The “silence of the liberals.”(via theamericanbear)
CIA Monitors Facebook & Social Media Sites
Gayane Chichakyan of RT interviews Thomas Andrews Drake. Drake was a senior executive of one of America’s biggest intelligence agencies at the beginning of the 2000’s.
He was an expert on electronic eavesdropping and had top secret security clearance. He was also a decorated United States Air Force and United States Navy veteran, computer software expert, linguist, management and leadership specialist. Then Mr Drake essentially sacrificed his career to blow the whistle on his agency’s wrongdoings, as he saw them.
He was then charged under the Espionage Act, and only last year the charges were dropped.
In 2010, the U.S. government alleged that he ‘mishandled’ documents, one of the few such Espionage Act cases in U.S. history. His defenders claim that he was instead being persecuted for challenging the Trailblazer Project. He is the 2011 recipient of the Ridenhour Prize for Truth-Telling and co-recipient of the Sam Adams Associates for Integrity in Intelligence (SAAII) award.
On June 9, 2011, all 10 original charges against him were dropped. He rejected several deals because he refused to “plea bargain with the truth”. He eventually pleaded to one misdemeanor count for exceeding authorized use of a computer; Jesselyn Radack of the Government Accountability Project, who helped represent him, called it an act of “Civil Disobedience.” The interview makes for very interesting listening, as they discuss the fact that the NSA (National Security Agency had a secret deal with the White House after 9/11, that made the NSA responsible for a secret surveillance program. They also discuss the current situation with whistleblowers and also with the Flame and Stuxnet viruses, created by the U.S. government.
“You go after the messenger because the last thing you want to do is deal with the message. You’re talking about all the activities, the secret surveillance, the warrantless wiretapping, torture, rendition, drone strikes, and a whole host of other measures that I would assert are extra-constitutional. Not only do they violate our own law, but they also violate a number of international laws.
Go after the messenger and not the message because to actually discuss or address the message becomes very uncomfortable. Essentially, what’s happened is that law—and we’re a nation of law—if we start to part (which we have in a very significant way), moving away from being a nation of laws and simply leaving it up to policy as a substitute, we’re going down a very slippery slope in the United States of America.”
With Morris Berman:
On 19 July 2010 the Washington Post reported that 854,000 people work for the National Security Agency in thirty-three building complexes amounting to 17 million square feet of space, in the DC Metro and suburban area. Every day, collection systems at the NSA intercept and store 1.7 billion emails and phone calls of American citizens, in what amounts to a vast domestic spy system. Writing in the New Yorker on 23 May 2011, Jane Mayer reported that the NSA has three times the budget of the CIA, and has the capacity to download, every six hours, electronic communications equivalent to the entire contents of the Library of Congress. They also developed a program called Thin Thread that enables computers to scan the material for key words, and they collect the billing records and the dialed phone numbers of everyone in the country. In violation of communications laws, ATT, Verizon, and BellSouth have opened their electronic records to the government. At the height of its insanity, the Stasi in East Germany was spying on 1 out of 7 citizens. The U.S. is now spying on 7 out of 7.
To make the surveillance of American citizens even more comprehensive (assuming that is even possible), the NSA is currently building the biggest-ever data complex in Bluffdale, Utah, as part of a secret surveillance program code-named “Stellar Wind.” The center, scheduled for completion in 2013, will be twice as large as the U.S. Capitol, and contain 100,000 square feet of computer space, at a cost of $2 billion. In addition, the NSA has established listening posts throughout the country as part of this operation. All in all, there are now 1,271 government agencies and 1,931 private companies that work on programs related to counterterrorism and homeland security in about 10,000 locations across the U.S. The goal is to store and review the e-mails, phone calls, online shopping lists, and virtually every bit of information about every single American. Everything you do, from traveling to buying groceries, will be displayed on a graph. [NSA whistleblower] William Binney has stated that we are about two millimeters away “from a turnkey totalitarian state.”
By 2014, the FBI plans to test a database for searching iris scans nationwide to quickly track criminals, according to budget documents and a contractor working on the project.
The Next-Generation Identification system, a multiyear $1 billion program already under way, is expanding the server capacity of the FBI’s old fingerprint database to allow for rapid matching of additional physical identifiers, including facial images and palm prints.
Today, iris scans conjure images of covert agents accessing high-security banks and laboratories. But law enforcement agencies are increasingly spending state and federal funds on iris recognition technology at jails to monitor inmates. Some Missouri prisons are buying the same system the FBI acquired, partly so that they can eventually exchange iris images with federal law enforcement officials. And many counties are storing pictures of prisoner irises in a nationwide database managed by a private company, BI2 Technologies.
The FBI expects to collect many of these state and local iris images, according to B12 officials and federal documents.
A May 17 budget justification document states one of the “planned accomplishments for BY13 — the budget year that begins Oct. 1 — is to demonstrate iris recognition capabilities via the iris pilot.”
A June FBI advisory board memo that Nextgov reviewed states, “supervised release/corrections are candidates for the pilot, being that many already have the capability in place. The additional goal is to start to build an iris repository.”
Iris recognition is a helpful identification tool, according to the memo, because it “is very accurate,” does not require human intervention and “the hardware footprint is also very small [due] to the size of the iris image.”
The aim of iris recognition at corrections facilities, according to law enforcement officials, is to promptly catch repeat offenders and suspects who try to hide their identities.
In the era of computer-controlled surveillance, your every move could be captured by cameras, whether you’re shopping in the grocery store or driving on the freeway. Proponents say it will keep us safe, but at what cost?
Pathmark archives every transaction of every customer, and the grocery chain is hardly alone. Amazon knows what you read; Netflix, your taste in movies. Search engines such as Google and Yahoo retain your queries for months, and can identify searches by IP address—sometimes by individual computer. Many corporations log your every transaction with a stated goal of reducing fraud and improving marketing efforts. Until fairly recently it was impractical to retain all this data. But now the low cost of digital storage—you can get a terabyte hard drive for less than $350—makes nearly limitless archiving possible.
So what’s the problem? “The concern is that information collected for one purpose is used for something entirely different down the road,” says Ari Schwartz, deputy director of the Center for Democracy and Technology, a Washington, D.C., think tank.
This may sound like a privacy wonk’s paranoia. But examples abound. Take E-ZPass. Drivers signed up for the system to speed up toll collection. But 11 states now supply E-ZPass records—when and where a toll was paid, and by whom—in response to court orders in criminal cases. Seven of those states provide information in civil cases such as divorce, proving, for instance, that a husband who claimed he was at a meeting in Pennsylvania was actually heading to his lover’s house in New Jersey. (New York divorce lawyer Jacalyn Barnett has called E-ZPass the “easy way to show you took the offramp to adultery.”)
On a case-by-case basis, the collection of surveillance footage and customer data is usually justifiable and benign. But the totality of information being amassed combined with the relatively fluid flow of that data can be troubling. Corporations often share what they know about customers with government agencies and vice versa. AT&T, for example, is being sued by the Electronic Frontier Foundation, a San Francisco-based civil liberties group, for allowing the National Security Agency almost unlimited access to monitor customers’ e-mails, phone calls and Internet browsing activity.
“We are heading toward a total surveillance society in which your every move, your every transaction, is duly registered and recorded by some computer,” says Jay Stanley, a privacy expert with the American Civil Liberties Union.
The debate over surveillance pits the tangible benefits of saving lives and dollars against the abstract ones of preserving privacy and freedom. To many people, the promise of increased security is worth the exchange. History shows that new technologies, once developed, are seldom abandoned, and the computer vision systems being adopted today are transforming America from a society that spies upon a small number of suspicious individuals to one that monitors everybody. The question arises: Do people exercise their perfectly legal freedoms as freely when they know they’re being watched? As the ACLU’s Stanley argues, “You need space in your life to live beyond the gaze of society.”
Surveillance has become pervasive. It is also more enduring. As companies develop powerful archiving and search tools, your life will be accessible for years to come in rich multimedia records. The information about you may be collected for reasonable purposes—but as its life span increases, so too does the chance that it may fall into unscrupulous hands.
Several months after I stayed at the Talbott Hotel, Derene, my editor, called Troy Strand to ask if he still had the security camera images of me at the hotel. He did. My niece Emma’s Statue of Liberty shots are probably stored on a computer, as are the records of all my Pathmark purchases. Ramos could query my shopping trip of, say, Jan. 13, 2005, and replay video keyed precisely to any part of the register tape—from the fifth item scanned, pork chops, to the tenth, broccoli. That’s innocuous and even humorous on the surface, but the more I thought about the store’s power, the more it disturbed me.
“I would never do that,” Ramos assured me. “But I could.”
In an interview with The Guardian, Google employee Tim Bray said that he’s recommending to the Internet Engineering Task Force to use error code 451 when a website is blocked by the government.
For those who don’t recognize the symbolism, the number pays homage to the late Ray Bradbury’s novel Fahrenheit 451 which was first published in 1950. The story warned of a dystopian world defined by government-imposed censorship which arrived in the form of burning any house that contained books.
Texas Senator Kay Bailey Hutchison, Congress Welcomes The Drones
The ACLU, for one, is concerned that with all this talk of taking limits off drone use, there’s no talk about putting limits on how they’re used.
“Congress — and to the extent possible, the FAA — need to impose some rules (such as those we proposed in our report) to protect Americans’ privacy from the inevitable invasions that this technology will otherwise lead to,” writes the ACLU’s Jay Stanley. “We don’t want to wonder, every time we step out our front door, whether some eye in the sky is watching our every move.”
Carrier IQ Pt. 2
1984 comes to mind…. for more information on Carrier IQ (CIQ), go here.