret.  Apparently, if you think hiding information about spying on Americans is bad, you are misguided.  The real problem is that Snowden didn't understand that his role is to sit and be quiet while the "best and the brightest" keep Americans in the dark about government snooping on private citizens.

NSA "Whistleblower" An Enemy Agent?  The fingerprints of America's enemies and adversaries are all over the disclosures about the NSA's terrorist surveillance program.  It is significant that NSA contract employee Edward Snowden would flee to Hong Kong — controlled by China — and that he would select Glenn Greenwald, a far-left columnist, as his mouthpiece. [...] After first giving Greenwald and his then-secret source tons of favorable publicity and softball coverage, the media seem to be having second thoughts, with CNN asking about Snowden, "Is this guy a hero or a traitor?"

By Revealing Prism, Snowden May Have Committed Treason.  Like many others, we have raised constitutional questions about the expansive nature of the so-called Prism program that collects data on more than 100 million Americans.  That said, Snowden's revelation of Prism and U.S. intelligence data-mining efforts to the left-wing British newspaper the Guardian broke the law.  As a government contractor with top-security clearance, he agreed not to reveal the secrets that were entrusted to him, under penalty of U.S. law.  He violated that.

Ron Paul fears US will use a drone to take out Edward Snowden.  Former Republican Rep Ron Paul has revealed he is worried about the welfare of Edward Snowden, the NSA whistleblower who leaked the secret information about a classified U.S. government surveillance program.  'I'm worried about somebody in our government might kill him with a cruise missile or a drone missile,' Mr Paul explained in an interview this morning.  'I mean we live in a bad time where American citizens don't even have rights and that they can be killed, but the gentlemen is trying to tell the truth about what's going on.'

Is Edward Snowden's story unravelling? Why the Guardian's scoop is looking a bit dodgy.  Now that the dust has settled after the Edward Snowden affair, it's time to ask some tough questions about The Guardian's scoop of the week.  Snowden's story is that he dropped a $200,000 a year job and a (very attractive) girlfriend in Hawaii for a life in hiding in Hong Kong in order to expose the evils of the NSA's Prism programme.  But bits of the story are now being questioned.

NSA Leaker Edward Snowden Breaks Silence: 'I'm Neither Traitor Nor A Hero, I'm An American'.  Since Snowden's bombshell revelations were made abroad, some have suggested that he was aware that he was breaking U.S. law and sought the protection of foreign governments.  Snowden says that he does not consider himself to be a fugitive from justice.

Spy leaker Edward Snowden 'vows to fight extradition'.  The information leaked by Mr Snowden has undoubtedly angered the US government, but so far he has not been charged by the authorities, nor is he the subject of an extradition request.  Hong Kong has an extradition treaty with the US, although analysts say any attempts to bring Mr Snowden to America may take months and could be blocked by Beijing.

Why I Don't Care About Edward Snowden.  The Snowden narrative matters mostly to White House officials trying to deflect attention from government overreach and deception, and to media executives in search of an easy storyline to serve a celebrity-obsessed audience.

Edward Snowden and the selective targeting of leaks.  Edward Snowden's expansive disclosures to the Guardian and the Washington Post about various National Security Agency (NSA) surveillance programs have only two corollaries in contemporary history — the classified cache Bradley Manning allegedly released to WikiLeaks a few years ago and Daniel Ellsberg's dissemination of the voluminous Pentagon Papers to the New York Times and other newspapers in 1971.

That's Officer Obama, walking the electronic beat.  Our constitutional republic is under attack.  It has been wounded by the rise of the national surveillance state. [...] We now know the NSA monitors the phone records, emails and Internet data of more than 120 million Americans.  For this, many Republicans and Democrats are calling him a "traitor."  The ruling class considers Mr. Snowden a digital Benedict Arnold.  The opposite is true.  He is a hero and patriot, who exposed the rampant abuses of power at the heart of the Obama regime.

Did Snowden have an accomplice?  The world of the NSA, and the contractors who support it, is filled with young men and women — many of whom are or once were enlisted military personnel — who may or may not have a college degree but have shown an aptitude for some element of NSA work.  All that said, we still don't know (at least publicly) exactly what Snowden's job was.  So questions remain about whether he should have had access to the materials he passed along to the Guardian and the Washington Post.  Or is there some "hole" in the NSA's internal IT system that allowed him to get around and get to materials he should not have been able to see, let alone download?

NSA Leaker Had Legal Means to Reveal Information.  The inspector general for the Defense Department runs a hotline for military and intelligence officials to report such conduct in ways that do not disclose classified information to the public.  Experts on national security whistleblower laws say Snowden could also have disclosed the information to members of Congress.

Edward Snowden: Whistleblower or double agent?  While some initially championed Edward Snowden, the 21st century mole holed up in Hong Kong, as a martyr, there also appears to be a growing backlash against the former NSA contractor.  And as the story slowly unfolds, one key question stands out: is Snowden the heroic whistleblower he claims to be or something more sinister?

Snowden Used Banned Flash Drive to Smuggle NSA Data.  Edward Snowden, who has admitted leaking top-secret documents detailing the NSA's phone and Internet surveillance programs, exceeded his authorized access to the agency's computer systems while managing to smuggle out classified documents on a portable USB drive.  The small data-storage device has been banned from use on secret military networks, including those of the National Security Agency, for at least five years, The Washington Times reports.

NSA leaker Ed Snowden used banned thumb-drive, exceeded access.  Questions were raised Friday about security procedures at the ultra-secret National Security Agency, after it emerged that Edward Snowden, the contract employee who leaked details of the agency's broad-scale data gathering on Americans, exceeded his authorized access to computer systems and smuggled out Top Secret documents on a USB drive — a thumb-sized data storage device banned from use on secret military networks.  "He should not have been able to do either of those things" without setting off alarm bells, said one private sector IT security specialist who has worked on U.S. government classified networks.  He spoke on condition of anonymity because of the sensitivities of his current employer.

Fox's Brit Hume Dismisses NSA Uproar As 'Misplaced Hysteria'.  Appearing on FoxNews.com Tuesday afternoon [6/11/2013], Fox senior political analyst Brit Hume dismissed the uproar over the National Security Agency's snooping revelations as "misplaced hysteria," adding that he sees no "abuse" whatsoever in what has been revealed.  If anything, he said, NSA leaker Edward Snowden is the one who committed an abuse.

Judge Napolitano To Shep Smith: NSA Leaker An 'American Hero' Who Exposed 'Extraordinary Violations'.  Appearing on Fox's Studio B this afternoon [6/10/2013], senior judicial analyst Judge Andrew Napolitano gave a frank assessment of NSA leaker Edward Snowden as "an American hero" who went great lengths to expose "extraordinary violations" of fundamental American values within the government.  "I describe this man has an American hero," the judge told host Shepard Smith, "willing to risk life and liberty in order to expose to the American people one of the most extraordinary violations of the American principles, value judgments and the Constitution itself in all of our history."


"Anybody who thinks it is consistent with the Constitution for spies in the United States of America, working for the federal government, to spy on more than half the country, does not understand the Constitution, does not accept our values, does not understand our history and ought not be in office."

Judge Andrew Napolitano        


Edward Snowden has exposed both the ambition and the incompetence of Obama's security state.  "We hack everyone everywhere," Snowden tells The Guardian, arguing that there's little material or moral difference between the US and China when it comes to privacy rights.  "You are not even aware of what is possible," he continues.  "We can plant bugs in machines.  Once you go on the network, I can identify your machine.  You will never be safe whatever protections you put in place."  Snowden says that the NSA "routinely lies" about the scale of the surveillance, all of which implies that Verizon is simply the tip of the iceberg.

Glenn Beck, Michael Moore call NSA whistleblower Edward Snowden a hero.  Conservative radio commentator Glenn Beck and liberal Hollywood movie-maker Michael Moore have found common ground on the National Security Agency whistleblower, Edward Snowden:  He's a hero.



Other government threats to your privacy

Report: Missouri Governor's Office Responsible for Teacher Data Leak.  Missouri Governor Mike Parson made headlines last year when he vowed to criminally prosecute a journalist for reporting a security flaw in a state website that exposed personal information of more than 100,000 teachers.  But Missouri prosecutors now say they will not pursue charges following revelations that the data had been exposed since 2011 — two years after responsibility for securing the state's IT systems was centralized within Parson's own Office of Administration.

CIA has a secret surveillance program called 'Deep Dive' that has been collecting Americans' personal information for years.  The CIA has been collecting the personal information of Americans for years in a secret surveillance program that has no congressional approval, according to a newly declassified letter released by a pair of Democratic senators said late Thursday night.  Sens. Ron Wyden of Oregon and Martin Heinrich of New Mexico are branding the collection 'warrantless backdoor searches.'  They sent a letter to top intelligence officials calling more details about the program to be declassified and demanded immediate action.  The program is 'entirely outside the statutory framework that Congress and the public believe govern this collection, and without any of the judicial, congressional or even executive branch oversight that comes from [Foreign Intelligence Surveillance Act] collection,' the senators wrote.

CIA has secret program that collects American data:  Senators.  The CIA has a secret, undisclosed data repository that includes information collected about Americans, two Democrats on the Senate Intelligence Committee said.  While neither the agency nor lawmakers would disclose specifics about the data, the senators alleged the CIA had long hidden details about the program from the public and Congress.  Sens. Ron Wyden of Oregon and Martin Heinrich of New Mexico sent a letter to top intelligence officials calling for more details about the program to be declassified.  Large parts of the letter, which was sent in April 2021 and declassified Thursday, and documents released by the CIA were blacked out.  Wyden and Heinrich said the program operated "outside the statutory framework that Congress and the public believe govern this collection."

Use Of Controversial Phone-Cracking Tool Is Spreading Across Federal Government.  U.S. Fish and Wildlife Service frequently work to thwart a variety of environmental offenses, from illegal deforestation to hunting without a license.  While these are real crimes, they're not typically associated with invasive phone hacking tools.  But Fish and Wildlife agents are among the increasingly broad set of government employees who can now break into encrypted phones and siphon off mounds of data with technology purchased from the surveillance company Cellebrite.  Across the federal government, agencies that don't use Cellebrite technology are increasingly the exception, not the rule.  Federal purchasing records and Cellebrite securities documents reviewed by The Intercept show that all but one of the 15 U.S. Cabinet departments, along with several other federal agencies, have acquired Cellebrite products in recent years.

CIA has been secretly collecting data on Americans in bulk, senators say.  The Central Intelligence Agency has conducted a secret, bulk surveillance program without congressional approval for years and two senators have called for new information about the program that includes data on Americans, according to a statement on Thursday [2/10/2022].  Sens. Ron Wyden and Martin Heinrich, both Democrats on the Senate Intelligence Committee, posted an April 13, 2021 letter they sent to Avril D. Haines, the director of national intelligence, and William J. Burns, the CIA director, in an effort to learn more about that program.  Their letter to the top intelligence officials was partially declassified on Thursday.  The two accused the CIA of conducting the program "entirely outside the statutory framework that Congress and the public believe govern this collection, and without any of the judicial, congressional or even executive branch oversight that comes with FISA [Foreign Intelligence Surveillance Act] collection."

Newly Declassified Documents Reveal Previously Secret CIA Bulk Collection.  U.S. Senator Ron Wyden, D-Ore., and Sen. Martin Heinrich, D-N.M., both members of the Senate Intelligence Committee, called for new transparency about bulk surveillance conducted by the Central Intelligence Agency, following the release of documents that revealed a secret bulk collection program and problems with how the agency searches and handles Americans' information.  Wyden and Heinrich requested the declassification of a report by the Privacy and Civil Liberties Oversight Board on a CIA bulk collection program, in a letter sent April 13, 2021.  The letter, which was declassified and made public today reveals that "the CIA has secretly conducted its own bulk program," authorized under Executive Order 12333, rather than the laws passed by Congress.

NSA watchdog worries analysts' searches may harm Americans' privacy.  National Security Agency analysts failed to follow court-approved procedures and internal policies for examining Americans' data when conducting searches under the Foreign Intelligence Surveillance Act, according to an NSA inspector general report.  The semiannual report to Congress, published Monday, says an evaluation of NSA analysts' searches of communications aimed at foreigners did not always follow the rules and Americans' privacy may suffer as a result.  "The evaluation revealed several issues that, if not addressed, have the potential to impact the effectiveness of the Agency's internal controls used to protect the civil liberties and privacy rights of [U.S. persons]," reads the NSA inspector general report.

Capitol Police examines backgrounds, social media feeds of some who meet with lawmakers.  After the Jan. 6 insurrection, the Capitol Police's intelligence unit quietly started scrutinizing the backgrounds of people who meet with lawmakers, according to three people familiar with the matter.  Politico also viewed written communications describing the new approach, part of a host of changes that the department implemented after the Capitol attack.  Examining the social media feeds of people who aren't suspected of crimes, however, is a controversial move for law enforcement and intelligence officials given the civil liberties concerns it raises.  Among those who have been subject to new Capitol Police scrutiny are Hill staffers, the three people said.

How Did ID.me Get Between You and Your Identity?  If you were writing a techno-thriller, you'd give your hero a backstory like Blake Hall's.  He's a Harvard MBA, an alumnus of McKinsey & Co.'s ultracompetitive summer associate program, and comes from a family with a proud military tradition.  He's a decorated Army Ranger who saw action in Iraq; his dad was an Army brigade commander; his grandfather fought off a Nazi assault in World War II. [...] So this past June, when he very publicly claimed that his company, ID.me, a player in the booming online identity-verification business, had uncovered one of the biggest heists in U.S. history — a $400 billion theft of pandemic unemployment payments perpetuated by cybercriminal gangs — it came with a certain veneer of credibility.  Within minutes of Axios publishing the interview with Hall, the $400 billion figure went viral.  It generated news stories of a nefarious dark web inhabited by Nigerian criminal syndicates out to massively defraud the U.S. government.  It was seized on by think tanks on both the left and right that are trying to reimagine the delivery of government benefits.

What Could Possibly Go Wrong?  The IRS Will Soon Require a Face Scan to Access Your Tax Records.  No problem.  I can't think of a single reason why the Internal Revenue Service scanning my face before allowing me to access my tax records is a bad idea.  Not at all.  It's not like we can't trust the IRS, right? [...] If you created an online account to manage your tax records with the IRS, your login credential will no longer work later this year.  Instead, as first reported by Krebs on Security, the IRS will force users to sign in to the IRS website through an account with third-party firm ID.me, and provide a government identification document with their photo alongside a "selfie" to verify their identity, according to the IRS website.

Common Office Desk Phone Could Be Leaking Info To Chinese Government, Govt Report Alleges.  A major Chinese phone maker could be putting U.S. consumers, companies, and even national security data at risk, and a U.S. senator wants to know what the Commerce Department is going to do about it.  As DefenseOne first reported, in a Sept. 28 letter obtained by Defense One, Sen. Chris Van Hollen, D-Md., described a report that "raises serious concerns about the security of audio-visual equipment produced and sold into the U.S. by Chinese firms such as Yealink."

Biden administration planning lists of employees seeking 'religious' vaccine exemptions.  An obscure federal agency has proposed creating a database capturing the names and "personal religious information" of government employees who submit "religious accommodation requests" to be exempted from the Biden administration's COVID-19 vaccine mandate.  At least seven other federal agencies, including five Cabinet departments, are apparently setting up similar "personal religious information" databases, according to an analyst at the Heritage Foundation, a conservative think tank in the District.  The federal Court Services and Offender Supervision Agency for the District of Columbia, or CSOSA, published a "notice of a new system of records" in the Federal Register on Tuesday [1/11/2022].  The agency, which supervises defendants awaiting trial as well as parolees, aims to "reduce recidivism" and "integrate offenders into the community by connecting them with resources and interventions."

China's driverless vehicles are surveillance tools.  So why are we bringing them here?  Flying cars are still the stuff of Jetsonian dreams, but self-driving cars are already here.  But these semi-autonomous vehicles come with a host of issues.  For instance, they must be able to deal with the erratic driving behaviors of humans, as well as unexpected obstacles on the road, such as a wild deer crossing the highway.  But a critical though lesser discussed problem associated with self-driving cars involves surveillance.  These vehicles look likely to be used as surveillance tools, closely monitoring our every move.  Worse still, China, a country that has expanded mass surveillance and integrated it into every part of Chinese life, is leading the self-driving revolution.  "Self-driving cars will represent a new mode for surveillance," says Luis F. Alvarez León, an assistant professor of geography at Dartmouth College, New Hampshire.  "Through a self-driving car's global positioning, system, navigational tools, and other data collection mechanisms, companies will be able to gain access to highly contextual data about passengers' habits, routines, movements, and preferences."

The Government Is Your Car's Next Passenger.  In a few short years, the government may be an omnipresent passenger in every new car.  The 2,000-page infrastructure bill, signed into law a few weeks ago, includes a mandate that newly manufactured cars keep a digital eye on their drivers — and figure out whether or not they're in any condition to drive.  This certainly sounds well-intentioned, but as lamentable as drunk-driving deaths are, mandating technology that has yet to be invented raises serious practical and privacy concerns.  Section 24220 of the law, titled Advanced Impaired Driving Technology, directs the secretary of transportation to issue a rule within three years requiring advanced impaired driving technology in all new vehicles, although the rule may be delayed if the technology is not ready for implementation.  Automakers have up to three years after the rule is issued to comply.

Tax & Spy:  Treasury Department Buying App Data to Investigate Private Citizens.  The US Treasury Department wants your private app data in order to make it easier to monitor and track down tax dodgers and, well, anyone they suspect isn't paying their fair share.  According to the Intercept, the US Treasury Department has entered into a new agreement with controversial firm Babel Street, which has a history of "helping federal investigators around the Fourth Amendment."  "The Treasury acquired two powerful new data feeds from Babel Street," the Intercept reports.  "One for its sanctions enforcement branch, and one for the Internal Revenue Service.  Both feeds enable government use of sensitive data collected by private corporations not subject to due process restrictions."  If that sounds bad, it's because it is.

Al Gore's Latest 'Solution' To Climate Change Is Mass Surveillance.  Speaking from the private jet and super yacht owners gathering, otherwise known as the COP 26 summit, Al Gore touted his latest solution to curb carbon emissions, mass surveillance via satellites, sensors and artificial intelligence.  In the interview with MSNBC's Andrea Mitchell, Gore declared that technology created by the so called Climate TRACE coalition will monitor greenhouse gas emissions and root out the culprits.  "We get data consistently from 300 existing satellites, more than 11,000 ground-based, air-based, sea-based sensors, multiple internet data streams and using artificial intelligence," Gore explained, adding "All that information is combined, visible light, infrared, all of the other information that is brought in, and we can now accurately determine where the greenhouse gas emissions are coming from." [...] Gore, who in 2008 said there would be no polar ice caps left within five years, continued, "And next year we'll have it down to the level of every single power plant, refinery, every large ship, every plane, every waste dump, and we'll have the identities of the people who are responsible for each of those greenhouse gas emission streams."  And what, pray tell will happen to these climate criminals Al?

Resist the Unique Patient Identifier!.  When I began fighting the unique patient ID in the 1990s, my opponents denied that medical identifiers would make it impossible to ensure confidentiality of medical records.  Now, they are saying we should support medical identifiers because they allow government officials, employers, schools, airlines, and even stores and restaurants to discover what, if any, vaccinations or other medical treatments we have or have not received.  The result of the identifier will be a medical caste system, where those who refuse to follow the mandates or advice of the "experts" are denied opportunities to work, receive an education, or even go to church or enjoy a night out on the town.  A unique patient identifier will weaken health care by making individuals reluctant to share personal information — such as drug and alcohol use and past sexual history — with health care providers.  It will also discourage sick individuals from seeking medical care for fear their physicians will discover they are unvaccinated, smoke, are overweight, or engage in other unapproved behaviors.  A unique medical ID could also be tied to government records of gun purchases.  Someone with "too many" guns could be labeled a potential mental health risk and harassed by law enforcement.  This is especially likely if the gun grabbers are successful in their push to enact "red flag" laws in every state.

The Data Mining of America's Kids Should Be a National Scandal.  On a recent Saturday night, Caroline Licwinko, a mother of three, a law school student and the coach to her daughter's cheerleading squad, sat in front of her laptop and tapped three words into an internet search engine:  "Panorama.  Survey.  Results."  Within three clicks, Licwinko was in an online "dashboard" created by Panorama Education Inc., a government contractor hired by school districts to gauge their students' "social and emotional learning."  However, Panorama digs far deeper than whether students might feel depressed or lonely, raising serious public policy questions.  It asks all kinds of prying questions, including gender and sexual orientation and views on racial issues.  Licwinko and her husband, Eric, became concerned in September when their sons' school, North Hunterdon High School, told parents they were sending students a Panorama survey.  Although they opted their sons out, as parents are ostensibly allowed to do, their sons were sent the survey anyway.  What's more, a school official confirmed to them, the private information of all students — including whether they receive special education services and free and reduced meals — was sent across four state lines to Panorama, based in Boston.  Last week, Panorama refused to give the Licwinkos the data the company received on their children.  "They are data mining and psychologically profiling our kids.  The questions they are asking are absolutely inappropriate in a school setting," says Licwinko.  "Schools have sold our children's privacy to a data analytics company that is tracking attendance, behavior, and family's financial status."

Oops! Oregon government "accidentally" leaks vaccination status of 40,000 state employees.  The vaccination status of more than 40,000 individual state employees in Oregon has been leaked to the media, supposedly by accident.  Adam Crawford, the director of the Oregon Department of Administrative Services External Relations, was supposed to email out a generic datasheet showing vaccination rates and vaccine exemption rates for each executive branch state agency overseen by Gov. Kate Brown.  Instead, Crawford "mistakenly" sent out every individual state employee's current vaccination status.  "It's a mistake on my part," Crawford told The Oregonian / OregonLive, in a call.  The Oregonian / OregonLive is one of the news outlets that received the file, which included details about each state employee's Wuhan coronavirus (Covid-19) vaccine verification, medical or religious exemption, or nothing if no information was ever submitted.

Public School District Wants to Teach 8-Year-Olds about the 'Birds and the Bees'.  As school board races across Colorado are down to the wire, the thirteen-page Healthy Kids Colorado Survey (HKCS) for middle school students in Colorado's 9-R District surfaced, to the panic of many unsuspecting parents.  Those parents were already questioning the district's previously unknown policy on diversity, which was adopted in January with no public hearing.  There is also a comparable survey for high school students.  Widely administered by the Colorado Department of Public Health and Environment (CDPHE) every other year, the survey targets 6th-, 7th-, and 8th-grade students (ages 11-14) as voluntary and promises to be "completely anonymous" with its answers "kept private."  There appears to be no requirement for parental permission, so presumably, the parents may remain unaware that the student has taken the survey, with no knowledge of the invasion of their child's privacy (and constitutional) rights that have been violated.

Why would anyone believe the IRS should be trusted with vast new snooping powers?  Most of the media, along with other Democrats, are campaigning to give the IRS huge amounts of additional money for their budget so that they can pretend to pay for the two huge slush funds they are peddling for the tax agency.  They want banks to report the receipts and disbursements on any bank accounts where the annual deposit amount is more than $10,000.  Catherine Rampell of the Washington Post says that Republicans are only opposing this provision to massively intrude on the privacy of the public because they support tax cheats.  Somehow banks are supposedly able to sort the accounts to exclude wage income and other exempt income, plus sort out the teachers and firefighers, who will oddly be exempt from the measure, from the massive data dump of the banking system at the flick of a switch.  That implies that the computer can determine those sources in their data dump.  It must be magic!

Democrats to scale back Treasury's IRS bank reporting plan, raise threshold from $600 to $10,000.  Senate Democrats are set Tuesday [10/19/2021] to announce a scaled-down version of the Biden administration's proposal to crack down on Americans it suspects are dodging taxes.  The administration's original proposal was greeted with overwhelming opposition from fiscal conservative groups, the banking industry and other over concerns about financial privacy.  The initial plan, conceived by the Treasury Department and Senate Democrats, would have allowed the Internal Revenue Service access to information on bank accounts that had at least $600 worth of annual deposits or withdrawals.  The new proposal will still allow the IRS to access information on accounts that transfer or receive more than $10,000 annually.  However, it will exclude all wage income from counting toward the $10,000 threshold.

The Democrats are determined to get into your bank accounts.  Nancy Pelosi finally admitted that, faced with Sen. Joe Manchin's and Sen. Kyrsten Sinema's laudable refusal to back down, the Democrats are not going to get their $3.5 trillion spending bill.  However, Pelosi insists that the bill will still allow the feds to track every banking transaction over $600, something that manifestly violates the Fourth Amendment.  After Pelosi admitted that Democrats would have to trim their spending bill, she was asked whether the bill would continue to require banks to forward to the IRS all $600 transactions in bank accounts.  Her answer, emphatically, was "yes": [...] Put simply:  The plan will vastly expand the IRS's reach; impose huge reporting burdens on banks, driving up costs (which will increase fees and further lower interest rates on consumer savings accounts); and allow the IRS to wander freely through people's bank accounts looking for cash and crimes.

Pelosi Plans to Keep the 'Spy on All Bank Accounts' Clause in the $3.5T bill.  Democrats, now the party of the hardcore Left, have a clause in the $3.5 trillion bill that will allow the government to look at any account making transactions — like paying rent — of $600 or more.  That takes in almost every American.  Politicians will be able to spy on everyone's account.  They will know everything about you.  At the same time, they plan to hire up to 95,000 new IRS employees to look for people not paying their fair share.  We have already seen what these people do with power and how they use it against people who don't agree with them.  What do you think they will do with this kind of power?  Will they cancel gun manufacturers?  Abuse conservatives and when they run out of them, abuse their own?  I watched a recent Bill O'Reilly podcast in which he said it will never remain in the bill.  He's naive if he believes that.  It's an important power grab for them.  Speaker Nancy Pelosi, who has been acting like a dicatator, was asked about it and she sounded pretty definite about it remaining in the bill.  She said the number is open to negotiations but not the clause.

Biden's Proposal to Empower IRS Rattles Banks and Their Customers.  When the Biden administration looked for ways to pay for the president's expansive social policy bill, it proposed raising revenue by cracking down on $7 trillion in unpaid taxes, mostly from wealthy Americans and businesses.  To help find those funds, the administration wants banks to give the Internal Revenue Service new details on their customers and provide data for accounts with total annual deposits or withdrawals worth more than $600.  That has sparked an uproar among banks and Republican lawmakers, who say giving the IRS such power would be an enormous breach of privacy and government overreach.  Banks and their trade groups are running advertising and letter-writing campaigns to raise awareness — and concern — about the proposal.  As a result, banks from Denver to Philadelphia say they are being deluged with calls, emails and in-person complaints from both savers and small-business owners worried about the proposal.  JPMorgan Chase & Co. has issued talking points to bank tellers on what to tell angry customers who call or come into a branch to complain.

Teachers blast union for telling them to upload vaccination status of student's parents, their names and addresses.  A national teachers union training session that asks educators to log conversations with parents about the COVID-19 vaccine — into a campaign app built for Alexandria Ocasio-Cortez's campaign — was blasted as a 'blatant effort to coerce, manipulate, and even track information on students and their parents.'  The recurring virtual training is hosted by vaccine equity group Made to Save and is sponsored by the National Educators Association (NEA), and the American Federation of Teachers (AFT).  'Having the audacity to back this type of presentation shows that the NJEA, NEA, AFT, and any other organization involved clearly does not regard educators as professionals or critical thinkers,' Jennifer Mess, a drama teacher for the Middletown Township Public Schools in New Jersey, told Fox News.

Judge delivers blow to city's spy-on-residents agenda.  A federal judge has delivered a blow to an Illinois city's agenda to spy on its residents through a mandatory inspection of their rental properties, refusing to dismiss the case as officials in the city of Zion had wanted.  At issue is an "inspection" program created by the city that demands that inspectors be allowed to enter the rental homes of residents "without cause or their consent," in apparently violation of the Fourth Amendment.  The city has threatened landlords with fines of $750 per day if a tenant declines to allow city officials to enter and inspect as they wish.  Josefina Lazono and Robert and Dorece Pierce, a landlord and two tenants, had sued the city over the violation of constitutional privacy protections, and the city now has failed to get the case thrown out.

Nebraska becomes the first state to say they will not comply with Biden's snooping plan to have banks report every transaction over $600 to the IRS.  Nebraska is already promising to defy a Biden proposal that would require banks to hand over data on transactions over $600 on individual bank accounts to the IRS.  'My message is really simple.  The people of Nebraska entrusted me to protect the privacy of these accounts and I am not going to comply with this.  If the Biden administration sues me, we will take it all the way to the Supreme Court.  We are going to fight every step of the way,' state treasurer John Murante told FOX Business.  The proposal, backed by $79 billion in additional funding, would allow the IRS to peer into the aggregate inflows and outflows of a bank account over $600.

IRS would track all bank transactions over $600 under Biden plan; businesses revolt.  A major component of President Joe Biden's plan to raise revenue to pay for his trillions of dollars in new federal spending is now under fire from trade associations across the country.  The Biden administration has made clear its plan to beef up IRS auditing by expanding the agency's funding and power.  Biden's latest proposal would require banks to turn over to the Internal Revenue Service bank account information for all accounts holding more than $600.  In a sharp pushback against the proposal, more [than] 40 trade associations, some of which represent entire industries or economic sectors, signed a letter to U.S. House Speaker Nancy Pelosi (D-Calif.) and Minority Leader Kevin McCarthy (R-Calif.) raising the alarm about the plan.  The letter, which includes the support of several banking coalitions, calls on Congress to reject that requirement, saying it violates customer privacy and would create an incredibly expensive and elaborate reporting requirement for the banks.

Biden wants to get into your bank account.  We've long been used to the fact that banks and credit unions must report to the federal government any transactions greater than $10,000.  This requirement goes back to 1970 when $10,000 was equivalent to around $70,000 today.  The law is a way to track criminal activity such as bank fraud.  But how would you feel if the government requires banks to report to the government — i.e., the IRS — every transaction of $600 or more?  Well, if Democrats pass their $3.5 trillion American Families Plan, that's exactly what will happen.

Joe Biden wants to spy on your bank account.  Joe Biden wants to know what's in your bank account, and he'd like to keep watching.  That's the alarming issue Reason magazine has explored, noting that buried deep within Biden's much-touted tax hikes for "infrastructure" American Families Act unveiled last April 28 is a sneaky Democrat plot called the American Families Tax Compliance Agenda.  That will force the IRS to hire 87,000 new IRS agents, all of them armed with vast, new, and expanded surveillance powers. [...] Those powers include the "right" to continuously spy on Americans' checking accounts through forced reporting requirements from banks on all cash flows.  They will also spy on Americans' PayPal and Venmo accounts in the name of knowing whether they are reporting their petty side income.  It's definitely a war on the little guy.  The rich know how to hide their wealth, says Reason, so it's not going to be they who get caught up in this federal fishing expedition and bankbook dragnet.

Insecure wheels:  Police turn to car data to destroy suspects' alibis.  On June 26, 2017, the lifeless body of Ronald French, a bearded auto mechanic with once-twinkling eyes, was mysteriously found in a cornfield in Kalamazoo County, Michigan.  French, a grandfather of eight who always tried to help people "down on their luck," his daughter Ronda Hamilton told NBC affiliate WOOD of Kalamazoo, had disappeared three weeks before.  According to the police report, a cord had been wrapped around his neck, his face and his feet.  He had been dragged behind a vehicle so forcefully that he had abrasions along his back, and his skull had been partly flattened.  The medical examiner attributed French's death to "homicidal violence."  But then his grieving family heard nothing about arrests.  For more than two years, Kalamazoo County sheriff's detectives investigated French's murder without making any arrests.  Then, according to police records obtained by NBC News, one of the detectives learned of an emerging field — digital vehicle forensics — which focuses on extracting the treasure trove of data stored in an automobile's onboard computers.

Your Credit Score Should Be Based on Your Web History, IMF Says.  With more services than ever collecting your data, it's easy to start asking why anyone should care about most of it.  This is why.  Because people start having ideas like this.  In a new blog post for the International Monetary Fund, four researchers presented their findings from a working paper that examines the current relationship between finance and tech as well as its potential future.  Gazing into their crystal ball, the researchers see the possibility of using the data from your browsing, search, and purchase history to create a more accurate mechanism for determining the credit rating of an individual or business.  They believe that this approach could result in greater lending to borrowers who would potentially be denied by traditional financial institutions.

We say "No" to mug shots at airports and borders.  Today the Identity Project (IDP), Restore the Fourth, Privacy Times, and the National Workrights Institute filed joint comments with U.S. Customs and Border Protection (CBP) in opposition ot the CBP proposal to require mug shots (and possibly collection of other biometrics) from all non-U.S. citizens at all border crossings and international airports and seaports. [...] As our comments discuss in more detail, the Privacy Act allows the collection of information "describing how any individual exercises rights guaranteed by the First Amendment", which includes records of travel and assembly, only in specified circumstances — none of which apply to suspicionless mug shots at airports and borders.

How Much Does the Government Know About You?  According to the NSA, they're already tracking/plan to track information like internet searches, emails sent and received, websites visited, blogging activity (including posts you read and comment on), social media activity, photos viewed online, videos watched, phone call records, video calls, online purchases, legal documents, financial information, travel documents, educational records, DNA, facial recognition, cable TV shows watched and recorded, health records, and more.  Their reasoning for collecting all of this data?  "There is no way to predict in advance which crucial piece of data will be the key to revealing a potential plot." [...] The NSA is basically admitting that they collect a ton of information without much purpose or direction in the hopes that they can connect the dots in situations where a crime is about to occur/has occurred.

State Dept. officials [were] told they broke [the] law by monitoring Americans during [the] Ukraine scandal.  State Department officials were explicitly ordered in spring 2019 to stop tracking 13 prominent Americans' social media accounts for information about the Joe Biden-Ukraine scandal because the monitoring violated federal law, according to emails that were originally redacted to hide the concerns from the American public.  "We are barred by law from actively monitoring the accounts of American citizens in aggregate — and particularly from identifying and monitoring individual, selected accounts," a State Department official wrote in an April 1, 2019 email to officials in Washington and the U.S. embassy in Kiev[.]  The unredacted emails, obtained by Just the News, raise new questions about the accuracy of State Department officials' testimony during President Trump's impeachment proceedings.  They also provide a window into how the department used redactions in a Freedom of Information Act case to hide the potentially explosive information just weeks before Election Day 2020.

Washington state directs restaurants to log all eat-in customers in order to reopen.  Restaurants in Washington state will be required to keep a log of each dine-in customer to facilitate contact tracing during phase two of the state's coronavirus reopening plans.  As part of the requirements, the log must be maintained for 30 days and must include each customer's telephone number and email address, and what time they came in to eat, according to officials.  "If you have somebody who has become sick and they were sitting right next to a person at a restaurant, to be able to identify that person could be very valuable for their health to try to save their life, and so we put that in place," Gov. Jay Inslee said Tuesday [5/12/2020].

The Editor says...
These mandatory lists of names, email addresses, and phone numbers will likely become "public records," and will then create a gold mine for email spammers and telemarketers.

COVID-19 and the Normalization of Mass Surveillance.  Governments, scientists, and product designers are racing to find technological fixes for the spread of COVID-19.  Some of these solutions — such as more efficient mass-production of masks, more accurate and prevalent testing, and efforts to create a vaccine — are valid and vital, and defend the health of citizens and strength of society without violating civil liberties.  Masks can arguably even help promote freedom by disguising protestors and flustering increasingly prevalent public facial recognition cameras.  And there are other key antiviral tactics that don't rely on cutting-edge technology: handwashing, social distancing, and contact tracing.  Contact tracing is the important practice of interviewing the sick to find out who they've met in recent days, so that health authorities can warn them, so they can take proper precautions, isolate themselves, and seek medical help if necessary.  It is a resource-intensive practice, requiring tens of thousands of human "contact tracers" for large populations.  Silicon Valley has clamored that there must be ways to automate this process.  At least two dozen governments are already experimenting with or rolling out contact tracing phone apps.

Homeland Security's Biometrics Database Is on Its Way to the Amazon Cloud.  The Homeland Security Department is in the midst of migrating its central biometric database — used to store, manage and disseminate biometric data on U.S. citizens and foreign nationals — to the Amazon Web Services GovCloud, the first step in a major overhaul of the decades-old legacy system.  With significant advancements in biometric technologies — like iris and facial scans — and computing technology, DHS decided it was time to upgrade its decades-old Automated Biometric Identification System, known as IDENT, originally developed in 1994.  In 2015, the Office of Biometric Identity Management began work on the Homeland Advanced Recognition Technology, or HART, system, which will introduce new capabilities and shift the entire system to the cloud.

Managing knowledge too dangerous to exist.  From the technical point of view the battle to preserve privacy is already lost.  While a given tracking app may not record your location that information is logged in other databases.  When that data is tied together anonymity vanishes. [...] Such information once gathered become potential hazards even if there is no intention to misuse them.  Like nuclear materials they are magnets for theft as are dual use biological material.  From 2013- 2015 the previous administration lost an entire federal personnel database to China.  A national contact tracing database could potentially contain movement patterns and related biometric information incomparably more valuable.  If you build it the hackers will come.

U.S. Judge Blocks Twitter's Bid To Reveal Government Surveillance Requests.  Twitter Inc will not be able to reveal surveillance requests it received from the U.S. government after a federal judge accepted government arguments that this was likely to harm national security after a near six-year long legal battle.  The social media company had sued the U.S. Department of Justice in 2014 to be allowed to reveal, as part of its "Draft Transparency Report", the surveillance requests it received.  It argued its free-speech rights were being violated by not being allowed to reveal the details.

What happened to the HIPAA laws?
Judge Forces McHenry County, Illinois Health Dept. to Provide Names of All COVID-19 Patients to Police.  The McHenry County, Illinois, Health Department (MCHD) had refused to provide the names of all coronavirus (COVID-19) patients to police — but, on Friday [4/10/2020], Judge Michael Chmiel ruled the MCHD must do so.  The McHenry County state's attorney's office had sued MCHD to force it to begin supplying patients' names to local law enforcement, prompting the judge's ruling, The Chicago Tribune reports: [...]

FBI's coronavirus 'fitness app' slammed as a way to extract personal info.  The FBI is helping gym rats looking to stay in shape during the coronavirus lockdown by promoting a fitness app — but it requires users to provide their GPS coordinates.  The law enforcement agency urged people in a Monday tweet to "download the FBI's Physical Fitness Test app to learn proper form for exercises you can do at home like pushups and situps."  The catch is that the FBI FitTest created in 2018 uses the "phone's GPS and accelerometer," which the FBI claims provides the user a "more realistic PFT experience."  The digital workout tool has been slammed on social media as a sneaky way for the government to extract personal info amid the coronavirus pandemic.

New web threat:  Government plan to scan online messages.  A privacy organization warns a bill in Congress would violate privacy and security by requiring "every message sent" to be read by government-approved scanning software.  The Electronic Frontier Foundation said the EARN IT bill sponsored by Sens. Lindsey Graham, R-S.C., and Richard Blumenthal, D-Conn., would spell the end of encryption online.  The bill's authors avoided the word "encryption," EFF noted, but they proposed "legislation that enables an all-out assault on encryption."

Secret Babel Street app is being used by Feds to track cell phone 'movement' — without warrants.  As supporters of President Trump wait on Attorney General William Barr and U.S. Attorney John Durham to hold people at the FBI and Justice Department accountable for lying to the FISA Court to fraudulently obtain a surveillance warrant to spy on the 2016 Trump campaign, now comes a report that federal law enforcement agencies won't have to do that anymore.  And why?  Because they've spent millions on a contract with a tech company in Virginia that has developed an app the Feds are secretly using to track cellphone movements and, thus, the movements of any individual they choose.  No warrant necessary.

The FISA States of America.  The Justice Department brazenly disregards the Constitution when it comes to spying.  Does FISA help prevent terrorism?  As I noted here, the government obtained more than 1,000 warrants in a one-year timeframe to spy on Americans.  That's a lot of spying on a lot of Americans.  The Justice Department's lying to obtain these warrants has become so brazen that the court now questions whether it can trust any of the affidavits the FBI submits to justify its domestic surveillance.  The fact that none of these lies are ever criminally punished further reinforces a cycle of dishonesty within the process.

NSA generated 434 million Call Detail Records from 14 FISA warrants.  [Scroll down]  The Freedom Act was passed in 2015.  It cost $100 million to generate "two unique leads".  Only one resulted in an investigation.  No details were given on what that was.  The last 20-pages of the Call Report are blacked out.  Starting at Page 86.

Smart Home Tech, Police, and Your Privacy:  Year in Review 2019.  If 2019 confirmed anything, it is that we should not trust the microphones and cameras that large corporations sell us to put inside and near our homes.  Thanks to the due diligence of reporters, public records requesters, and privacy researchers and activists, consumers have been learning more and more about how these "smart" home technologies can be hacked, exploited, or utilized by the police and other law enforcement agencies.

The Feds Don't Need To Tell You Or Get A Warrant To Collect Your Emails And Phone Records.  [Scroll down]  These records included calls allegedly with Devin Nunes, R-Calif., the ranking minority member on the Intelligence Committee, and John Solomon, a prominent journalist.  Americans began querying how Schiff could have obtained the phone call records for the report.  Some speculated that a secret warrant had been sought for them, that someone at the carrier (AT&T) had leaked them, that the National Security Agency had been tasked with obtaining them, or that a federal agency had issued a "natsec" letter to acquire them for the intelligence committee.  In reality, the government can obtain these records without taking any such extraordinary measures — and no judge even need be involved for Congress to get them.  It can simply send a subpoena to the carrier.

Trump Admin Proposes Using Facial Recognition On All Airport Travelers — Including Americans.  The Department of Homeland Security is proposing a rule that would allow the government to use facial recognition data to identify everyone traveling to and from the country, including U.S. citizens. [...] "The Department of Homeland Security (DHS) is required by statute to develop and implement a biometric entry-exit data system," the proposal reads.  "To facilitate the implementation of a seamless biometric entry-exit system that uses facial recognition and to help prevent persons attempting to fraudulently use U.S. travel documents and identify criminals and known or suspected terrorists, DHS is proposing to amend the regulations to provide that all travelers, including U.S. citizens, may be required to be photographed upon entry and/or departure," the filing continues.

California DMV Makes 50 Million Dollars a Year Selling Drivers' Info to Private Companies.  A California Department of Motor Vehicles document revealed that the government agency is generating $50 million a year by selling drivers' personal information to private companies.  According to a report from VICE, which received the document through a public records request, revenue from selling information — which includes names, physical addresses, and car registration information — has climbed from $41 million in fiscal year 2013-2014 to $51 million in 2018-2019.  In an email explaining the numbers, the California DMV did not specify which private companies have purchased the data, but said the list may include insurance companies, vehicle manufacturers, and prospective employers.

The Surveillance Century: Who Should Own Your Data?  You may object that this and many other forms of security come at the expense of individual privacy, but this has been going on for a long time.  Back in 2013, the Washington Post reported that "both the National Security Agency and the Federal Bureau of Investigation are said to have been secretly mining data directly from the servers of at least nine top U.S.-based technology companies... this was all done since 2007 under a highly-classified program dubbed 'PRISM.'"  Almost everyone, it seems, both attacker and defender, has been reading the public data.  Yet the issue of data ownership and privacy has been largely confined to the political fringes.

How Photos of Your Kids Are Powering Surveillance Technology.  The pictures of Chloe and Jasper Papa as kids are typically goofy fare: grinning with their parents; sticking their tongues out; costumed for Halloween.  Their mother, Dominique Allman Papa, uploaded them to Flickr after joining the photo-sharing site in 2005.  None of them could have foreseen that 14 years later, those images would reside in an unprecedentedly huge facial-recognition database called MegaFace.  Containing the likenesses of nearly 700,000 individuals, it has been downloaded by dozens of companies to train a new generation of face-identification algorithms, used to track protesters, surveil terrorists, spot problem gamblers and spy on the public at large.

If You've Given Your Genetic Code To A DNA Database, US Police May Now Have Access To It.  GEDmatch lets users upload their raw genetic data, obtained from companies such as Ancestry or 23andMe, to be matched with relatives who have also uploaded their data.  Law enforcement's capacity to use GEDmatch to solve crimes became prominent in April last year, when it was used to solve the Golden State Killer case.  After this raised significant public concern around privacy issues, GEDmatch updated its terms and conditions in May.  Under the new terms, law enforcement agencies can only access user data in cases where users have consented to use by law enforcement, with only 185,000 people opting in so far.  The terms of the warrant granted in Florida, however, allowed access to the full database — including individuals who had not opted in.  This directly overrides explicit user consent.

DOJ allowing foreign police to see your private data.  A privacy organization is lobbying Congress to stop an agreement that will allow police in the United Kingdom to access the online private information of Americans without a search warrant.  The Electronic Frontier Foundation has posted an extensive report on the new law enforcement deal between the U.S. and the U.K. under the CLOUD Act, which was signed into law by President Trump in 2018.

Your DNA Profile is Private?  A Florida Judge Just Said Otherwise.  For police officers around the country, the genetic profiles that 20 million people have uploaded to consumer DNA sites represent a tantalizing resource that could be used to solve cases both new and cold.  But for years, the vast majority of the data have been off limits to investigators.  The two largest sites, Ancestry.com and 23andMe, have long pledged to keep their users' genetic information private, and a smaller one, GEDmatch, severely restricted police access to its records this year.

DMVs Are Selling Your Data to Private Investigators.  Departments of Motor Vehicles in states around the country are taking drivers' personal information and selling it to thousands of businesses, including private investigators who spy on people for a profit, Motherboard has learned.  DMVs sell the data for an array of approved purposes, such as to insurance or tow companies, but some of them have sold to more nefarious businesses as well.  Multiple states have made tens of millions of dollars a year selling data.

Clothing Line Fools Big Brother Surveillance by Making You Look Like a Car.  As Vice explains, "If you've ever gotten a traffic ticket in the mail — sometimes complete with a photo of your vehicle, with yourself and passengers looking stunned in the front seat — your car has likely encountered an ... ALPR."  "Like many surveillance technologies in American cities, ALPRs are everywhere, always watching," the site continues.  "They're attached to everything from public telephone poles to cop cars, but they're much more than speed trap cameras.  ALPRs are privately-owned systems that capture everything resembling a license plate within their purview, collecting up to a thousand plates per minute.  So while you're driving around, or traveling in a rideshare, these systems read the vehicle's plates and collect its GPS location and registration information, as well as the date and time."

Cops Are Giving Amazon's Ring Your Real-Time 911 Caller Data.  Amazon-owned home security company Ring is pursuing contracts with police departments that would grant it direct access to real-time emergency dispatch data, Gizmodo has learned.  The California-based company is seeking police departments' permission to tap into the computer-aided dispatch (CAD) feeds used to automate and improve decisions made by emergency dispatch personnel and cut down on police response times.  Ring has requested access to the data streams so it can curate "crime news" posts for its "neighborhood watch" app, Neighbors.

FBI, ICE use driver's license photos for facial recognition tech.  The FBI and ICE are reportedly using driver's license photos for facial recognition without consent.  According to reports Monday [7/8/2019], the two agencies compiled a facial recognition database of millions of people living in the U.S. between 2014 and 2017.  The database was designed to help law enforcement agencies battle crime and deport illegal aliens.  However, some congressional Democrats say facial recognition could violate what they call the civil rights of illegals.  Meanwhile, Republicans have raised privacy concerns.

FBI, ICE use driver license photos without owners' knowledge or consent.  Agents with the Federal Bureau of Investigation and Immigration and Customs Enforcement have turned state driver's license databases into a facial-recognition gold mine, scanning through hundreds of millions of Americans' photos without their knowledge or consent, newly released documents show.

FBI, ICE using state driver's license photos without consent for facial recognition searches: report.  The FBI and Immigration and Customs Enforcement (ICE) have reportedly been using driver's license photos for facial recognition searches without license holders' knowledge or consent.  The Washington Post reports the two agencies have used millions of Americans' photos, largely from driver's licenses, for the purpose of facial recognition searches, citing internal documents and emails from the two agencies that were obtained by Georgetown Law researchers over the past five years and shared with the news outlet.  The photos give the agencies a new layer of information on Americans and a new tool to potentially track both criminals and those who have never committed a crime, according to the Post, which adds that Congress has not authorized any such development of a facial recognition system.

Hassan Likely Didn't Notify Constituents Whose Data May Have Been Exposed, Despite Pushing Law Requiring It For Companies.  Sen. Maggie Hassan's computer system was hacked in what prosecutors called the "largest data theft in Senate history," yet there is no evidence she informed constituents who may be at risk of identity theft as a result — despite being one of the most vocal advocates for laws requiring hacking victims to do just that.  The New Hampshire Democrat's former IT aide Jackson Cosko was sentenced to four years in prison June 19 for pilfering essentially all the office's data by paying another Hassan staffer to help him break into the office late at night.

FBI, DHS Contacted Over Stealth Dem Effort to Gain Voter Data.  A massive effort to obtain Michigan voter data spearheaded by powerhouse Democratic group Priorities USA was so "unusual" that top officials in the state contacted the Federal Bureau of Investigation and Department of Homeland Security over the matter, internal emails provided to the Washington Free Beacon show.  Michigan clerks began receiving "mystery" Freedom of Information Act (FOIA) requests last year from an opaque limited liability company, the United Impact Group LLC, seeking a large assortment of voter data from across the state, including ballots cast in the 2016 elections.  The efforts were later linked to the Priorities USA Foundation, the separate but affiliated nonprofit arm of Priorities USA Action, the largest outside liberal super PAC.

FISA Motion Allowed FBI To Share US Citizens' Info With Foreign Agencies.  A 2012 Foreign Intelligence Surveillance Court motion contained a little-noticed provision expanding the FBI's ability to share information with foreign officials, which could have laid the groundwork for abuses against U.S. citizens, Rep. Louie Gohmert said.  "This motion and order would allow the FBI to collude with foreign governments about U.S. citizens," Gohmert, a Texas Republican on the House Judiciary Committee, told The Daily Caller News Foundation.  The potential for the U.S. government to spy on citizens — including for potentially political purposes — by partnering with foreign governments has come under renewed scrutiny following a pattern of Trump campaign associates being seemingly targeted abroad or by using their contacts with foreigners.

Big Brother Wants Your Genes.  Uncle Sam wants you — or at least your DNA.  That's the takeaway from the new "All of Us" research program at the National Institutes of Health.  The initiative aims to collect electronic health records and DNA samples from at least one million Americans.  Any person 18 or older is eligible to participate.  Researchers hope the donated data will help them better understand diseases and develop more personalized treatments.  This new effort is well-intentioned.  But it could put donors' privacy at risk.  Before parting with their DNA, citizens should understand their privacy rights and know how that data will be used.

The government's creepy obsession with your face.  From the federal Department of Homeland Security down to local police departments, governmental use of biometric facial recognition software has gained a startling amount of traction in recent years.  And these agencies are getting help from big business, to boot.  For example, DHS is reportedly developing a massive new biometric and biographic database with extensive data on citizens and foreigners alike.  The Homeland Advanced Recognition Technology (HART) database will reportedly include at least seven biometric identifiers, including face and voice data, tattoos, DNA, scars, and other "physical descriptors" on as many as 500 million people.  The agency has been remarkably hush-hush on how HART will be utilized — but the possibilities are frightening.  DHS expects to launch the new database next fiscal year, according to internal documents.  By the following year, they anticipate having iris and facial matching capabilities, and by fiscal year 2021, the database is expected to be functioning in its full capacity.  This massive and intrusive initiative will grant a whole host of federal, state, and local agencies access to intimate details about hundreds of millions of Americans and foreigners.

James Clapper made 'unmasking' requests to identify U.S. citizens 'once every couple of weeks'.  Former Director of National Intelligence James Clapper said Thursday he would make "unmasking" requests to reveal the identity of a U.S. citizen every "couple of weeks" during a more than six-year period.  His comments about unmasking were made to conservative radio host Hugh Hewitt, who asked about then-President Barack Obama's U.N. Ambassador Samantha Power's testimony in which she said other people had used her name to make unmasking requests.  Mr. Clapper said he did not know how that could happen, and that during his time as DNI director, he would make an unmasking request "once every couple of weeks, something like that, over the six and a half years."

Here are 1,366 well sourced examples of Barack Obama's lies, lawbreaking, corruption, cronyism, hypocrisy, waste, etc..  [#456] In November 2013, it was reported that the Obama administration had given the names, social security numbers, and other personal information of thousands of bookstore customers to dozens of federal agencies, including the IRS, CIA, NSA, and FDA. [...] [#537] In July 2012, the Obama administration illegally gave out the home addresses, phone numbers, GPS coordinates, and medical histories of up to 100,000 agricultural workers.

Hillary Clinton's email list, voter data, campaign software costing Democrats millions, report says.  Democratic campaign organizations have paid or pledged to pay more than $2 million for key parts of Hillary Clinton's 2016 campaign infrastructure — including her email list and campaign software — as the party ramps up a costly campaign to win back both houses of Congress this November, The Intercept reported Wednesday [4/25/2018].  According to the report, the Democratic National Committee will pay Clinton's PAC Onward Together $1.65 million for access to her campaign resources, including voter data.  The Democratic Congressional Campaign Committee has paid more than $700,000 to rent the email list.  In contrast, then-President Barack Obama gifted his email list worth nearly $2 million to the DNC as an in-kind contribution in 2015, the report added.

Devin Nunes Reveals Bombshell 'Secret Intel'.  Those who staged a soft coup attempt against President Donald Trump aren't anywhere near finished.  There are liberal Americans who refuse to believe that Trump did not collude with the Russians to win the presidency, but it's high time they are forced to see the truth before it's too late.  You don't have to know all the background information to understand the bombshell that Devin Nunes dropped on Fox News' Maria Bartiromo's show.  Nunes just got this bombshell from the DOJ after they refused to hand it over to the Houe Intel Committee for weeks.  For the FBI to start an investigation into anyone, they need a starting point, a possible crime.  Law enforcement does not investigate people, they investigate potential crimes that people commit.  This is an extremely important concept to understand.  It's the foundation of our justice system.

Obama bureaucracy left our private data more vulnerable than ever.  Without your knowledge or permission, the Obama administration collected and warehoused your most private bank records and continued to sweep them up — despite repeated warnings the data wasn't being properly protected.  Now there's a good chance your personal information could be in the hands of identity thieves or even terrorists.  The government isn't sure who has your information.  It only knows the Obama-era databases have been breached by outsider threats potentially 1,000-plus times.  That's according to a recent investigation of cyber-intrusions at the Consumer Financial Protection Bureau, where the sensitive information is stored.

Comey warns there is no longer 'absolute privacy' in US.  FBI Director James Comey said Wednesday that Americans should no longer have the expectations of complete privacy. [...] "Even our memories aren't private," he said.  "Any of us can be compelled to say what we saw.  In appropriate circumstances, a judge can compel any of us to testify in court on those private communications.  There is no place in America outside of judicial reach."

This Loophole Ends the Privacy of Social Security Numbers.  Federal law is supposed to protect the privacy of your Social Security number from government inquiries — but apparently that doesn't extend to a check on whether you've paid back taxes and child support.  In a decision with worrying implications for those who oppose a single national identification number, a divided federal appeals court has rejected a lawyer's refusal to submit his Social Security number along with his renewal of Maryland bar membership.  The state says it needs Social Security numbers to make sure lawyers' child support and taxes are up to date.  The court's majority said that was enough to fit the Social Security number under the federal law that allows states to use your number for tax purposes.  That definition is so loose that it enables states to ask for your Social Security number pretty much whenever they want — even when their records have been hacked.

Senate [is] one vote away from warrantless searches by FBI of Internet browsing history.  The Senate is one vote away from voting away the Fourth Amendment.  In a 58 to 38 vote, a Senate amendment to the Commerce, Justice, Science and Related Agencies Appropriations Act, 2016 failed which would have allowed the FBI to conduct warrantless surveillance searches on individual's [sic] Internet browsing history for national security purposes.  The bill proposed by Senator John McCain (R-Ariz.) in the wake of the Islamist terrorist attack in Orlando, Fla. is a large step in expanding the surveillance power of FBI in order to obtain records such as email addresses, telephone numbers, account numbers, login history, payment sources including any card or bank account information, and local and long distance toll billing records.

House asks feds to stop mailing postcards with Social Security numbers on them.  The House passed legislation Monday [9/26/2016] aimed at stopping the federal government from mailing letters to people that include their Social Security numbers — including in envelops that have these vital numbers printed on the outside where anyone can see them.  Lawmakers passed the bill, from Rep. David Valadao, R-Calif., in an easy voice vote Monday afternoon.  House Oversight and Government Reform Committee Chairman Jason Chaffetz, R-Utah, noted that Valadao offered the bill when one of his constituents complained that her Social Security number could be seen in a letter she got from the Social Security Administration.

Judge blocks Seattle from revealing locations of FBI's hidden cameras on utility poles.  A federal judge has issued a temporary restraining order preventing Seattle City Light from disclosing the location of FBI cameras and other surveillance equipment hidden on some of the city's utility poles.  U.S. District Judge Richard Jones said in a written order Monday [6/13/2016] that he reviewed classified material before issuing the order, finding that the bureau could be "irreparably injured" if the information is released.  Turning over the information could damage national security or "harm important federal law enforcement operational interests as well as the personal privacy of innocent third parties."

Judge's order could expose 10M California schoolkids' personal info, say critics.  A federal judge's order earlier this month that California public schools turn a trove of personal information on millions of children over to two nonprofits has parents worried and privacy rights advocates outraged.  The nonprofits, who advocate for special needs kids, say they need the info to gauge compliance with federal law, but critics don't believe Social Security numbers, home addresses and other sensitive records should be included.  The ruling by Judge Kimberly Mueller of the Eastern District of California, applies to all students enrolled in Golden State public schools at any time since 2008, a number estimated at 10 million.

U.S. officials: Encrypted apps a "blind spot" for intelligence.  U.S. law enforcement believes one blind spot is when terrorists "go dark," hiding their online communications.  Investigators say members of ISIS lure potential sympathizers to social media apps and forums where the messages self-destruct or are encrypted.  Law enforcement has been pressing the technology industry for access to that data when national security is at risk, but so far privacy concerns have won out.

The Editor says...
I'd much rather take my chances with the Islamic terrorists than with Big Brother.

Can Politicians Be Manipulated?  It is not a secret that the government occasionally spies upon it citizens.  We know that Attorney General Robert Kennedy authorized the wiretapping of Martin Luther King Jr.  It is a matter of record that First Lady Hillary Clinton had more than 900 FBI files in her possession at one point during her time in the White House.  It is also a matter of record that Kathleen Willey's personal protected information was released to the public.  Also during the Lewinsky affair, officials at the Department of Defense leaked Linda Tripp's personal information to the press.  These may be considered isolated cases where a small number of individuals violated the law.  These things happen.  However, what if government surveillance is more extensive?  Perhaps Congresswoman Maxine Waters let that particular cat out of the bag.

Secret IRS policy hides identity theft from victims.  Findings of the [WTHR] 13 Investigates report include:
  •   The IRS accepts millions of tax returns — and issues tax refunds — even when taxpayer documents show clear warning signs of identity theft
  •   Confidential IRS policies instruct IRS employees not to tell taxpayers when someone else uses their social security number to earn income
  •   The IRS allows illegal immigrants to "borrow" social security numbers that do not legally belong to them
  •   The IRS is discontinuing a program to notify taxpayers when their social security number is used by someone else to gain employment

New Cybersecurity Bill Protects Companies as Government Snitches.  A new bill passed this week will grant protection from prosecution of for violation of privacy laws to companies who share private data.  While it is allegedly limited to specific types of information, the concerns of lawmakers and privacy groups is that this law will open the door to government encroaching on the rights of the citizenry.

FBI Director: Government Must Have Access to Your Encrypted Data.  The director of the FBI doesn't want you to use technology to encrypt your personal data.  He said that for your safety the feds should have unrestricted access to everything you store in a cloud or a hard drive, write in an e-mail, or send in a text.  Security, he says, trumps privacy.  Besides, only a criminal has something to hide.  Actually, what FBI Director James Comey told the members of the Senate Judiciary Committee is that in order to stay a step ahead of the bad guys, the g-men should have access to any available technology to decode encrypted data.  And that the government should be the arbiter of when decryption is necessary or not.

The Editor says...
Next, they'll want a copy of the key to the front door of your house.  You don't have anything to hide, do you?

Obama collecting personal data for a secret race database.  A key part of President Obama's legacy will be the fed's unprecedented collection of sensitive data on Americans by race.  The government is prying into our most personal information at the most local levels, all for the purpose of "racial and economic justice." [...] This Orwellian-style stockpile of statistics includes a vast and permanent network of discrimination databases, which Obama already is using to make "disparate impact" cases against: banks that don't make enough prime loans to minorities; schools that suspend too many blacks; cities that don't offer enough Section 8 and other low-income housing for minorities; and employers who turn down African-Americans for jobs due to criminal backgrounds.  Big Brother Barack wants the databases operational before he leaves office, and much of the data in them will be posted online.  So civil-rights attorneys and urban activist groups will be able to exploit them to show patterns of "racial disparities" and "segregation," even if no other evidence of discrimination exists.

We all have good reason to block Uncle Sam's snoops.  Testifying before the Senate Judiciary Committee last week, FBI Director James Comey argued that data should never be transmitted or stored in a way that frustrates government snooping.  Comey warned that encryption is a boon to criminals and therefore must be designed so that law-enforcement agencies can decode it when the need arises.  As a panel of computer-security experts pointed out in a report issued two days before that hearing, Comey's argument founders on the practical difficulties of facilitating access by government officials without facilitating access by "bad actors."  Another problem:  Sometimes the bad actors are government officials.

Don't be fooled, America, your government is still lying to you.  Under the Patriot Act, the NSA installed its computers in every main switching station of every telecom carrier and Internet service provider in the U.S. It did this by getting Congress to immunize the carriers and providers from liability for permitting the feds to snoop on their customers and by getting the Department of Justice to prosecute the only CEO of a carrier who had the courage to send the feds packing.  In order to operate its computers at these facilities, the NSA placed its own computer analysts physically at those computers 24/7.  It then went to the U.S. Foreign Intelligence Surveillance Court and asked for search warrants directing the telecoms and Internet service providers to make available to it all the identifying metadata — the times, locations, durations, email addresses used and telephone numbers used — for all callers and email users in a given ZIP code or area code or on a customer list.

FBI spy planes spotted over Phoenix.  A Phoenix aviation photographer may have captured photos of secret FBI spy planes at Deer Valley Airport.  Chris Kennedy posted photos of the two Cessna aircraft on Flickr.  The registration records for the aircraft lead to two companies identified by the Associated Press as dummy corporations set up by the Department of Justice.  And the spy planes appear to still be flying.

Sign You're Doing Something Wrong: Front Companies.  CIA setting up front companies to hide covert operations abroad?  Business as usual, no objections, that's what spooks do, and one hopes (alas...) that, given the splendid budgets and resources with which we provide them, they'd do it well enough to avoid detection by a couple of AP reporters.  (Seriously:  Nice work, AP!)  That's fine for spies.  Domestic law enforcement doing the same thing at home?  That is deeply worrisome.  Any time a law-enforcement agency engages in a campaign of mass public deception, it's almost certainly doing something wrong.

FBI Behind Mysterious Surveillance Aircraft Over US Cities.  The FBI is operating a small air force with scores of low-flying planes across the country carrying video and, at times, cellphone surveillance technology — all hidden behind fictitious companies that are fronts for the government, The Associated Press has learned.

Jacksonville debuts high-tech streetlights — and they're watching you.  They may be on nearly every street that residents drive on, but Jacksonville's streetlights are about to get a whole lot smarter.  Through a pilot program with GE Lighting, JEA and the city, Downtown and surrounding neighborhoods will be outfitted with about 50 data-collecting LED streetlights, as part of the GE Intelligent City Initiative, announced Thursday morning [4/16/2015].

DEA acknowledges massive phone call database.  The Drug Enforcement Administration has formally acknowledged that it maintained a sweeping database of phone calls made from the United States to multiple foreign countries.

DEA chief: US abandoned plan to track cars near gun shows.  The Drug Enforcement Administration abandoned an internal proposal to use surveillance cameras for photographing vehicle license plates near gun shows in the United States to investigate gun-trafficking, the agency's chief said Wednesday [3/25/2015].

Russian researchers expose breakthrough U.S. spying program.  The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

Why are a bunch of "3 letter agencies" gathering intel on gun owners?  The NSA is monitoring phone calls and data, the Internet is an open book to the government and recently we learned that Uncle Sam has been tracking our vehicles.  According to the Wall Street Journal, "The Justice Department has been building a national database to track in real time the movement of vehicles around the U.S., a secret domestic intelligence-gathering program that scans and stores hundreds of millions of records about motorists."  We are continually assured this is for own safety; the government is not opposed to the citizens' rights, it is only looking to protect us with the data.

License-plate readers violate our principles.  In 2008, the Drug Enforcement Agency created a program to read and monitor vehicle license plates near border crossings in California, Arizona, and Texas.  Seeking cooperation from local officials, federal authorities explained that the system would be used strictly to track the movement of contraband and money by Mexican drug cartels.  Today, however, the federal government gathers information from hundreds of cameras and scanners from California to New Jersey to Florida.  The resulting database tracks the movement of millions of vehicles — maybe yours — throughout the United States.

Georgia bill would regulate license plate readers used by police.  Citing privacy concerns, House Republican leaders filed legislation this week that would regulate the license plate readers police use. [...] Mounted on police cars, road signs or traffic lights, the readers capture images of license plates as well as the date, time and location of each scan.  Police use that data to help spot stolen cars or suspects wanted on criminal charges.

Also posted under License plate readers.

TSA Disputes Claim That It Will Spy On Air Travelers' Social Media, Credit Card Activities.  The Transportation Security Administration (TSA) says language included in a draft agreement that was to allow private contractors to scour air travelers' social media activities and credit card purchases before approving them for expedited travel under the agency's PreCheck program was included "inadvertently."  The TSA recently filed a request for proposal which included the draft agreement with third-party vendors the agency plans to hire to pre-screen PreCheck applicants.  Under the agreement, companies hired by TSA would plug "commercial data" into algorithms to determine whether travelers qualified as "low-risk," and, thus, eligible for PreCheck boarding at airports.

Passengers' Personal Data At Risk.  Remember a few years after 9/11 when the airlines started requiring you to use your full name as it appears on a government issued ID, date of birth and gender when you buy a plane ticket?  That's so the TSA can check you against the Federal No-Fly List.  But there is more than meets the eye. [...] TSA now plans to release applicant's data to federal, state, tribal, local, foreign governments and debt collectors.

Feds Developing Technology to Detect Obesity from Your Picture.  The federal government is developing a body mass index (BMI) detector intended to be available to every American "anywhere and anytime," according to a grant awarded by the National Science Foundation (NSF).  The detector is expected to rely on the analysis of facial and body imagery.  The project has been awarded $200,113 thus far to create the system under the notion that too many obese individuals are unaware of their BMI.

Are Public Schools Collecting Too Much Data on Your Kids?  Parents are increasingly voicing concern that public schools are collecting massive amounts of personal data on students, storing it and distributing it to third parties without their consent.  Dawn Sweeney, a Pennsylvania mother, has two children in public schools and home-schools her younger three.  She had planned to enroll them in public schools when they reached seventh grade, as she did with her two oldest.  But because of the data collection, she's now reconsidering.

Anti-Surveillance Camouflage for Your Face.  I had slathered the paint on my face in order to hide from computers.  The patterns in which I applied the paint were important:  To the pixel-calculating machinations of facial recognition algorithms, they transformed my face into a mess of unremarkable pixels.  In the computer's vision, my face caused a momentary burst of confusion.  That's why the patterns are called computer vision dazzle (or CV dazzle).  When it works, CV dazzle keeps facial-recognition algorithms from seeing a face.

Report: 87 Percent of Online Spying Comes from Governments.  It's not surprising to learn that various governments (not just the United States) account for the bulk of online mischief, but it's a bit sobering to see the numbers laid out by a new Verizon investigative report, summarized by the UK Telegraph:  there has been a 300 percent increase in cyber espionage since last year's report, and government agents are responsible for 87 percent of it.  (11 percent came from organized criminals, which I suppose leaves two percent traceable to random jackasses.)

The Editor says...
The remaining two percent could be stalkers and snoops, or they might be supermarkets tracking your purchases through the use of "loyalty cards."

White House Updating Online Privacy Policy.  A new Obama administration privacy policy released Friday [4/18/2014] explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites, and it clarifies that online comments, whether tirades or tributes, are in the open domain.

It will soon be technically impossible to be anonymous.  Whether we like it or not (and often we do), we are getting ever more astonishingly accurate authentication links between people and machines.  It soon will be technically impossible to stay "anonymous".  Data we emit as people as we do anything other than sit alone starving in a cave will be collected and stored and processed as part of things working normally.  That data will throw up patterns of behaviour that can be used for both good and malign purposes, by both government agencies and private organisations.

Government 'Mining' Social Media for Information on Health Behavior.  The National Library of Medicine (NLM) is "mining" Facebook and Twitter to improve its social media footprint and to assess how Tweets can be used as "change-agents" for health behaviors.  The NLM, a division of the Department of Health and Human Services (HHS), will have software installed on government computers that will store data from social media as part of a $30,000 project announced last week.

Privacy fears grow as Obama weighs expanded gun-buyer database.  Mental health advocates are worried that the privacy of people who have received treatment for their illnesses could be jeopardized by a White House push to expand a database used to run background checks on gun buyers.

They're up in arms of the NSA database, but what about ObamaCare and health records?  [Scroll down]  What I have a hard time understanding, however, is how one can get worked up into a near panic about an overreaching national security apparatus while also celebrating other government expansions into our lives, chief among them the hydrahead leviathan of the Affordable Care Act (aka ObamaCare).  The 2009 stimulus created a health database that will store all your health records.  The Federal Data Services Hub will record everything bureaucrats deem useful, from your incarceration record and immigration status to whether or not you had an abortion or were treated for depression or erectile dysfunction.

Justice Department tries to force Google to hand over user data.  A secret lawsuit in Manhattan filed last month asks judge to force Google to cough up user data without a search warrant.  A different court has already ruled that the process is unconstitutional.

Indiana attorney general probing privacy breach of 'Obamaphone' users.  The Indiana attorney general's office confirmed Monday [5/20/2013] it is investigating a security breach in which Social Security numbers and other personal information were posted online for roughly 44,000 low-income Americans who applied for a federal program that provides discount Internet and phone service.  The program was nicknamed the "Obamaphone" during the 2012 election, though it actually started long before President Obama took office.  Indiana reportedly has the highest number of applicants, roughly 17,400, who were signed up by TerraCom Inc. and the affiliated YourTel America Inc.

DOJ Won't Require Warrants for Email, Chat Seizures.  In blatant violation of the Fourth Amendment protections against unreasonable search and seizure, the Department of Justice has apparently declared that they do not require warrants for grabbing Americans' emails and Facebook chats.  The ACLU has gotten hold of the documents from the FBI and DOJ that show that a subpoena, which comes from a prosecutor, is all that is necessary to seize emails and chats.

Big Government Mind-Readers.  Like Big Brother, Big Government cannot read minds.  But he can read your emails (at least, the IRS can, and apparently without a warrant) and your social media.  He can obtain your Google history and data.  He knows which candidates you voted for and how much you contributed to political campaigns.  Big Government can calculate how much you're worth, what you earn, spend, and owe, whether you pay bills on time, and how much you dropped in the offering plate at church.  He knows what kind of car you drive, where you drive it, and how quickly it guzzles gas.  If you use public transportation, he can see what you packed for the trip and then pat you down.

Obama's EPA And IRS Violate Our Constitutional Rights.  The Environmental Protection Agency has acknowledged that it released personal information on potentially thousands of farmers and ranchers to environmental groups, violating their privacy rights and acting in collusion with private groups with private political agendas.  In Nixonian fashion, the EPA has provided these environmental groups with the dossiers of farmers it has gathered to help them create an enemies list of potential polluters.  The agency acknowledged the information included individual names, email addresses, phone numbers and personal addresses.

Silly extremist: the government has no designs on your firearms.  See?  No black helicopters here.  Just the innocent sharing of data between states and the federal government.  For the children!

Why Are the Feds Trying to Identify All Gun Owners in Missouri?  They keep telling you they have noting but good intentions, that to worry about the feds coming for your guns makes you part of "the black helicopter crowd."  But then things like this happen:  In Missouri, federal investigators have demanded and obtained from the state government — apparently twice — the entire list of Missouri concealed weapon permit holders.

The IRS is reading your email, and doesn't care a court said they can't.  If you aren't encrypting your email, the IRS is probably reading it right now.

The Second Great Crypto War.  The first great conflict over cryptography and state power happened in the 1990s.  In one corner were cryptographers equipped with subtle math, digital technologies, and new ideas.  In the other were the Clinton administration and its National Security Agency (NSA), which sought to maintain and extend the federal government's control over cryptography.  They struggled over the concept that cryptography could be classified as munitions, over requirements to include NSA-friendly chips in communication hardware, and, in general, over the shape of post-Cold War security.  The geeks eventually defeated the feds, freeing up crypto for public use.

Big Brother Has The Neatest Toys.  At the time of the revolution Libya had only about 100,000 Internet users and the government monitoring system was able to filter all traffic (that was readable) for certain words or phrases.  If something was not in plaintext, the French monitoring software could identify what kind of data it was (encrypted, compressed, music or video, or whatever).  The system also kept a record of which users were on the Internet, when, and with what type of data.  The monitoring effort was no secret and rebels using the Internet were warned to be careful what they said and how they said it.

Electronic Privacy is the New 21st Century Battleground: Why We Must Fight Back.  With the advent of the Electronic Age mankind has seen increasing breakthroughs of communications and entertainment utterly unthinkable a century ago.  Along with these advances though comes the ability of government to increasingly track the emails, cell calls, and online activities of countless Americans with increasing ease.  In fact, we are being spied on routinely — a fact which is occasionally noted but hardly ever protested in our increasingly complacent, civil-rights illiterate and government-trusting populace.

Missouri Secretly Shares Entire CCW List With Feds Against State Law.  Missouri State Senator Kurt Schaefer confirmed today [4/10/2013] that the Missouri Highway Department did in fact share confidential CCW lists with the federal government in violation of Missouri law.

IRS to taxpayers: We don't need a warrant for email snooping, GPS tracking.  IRS attorneys have asserted in internal documents that the Fourth Amendment does not protect email and that a warrant is not needed to plant a GPS location tracker on a car in its owner's driveway.  In documents obtained from the IRS by the ACLU under the federal Freedom of Information Act and posted on the website Wednesday, the agency's attorneys adopt an extremely aggressive posture toward the requirements the Fourth Amendment might place on its criminal investigators who want to read email or text messages, or use GPS location tracking.

EPA acknowledges releasing personal details on farmers, senator slams agency.  The Environmental Protection Agency acknowledged Tuesday [4/9/2013] that it released personal information on potentially thousands of farmers and ranchers to environmental groups, following concerns from congressional Republicans and agriculture groups that the release could endanger their safety.

Highway patrol gave feds Missouri weapon permits data.  Missouri's database of concealed weapon permits was twice given to federal authorities investigating Social Security disability fraud in a move that has enraged lawmakers already angry over potential abuses in a new driver's licensing system.

National Databases: Collecting Student-Specific Data is unnecessary and Orwellian.  Home School Legal Defense Association has long opposed the creation of a national database of student-specific data.  We believe that such national databases threaten the privacy of students, could be abused by government officials or business interests that may gain access to the data, threaten the safety of young people if their data is breached, and are not necessary in order to educate young people.

EPA acknowledges releasing personal details on farmers, senator slams agency.  The Environmental Protection Agency acknowledged Tuesday that it released personal information on potentially thousands of farmers and ranchers to environmental groups, following concerns from congressional Republicans and agriculture groups that the release could endanger their safety.

Senate GOP blasts EPA for release of private business info to environmental groups.  Senate Republicans on the Environment and Public Works Committee this week criticized the Environmental Protection Agency (EPA) for improperly releasing private personal and business information to environmental groups.  Sen. David Vitter (R-La.), the lead Republican on the committee, and other committee Republicans charged that the EPA answered a Freedom of Information Act (FOIA) request last year by including business information that should have remained private.

ATF Seeks 'Massive' Database of Personal Info: 'Assets, Relatives, Associates and More'.  A recent solicitation from the Bureau of Alcohol, Tobacco and Firearms (ATF) reveals that the agency is seeking a "massive" online database capable of pulling up individuals' personal information, connections and associates.

Mayor Bloomberg admits soon NYPD surveillance cameras will be on nearly every corner.  Envisioning a future where privacy is a thing of the past, Mayor Bloomberg said Friday [3/22/2013] it will soon be impossible to escape the watchful eyes of surveillance cameras and even drones in the city.  He acknowledged privacy concerns, but said "you can't keep the tides from coming in."  "You wait, in five years, the technology is getting better, they'll be cameras everyplace ... whether you like it or not," Bloomberg said.

The Editor says...
"Whether you like it or not"?  Is that representative government, or an omnipotent nanny state?

13,753 Gov't Requests for Google E-Mail Data in 2012, Most Without a Warrant.  American government agencies — state, local, and federal — made a record 13,753 requests to read emails or gather other information sent through Google's Gmail and other services in 2012, more than half without warrants, according to statistics released by Google.  The total number of users about whom government agencies wanted information also set a record at 31,072, up from 23,300 in 2011, the first year Google began reporting the data.  The discrepancy comes because government agencies request information on multiple users or accounts at the same time.

Obama's license to snoop.  Uncle Sam is downloading the contents of laptops, cellphones and digital cameras belonging to international travelers.  The widespread snooping may help agents discover whether someone illegally downloaded music before boarding a long flight, but it also has chilling implications for personal privacy.  A report released Jan. 29 by the Department of Homeland Security's internal civil liberties watchdog saw nothing wrong with the searches.

The single dumbest gun-control measure ever proposed.  With extraordinary shortsightedness, Connecticut lawmakers want to publicize the addresses of handgun owners.

Connecticut Lawmaker Introduces Bill to Publish Names, Addresses of Gun Permit Holders.  Connecticut State Representative Stephen D. Dargan (D-New Haven), co-chairman of the state's Public Safety Committee, has introduced a bill that would make public the names and addresses of gun permit holders in Connecticut under the state's Freedom of Information Act (FOIA).

Big Brother's Listening.  The era of private conversations on city buses — and even on San Francisco's iconic streetcars — may be coming to an end.  Government officials are quietly installing sophisticated audio surveillance systems on public buses across the country to eavesdrop on passengers, according to documents obtained by The Daily.  Plans to implement the technology are under way in cities from San Francisco to Hartford, Conn., and Eugene, Ore., to Columbus, Ohio.

Public Buses Across Country Quietly Adding Microphones to Record Passenger Conversations.  Transit authorities in cities across the country are quietly installing microphone-enabled surveillance systems on public buses that would give them the ability to record and store private conversations, according to documents obtained by a news outlet.  The systems are being installed in San Francisco, Baltimore, and other cities with funding from the Department of Homeland Security in some cases, according to the Daily, which obtained copies of contracts, procurement requests, specs and other documents.

Great news: Your permanent record is now available on demand.  Remember when government needed something called a warrant or even probable cause to look at your records?  Good times, good times.  I'm nostalgic for the halcyon days of, er, February of this year, before the Attorney General of the United States signed off on an order allowing the government to access pretty much everything it wanted in the name of counterterrorism.

U.S. Terrorism Agency to Tap a Vast Database of Citizens.  Top U.S. intelligence officials gathered in the White House Situation Room in March to debate a controversial proposal.  Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens — even people suspected of no crime. [...] The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them.  That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation.

Attorney General Secretly Granted Gov. Ability to Develop and Store Dossiers on Innocent Americans.  In a secret government agreement granted without approval or debate from lawmakers, the U.S. attorney general recently gave the National Counterterrorism Center sweeping new powers to store dossiers on U.S. citizens, even if they are not suspected of a crime, according to a news report.  Earlier this year, Attorney General Eric Holder granted the center the ability to copy entire government databases holding information on flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and other data, and to store it for up to five years, even without suspicion that someone in the database has committed a crime, according to the Wall Street Journal, which broke the story.

Feds Want 'Black Boxes' in New Cars, But Who Will Be Tracking You?  [Scroll down]  Lt. Gov. Timothy Murray of Massachusetts found out the hard way last year.  He crashed a car he was driving and told police that he was wearing a seatbelt and was not speeding at the time of the crash.  However the black box installed in his car revealed he was actually speeding at 75 miles per hour in a 65 mile per hour zone, before accelerating to more than 100 miles per hour.

Nothing is Private Under the False Flag of Terrorism.  In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA's Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range.  This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data.  They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.  The facility has the technological ability to record and analyze every communication in the world.  From emails to phone calls to text messages to chats; nothing is private anymore.

Electronic Privacy is the New 21st Century Battleground: Why We Must Fight Back.  With the advent of the Electronic Age mankind has seen increasing breakthroughs of communications and entertainment utterly unthinkable a century ago.  Along with these advances though comes the ability of government to increasingly track the emails, cell calls, and online activities of countless Americans with increasing ease.  In fact, we are being spied on routinely — a fact which is occasionally noted but hardly ever protested in our increasingly complacent, civil-rights illiterate and government-trusting populace.

If There Needs To Be An Investigation, It Should Be About Why The FBI Was Reading Certain Emails.  While some have noted the irony of General Petreaus being taken down due to online surveillance methods that he should have been aware of, the case is bringing growing attention to an issue many of us have been discussing for a while:  how easy it is for law enforcement to snoop through your email.

Senate bill rewrite lets feds read your e-mail without warrants.  A proposed law scheduled for a vote next week originally increased Americans' e-mail privacy.  Then law enforcement complained.  Now it increases government access to e-mail and other digital files.

The Editor says...
Cops are notorious for claiming, "We don't write the laws, we just enforce them."  Such claims are completely untrue, as we see in this case:  The cops tell the state legislators what kind of laws they want, and the politicians put it in writing.

Update:
Leahy scuttles his warrantless e-mail surveillance bill.  After public criticism of proposal that lets government agencies warrantlessly access Americans' e-mail, Sen. Patrick Leahy says he will "not support" such an idea at next week's vote.

DHS Boss, In Charge Of Cybersecurity, Doesn't Use Email Or Any Online Services.  We've talked in the past about the problematic efforts to push for new cybersecurity regulations, especially when little to nothing has been done to show the actual problem.  There has been quite a turf war over who would "own" cybersecurity within the federal government, with some wanting to give it to the Defense Department, where the NSA would control it (along with all your info), and others wanting to give it to the Department of Homeland Security.

Petraeus case shows ease of government email snooping.  The scandal surrounding the sudden resignation of an adulterous CIA director has stunned the American public not just for its prominent cast of characters, but also because of the ease with which authorities appeared to have traipsed through personal email accounts.

Petraeus case shows FBI's authority to read email.  Your emails are not nearly as private as you think.

California vs. Texas.  Certainly, many government workers are working in legitimate government functions: police, courts, and prisons.  But what are the others doing? They are creating regulations, checking paperwork, inspecting businesses, and generally putting obstacles in the path of citizens living their lives and operating their businesses.  California has substantially more people erecting these arbitrary barriers than Texas.  In short, California has more people snooping and prying into the lives of its citizens than Texas does.

In Cell Phone Privacy Case, Government's Arguing a Theory of the Fourth Amendment 'That No One's Ever Heard Of'.  A federal appeals court in New Orleans is set to hear a case on whether the government can take possession of an individual's cell phone records from their carrier without a search warrant.  A federal court has already denied the government's bid to obtain the records without a warrant.  Judge Andrew Napolitano weighed in on Fox Business Network this morning [10/1/2012], saying the government's argument represents a new theory of the Fourth Amendment "that no one's ever heard of in 230 years."

94 Million Exposed: The Government's Epic Fail on Privacy.  Believe it or not, this number — which was just revealed in the latest report from tech security firm Rapid7 — is only the most conservative estimate.  When you take into account the difference between reported data breaches, which is what this report measures, and actual incidents, you are talking about a much, much bigger number.  As bad as the numbers are, it gets worse.

Constitution Day: 225 Years in Passage of Time; Light Years in Loss of Liberty.  In increasingly sophisticated and insidious ways, today's national government weaves a web of monitoring that allows the national intelligence apparatus to keep most citizens under some form of surveillance nearly 24 hours a day.  Add to that the passage by Congress and the signing by the president of the National Defense Authorization Act — legislation that grants the president the unprecedented and unconstitutional power to deploy members of the U.S. military to apprehend and indefinitely detain anyone he suspects of posing a threat to national security.  Finally, with the Supreme Court's decision to deem ObamaCare a constitutional exercise of Congress' taxing power, all three branches of the federal government established in the document drafted in Philadelphia 225 years ago have colluded in the creation of a government whose power is nearly immeasurable.

Obama Admin. Argues for Warrantless Cellphone Tracking.  In a document filed September 4 in the D.C. District Court, the Obama administration argues that there is no "reasonable expectation of privacy" in a person's cellphone GPS data.  The president's lawyers argue that they do not need a warrant to request cellphone company records regarding a customer's movements and location as tracked by their signal towers.

FBI to roll out $1 billion public facial recognition system in 2014.  They're watching you — or at least will be in a couple of years.  That's when the FBI is gearing up for a nationwide launch of a $1 billion project designed to identify people of interest, according to the New Scientist.  Dubbed the Next Generation Identification (NGI) program, the high-tech endeavor uses biometric data such as DNA analysis, iris scans and voice identification to track down folks with a criminal history.

The Editor says...
That sounds harmless enough, but with a large enough database, the government could track anybody's movements — not just criminals.

The Most Powerful, Well Connected Company You've Never Heard Of.  Have you ever heard of a tech company called Neustar?  Probably not, and that's just the way the government wants to keep it.  Neustar is a relatively new company that is playing a large, albeit secret, role in the expansion of the surveillance state.  According to published reports, Neustar handles the law enforcement surveillance and user data requests for over 400 telecommunications companies.  To accommodate their clients' demands, Neustar maintains a database containing information on every cell phone in the United States — including yours.

Feds Sue Telecom for Fighting Warrantless Search.  The Justice Department is suing a telecommunications company for challenging a request from the Federal Bureau of Investigation for customer information — despite the fact that the law authorizing the request explicitly permits such challenges. [...] Clearly the Justice Department is unaccustomed to having to defend its attempts to obtain customer data on its own say-so; and it isn't taking this fight lying down.

Covert FBI Power to Obtain Phone Data Faces Rare Test.  Early last year, the Federal Bureau of Investigation sent a secret letter to a phone company demanding that it turn over customer records for an investigation.  The phone company then did something almost unheard of:  It fought the letter in court.  The U.S. Department of Justice fired back with a serious accusation.  It filed a civil complaint claiming that the company, by not handing over its files, was interfering "with the United States' sovereign interests" in national security.  The legal clash represents a rare and significant test of an investigative tool strengthened by the USA Patriot Act, the counterterrorism law enacted after the attacks of Sept. 11, 2001.

National Reconnaissance Office accused of illegally collecting personal data.  One of the nation's most secretive intelligence agencies is pressuring its polygraphers to obtain intimate details of the private lives of thousands of job applicants and employees, pushing the ethical and legal boundaries of a program that's designed instead to catch spies and terrorists.  The National Reconnaissance Office is so intent on extracting confessions of personal or illicit behavior that officials have admonished polygraphers who refused to go after them and rewarded those who did, sometimes with cash bonuses, a McClatchy investigation found.

Is US government reading email without a warrant? It doesn't want to talk about it.  In March, the American Civil Liberties Union caused a nationwide stir when the advocacy group released the results of its year-long investigation into law enforcement use of cellphone tracking data.  After issuing hundreds of Freedom of Information Act requests, the ACLU learned that many local police departments around the country routinely pay mobile phone network operators a small fee to get detailed records of historic cell phone location information.  The data tell cops not just where a suspect might have been at a given moment, but also create the possibility of retracing someone's whereabouts for months.

NSA chief defends agency against domestic spying charges.  The head of the National Security Agency on Monday denied reports that NSA's new data center in Utah would collect and store data about Americans, including their e-mails and web-browsing habits.  The $2 billion data center in Bluffdale, Utah, will house massive supercomputers capable of storing and analyzing vast quantities of data when it comes online next year, but U.S. Army Gen. Keith B. Alexander reiterated NSA's insistence it does not unlawfully conduct surveillance of Americans.

FBI, DEA warn IPv6 could shield criminals from police.  Relax.  This has nothing to do with criminals.  It's cop bluster designed to get us to wiretap ourselves "before the cops get Congress to force us to".

NASA gets two military spy telescopes for astronomy.  The secretive government agency that flies spy satellites has made a stunning gift to NASA:  two exquisite telescopes as big and powerful as the Hubble Space Telescope.  They've never left the ground and are in storage in Rochester, N.Y. [...] The telescopes have been declassified, though they remain sufficiently sensitive that neither the NRO or NASA would provide a photograph of them.

The Editor says...
Last year's model, perhaps?  These two have "never left the ground", they say, but how many others just like them are in orbit right now?

NSA Has Your E-Mails and More, Whistleblower Says.  The internal spying regime, instituted under an NSA program known as "Stellar Wind," began sometime in 2001, [William] Binney said.  But after the scheme was implemented, he resigned from the agency in disgust.  "At that point, I knew I could not stay because it was a direct violation of the constitutional rights of everybody in the country," he said.  The NSA, Binney explained, has also enlisted the support of major companies such as AT&T to help spy on the American people.

Big Brother uses school children to troll for incriminating information
State exam asks N.J. 3rd graders to write essay on secret they had kept.  Is it okay to ask a child to reveal a secret?  Richard Goldberg doesn't think so.  Goldberg, the father of 8-year old twin boys, was dismayed to learn his third-grade sons were asked to write an essay about a secret they had and why it was hard to keep.  The unusual question, which Goldberg called "entirely inappropriate" was on the standardized tests given to public school students in the third through eighth grade every spring.

Big Brother just got scarier.  A new camera technology from Hitachi Hokusai Electric can scan days of camera footage instantly, and find any face which has EVER walked past it.  Its makers boast that it can scan 36 million faces per second.  The technology raises the spectre of governments — or other organisations — being able to 'find' anyone instantly simply using a passport photo or a Facebook profile.

The Editor says...
Maybe that's why criminals wear hoodies.  In the summer.

Say good-bye to privacy thanks to Stellar Wind.  The American republic, or any society so desiring emancipation to have its citizens live free and unfettered lives, must allow liberated and confidential communication.  Liberty and human dignity demand nothing less.  All of this is about to change.

New Details on NSA's 'Spy Center' and Secrets From Domestic Eavesdropping Operation 'Stellar Wind'.  [Scroll down]  Wired also includes a former NSA official going on the record for the first time on the secret, domestic spying program Stellar Wind and its role in data communication collection, which when the Bluffdale facility is complete will be stored there.  Former senior NSA "crypto-matematician" William Binney, who helped develop NSA's spying capabilities before leaving in 2001, explains how the NSA deliberately violated the Constitution, which was the reason why he left, in setting up warrentless wiretapping to the extent that they did.  Wired reports that much of NSA's wiretapping practices now were made legal under the FISA Amendments Act of 2008.

Big Brother FBI Data-Mining Programs Resurrect "Total Information Awareness".  From the wholesale use of informants and provocateurs to stifle political dissent, to Wi-Fi hacking and viral computer spyware to follow our every move, the FBI has turned massive data-mining of personal information into a growth industry.  In the process they are building the surveillance state long been dreamed of by American securocrats.

The Stellar Wind is Blowing.  The former NSA official held his thumb and forefinger close together:  "We are that far from a turnkey totalitarian state."

NSA keeping details about data center quiet.  The agency building 1 million square feet of enclosed space, including 100,000 square feet of space just for computers that will gather and digest intelligence information, continues to do what it does best — keep secrets — when asked about the project.  The NSA sent a short statement to the Deseret News on Friday [3/16/2012], but only after Wired Magazine compiled a voluminous story published the same day.

The CIA wants to spy on you through your TV.  When people download a film from Netflix to a flatscreen, or turn on web radio, they could be alerting unwanted watchers to exactly what they are doing and where they are.  Spies will no longer have to plant bugs in your home — the rise of 'connected' gadgets controlled by apps will mean that people 'bug' their own homes, says CIA director David Petraeus.  The CIA claims it will be able to 'read' these devices via the internet — and perhaps even via radio waves from outside the home.

CIA Chief: We'll Spy on You Through Your Dishwasher.  More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches.  CIA Director David Petraeus cannot wait to spy on you through them.  Earlier this month, Petraeus mused about the emergence of an "Internet of Things" — that is, wired devices — at a summit for In-Q-Tel, the CIA's venture capital firm.  "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft."

Big Brother Goes Live September 2013.  George Orwell was right.  He was just 30 years early.

Report: NSA's Warrantless Spying Resurrects Banned 'Total Information Awareness' Project.  Total Information Awareness — the all-seeing terrorist spotting algorithm-meets-the-mother-of-all-databases that was ostensibly de-funded by Congress in 2003, never actually died, and was largely rebuilt in secret by the NSA, according to the Wall Street Journal's Siobhan Gorman.

Data-Mining for Terrorists Not 'Feasible,' DHS-Funded Study Finds.  The government should not be building predictive data-mining programs systems that attempt to figure out who among millions is a terrorist, a privacy and terrorism commission funded by Homeland Security reported Tuesday [10/7/2008].  The commission found that the technology would not work and the inevitable mistakes would be un-American.  The committee, created by the National Research Council in 2005, also expressed doubts about the effectiveness of technology designed to decide from afar whether a person had terrorist intents, saying false positives could quickly lead to privacy invasions.

NSA's Domestic Spying Grows As Agency Sweeps Up Data.  Five years ago, Congress killed an experimental Pentagon antiterrorism program meant to vacuum up electronic data about people in the U.S. to search for suspicious patterns.  Opponents called it too broad an intrusion on Americans' privacy, even after the Sept. 11 terrorist attacks.  But the data-sifting effort didn't disappear.  The National Security Agency, once confined to foreign surveillance, has been building essentially the same system.

FBI's Data-Mining System Sifts Airline, Hotel, Car-Rental Records.  Headquartered in Crystal City, Virginia, just outside Washington, the FBI's National Security Branch Analysis Center (NSAC) maintains a hodgepodge of data sets packed with more than 1.5 billion government and private-sector records about citizens and foreigners, the documents show, bringing the government closer than ever to implementing the "Total Information Awareness" system first dreamed up by the Pentagon in the days following the Sept. 11 attacks.

Supreme Court: Police Need Warrant for GPS Tracker.  The government argued that attaching the tiny device to a car's undercarriage was too trivial a violation of property rights to matter, and that no one who drove in public streets could expect his movements to go unmonitored.  Thus, the technique was "reasonable," meaning that police were free to employ it for any reason without first justifying it to a magistrate, the government said.  The justices seemed troubled by that position at arguments in November, where the government acknowledged it would also allow attaching such trackers to the justices' own cars without obtaining a warrant.

All Hail Samuel Alito, Privacy Champion Extraordinaire!  Yesterday [1/23/2012] the Supreme Court handed down the most important privacy case of the Roberts era, U.S. v. Jones.  The unanimous decision is an occasion for dancing in the chat rooms.  In holding that the government needs a warrant before attaching a GPS device to a suspect's car to track his movements 24/7 for a month, all the justices rejected the Obama administration's extreme and unnecessary position that we have no expectations of privacy when it comes to the virtual surveillance of our movements in public places.

9 Things to Say Goodbye To:  [#9] Privacy.  If there ever was a concept that we can look back on nostalgically, it would be privacy.  That's gone.  It's been gone for a long time anyway.  There are cameras on the street, in most of the buildings, and even built into your computer and cell phone.

Block Big Brother's Internet snoops.  Americans are moving more and more of our personal data onto the Internet. ... What most Americans don't realize is that if the government wants to read your emails, look at your pictures or gain access to any data that you have stored online for more than 180 days on sites including Yahoo! Google Docs and online backup sites, it can do so without a search warrant.

Justice Dept. to Congress: Don't Saddle 4th Amendment on Us.  The Obama administration is urging Congress not to adopt legislation that would impose constitutional safeguards on Americans' e-mail stored in the cloud.  As the law stands now, the authorities may obtain cloud e-mail without a warrant if it is older than 180 days, thanks to the Electronic Communications Privacy Act adopted in 1986.

Is Your Gmail Safe From the G-Men?  Does the Fourth Amendment's requirement that the government obtain a warrant to search one's effects based on probable cause apply to e-mail communications?  It all depends on where those e-mails are being stored.  Under the 1986 Electronic Communications Privacy Act (ECPA), if the e-mail is downloaded to the recipient's computer and stored there, the Fourth Amendment applies.  If, however, the e-mail is being stored "in the cloud" (i.e., on a third-party server), then the Fourth Amendment only applies for the first 180 days of storage.

The worst homeland-security menace.  How much of your freedom are you willing to give up in the name of your personal safety?  That question is prompted by the latest news about the Transportation Security Administration, which has reportedly been contemplating expanding its controversial X-ray body-scanning program from airports to public events, mass transit and possibly even the streets where you live.  According to documents obtained by the nonprofit Electronic Privacy Information Center, the TSA in 2006 began planning pilot programs that, if ever fully implemented, would expand its reach into the everyday lives of American citizens.

Infra-red camera scheme put on hold over privacy concerns.  A project in Boston designed to educate home owners about energy efficiency has been put on hold due to privacy concerns.  The city was due to have a number of infrared cameras installed that would take aerial and street-level photos across approximately four miles in order to show heat loss in homes during the winter months.

Your Papers, Please!  I recently received an e-mail from the St. Louis Association of Realtors detailing a new policy being implemented by the Missouri Real Estate Commission (the official governmental board regulating real estate practices).  In the next licensing period anyone licensed to sell or rent real estate will have to be fingerprinted and their fingerprints — along with a tougher background check — kept on file with both the state police and the Federal Bureau of Investigation.  Of course, I will have to pony up $52.20 for this singular honor.  Granted, other states have had this provision, but why implement it in Missouri now?

Fingerprint Registry in Housing Bill.  Fingerprints are considered to be among the most personal of information, and fingerprint databases created and proposed in the name of national security have generated much debate.  Recently, "Server in the Sky" — a proposed international database of the fingerprints of suspected criminals and terrorists to be shared among the U.S., U.K. and Canada — has ignited a firestorm of controversy.  As have cavalier comments by Homeland Security Secretary Michael Chertoff that fingerprints aren't "personal data."

Are Borrowers Next?  [Scroll down]  I have still not been able to find any debate or justification for it, but it seems now that fingerprint requirements are a simplistic way for polticians to argue that they are getting tough about a particular problem, even if it's questionable how much fingerprinting will contibute to solving the problem.  Some commenters were right to note that this is an issue concerning federalism as well as privacy.  Through the CNET story, comments on the blog, and e-mails I have received, I learned about other state fingerprint registries of questionable justification for various professions.

More about the proposed National ID Card.

Oil change reignites debate over GPS trackers.  Yasir Afifi, a 20-year-old computer salesman and community college student, took his car in for an oil change earlier this month and his mechanic spotted an odd wire hanging from the undercarriage.

Homeland Security head praises Chicago's security cameras.  U.S. Homeland Security Secretary Janet Napolitano on Thursday ranked Chicago's Big Brother network of well over 10,000 public and private surveillance cameras as one of the nation's most extensive and integrated — and Mayor Daley wants to make it even bigger.  "Expansion of cameras citywide is one of the highest priorities that will help us here in the city of Chicago," Daley said with Napolitano at his side.

The Government Can Use GPS to Track Your Moves.  Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go.  This doesn't violate your Fourth Amendment rights, because you do not have any reasonable expectation of privacy in your own driveway — and no reasonable expectation that the government isn't tracking your movements.

Fall back, Big Brother.  Americans can be excused for a slight paranoid feeling that someone is following them.  Omnipresent surveillance cameras, especially in Chicago, record our daily movements.  If we use our cell phones, we announce where we are.  Our online communications can be monitored or resurrected from the distant past.  Congress is thinking about installing data-gathering "black boxes" in every car.  And now two U.S. senators — Chuck Schumer (D-N.Y.) and John Cornyn (R-Texas) — have introduced a bill to require people to produce identification before buying pre-paid cell phones.

Welcome to the New Total Security State.  The U.S. government now has at its disposal a technological arsenal so sophisticated and invasive as to render any constitutional protections null and void.  And these technologies are being used by the government to invade the privacy of the American people.

GPS use voids conviction.  Ruling that federal agents erred in attaching a satellite tracking device to a vehicle without a search warrant, a federal appeals court has reversed the life sentence of man accused of running a major Washington drug ring.  The U.S. Court of Appeals for the District of Columbia Circuit on Friday [8/6/2010] found that the government's use of GPS technology to track defendant Antoine Jones' Jeep violated the Fourth Amendment.

Airport device follows fliers' phones.  Today's smartphones and PDAs could have a new use in the nation's airports:  helping passengers avoid long lines at security checkpoints.  The Transportation Security Administration is looking at installing devices in airports that home in and detect personal electronic equipment.  The aim is to track how long people are stuck in security lines.

U.S. eavesdropping agency says Perfect Citizen is purely R&D.  The program, dubbed Perfect Citizen, is "purely a vulnerabilities-assessment and capabilities-development contract," Judith Emmel, a National Security Agency spokeswoman, said in an email to Reuters.  "This is a research and engineering effort," she said.  "There is no monitoring activity involved, and no sensors are employed in this endeavor."  The Wall Street Journal, in its Thursday [7/8/2010] editions, described Perfect Citizen as relying on sensors it said would be deployed in networks running critical infrastructure such as the electricity grid and nuclear-power plants.

NSA Denies It Will Spy on Utilities.  The NSA is denying a report from the Wall Street Journal that a secret program code-named "Perfect Citizen" will be monitoring civilian networks.  That's from a rare public statement by the ultra-secret agency responsible for spying on outsiders and defending classified networks.  The NSA, as a wing of the military, is largely prohibited from operating within the U.S.

Putting Private Info on Government Database.  Far more personal information on students than is necessary is being collected by public schools, according to the Fordham Law School Center on Law and Information Policy, which investigated education records in all 50 states.  States are failing to safeguard students' privacy and protect them from data misuse.  Some states collect a lot of data that has nothing to do with student test scores, including Social Security numbers, disciplinary records, family wealth indicators, student pregnancies, student mental health, illness and jail sentences.  A couple of states record the date of a student's last medical exam and a student's weight.

CDC uses shopper-card data to trace salmonella.  As they scrambled recently to trace the source of a salmonella outbreak that has sickened hundreds around the country, investigators from the Centers for Disease Control and Prevention successfully used a new tool for the first time — the shopper cards that millions of Americans swipe every time they buy groceries.

More about supermarket discount cards.

How much information can the government demand from us?  We don't have to give corporations [personal information].  We do so for our convenience.  If I don't want a credit card company to track my spending habits, I can pay cash.  If I don't want Safeway to track my product purchases, I don't have to have a membership number.  I like the convenience of credit cards and I like the discounts that go with grocery store membership cards, but I can quit playing the game at any time to preserve my privacy.  The stakes are different, though, when the government is involved.  When it's the government demanding your information, you have no leeway to say "no!"

Tracking Your Digital Trail.  Since the mid-1970s, market research firms and pollsters have worked to collect value and lifestyle ("VALS") data on children and adults from any source capable of generating an analysis — popular magazines, surveys, telephone polls, school questionnaires, psychological screening instruments, census forms, and even academic tests. ... A few parents were aware that such tactics were encroaching upon educational settings, but viewed them as more an invasion of privacy than an outright violation of their childrearing prerogatives.  Until the other shoe dropped.  Along came the computer and the Internet.

Big Brother? — Area cameras would record all license plates.  If recent grant applications win approval, all vehicles traveling on certain local traffic arteries would have their license plates automatically recorded and checked against a U.S. criminal records database.  A surveillance system would run every plate number through the National Crime Information Center, a computerized index maintained by the FBI.  If the number matches someone with an outstanding warrant, or a criminal record, or perhaps just a person of interest in a local investigation, police would be alerted.

Lower Merion School District sued for cyber spying on students.  Lower Merion School District officials brag that they give every one of their 1,800 high-schoolers laptop computers to "ensure that all students have 24/7 access to school-based resources."  Instead, they ensured they got a 24/7 sneak peek into students' private lives by secretly monitoring webcams embedded in the laptops to spy on teens and their families at home, according to a federal, class-action lawsuit filed this week in Philadelphia.

Federal judge orders school district to stop spying on students.  A Pennsylvania school district has been ordered to disable equipment allowing officials to watch students using cameras on their laptops.  The order, issued Wednesday [2/24/2010] by a federal judge, will prevent school administrators from turning on cameras installed on students' school-issued laptops remotely.

Big Teacher Is Watching You.  My laptop's webcam now has a postage stamp covering it.  Does yours?  This week, a district court judge in Philadelphia, PA, had to do the unthinkable:  issue an order preventing a school district from further remote reactivation of webcams on laptop computers issued to nearly 2,000 high school students, a practice which has left many students and parents wondering whether school administrators had unfettered access into their homes and lives.

When schools spy on their students, bad things happen.  Last week the Robbins family, whose son Blake attends LMSD's Harriton High, filed a class-action suit against the district alleging that it's been spying on its students via webcams on school-supplied MacBooks.  The suit came about after Blake Robbins was called into the assistant principal Lindy Matsko's office last November to discuss "inappropriate behavior" he was displaying — at home.  The proof?  A snapshot of him taken with his laptop's Webcam.  Apparently Matsko thought Blake was popping pills.  According to Robbins, he was merely eating candy:  Mike-N-Ikes.

Students'-eye view of Webcam spy case.  Students at Harriton High School in Lower Merion School District near Philadelphia are given Apple MacBook laptops to use both at school and at home.  Like all MacBooks, the ones issued to the students have a Webcam.  And, in addition to the students' ability to use the Webcam to take pictures or video, the school district can also use it to take photographs of whomever is using the computer.

School 'Spycam' in Student's Home Sparks Outrage in Philly Suburb.  A school district in suburban Philadelphia apparently thought it had devised the perfect anti-theft device for the laptops it issued its students — until parents discovered the plan involved secretly using a Web camera to snap photos of their children, even in their bedrooms at home.

School Snoops on Students at Home Via Computer Camera.  The Lower Merion, Pennsylvania, school district lent high school sophomore Blake Robbins an Apple MacBook laptop last fall, and then utilized security software on the computer's webcam to take pictures of him in his home.  The pictures involved him sleeping and getting dressed, but the school district's information systems coordinator Carol Cafiero contends in a lawsuit that Robbins had "no legitimate expectation of privacy" with the laptop.

The American inquisition:  Considering all those privacy statements I've received over the years, one may reasonably conclude that everyone understands the importance of keeping personal information secure. ... So why is it that government gets away with disregarding your right to privacy?

Taxes could get sky-high with aerial technology.  A new high-tech aerial photography system that can spot an illegal porch from 5,000 feet is being marketed to tax assessors as a way to grow revenue.  Pictometry International Corp. says it offers tax assessors 12 different views of every square foot of building or land in a jurisdiction that buys their system.  They call it "sophisticated visual intelligence."  State Sen. Jeff Van Drew has another name for it.  "It's Big Brother," said Van Drew, D-Cape May, Cumberland, Atlantic.

Wisconsin court upholds GPS tracking by police.  Wisconsin police can attach GPS to cars to secretly track anybody's movements without obtaining search warrants, an appeals court ruled Thursday [5/7/2009].

Courts Divided on Police Use of GPS Tracking.  If a police officer puts a GPS tracking device on your car, should he or she have to get a warrant first?  It's a simple question, but one, so far, without a clear legal answer.  In an example of how unsettled the issue is, in just the past week, appeals courts in two different states delivered completely opposite rulings.

Big British Brother:  [The National Post's] editorial board traditionally has argued that, in the post-9/11 age, law-enforcement and security services should enjoy broad powers to investigate and apprehend terrorists.  But even we are appalled by a British proposal, revealed over the weekend, to monitor the telephone, cellphone, text message, e-mail and Web surfing activity of every citizen in the U. K. in the name of homeland security.

Britain To Put CCTV Cameras Inside Private Homes.  As an ex-Brit, I'm well aware of the authorities' love of surveillance and snooping, but even I, a pessimistic cynic, am amazed by the governments latest plan:  to install Orwell's telescreens in 20,000 homes.  £400 million ($668 million) will be spend on installing and monitoring CCTV cameras in the homes of private citizens.  Why?  To make sure the kids are doing their homework, going to bed early and eating their vegetables.

Britons Weary of Surveillance in Minor Cases.  It has become commonplace to call Britain a "surveillance society," a place where security cameras lurk at every corner, giant databases keep track of intimate personal details and the government has extraordinary powers to intrude into citizens' lives.

FBI compiling big database of physical traits.  The FBI has embarked on a $1 billion effort to build the world's largest computer database of peoples' physical characteristics, a project that would give the government unprecedented abilities to identify individuals in the United States and abroad.  Digital images of faces, fingerprints and palm patterns already are flowing into FBI systems….

FBI Spearheads Biometric Program with Other Nations.  The FBI is spearheading the creation of a biometrics program, called 'Server in the Sky,' with international partners using biometric information — such as irises and palm prints — to create a worldwide database of criminals and terrorists.

[...and everybody else, while they're at it.]

Total Informational Awareness.  A project of the United States Department of Defense, Total Informational Awareness (TIA) is designed to gather personal data on a grand scale, including emails, phone calls, financial records, transportation habits, and medical information.  Its proponents believe that by scanning and analyzing this massive pile of data, government agents will be able to predict and prevent crime.

[If that is true, they would also be able to detect and prevent any opposition to Big Brother.]

Update:
Homeland Security revives supersnoop.  Homeland Security officials are testing a supersnoop computer system that sifts through personal information on U.S. citizens to detect possible terrorist attacks, prompting concerns from lawmakers who have called for investigations.  The system uses the same data-mining process that was developed by the Pentagon's Total Information Awareness (TIA) project that was banned by Congress in 2003 because of vast privacy violations.

Safer homes, safer neighborhoods.  Police Chief Cathy Lanier wants to help parents and others who fear their own children or other family members might have a gun in the home.  As part of her Safe Homes initiative, the chief announced that officers would be going door-to-door asking residents for permission to search their home and seize illegal property (guns, drugs, etc.)  No warrants.  Just knock, ask, agree and the latex gloves begin searching.

The Editor says...
The usual shills will argue, "If you have nothing to hide, why would you object?"

Sounding the Alarm on Government-Mandated Data Retention:  By waving the red flag of fighting child pornography, seemingly intelligent and usually well-meaning legislators appear ready to create the mother of all big-brother database laws, a treasure trove of personal data that will ultimately be available for every fishing expedition under the sun.

Additional information about Data Retention is on this page.

And if you're worried about leaky interactive databases, read this.

'Big Brother' is the boss.  When the Town of Babylon (New York) installed global positioning system technology in most of its fleet of 250 vehicles in January, officials touted it as a way to improve efficiency, particularly during emergencies such as snowstorms.  However, the system also is being used to monitor worker behavior — a realization that has left town employees increasingly nervous.

Living Under Surveillance:  Telecom giant AT&T has allowed the National Security Agency (NSA) to set up what could only be called a "spy room" on AT&T property to make routine monitoring of phone calls easier. … Face-recognition software was successfully tested during Super Bowl XXXV in Tampa, Florida, with approximately 100,000 faces being scanned and identified. … The FBI, apparently unsatisfied with their success using data mining, is issuing so many National Security Letters (NSLs) — administrative subpoenas that require no probable cause while simultaneously precluding the recipient from ever disclosing that the letter was issued — that they plan to automate the process of tracking them.

Protecting Yourself From Suspicionless Searches While Traveling:  Only a judge can force you to answer questions, and then only if the Fifth Amendment does not apply.  While no Fifth Amendment right protects the data on your laptop or phone, one federal court has held that even a judge cannot force you to divulge your password when the act of revealing the password shows that you are the person with access to or control over potentially incriminating files.  See In re Boucher, 2007 WL 4246473 (D. Vt. November 29, 2007).

'Snooper's charter' to check texts and emails.  Local councils, health authorities and hundreds of other public bodies are to be given the power to access details of everyone's personal text, emails and internet use under Home Office proposals published yesterday [8/12/2008].  Ministers want to make it mandatory for telephone and internet companies to keep details of all personal internet traffic for at least 12 months so it can be accessed for investigations into crime or other threats to public safety.

NYC mayor:  Get used to surveillance.  Residents of big cities like New York and London must accept that they are under constant watch by video cameras, New York Mayor Michael Bloomberg said Monday [10/1/2007].  Bloomberg, holding talks with his London counterpart Ken Livingstone, said such measures as London's "ring of steel" — a network of closed-circuit cameras that monitors the city center — were a necessary protection in a dangerous world.

D.C. police set to monitor 5,000 cameras.  D.C. officials are giving police access to more than 5,000 closed-circuit TV cameras citywide that monitor traffic, schools and public housing — a move that will give the District one of the largest surveillance networks in the country.

Who's Listening In on You?  Simply put, monitoring every phone call, every e-mail message, and every instant message flowing through America will not result in a reasonable reduction of the risk of terrorist attacks.  Unless there are a lot more terrorists in the United States than even the most pessimistic estimates would suggest, increased monitoring will result in little else but loss of privacy and increased expense.  (It would also result in a veritable cornucopia of business for security firms and technology providers, all paid for with taxpayer money.)

U.S. to Expand Domestic Use Of Spy Satellites.  The U.S.'s top intelligence official has greatly expanded the range of federal and local authorities who can get access to information from the nation's vast network of spy satellites in the U.S.  The decision, made three months ago by Director of National Intelligence Michael McConnell, places for the first time some of the U.S.'s most powerful intelligence-gathering tools at the disposal of domestic security officials.

Federal, local police bypass subpoenas, get phone data from brokers.  Those using data brokers include agencies of the Homeland Security and Justice departments — including the FBI and U.S. Marshal's Service — and municipal police departments in California, Florida, Georgia and Utah.  Experts believe hundreds of other departments frequently use such services.

This is an original compilation, Copyright © 2024 by Andrew K. Dart



We must learn from other countries' experiences.

England had the great idea to put up surveillance cameras almost everywhere (just like in 1984) as a sure way to eliminate crime.  There's still just as much crime, but now the cops have pictures of it.  Unfortunately they also have pictures of everyday people minding their own business.

This nonsense can happen here, too, if we let it.

Germany's plan to take on NSA: Block eavesdroppers with classical music, and use typewriters.  Politicians in Germany have devised an ingenious solution to combat the threat of eavesdropping by American spies: playing classical music during their meetings.  MPs who sit on the spying committee had become so concerned that US agents might listen in to their discussions that they had ordered classical music to be played, to drown out the discussions.  On arrival at the meeting, The Suddetusche Zeitung reported that for "security reasons" MPs had to put their mobile phones and computers into a large metal box to ensure that they were not subjected to outside surveillance.

U.K. Govt. Seeks Massive Communications Surveillance Powers.  "Unless you are a criminal, then you've nothing to worry about from this new law."  How many times have humans heard that old saw?  Only as many times as governments have taken away more of their liberties in the name of fighting crime.  The latest politician to utter those infamous words is British Home Secretary Theresa May.  Defending her government's plan to require communications providers to store details of every e-mail, telephone call, and text message in the United Kingdom, May called the proposal "sensible and limited" and denounced opponents as "conspiracy theorists ... with ridiculous claims about how these measures infringe freedom."

Britain will be first country to monitor every car journey.  Britain is to become the first country in the world where the movements of all vehicles on the roads are recorded.  A new national surveillance system will hold the records for at least two years.  Using a network of cameras that can automatically read every passing number plate, the plan is to build a huge database of vehicle movements so that the police and security services can analyse any journey a driver has made over several years.

Your family is being watched 24-7.  What's next in surveillance-happy Britain?  Cameras in private homes?  Actually, yes.

Britain risks becoming 'Orwellian society'.  An increase in closed-circuit television (CCTV) cameras risks turning Britain into an Orwellian society, a senior police officer said in an interview broadcast today.

It's all just a façade.
Tens of thousands of CCTV cameras, yet 80% of crime unsolved.  London has 10,000 crime-fighting CCTV cameras which cost £200 million, figures show today.  But an analysis of the publicly funded spy network, which is owned and controlled by local authorities and Transport for London, has cast doubt on its ability to help solve crime.  A comparison of the number of cameras in each London borough with the proportion of crimes solved there found that police are no more likely to catch offenders in areas with hundreds of cameras than in those with hardly any.

Britain's multi-billion-pound CCTV network 'an utter fiasco which has failed to cut crime'.  Britain's network of CCTV cameras has been branded "an utter fiasco" for failing to cut crime, despite billions of pounds being spent on it.  Detective Chief Inspector Mick Neville, who is in charge of closed-circuit television for the Metropolitan Police Force, claimed only 3 percent of the capital's street robberies are solved using security camera footage and criminals are not afraid of being caught on film.

80 percent of CCTV images 'ineffective'.  Britain's surveillance society was exposed as ineffective yesterday [10/19/2007] by a damning official report which revealed 80 percent of CCTV footage is of poor quality and that the cameras are mostly used to trap motorists rather than catch criminals.  The Government and police chiefs want to extend the network which monitors Britons — already the world's biggest with an estimated one camera for every 12 people — even further to cover all "public space".

Councils Told:  Stop Spying On The Public.  Bosses have been warned by the head of the Local Government Association (LGA) that they risk alienating the public for so-called snooping.  They may also be stripped of the right to use spying methods.  But Sir Simon Milton defended councils that used surveillance to tackle fly tippers, rogue traders and tax and benefit fraudsters.  There has been growing anger about the methods used by councils to probe minor crimes, such as dog fouling.

Electronic Visual Surveillance and the Reasonable Expectation of Privacy:  Public video surveillance has recently become one of the most conspicuous manifestations of, and effective instruments in, the exercise of the state's police powers.  The development of surveillance technology, and its late convergence with state of the art computers, databases, and telecommunication systems, has dramatically enhanced government's ability to perform its law enforcement functions.  But, it has equally increased the tension between the need of government to combat the daily threats to public safety and the right of law-abiding citizens to be secure from the potential privacy abuses of modern policing technology.

Surveillance Nation.  News broke this week that the [British] police have a series of databases recording the personal details of thousands of people who attend protests or rallies, which are searchable by a number of officers and come complete with color photographs assembled and printed onto "spotter cards" which are then distributed to enable agencies to monitor attendees at events.  Cost of this part of the surveillance state alone?  Over nine million pounds.



NJ Bill Would Prohibit Anonymous Posts on Forums.  Too much important opinion, including that leading to the founding of the country, was published anonymously to permit the government to ban anonymous opinion.  Even unto this day, anonymous pamphleteering is an honorable activity at the core of the First Amendment. … I would expect that such a statute, were it to be enacted, would be quickly challenged and almost as quickly overturned.

TSA Lied About Protecting Passenger Data.  This is major stuff.  It shows that the TSA lied to the public about its use of personal data again and again and again.

IBM Becomes Speed Enforcer in UAE.  IBM will begin installing a "Smart Box" system in vehicles in the United Arab Emirates next year, potentially generating millions in traffic fines for the Gulf state.

Covert Video Cameras:  Who's Watching Me?  The controversial news of the National Security Agency (NSA) conducting domestic spying puts a spotlight on the issue of surveillance in general. Have you ever wondered, for instance in your place of employment or at the local shopping mall, if you were being watched?

SFPD Officer Accused of Using Airport Cameras to Ogle Women.  A police officer is facing possible disciplinary action for allegedly using surveillance cameras at San Francisco International Airport to ogle women as they walked through the terminal, according to San Francisco Police Commission documents.

Watching You:  Systematic Federal Surveillance of Ordinary Americans.  To combat terrorism, Attorney General John Ashcroft has asked Congress to "enhance" the government's ability to conduct domestic surveillance of citizens.  The Justice Department's legislative proposals would give federal law enforcement agents new access to personal information contained in business and school records.  Before acting on those legislative proposals, lawmakers should pause to consider the extent to which the lives of ordinary Americans already are monitored by the federal government.

Schools Adjust to Student-Tracking System.  This month marks the first anniversary of a student tracking system that has nabbed 155 individuals in its first year for various suspicious activities, including using forged documents.

Warrants as a Security Countermeasure.  More and more, we are living in a society where we are all tracked automatically all of the time.  We can all be tracked by our cell phones.  E-ZPass tracks cars at tunnels and bridges.  [In Dallas, they're called Toll Tags.]  Security cameras record us.  Our purchases are tracked by banks and credit card companies, our telephone calls by phone companies, our Internet surfing habits by Web site operators.  The Department of Justice claims that it needs these, and other, search powers to combat terrorism.

Privacy from Government in a Transparent Society:  Individuals face a greater threat to their privacy from government than from the private sector.  In general, people have little or no control over what information is collected, how much is shared or how securely it is stored.  If a business refuses to keep private information about one's consumer preferences secure, consumers can take their business elsewhere.  But they hardly have the same opportunity when it comes to the Department of Motor Vehicles or the IRS.

Is the IRS putting your private data at risk?  The Internal Revenue Service already takes your money.  As if that weren't painful enough, it also seems that the IRS doesn't adequately protect your private information, according to a recent report by the Treasury Inspector General for Tax Administration.  Curious?  You should be.

Sweden May Spy On E-Mails.  Sweden's government presented a contentious plan Thursday [3/8/2007] to allow a defense intelligence agency to monitor — without a court order — E-mail traffic and phone calls crossing the nation's borders.  The government insists only a fraction of the electronic communications will be affected, but critics worry the program, designed to combat terrorism and other threats to national security, is too far-reaching.

The Agency That Could Be Big Brother.  Thirty years ago, Senator Frank Church, the Idaho Democrat who was then chairman of the select committee on intelligence, investigated the [NSA] and came away stunned.  "That capability at any time could be turned around on the American people," he said in 1975, "and no American would have any privacy left, such is the capability to monitor everything:  telephone conversations, telegrams, it doesn't matter.  There would be no place to hide."  He added that if a dictator ever took over, the N.S.A. "could enable it to impose total tyranny, and there would be no way to fight back."

ACLU Calls New "Secure Flight" Passenger Profiling System Invasive, Inadequate and Ineffective.  In comments filed with the Department of Homeland Security, the ACLU has offered deep criticism of the "Secure Flight" airline passenger screening program.  The ACLU said that many of the privacy and civil liberties concerns identified in the Computer Assisted Passenger Prescreening System (CAPPS II) remain with its successor, Secure Flight.

License Plate "Guns" and Privacy:  New Haven police have a new law enforcement tool:  a license-plate scanner.  Similar to a radar gun, it reads the license plates of moving or parked cars and links with remote police databases, immediately providing information about the car and owner.  Right now the police check if there are any taxes owed on the car, if the car or license plate is stolen, and if the car is unregistered or uninsured.  A car that comes up positive is towed.

Olympic Spy Zeppelin Flies Into Greek Flak.  Greek activists say a 200-foot surveillance zeppelin patrolling Olympic Athens tramples on civil rights and have launched legal action to ground it.  The blimp, dubbed Big Brother by local media, carries a battery of hi-tech sensors from spy cameras to chemical agent detectors and is part of Greece's $1.2 billion security plan.

DOJ Seeks the Power To Disable PC Security.  The U.S. Department of Justice is to request government authorization to use covert methods to disable security measures on PCs prior to criminal investigations, according to Friday's Washington Post. The legislation is reportedly entitled the "Cyberspace Electronic Security Act".

Minneapolis approves gunfire sensors.  The Minneapolis City Council approved a new system (called "Shot Spotter") that detects the sound of gunfire in the city, allowing police to respond more quickly to possible crimes. … The system's sensors are hidden in units the size of a coffee can, and criminals cannot detect them.  "They have no idea where the system is deployed," says [Shot Spotter CEO James] Beldock.

[Nonsense.  The sensors will be in fixed locations, and anyone with eyes should be able to find them all.]

The Patriot Act reduces privacy and undercuts judicial review.  The assumption has been that there was simply too much liberty and privacy in America — and that federal law-enforcement agencies did not have enough power.  To remedy that perceived problem, policymakers rushed the USA Patriot Act into law.  The Patriot Act was designed to reduce privacy and increase security.  It has succeeded in at least reducing privacy.  Financial privacy is essentially gone.  The feds have turned banks, brokerage houses, insurers and other financial institutions into state informers.

Big Brother is Watching You.  The issues involved have little to do with privacy, although Americans like to think of their cars as their own private little domain.  The issues involved are constitutional in nature, and have to do more with fairness than privacy.

Watching Your Every Move:  Comprehensive government databases and new invasive technologies threaten our system of checks and balances, presenting an unprecedented potential for tyranny.

The Loss of Privacy:  The advance of technology poses a new threat to privacy.  Today vast amounts of information once considered personal and private are collected, shared and cross-referenced in massive databases without the knowledge or consent of those affected.  Included in the list are school records, financial records, buying habits information, and medical records.

Carnivore: The Government Wants Your E-Mail.  The FBI has assured congress that only communications covered by warrants will be kept and any non-relevant material destroyed, but what else are they going to say?  Can you imagine a federal official testifying before congress that "well, we think it's a neat way to find out who's misbehaving".  These assurances of honorable intent would be more comforting if they weren't coming from an agency that happily trotted over hundreds of raw FBI files, many on political adversaries of the Clinton's, to the White House.

Minnesota Private Police Database Shut Down.  Some saw it as the sort of tool that could help police protect citizens, but others decried it as a Big Brother network operating outside the bounds of state regulation.

Secret U.S. court OKs electronic spying.  In an unexpected and near-complete victory for law enforcement, the Foreign Intelligence Surveillance Court of Review overturned a lower court's decision and said that Attorney General John Ashcroft's request for new powers was reasonable.

New Technology:  Security Precautions or Privacy Violations  The Pentagon's already developing a system that can track and library every car and driver in a city, a complex matrix of cameras and computers constantly sifting information about the traffic, looking for suspicious activity.

IRS Tightens Controls Over Tax ID Numbers:  After raising concerns about potential security risks, the Internal Revenue Service on Wednesday [12/17/2003] tightened restrictions on identification numbers issued to taxpayers who are ineligible for Social Security numbers.

Vanishing Liberties:  Where's the Press?  On March 18 [2003], the Associated Press reported that at John Carroll University, in a Cleveland suburb, Justice Antonin Scalia said that "most of the rights you enjoy go way beyond what the Constitution requires" because "the Constitution just sets minimums."  Accordingly, in wartime, Scalia emphasized, "the protections will be ratcheted down to the constitutional minimum."

Complexities Of Federal Data Mining:  Whether or not the powers of the federal government to mine data make us safer from terrorism is open to serious question.  The government has yet to prove its efficacy in fighting terrorism.

How Much Is Privacy Worth?  The Supreme Court will hear arguments over whether the government is automatically on the hook for illegally releasing private data.  The feds say individuals must prove harm before claiming compensation.

Plan to snoop on fliers takes intrusion to new heights:  The government now is proposing to take screening to an unprecedented level of intrusiveness:  rifling through extensive commercial and government data on all air travelers without their knowledge or permission and using the information to assign each flier a security-risk ranking.

Privacy Villain of the Week: North Central Texas Council of Governments.  According to a report in the Dallas Star-Telegram, members of the North Central Texas Council of Governments are pushing a plan to record and archive the movements of motorists in the Dallas-Fort Worth metroplex as viewed on 159 traffic cameras.  The highly dubious justification given for the move is a potential bioterrorist attack at a football stadium that no one notices at the time.  By recording everyone, the Council of Governments can later decide what cities to quarantine.

ACLU report says the US is heading toward a Big Brother society.  The United States is evolving into a Big Brother society as technology advances and post-September 11 surveillance increases, the American Civil Liberties Union said in a new report.

More Surveillance on the Way:  The USA Patriot Act opened loopholes that let electronic communications service providers give customer records to law enforcement officials without a warrant.  In lay terms, the folks that provide your email account are an electronic service provider, and your actual emails could fall into the category of customer records.

Conservatives Go on the Offense:  The privacy issue was discussed in terms of making certain that any information the government can gather on law-abiding citizens in the name of national security is information you would not mind falling into the hands of Hillary Clinton should she someday become president or attorney general.

Why the Pentagon Wants to Spy on Your Shopping:  Did you realize the Pentagon will soon know about every gun, book, magazine, Twinkie, condom and everything else you buy?  The reason for the massive database:  to seek "patterns indicative of terrorist activity," defense officials said [recently].

Watching You:  Systematic Federal Surveillance of Ordinary Americans  Federal data collection empowers the United States government to obtain personal information about every American citizen:  the checks he writes, the types of causes he supports, what he says "privately" to his doctor.  The result — and often the purpose — is a profound erosion of individual autonomy.

Feds Share College Students' Info:  Student aid applicants, check the fine print.  That information you put on your application to the U.S. Department of Education is being shared with the Pentagon, the Justice Department and other agencies, even private companies like debt collectors.

The Number of the Beast:  Worldwide systems of pervasive surveillance might make it easier for the spies and for law enforcement, but is that a sufficient excuse for the establishment of a secret police?  As long as the existence and purpose of these systems are denied by my government and held secret from me in the name of some bogus national security, then they are wrong, and I object.  A system like Carnivore or Echelon, well known to any conceivable enemy of the state but kept hidden only from everyday citizens and operated outside of the purview of due process, has no business in a free society.  Yet somehow these defenders of our liberty expect us to lie down and accept their lies and their invasion into our daily lives.  That's what they are counting on.

Big Brother is watching you read:  Increasingly, the government is demanding that bookstores reveal what books their customers have purchased. Bookstore owners and privacy advocates say that's scarier than a Stephen King novel.

Big Brother Wants to Watch You Even MoreYour phone bill records, your bank account, your medical records.  All will be exposed to more prying eyes if federal and (increasingly) international snoopers get their way.

Big Brother is On-line: Public and Private Security in the Internet

Security trumps privacy:  In the name of thwarting terrorism, Americans are more accepting than ever of technology that tracks their every move.

Liberty and Privacy: Connections.  If property is liberty's other half, privacy is its guardian.  The right to privacy is essential to the preservation of freedom for the simplest of reasons.  If no one knows what I do, when I do it, and with whom I do it, no one can possibly interfere with it.  Intuitively, we understand this, as witness our drawing the curtains and pulling the window shades down when prowlers are about.  The threat to freedom comes from both the criminal and the state, from any and all ways and means in which others forcibly overcome our will.  Just as we do not want burglars casing our homes, we should fear the government's intimate knowledge of the many details of our daily lives.

Feds implement perpetual census:  Critics of [2000]'s decennial census "long form" may soon find a similar questionnaire in their mailboxes as the U.S. Census Bureau begins implementing a revised version of the American Community Survey.

Reveal Everything Just to Keep a Driver's License:  Driving may obligate you to tell bureaucrats minute details of your health problems and other personal matters.  Dean C. Eger of New Bern, N.C., was stunned when he received a 10-page questionnaire this month from the state Division of Motor Vehicles.  Some of the 114 questions were to be answered by him, the others to be filled out by his physician.  Failure to answer in 30 days "will result in cancellation or denial of your driving privilege."

Condit's Zone of Privacy — And Ours:  The press has done to him what he would do to us.

High-Tech Peeking Requires Warrant:  The Supreme Court ruled 5-4 across ideological lines (June 11, 2001) that police must get warrants before using high-tech devices to search homes from the outside.

House Leadership Turns Up Heat on Privacy:  House Majority Whip Tom DeLay has urged the Bush administration to cut the U.S. from any participation in an international privacy-invading program being promoted by Europeans. In a letter to Treasury Secretary Paul O'Neill, DeLay congratulates the Bush administration for refusing to go along with an attempt by the Organization for Economic Cooperation and Development (OECD) to sanction low-tax nations for their supposedly "unfair" competition against the high-tax welfare states.

EU row on use of phone records:  European Union ministers approved a British-backed measure yesterday [6/27/2001] to allow the police access to telephone, email and internet records.

Warning:  Internet Privacy at RiskThe effort to deprive you of the privacy that comes with the Internet — "the people's medium" – is taking on worldwide Orwellian proportions.

Eurosnoops Want to Invade Communications Privacy

Cyberbrother Is WatchingImagine not having to file an income tax form every year, or sending out change-of-address notices or renewing your driver's license, because all the information concerning these personal matters is part of a nationwide data bank.  That world exists — it's called Finland.

Next FBI Director: Privacy or the Jackboot?  Your right to privacy could hang in the balance when President Bush nominates an FBI director to replace Louis Freeh.

Feds Buy Citizens' Most Personal InformationBanned by law from snooping around in the private lives of American citizens, the FBI, IRS and about 35 other inquisitive government agencies just go out and buy information about citizens from huge personal data-gathering companies.

HHS Chief to Alter Privacy Rules

Campaign Finance 'Reform' Risks PrivacyPart of the bill that raises personal privacy issues is getting little attention.

Nosy Pupil Surveys Rile Parents

Privacy Debate Rages as Government Increases Watchdog Role

Where Does Privacy Begin?  In the continuing saga of government invasion of our personal privacy, today (02/20/2001) could be a landmark day.

"Wiretapped nation":  The British government's plan to wiretap the entire country is so outrageous it seems to have been put forward just to see if anybody is paying attention.

Firestorm Hits Capitol Hill As Americans Protest 2000 CensusPhone lines are ringing off the wall in Congressional Offices as Americans express their outrage over the intrusive questions on the 2000 Census form.  Even the short form's "eight simple questions" invade personal privacy as it asks if the home is owned or rented, who owns it and what is the telephone number.  All of this information is already available to the government through federal, state and local records.  What does such information have to do with assuring an official count of the nation, as called for in the Constitution?

House leader demands action against Clinton invasion of medical privacy.

All That Data, All That Secrecy Big Brother may know who you are, but do you know who Big Brother is?  If you showed up at the Federal Trade Commission's workshop on the privacy implications of database marketing Tuesday, [3/13/2001] the answer is probably still no.

The secret FISA court: Rubber stamping on rights(FISA = Foreign Intelligence Surveillance Act)

Big Brother Goes High-Tech

Privacy a Victim of the Drug War

Big Brother Is Monitoring Us by Databases

Privacy International – The 2000 US Big Brother Awards



Social Security Numbers:

How many of you remember when Social Security cards included a statement that they were not to be used for identification?  That was one of the promises made when Social Security was established.  Somehow that disclaimer seems to have disappeared - new Social Security cards don't have it.  Today many states include a person's Social Security number on his or her driver's license, and people are beginning to speculate about the Social Security number showing up on the National ID Card, when and if it materializes.

Frequently Asked Questions on Social Security Numbers and Privacy

The Privacy Act of 1974 is the primary law affecting the use of SSNs.

My Social Security Number:  How Secure Is It? When Social Security numbers were first issued in 1936, the federal government assured the public that use of the numbers would be limited to Social Security programs.  Today, however, Social Security numbers are used for many purposes, including employee files, medical records, credit reports and banking information.  In fact, the Social Security number (SSN) is now required for dependents over one year of age, and is the most frequently used recordkeeping number in the United States.

Data theft hit 80 percent of active military.  Social Security numbers and other personal information for as many as 2.2 million U.S. military personnel — including nearly 80 percent of the active-duty force — were among the data stolen from the home of a Department of Veterans Affairs analyst last month, federal officials said yesterday [6/5/2006], raising concerns about national security as well as identity theft.

Stopping the Surveillance State:  For all intents and purposes, the Social Security number is now a national ID.  The use of the Social Security number has become so widespread that most Americans must produce a Social Security number to get a fishing license, and members of Congress must show their Social Security number in order to vote on the House floor.

Putting the SSN genie back in the bottle?  There were several stories in the news today about a delay in implementing new privacy-enhancing legislation in Texas.  All SSNs were to have been stricken from publicly-accessible documents, including title records, deeds, tax liens and birth and death records, but in response to complaints that this work could not be completed in time, Attorney General Greg Abbott issued a letter delaying the requirement by 60 days.

Privacy Survival Guide:  How to Take Control of Your Personal Information.

Princeton Uses Social Security Numbers to Hack into Yale Admissions Database:  reported in Yale Daily News, 7/25/02

No problem with agencies sharing data?  A General Accounting Office report has claimed that privacy experts "have no problems" with the collection and use of Social Security numbers by state motor vehicle agencies, though experts who spoke with WorldNetDaily disagreed with the agency's assertion.

Your Social Security Number to be Shared

Feds are exempt from mortgage privacy noticesAn estimated 60 percent of the mortgage market is not required to send customers those privacy notices other consumers have been receiving, by law.  If your mortgage is covered by Fannie Mae or Freddie Mac, you likely won't even be asked whether you wish to "opt out" of having your name, personal financial information and Social Security number exchanged with other marketers or entities.


"Subtler and more far-reaching means of invading privacy have become available to the government.  Discovery and invention have made it possible for the government, by means far more effective than stretching upon the rack, to obtain disclosure in court of what is whispered in the closet."

- US Supreme Court Justice Louis Brandeis, 1928.      


Jump to The War With No Name
Jump to Carnivore / Echelon Trigger Words
Jump to Foreign and Domestic Policy Debates
Read about Wiretaps
Read about Other privacy issues
Back to The Privacy Page
Jump to Toll Road RFID Tags:  A Threat to Privacy, Anonymity and Individual Liberty.
Back to the Home page


Document location http://akdart.com/carniv.html
Updated April 23, 2024.

©2024 by Andrew K. Dart