President
Barack Obama while speaking about the government’s surveillance
practices during a news conference at the Department of Justice in
Washington, Jan. 17, 2014. (Photo: Stephen Crowley / The New York Times)
When considering the revolutionary history of the United States, most
would think of fighting for freedom, the enshrinement of basic human
and civil rights in a constitutional government of the people, by the
people and for the people.
But in his speech on reforms to the NSA and the United States'
intelligence gathering systems last week, President Obama had a creative
new addition to the legacy of the American Revolution: surveillance.
"At the dawn of our Republic, a small, secret surveillance committee
borne out of the Sons of Liberty was established in Boston," said the
president. "And the group's members included Paul Revere. At night, they
would patrol the streets, reporting back any signs that the British
were preparing raids against America's early Patriots."
Collecting the meta-data of billions of phone calls and 200 million
text messages a day, as well as gathering data through the government's
PRISM program and placing bugs in 100,000 computers all over the world
seems significantly more extensive than monitoring British troop
movement via horseback and candlestick - especially when you consider
that the data being collected is in large part that of the American
people, not a foreign enemy during war time. Such metadata information
would still be collected and stored in President Obama's "reformed" NSA.
The reforms proposed by the President's speech amount to nothing
short of a bouquet of roses for American intelligence agencies. The
changes detailed in the speech do almost nothing to actually rein in the
growing national surveillance state. Billions of phone calls by
Americans would still be collected and retained every single day - too
much information for even the NSA to wade through properly. We're
creating a massive database that could be used at basically any time to
determine peoples' associates and behaviors.
While no cause would be necessary to collect this information, the
president recommended requiring a court order for analysis of the
retained data. This court order is far from a warrant under the Fourth
Amendment, but is instead a rubber stamp from a secret court with a
tendency to never say no. Considering that the definition of terrorism
has sometimes included civil disobedience at demonstrations, the loose
standard for issuing a court order for retained data is not a strong
enough protection. Warrantless surveillance should be stopped
altogether, and metadata should only be collected and retained on an
individual basis by a court order under the Fourth Amendment, with a
standard of probable cause.
Then there's the continued question of national security letters.
And when "legal standards" do exist in the realm of government
spying, they prove very different than the constitutional measures
American citizens should be able to expect.
The president left the Foreign Intelligence Surveillance Court
alone, despite its horrendous track record of authorizing a massive
spying operation on all of us. This secret court has
authorized wide-scale surveillance, issuing 35 opinions upholding
metadata collection and consistently granting secret warrant requests.
Rather than opening up the court, limiting its powers or changing the
method of judge selection (as of now, all FISA judges are handpicked by
Supreme Court Chief Justice John Roberts), the president
instead suggested that Congress establish a panel of advocates to argue
in these secret courts on behalf of civil liberties and privacy. Again,
with no timetable or guarantee of Congressional action, it's unclear
whether or when this change would be enacted.
But even with a set of privacy and civil liberties advocates, these
secret courts operate on a corrupted base. What good is someone arguing
on behalf of privacy and civil liberties when the law allows for the
unlimited collection of metadata and wiretapping on Americans without
probable cause?
In and of itself, disappointment in the president's proposed reforms
isn't surprising - in some way it was expected, as the purpose of the
speech was most likely to take the pressure off the president to make
real change. What is shocking is that speech did not even
do that. Instead, it told all of us, both here and abroad, that massive,
Orwellian surveillance is somehow patriotic.
President Obama's assertion that our nation was formed as a result of
a heroic history of surveillance, and that such surveillance is among
the only things keeping us safe, is not only a
striking misappropriation of the facts, but a misleading scare tactic
clearly aimed at making Americans comfortable with the far-reaching
government spying he seems bent to protect. The American Revolution was
fought to prevent more than just taxes on tea. The British Empire's use
of general warrants - including "writs of assistance" that allowed
agents of the king to search and seize colonial property, including
letters and papers - was an abuse of power that the writers of our
Constitution specifically sought to address and protect against in the
newly formed government they had fought so hard for.
The American people should never accept the collection and retention
of millions of records by a government calling for our trust. Because,
as President Obama said himself, "History has too many examples
when that trust has been breached."
The National Security Agency depends on huge computers that guzzle
electricity in the service of the surveillance state. For the NSA’s top
executives, maintaining a vast flow of juice to keep Big Brother
nourished is essential—and any interference with that flow is
unthinkable.
But interference isn’t unthinkable. And in fact, it may be doable.
Grassroots activists have begun to realize the potential to put the
NSA on the defensive in nearly a dozen states where the agency is known
to be running surveillance facilities, integral to its worldwide snoop
operations.
Organizers have begun to push for action by state legislatures to
impede the electric, water and other services that sustain the NSA’s
secretive outposts.
Those efforts are farthest along in the state of Washington, where a new bill in
the legislature—the Fourth Amendment Protection Act—is a statutory
nightmare for the NSA. The agency has a listening post in Yakima, in the
south-central part of the state.
The bill throws down a challenge to the NSA, seeking to block all
state support for NSA activities violating the Fourth Amendment. For
instance, that could mean a cutoff of electricity or water or other
state-government services to the NSA site. And the measure also provides
for withholding other forms of support, such as research and
partnerships with state universities.
Here’s the crux of the bill: “It is the policy of this state to
refuse material support, participation, or assistance to any federal
agency which claims the power, or with any federal law, rule,
regulation, or order which purports to authorize, the collection of
electronic data or metadata of any person pursuant to any action not
based on a warrant that particularly describes the person, place, and
thing to be searched or seized.”
If the windup of that long sentence has a familiar ring, it should.
The final dozen words are almost identical to key phrases in the Fourth
Amendment of the U.S. Constitution.
In recent days, more than 15,000 people have signed a petition
expressing support for the legislation. Launched by RootsAction.org,
the petition is
addressed to the bill’s two sponsors in the Washington
legislature—Republican Rep. David Taylor, whose district includes the
NSA facility in Yakima, and Democrat Luis Moscoso from the Seattle area.
Meanwhile, a similar bill with
the same title has just been introduced in the Tennessee
legislature—taking aim at the NSA’s center based in Oak Ridge, Tenn.
That NSA facility is a doozy: with several hundred scientists and
computer specialists working to push supercomputers into new realms of
mega-surveillance capacities.
A new coalition, OffNow, is sharing information about model legislation. The group also points to known NSA locations in
other states including Utah (in Bluffdale), Texas (San Antonio),
Georgia (Augusta), Colorado (Aurora), Hawaii (Oahu) and West Virginia
(Sugar Grove), along with the NSA’s massive headquarters at Fort Meade
in Maryland. Grassroots action and legislative measures are also
stirring in several of those states.
One of the key organizations in such efforts is the Bill of Rights
Defense Committee, where legal fellow Matthew Kellegrew told me that
theOffNow coalition
“represents the discontent of average people with … business-as-usual
failure to rein in out-of-control domestic spying by the NSA and other
federal departments like the FBI. It is a direct, unambiguous response
to a direct, unambiguous threat to our civil liberties.”
In the process—working to counter the bipartisan surveillance-state
leadership coming from the likes of President Obama, House Speaker John
Boehner, the House Intelligence Committee’s chair Mike Rogers and the
Senate Intelligence Committee’s chair Dianne Feinstein—activists urging a
halt to state-level support for the NSA include people who disagree on
other matters but are determined to undermine the Big Brother
hierarchies of both parties.
“By working together to tackle the erosion of the Fourth Amendment
presented by bulk data collection,” Kellegrew said, “people from across
partisan divides are resurrecting the lost art of collaboration and in
the process, rehabilitating the possibility of a functional American
political dialogue denied to the people by dysfunction majority partisan
hackery.
From another vantage point, this is an emerging faceoff between
reliance on cynical violence and engagement in civic nonviolence.
Serving the warfare state and overall agendas for U.S. global
dominance to the benefit of corporate elites, the NSA persists in doing
violence to the Constitution’s civil-liberties amendments—chilling the
First, smashing the Fourth and end-running the Fifth.
Meanwhile, a nascent constellation of movements is striving to thwart
the surveillance state, the shadowy companion of perpetual war.
This is a struggle for power over what kind of future can be created for humanity.
I
t’s time to stop giving juice to Big Brother.
U.S. Attorney General Eric Holder said yesterday that the U.S. Treasury and Department of Justice will allow legal marijuana sellers
to conduct business with banks and credit unions. The DOJ will provide
operating guidelines to marijuana businesses and banks similar to those
provided to Colorado and Washington.
Banks will now be
able to deposit and withdraw money in and out of bank accounts, obtain
loans, build credit, and accept debit and credit cards payments.
Banks did deny
opening their doors to legal marijuana businesses for fear of being an
accessory to perceived illegal activities such as money laundering.
Having the DOJ’s blessing for such a relationship, banks can now rest
assured that they can hold legal marijuana money without fear of law
enforcement interaction. Holder said that barring legal marijuana
business from financial institutions causes the pot sellers grave
problems.
Operating on
cash-only basis creates issues for legal marijuana sellers. Marijuana
businesses usually have large amounts of cash on-hand and fear that they
are prime targets for robberies, forcing them to spend lots of money on
tighter security. Businesses also have a difficult time claiming their
money for federal tax purposes.In order to have their money accounted
for, owners must deliver thousands in hard currency to revenue offices.
Holder said allowing
legal marijuana businesses banking access would curtail any such
problems. It has certainly become an accounting headache for legal
marijuana business. He also noted that such issues cause concern for law
enforcement.
“There’s a public
safety component to this,” Holder said. “Huge amounts of cash –
substantial amounts of cash just kind of lying around with no place for
it to be appropriately deposited – is something that would worry me just
from a law enforcement perspective.”
Legal marijuana is
still a budding industry, but it is appearing to be a quite prosperous
one. Legal marijuana proprietors in Colorado have enjoyed booming
business. In legal marijuana’s first week, sales in Colorado exceeded $5 million, and the state is expected to earn $70 million in tax revenue from legal marijuana this year.
Washington state
marijuana businesses will begin operations later this year with other
states, mainly on the west coast, wanting to follow suit and implement
their own recreational marijuana legislation. The legal marijuana
industry is likely to outpace last year’s revenue by over 60 percent, expecting $2.3 billion of sales for 2014. Josh is a writer and researcher with Ring of Fire. Follow him on Twitter @dnJdeli.
So far, six states (Missouri, California, Oklahoma, Kansas,
Washington, and Indiana) have introduced bills that target the NSA.
Though they all differ somewhat, each state's bill would impede NSA
operations within their boundaries.
In Washington, for example, the bill would attack the NSA on multiple fronts:
State and local officials would be barred from providing information or “support” to the NSA.
The NSA would be forbidden from researching and recruiting at state universities.
Evidence collected by the NSA would be inadmissible in state courts.
Businesses that have contracts with the state would not be allowed
to conduct business with the NSA in any capacity; companies that
disobeyed would lose their contracts and face criminal charges.
Access to water and electricity provided by the state would be cut off altogether.
The last one is particularly a doozy since the buildings would be
unable to operate without power and water. NSA’s facility in Utah, for
example, requires 1.7 million gallons of water each day.
(Forget the warrant-less surveillance for a moment – can we get some
eco activists on their case?) Presumably, the NSA would seek these
pulled resources from private companies instead, but it would certainly
make things more complicated for the agency.
That’s precisely the point, anyway. If the states can’t eliminate
spying and mass data collection on innocent citizens altogether, they
can at least put up obstacles that may deter them. Will the federal
government still find it worthwhile to spy on citizens in a particular
state when officials aren’t allowed to assist them? How about when the
evidence they’ve gathered is ultimately banned from the courtroom?
Remarkably, participating states are seeing bipartisan support for
these retaliatory steps. Though the NSA may be a contentious issue,
opponents are hardly divided by party lines. Politicians from both sides
of the aisle have taken issue with the assault on the Fourth Amendment
and are willing to work together to protect constitutional rights.
As Mother Jones points out,
it’s not unprecedented for states to take issue with national agencies.
Colorado and Washington don’t work with the Drug Enforcement
Administration to pursue marijuana smokers. Meanwhile, California passed
its own laws to prevent turning over illegal aliens to U.S. Immigration
for likely deportation.
It’s too soon to project whether the states will have any success
getting these anti-NSA bills through their respective state legislatures
– even critics of the program may be too shy to disobey a federal
agency on this issue. Nonetheless, the early action has been enough to
inspire additional bills, with politicians in Arizona, Utah, and
Michigan indicating that they’re preparing to introduce similar
legislation. If even just a couple of the states can put these bills
into action, it will speak volumes on a symbolic level.
If President Obama isn’t willing to put a stop to this alarming
program, it’s nice to see that many on the state level are set on
honoring the U.S. Constitution – even if it means shutting the lights
off by literally cutting off its electricity.
The spying-industrial complex always rationalizes pervasive domestic
spying on the basis that, supposedly, it is necessary to keep us safe.
But as I pointed out in a speech on the Floor of the House a few months
ago, there is no threat to national security when I call my mother. On
Monday, in the landmark decision of Klayman v. Obama, No. 13-0851
(D.D.C. Dec. 16, 2013), Judge Richard Leon ordered an end to NSA
monitoring of the two innocent plaintiffs. The NSA's "bulk telephony
metadata program" generates a report to the NSA on every phone call that
every American makes. Judge Leon invited the NSA to prove in court
that this program had ever
contributed in any way to thwarting a terrorist attack. The NSA
came up empty. Here is the key element of Judge Leon's ruling on that
issue:
The Government asserts that the Bulk Telephony Metadata Program serves
the "programmatic purpose" of "identifying unknown terrorist operatives
and preventing terrorist attacks." Govt.'s Opp'n at 51 - an interest
that everyone, including this Court, agrees is "of the highest order of
magnitude," In re Directives Pursuant to Section 105B of the Foreign Intelligence Surveillance Act, 551 F.3d 1004, 1012 (FISA Ct. Rev. 2008); see also Haig v. Agee, 453 U.S. 280, 307 (1981) ("It is obvious and unarguable that no governmental interest is
more compelling than the security of the Nation." (internal quotation
marks omitted)).[63]
A closer examination of the record, however, reveals that the
Government's interest is a bit more nuanced - it is not merely to
investigate potential terrorists, but rather, to do so faster than other investigative methods might allow. . . .
Yet, turning to the efficacy prong, the Government does not
cite a single instance in which analysis of the NSA's bulk metadata
collection actually stopped an imminent attack, or
otherwise aided the Government in achieving any objective that was
time-sensitive in nature. In fact, none of the three "recent episodes"
cited by the Government that supposedly "illustrate the role that
telephony metadata analysis can play in preventing and protecting
against terrorist attack" involved any apparent urgency. See
Holley Decl. ¶¶ 24-26. In the first example, the FBI learned of a
terrorist plot still "in its early stages" and investigated that plot
before turning to the metadata "to ensure that all potential connections
were identified." Id. ¶ 24. Assistant Director Holley does not
say that the metadata revealed any new information - much less
time-sensitive information - that had not already come to light in the
investigation up to that point. Id. In the second example, it
appears that the metadata analysis was used only after the terrorist was
arrested "to establish [his] foreign ties and put them in context with
his U.S. based planning efforts." Id
. ¶ 25. And in the third, the metadata analysis "revealed a
previously unknown number for [a] co-conspirator . . . and corroborated
his connection to [the target of the investigation] as well as to other
U.S.-based extremists." Id. ¶ 26. Again, there is no indication
that these revelations were immediately useful or that they prevented an
impending attack. Assistant Director Holley even concedes that bulk
metadata analysis only "sometimes provides information earlier than the FBI's other investigative methods and techniques." Id. ¶ 23 (emphasis added).[64] Given the limited record before me at this point in the litigation - most notably, the
utter lack of evidence that a terrorist attack has ever been prevented
because searching the NSA database was faster than other investigative
tactics - I have serious doubts about the efficacy of the
metadata collection program as a means of conducting time-sensitive
investigations in cases involving imminent threats of terrorism.[65]See Chandler,
520 U.S. at 318-19
("Notably lacking in respondents' presentation is any indication of a
concrete danger demanding departure from the Fourth Amendment's main
rule."). Thus, plaintiffs have a substantial likelihood of showing that
their privacy interests outweigh the Government's interest in collecting
and analyzing bulk telephony metadata and therefore the NSA's bulk
collection program is indeed an unreasonable search under the Fourth
Amendment.[66]
[65]
The Government could have requested permission to present additional,
potentially classified evidence in camera, but it chose not to do so. Although
the Government has publicly asserted that the NSA's surveillance
programs have prevented fifty-four terrorist attacks, no proof of that
has been put before me.See also Justin Elliott & Theodoric Meyer, Claim on 'Attacks Thwarted' by NSA Spreads Despite Lack of Evidence,PROPUBLICA.ORG (Oct. 23, 2013), http://www.propublica.org/article/claim-on-attacks-thwarted-by-nsa-spreads-despite-lack-of-evidence ("'We've heard over and over again the assertion that 54 terrorist plots
were thwarted' by the [NSA's] programs. . . . 'That's plainly wrong. . .
. These weren't all plots and they weren't all thwarted.
The American people are getting left with the inaccurate impression of
the effectiveness of the NSA programs.'" (quoting Sen. Patrick Leahy));
Ellen Nakashima, NSA's need to keep database questioned, WASH.
POST, Aug. 9, 2013, at A01 ("[Senator Ron] Wyden noted that [two
suspects arrested after an investigation that involved use of the NSA's
metadata database] were arrested 'months or years after they were first
identified' by mining the phone logs.").
. . . I cannot imagine a more "indiscriminate" and "arbitrary invasion" than this systematic and high-tech collection and retention of personal data on virtually every single citizen
for purposes of querying and analyzing it without prior judicial
approval. Surely, such a program infringes on "that degree of privacy"
that the Founders enshrined in the Fourth Amendment. Indeed, I
have little doubt that the author of our Constitution, James Madison,
who cautioned us to beware "the abridgement of freedom of the people by
gradual and silent encroachments by those in power," would be aghast.[67]
I applaud Judge Leon's ruling. In my opinion, the NSA has run a
giant con game on the American People, telling us that we have to give
up our freedom to preserve our safety, when in fact the NSA has done
little or nothing to keep us safe. The NSA has tried to fool us,
knowing that a fool and his freedom are soon parted. Thank you, Judge
Leon, for telling the truth to the American People.
TRANSCRIPT: PAUL JAY, SENIOR EDITOR, TRNN: Welcome to The Real News Network. I'm Paul Jay in Baltimore. And welcome to this week's edition of The Ratner Report with Michael Ratner.
But before we go to Michael, I'm going to introduce a little clip
from President Obama, who spoke on Friday, giving his new regulations.
He suggests new limitations, he says, on the NSA's surveillance
activities. And here's how he opened his speech.
~~~ BARACK OBAMA, U.S. PRESIDENT: At the dawn of our
Republic, a small, secret surveillance committee borne out of the "The
Sons of Liberty" was established in Boston. And the group's members
included Paul Revere. At night, they would patrol the streets, reporting
back any signs that the British were preparing raids against America's
early Patriots. Throughout American history, intelligence has helped
secure our country and our freedoms.
~~~ JAY: Now joining us from New York is Michael Ratner.
Michael is the president emeritus of the Center for Constitutional
Rights in New York. He's the U.S. attorney for Julian Assange. And he's
also a board member of The Real News Network.
Thanks very much for joining us, Michael. MICHAEL RATNER, PRESIDENT EMERITUS, CENTER FOR CONSTITUTIONAL RIGHTS: Paul, thank you for having me. JAY: So how did you respond, or how would you like to respond to President Obama? RATNER: Well, I responded--my own--I sat there
watching it really astounded, because I didn't expect a lot, but I think
we got almost nothing in terms of actually reining in what I call this
national surveillance state.
And what was really amazing to me--you could tell it from the
beginning--the clip you played, which is about the role of the Sons of
Liberty and Paul Revere and the Revolution as spies, are essentially
saying spies are our patriots, spies are our heroes, surveillance, as he
goes on to say, surveillance is essentially freedom.
And so he's reversing, really, the way I would have begun a speech,
which is to say, we're citizens, we're Americans, we're protected by a
constitution. We have a right to privacy. We have a right to First
Amendment associations. And that's our core right. And yes, we may need
to do surveillance for reasons, but we can't interfere with the core
rights.
So I knew from the beginning, when he starts by saying essentially
Paul Revere, a spy, is a patriot, that this thing was going in a very
bad direction. And if I had to characterize it in one way, it would be a
bouquet of roses to the national security agencies and the intelligence
agencies, which us normal citizens, normal people came in really for
the short shrift of protection.
And as I said, it said very little that was positive. And when you go
and look at what we are facing in the surveillance state--a billion
phone calls a day, metadata taken--a statistic that came out yesterday
or today: 200 million text messages a day are taken in by the NSA. A
hundred thousand computers all over the world have bugs in them through a
program called PRISM that can get into our internet and computers. So
you have this vast surveillance apparatus.
And then you have a speech that basically lauds the people who are
spies, talks about them really as, oh, they're your neighbor, they don't
want to do anything wrong to you, they're only out to protect you. And
then he goes through the history of how important spies are. In the
Civil War, the used balloons to look at the Confederate troops, in the
Second World War what we did, against the Soviet Union what we did,
etc., and on and on. So you know from that opening where Obama is going. JAY: Well, his main point out of all that was now,
after the Soviet Union was the great threat and we needed spies--he uses
the word to defend us against aggression, in other words, picks up the
whole Cold War narrative. But now he says the threat is this al-Qaeda
types, terrorist types. And, I mean, you know, I mean, we've said on The
Real News many times, and you end I have discussed this many times,
much of or all of this threat is the product or to a large extent the
product of U.S. foreign policy in the Middle East and other places. But
that being said, there actually are, are there not, people out there
that would--that see terrorism is a tactic and in some ways the only way
to fight back against such an overwhelming American military. And they
would, like, attack in the United States, one presumes, if they could
get away with it. I mean, that much is real, don't you think, that there
actually is such a threat? RATNER: You know, what was sad about what he said
about 9/11 is that it was a lie. Basically, we had the information to be
able to stop 9/11. What they didn't do was put the information
together. In other words, we had enough surveillance before 9/11 to stop
9/11, but they didn't do it.
And the question you have to ask yourself are two: how does taking in
a billion phone calls a day, every single American's phone call, really
help do that? And in fact, the judge, Judge Leon, who ruled that the
program of the metadata collection was unconstitutional, said the
government has not been able to show that they've been able to stop any
imminent attack with this information, nor been able to show that the
need for immediacy, in other words, without a court ordered warrant, is
necessary. So he was throwing us, you know, in my view, just a lot of
ways of scaring us. Oh, this big threat. So that's the first thing.
The second thing, of course, you'd say about the big threat is what's
come out in a lot of the information from Ed Snowden and others is that
a lot of this surveillance is not about keeping us safe, but it's about
two other things. One is about competitive advantages for U.S.
businesses, with the US government knowing what other businesses are
doing. We know that about the spying in Brazil on Petrobras, which is
the Brazilian oil company, the Canadians spying on the mining companies,
the taking in of the phone calls in France of businesses and political
leaders. So it's about business.
And it's also, obviously, about finding out what even our allies are doing in terms of their politics.
It's not about 9/11. It's not about stopping terrorism. They could do a much more limited program if that's what it was about.
So he tries to throw us, the scare, 9/11, which, of course,
everybody's sitting there, well, you know, 9/11, so what? He takes in
all of our information. If it'll start the next terrorist attack, let's
do it. But in fact what it does is it eliminates completely our First
Amendment rights to association, our rights to privacy, both under
international law as well as under our own law, our right to associate
under international law, a right to have any kind of privacy on our own,
whether it's, you know, medical records, who we're marrying, etc.
[crosstalk] JAY: Is there anything in his suggested reforms that you think's any good? RATNER: Well, let's start with the reforms, because I
think that's--we want to get there. One, he starts with a lot of BS
about oversight, transparency, kicks a bunch of it to Congress, all
completely meaningless. And he starts on, let's say--well, his main
point when he started talking about the reforms was also interesting to
me. He says, after he talks about all of, you know, the 9/11 and the
patriots who were spies, then he says it's not enough to trust us, the
government. We have to put into place, laws, etc. So it's not just us as
the government, not enough to trust us.
But in fact, everything that he says, we're going to have to trust
the government, which we've shown that we can't trust. So the first one,
the big one, two big ones: national security letters. Those are the
letters that the FBI can simply issue to your library, to your phone
company, to your bank to get all of your records. We had hoped that
there would be a judicial warrant requiring a national security letter.
It's not a small matter. There's 50,000 of those a year. They're secret.
You can't--you're gagged when the business gets one. It's a huge hole
in all of our data and all of our records. Did they do anything about
that? Zero. All he said was, after the fact, we'll have to reveal more
of the information about that. [incompr.] for national security letters.
Terrible.
The second big thing, of course, is the metadata. What we're talking
about is the billion phone calls and all the data that's caused a huge
storm because of everything you can get from metadata. And on that issue
he said, we're going to continue to collect metadata. They're going to
continue to collect it. My view is they shouldn't be collecting metadata
at all, and the only way they can collect any data on my phone call or
your phone call is with a judicial warrant. But no, they're going to
continue to collect it all.
The only two things he said was, we're not sure where we're going to
store it, whether it'll be stored in the federal government or outside
or where, and that's going to be kicked over to Congress.
And the one thing they said that people are planning is something
good is it'll require some kind of a judicial authority to begin to look
into that metadata. Well, you know, what that's telling me is you have
this huge database that you've retained, that you've collected, that can
be used at any time to find out who my associates are to the second,
third, and fourth and fifth degree. But they're not going to use it,
except with the court. Well, as we go through this life in this country,
I don't know what the court procedures are going to be, I don't know
that we're going to allow just one person to look at one phone number,
or whether when the government has that kind of data and there's
anything serious that happens in this country, whether it's serious
union strike, it's an Occupy Wall Street, or something, they will have
the databases on every one of us. The demand should be and has been: get
rid of the metadatabase. So the second thing is a failure. It's a
cosmetic--something on top of it. But it's on top of a base. The
judicial requirements are on top of a base that's completely, completely
corrupted.
The third reform that he was--talked about was the secret Foreign
Intelligence Surveillance Court. And that--everything is secret. They've
issued 35 opinions upholding the metadata and other kinds of
surveillance, the 15 judges have done that. They never turn down any
warrants, secret warrant requests, one in thousands, if that many.
Secret court.
What does he suggest for that? He suggests, like, sort of a panel of
advocates to argue for the civil liberties side. Again, kicks it over to
Congress. When is that going to happen? You and I just don't know.
And let me tell you what's wrong with it. Yeah, sure, it's good to
have somebody in there arguing for civil liberties, but again, it's on a
corrupted base. If you have a law that allows the collection of
metadata of all of us or wiretapping with a warrant, what good does it
do to get someone in there arguing on privacy and civil liberties when
it's on top of basically a corrupt set of laws?
So look at those three things: national security letter, metadata,
and the FISA court. None of them really any--none of them really with
any significant protections for this vast surveillance system that we
have. And finally, of course, he did mention Ed Snowden, Edward Snowden.
And what he said about Edward Snowden, you know, was not something that
I think is meant to give comfort to a man who has actually got us into
this debate and actually, you know, took a heroic gesture in doing so. JAY: Yeah. Michael, we're going to play a clip of
that right now. This is President Obama's statement to Snowden. And
here's the clip.
~~~ JAY: I mean, it seems to me this is President
Obama's shot across the bow of anyone talking about amnesty that that's
not on. Go ahead, Michael. RATNER: Yes. I mean, people weren't sure he would
mention Snowden, and he lied in saying that we've been considering
reforms to the NSA before Ed Snowden. But he basically says, this is
a--our system depends on secrecy. He's giving methods to our adversary.
It's sensational what he did. And yes, I think that's correct. I think
it's correct to say that Ed Snowden is not going to get amnesty or
clemency anytime within the Obama administration.
So all in all, [incompr.] I was disappointed in the speech, you know,
and that's not strong enough. I knew--we knew we'd all be disappointed.
We knew we're living in a massive surveillance state, expected the
speech to cover over some of the problems so that he would lessen the
tension around the issue of massive government spying. Maybe this speech
will have some of that effect. I think it wasn't good enough to have
that effect to stop the waters from roiling. People are giving it very,
very low marks. It was not--it's not a good speech, but it doesn't go to
any of the hearts of problem that we're living in an incredible
national security state, where everything we do, think, associate with
is taken in by our government. JAY: He didn't deal at all with some of the points
some of the NSA whistleblowers have raised recently. We interviewed
William Binney, and he said that they actually have the technology (and
Binney had actually proposed it before he left the NSA) where they could
really isolate people of real suspicion. They have reason to believe so
and so is involved in some kind of terrorist activities. They have ways
to create interconnections of the phone calls that start with someone
of real interest. And not only is this actually a way to exempt people
who are innocent from this blanket surveillance and thus actually defend
people's constitutional rights, but it's also way more effective. As
you say said in the beginning, if you have too much data, as Binney
said, if you're looking for a needle in a haystack, you don't want to
make the haystack any bigger, which is what the current methods are,
that the NSA's actually rejected methods of more focused surveillance,
because they really want everybody's records. RATNER: You know, the Binney is really smart on
this. And, of course, he's completely right. And that's why you have to
ask yourself what's really going on here. Aren't they really trying to
build up a database on every single American, nothing to do it
terrorism, a lot more to do with, ultimately, social control? It's
not--this is not about terrorism. This is--either it's conscious social
control, it's an agency that's gone wild. Obama's been either--either
feels the way the agencies do or he's been captured by the agency.
Obama's really become in Nineteen Eighty-Four terms, you know, our big
brother. JAY: Yeah. And I think it's--we shouldn't forget
there were days in the 19-teens where American citizens were deported.
There were mass internments, including of American citizens during World
War II. Let's not forget McCarthyism, the House Un-American Activities
Committee. I mean, it's not like this is all some dystopian vision.
There is some historical precedent for being concerned about this stuff. RATNER: You Know, Paul, that's right, and it's not
right that people should accept collection and retention of millions of
records and simply put on top of it you can only look at them with a
court order. Our government should not have billions of records on every
single American. JAY: Thanks for joining us, Michael. RATNER: Thank you for having me, Paul. JAY: And thank you for joining us on The Real News Network.
The NSA has made extensive use of its text
message database to extract information on people under no suspicion of
illegal activity. Photograph: Dave Thompson/PA
The National Security Agency has collected almost 200 million text
messages a day from across the globe, using them to extract data
including location, contact networks and credit card details, according
to top-secret documents.
The untargeted collection and storage of SMS messages – including
their contacts – is revealed in a joint investigation between the
Guardian and the UK’s Channel 4 News based on material provided by NSA
whistleblower Edward Snowden.
The documents also reveal the UK spy agency GCHQ has made use of the
NSA database to search the metadata of “untargeted and unwarranted”
communications belonging to people in the UK.
The NSA program, codenamed Dishfire, collects “pretty much everything
it can”, according to GCHQ documents, rather than merely storing the
communications of existing surveillance targets.
The NSA has made extensive use of its vast text message database to
extract information on people’s travel plans, contact books, financial
transactions and more – including of individuals under no suspicion of
illegal activity.
An agency presentation from 2011 – subtitled “SMS Text Messages: A
Goldmine to Exploit” – reveals the program collected an average of 194
million text messages a day in April of that year. In addition to
storing the messages themselves, a further program known as “Prefer”
conducted automated analysis on the untargeted communications.
An NSA presentation from 2011 on the agency's Dishfire program to collect millions of text messages daily. Photograph: GuardianThe Prefer program uses automated text messages such as missed call
alerts or texts sent with international roaming charges to extract
information, which the agency describes as “content-derived metadata”,
and explains that “such gems are not in current metadata stores and
would enhance current analytics”.
On average, each day the NSA was able to extract:
• More than 5 million missed-call alerts, for use in contact-chaining
analysis (working out someone’s social network from who they contact
and when)
• Details of 1.6 million border crossings a day, from network roaming alerts
• More than 110,000 names, from electronic business cards, which also included the ability to extract and save images.
• Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users
The agency was also able to extract geolocation data from more than
76,000 text messages a day, including from “requests by people for route
info” and “setting up meetings”. Other travel information was obtained
from itinerary texts sent by travel companies, even including
cancellations and delays to travel plans. A slide on the Dishfire program describes the 'analytic gems' of collected metadata. Photograph: Guardian
Communications from US phone numbers, the documents suggest, were
removed (or “minimized”) from the database – but those of other
countries, including the UK, were retained.
The revelation the NSA is collecting and extracting personal
information from hundreds of millions of global text messages a day is
likely to intensify international pressure on US president Barack Obama,
who on Friday is set to give his response to the report of his NSA
review panel.
While US attention has focused on whether the NSA’s controversial
phone metadata program will be discontinued, the panel also suggested US
spy agencies should pay more consideration to the privacy rights of
foreigners, and reconsider spying efforts against allied heads of state
and diplomats.
In a statement to the Guardian, a spokeswoman for the NSA said any
implication that the agency’s collection was “arbitrary and
unconstrained is false”. The agency’s capabilities were directed only
against “valid foreign intelligence targets” and were subject to
stringent legal safeguards, she said.
The ways in which the UK spy agency GCHQ has made use of the NSA
Dishfire database also seems likely to raise questions on the scope of
its powers.
While GCHQ is not allowed to search through the content of messages
without a warrant – though the contents are stored rather than deleted
or “minimized” from the database – the agency’s lawyers decided analysts
were able to see who UK phone numbers had been texting, and search for
them in the database.
The GCHQ memo sets out in clear terms what the agency’s access to
Dishfire allows it to do, before handling how UK communications should
be treated. The unique property of Dishfire, it states, is how much
untargeted or unselected information it stores.
“In contrast to [most] GCHQ equivalents, DISHFIRE contains a large volume of unselected SMS
traffic,” it states (emphasis original). “This makes it particularly
useful for the development of new targets, since it is possible to
examine the content of messages sent months or even years before the target was known to be of interest.”
It later explains in plain terms how useful this capability can be.
Comparing Dishfire favourably to a GCHQ counterpart which only collects
against phone numbers that have specifically been targeted, it states
“Dishfire collects pretty much everything it can, so you can see SMS
from a selector which is not targeted”.
The document also states the database allows for broad, bulk searches
of keywords which could result in a high number of hits, rather than
just narrow searches against particular phone numbers: “It is also
possible to search against the content in bulk (e.g. for a name or home telephone number) if the target’s mobile phone number is not known.”
Analysts are warned to be careful when searching content for terms
relating to UK citizens or people currently residing in the UK, as these
searches could be successful but would not be legal without a warrant
or similar targeting authority.
However, a note from GCHQ’s operational legalities team, dated May
2008, states agents can search Dishfire for “events” data relating to UK
numbers – who is contacting who, and when.
“You may run a search of UK numbers in DISHFIRE in order to retrieve
only events data,” the note states, before setting out how an analyst
can prevent himself seeing the content of messages when he searches – by
toggling a single setting on the search tool.
Once this is done, the document continues, “this will now enable you
to run a search without displaying the content of the SMS, especially
useful for untargeted and unwarranted UK numbers.”
A separate document gives a sense of how large-scale each Dishfire
search can be, asking analysts to restrain their searches to no more
than 1,800 phone numbers at a time.
+An NSA slide on the 'Prefer' program reveals
the program collected an average of 194 million text messages a day in
April 2011. Photograph: Guardian
The note warns analysts they must be careful to make sure they use
the form’s toggle before searching, as otherwise the database will
return the content of the UK messages – which would, without a warrant,
cause the analyst to “unlawfully be seeing the content of the SMS”.
The note also adds that the NSA automatically removes all “US-related
SMS” from the database,
so it is not available for searching.
A GCHQ spokesman refused to comment on any particular matters, but
said all its intelligence activities were in compliance with UK law and
oversight.
But Vodafone, one of the world’s largest mobile phone companies with
operations in 25 countries including Britain, greeted the latest
revelations with shock.
“It’s the first we’ve heard about it and naturally we’re shocked and
surprised,” the group’s privacy officer and head of legal for privacy,
security and content standards told Channel 4 News.
“What you’re describing sounds concerning to us because the regime
that we are required to comply with is very clear and we will only
disclose information to governments where we are legally compelled to do
so, won’t go beyond the law and comply with due process.
“But what you’re describing is something that sounds as if that’s
been circumvented. And for us as a business this is anathema because our
whole business is founded on protecting privacy as a fundamental
imperative.”
He said the company would be challenging the UK government over this.
“From our perspective, the law is there to protect our customers and it
doesn’t sound as if that is what is necessarily happening.” The NSA’s access to, and storage of, the content of communications of
UK citizens may also be contentious in the light of earlier Guardian
revelations that the agency was drafting policies to facilitate spying
on the citizens of its allies, including the UK and Australia, which
would – if enacted – enable the agency to search its databases for UK
citizens without informing GCHQ or UK politicians.
The documents seen by the Guardian were from an internal
Wikipedia-style guide to the NSA program provided for GCHQ analysts, and
noted the Dishfire program was “operational” at the time the site was
accessed, in 2012.
The documents do not, however, state whether any rules were
subsequently changed, or give estimates of how many UK text messages are
collected or stored in the Dishfire system, or from where they are
being intercepted.
In the statement, the NSA spokeswoman said: “As we have previously
stated, the implication that NSA's collection is arbitrary and
unconstrained is false.
“NSA's activities are focused and specifically deployed against – and
only against – valid foreign intelligence targets in response to
intelligence requirements.
“Dishfire is a system that processes and stores lawfully collected
SMS data. Because some SMS data of US persons may at times be
incidentally collected in NSA’s lawful foreign intelligence mission,
privacy protections for US persons exist across the entire process
concerning the use, handling, retention, and dissemination of SMS data
in Dishfire.
“In addition, NSA actively works to remove extraneous data, to
include that of innocent foreign citizens, as early as possible in the
process.”
The agency draws a distinction between the bulk collection of
communications and the use of that data to monitor or find specific
targets.
A spokesman for GCHQ refused to respond to any specific queries
regarding Dishfire, but said the agency complied with UK law and
regulators.
“It is a longstanding policy that we do not comment on intelligence
matters,” he said. “Furthermore, all of GCHQ's work is carried out in
accordance with a strict legal and policy framework which ensures that
our activities are authorised, necessary and proportionate, and that
there is rigorous oversight, including from the Secretary of State, the
Interception and Intelligence Services Commissioners and the
Parliamentary Intelligence and Security Committee.”
GCHQ also directed the Guardian towards a statement made to the House
of Commons in June 2013 by foreign secretary William Hague, in response
to revelations of the agency’s use of the Prism program.
“Any data obtained by us from the US involving UK nationals is
subject to proper UK statutory controls and safeguards, including the
relevant sections of the Intelligence Services Act, the Human Rights Act
and the Regulation of Investigatory Powers Act,” Hague told MPs.
NSA listening post in Yakima, Washington. (Image: via Google Maps)
The campaign to turn off power to the NSA has gotten a big boost.
Washington has become the first state with a physical NSA location to
consider a Fourth Amendment protection act designed to make life
extremely difficult for the massive spy agency.
The state-level campaign to turn off power to the NSA got a big boost
January 15, 2014, as Washington became the first state with a physical
NSA location to consider a Fourth Amendment protection act designed to
make life extremely difficult for the massive spy agency.
Bills introduced in California, Oklahoma, Indiana, Missouri and
Kansas seek to prevent the NSA from expanding further or sharing data
and metadata in non-terror investigations.
But Washington's House Bill
2272 (HB2272)
takes things a step farther because the state is home to the secretive
"Yakima listening post" documented by famous NSA researcher James
Bamford in his 1982 book, The Puzzle Palace.
HB2272 was introduced by a bipartisan team of legislators, Rep. David
Taylor, a Republican from Moxee, and Rep. Luis Moscoso, a former
three-term secretary of the state Democratic Party from Mountlake
Terrace.
If passed, the bill would make it the policy of the state "to refuse
material support, participation, or assistance to any federal agency
which claims the power, or with any federal law, rule, regulation, or
order which purports to authorize, the collection of electronic data or
metadata of any person pursuant to any action not based on a warrant."
Taylor, whose district houses the Yakima post, said he "cannot sit
idly by while a secretive facility in his backyard violates the rights
of people everywhere."
"We're running the bill to provide protection against the
ever-increasing surveillance into the daily lives of our citizens,"
Taylor said. "Our founding fathers established a series of checks and
balances in the Constitution. Given the federal government's utter
failure to address the people's concerns, it's up to the statesto stand
for our citizens' constitutional rights."
Practically speaking, the bill prohibits state and local agencies
from providing any material support to the NSA within their
jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a
warrant by the NSA and shared with law enforcement inadmissible in
state court. It blocks public universities from serving as NSA research
facilities or recruiting grounds. And it bans corporations who continue
to do business with the NSA from holding any contracts with the state.
According to documents made public by the US military, as of 2008, a
company called PacifiCorp is the primary supplier of electric power and
Cascade Natural Gas Corporation supplies natural gas to YTC. The
Kittitas Public Utility District, a function of the state, provides
electric power for the MPRC and the Doris site, but no documentation has
yet proven that it also provides electricity used directly by the NSA
facility. And while YTC does provide a bulk of its own water, documents
also show that some of it gets there by first passing through upstream
dams owned and operated by the state.
The Army report states, "YTC lies within three WAUs whose boundaries
coincide with WRIAs, as defined by the State of Washington natural
resource agencies."
WAU's are the state's Water Administration Units. WRIAs are state Water Resource Inventory Areas.
A Washington company has a strong link to the NSA. Cray Inc. builds
supercomputers for the agency. Calls to the company for comment were not
returned. Taylor said he understands the need for "national security" but insists we can't trample over the Constitution in the process.
"Simply claiming 'national security' does not negate an individual's
constitutional rights. We have a legal system which provides law
enforcement agencies the means to conduct legal, constitutional
surveillance. We're simply asking the government to follow the supreme
law of the land," he said.
Three public universities in Washington are among 166 schools
nationwide partnering with the NSA. Taylor's bill would address these
schools' status as NSA "Centers of Academic Excellence" and would bar
any new partnerships with other state colleges or universities.
OffNow national campaign leader Shane Trejo said that while people
tend to focus on the banning of resources to NSA facilities, the bill's
prohibition against using data gathered without a warrant in state court
probably would have the most immediate impact. In fact, lawmakers in
Kansas and Missouri are considering bills simply addressing this kind of
data sharing.
"Last fall, Reuters reported that NSA is sharing information gathered
without a warrant with local law enforcement. The documents said that
most cases where this is happening are not terror-related. By banning
this practice, the bill would lessen the practical effect of all that
data collecting that NSA is doing."
Trejo said he expects at least three more states to introduce the act within the next few weeks.
"This idea is catching on. And if people in Washington make phone calls to committee members,
the bill has a good chance of passing. That will just encourage even
more states to do the same," Trejo said. "In the end, our goal is to put
a stop to these NSA spying programs, whether the Congress wants us to
or not."
A
devastating 250-page dossier, detailing allegations of beatings,
electrocution, mock executions and sexual assault, has been presented to
the International Criminal Court, and could result in some of Britain's
leading defence figures facing prosecution for "systematic" war crimes.
General
Sir Peter Wall, the head of the British Army; former Defence secretary
Geoff Hoon; and formerDefence minister Adam Ingram are among those
named in the report, entitled "The Responsibility of UK Officials for
War Crimes Involving Systematic Detainee Abuse in Iraq from 2003-2008".
[Where are the US investigations? Why is Rumsfeld laughing? ]
The
damning dossier draws on cases of more than 400 Iraqis, representing
"thousands of allegations of mistreatment amounting to war crimes of
torture or cruel, inhuman or degrading treatment".
They
range from "hooding" prisoners to burning, electric shocks, threats to
kill and "cultural and religious humiliation". Other forms of alleged
abuse include sexual assault, mock executions, threats of rape, death,
and torture.
The
formal complaint to the ICC, lodged yesterday, is the cumulation of
several years' work by Public Interest Lawyers (PIL) and the European
Centre for Constitutional and Human Rights (ECCHR). It calls for an
investigation into the alleged war crimes, under Article 15 of the Rome
Statute.
The dossier, seen by The Independent on Sunday[UK],
is the most detailed ever submitted to the ICC's Office of the
Prosecutor on war crimes allegedly committed by British forces in Iraq.
The court has already acknowledged that there was little doubt that war
crimes were committed.
In
2006, it concluded: "There was a reasonable basis to believe that
crimes within the jurisdiction of the court had been committed, namely
wilful killing and inhuman treatment." At that time, prosecutors cited
the low number of cases – fewer than 20 – as a reason for not mounting
an investigation. But, since then, hundreds of other claims have come to
light – prompting consideration of the complaint now. It is the start
of a process which could result in British politicians and generals
being put in the dock on war-crimes charges.Tony
Blair meets troops in Iraq in 2003. A dossier alleging "systematic" war
crimes by British forces - sent to Iraq by the former Prime Minister -
has been presented to the International Criminal Court (PA)
The
sheer scale and seriousness of the allegations passes the "gravity"
threshold to justify an investigation, according to the complaint. It
continues "those who bear the greatest responsibility" for alleged war
crimes "include individuals at the highest levels" of the British Army
and political system.
It concludes the evidence "justifies further
investigation" into the criminal responsibility "of senior individuals
within the UK military and government". It adds British military
commanders "knew or should have known" that forces under their control
"were committing or about to commit war crimes". And "civilian superiors
knew or consciously disregarded information at their disposal, which
clearly indicated that UK services personnel were committing war crimes
in Iraq".