« Egypt's Bloody FridayThe assault in Christians in Egypt and Syria »

NSA Caught Red-Handed

August 18th, 2013

by Stephen Lendman

It's a longstanding rogue agency. It always operated extrajudicially. It's worse than ever now. It's a power unto itself.

Obama claims "(w)e don’t have a domestic spying program. What we do have are some mechanisms where we can track a phone number or an email address that we know is connected to some sort of terrorist threat."

False! Obama knows it. He lied. He always lies. He's a serial liar. NSA has a longstanding domestic spying program.

On August 15, the Washington Post headlined "NSA broke privacy rules thousands of times per year, audit finds."

Most infractions involved "unauthorized surveillance of Americans or foreign intelligence targets in the United States."

Doing so's restricted "by statute and executive order." Violations range from "significant ones to typographical errors that resulted in unintended interception of US e-mails and telephone calls."

Agency personnel are told to substitute generic language for specific details. They do in Justice Department and Director of National Intelligence reports.

They delay sending them. The FISA court didn't learn about an unconstitutional new collection method until months after it began.

Obama officials repeatedly stonewall. Secrecy substitutes for transparency.

After promising to explain NSA operations in "as transparent a way as we possibly can," Deputy Attorney General James Cole dismissively told Congress:

"Every now and then, there may be a mistake." Director of National Intelligence James Clapper lied. He committed perjury. He got away with it. He remains unaccountable.

Obama appointed him to investigate NSA spying. He'll head a so-called independent commission. Putting him in charge assures coverup, denial and whitewash. It assures business as usual.

He told Congress NSA has no domestic spying program. When it was too late to matter, he disingenuously apologized for a "clearly erroneous" statement.

NSA audit information WaPo obtained "counted 2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution of legally protected communications."

"Most were unintended. Many involved failures of due diligence or violations of standard operating procedure."

"The most serious incidents included a violation of a court order and unauthorized use of data about more than 3,000 Americans and green-card holders."

"There is no reliable way to calculate from the number of recorded compliance issues how many Americans have had their communications improperly collected, stored or distributed by the NSA."

Causes and severity vary widely. Sweeping surveillance assures many lawless practices. Serious ones happen often.

Audit data included only incidents at NSA's Fort Meade headquarters and other Washington area facilities.

Three government officials spoke on condition of anonymity. They said infractions would be much higher if other "NSA operating units and regional collection centers" were included.

One of the most serious violations involves "divert(ing) large volumes of international data passing through fiber-optic cables in the United States into a repository where the material could be stored temporarily for processing and selection."

NSA calls it "multiple communications transactions." Domestic and foreign ones are commingled.

NSA calls its mission "cryptology that encompasses both Signals Intelligence (SIGINT) and Information Assurance (IA) products and services, and enables Computer Network Operations (CNO) in order to gain a decision advantage for the Nation and our allies under all circumstances."

Signals Intelligence Management Directive 421 says "raw SIGINT data...includes, but is not limited to, unevaluated and/or unminimized transcripts, gists, facsimiles, telex, voice, and some forms of computer-generated data, such as call event records and other Digital Network Intelligence (DNI) metadata as well as DNI message text."

WaPo said database query incidents into "raw SIGINT data... include, but (are) not limited to, unevaluated and/or unminimized transcripts, gists, facsimiles, telex, voice, and some forms of computer-generated data, such as call event records and other Digital Network Intelligence (DNI) metadata as well as DNI message text."

NSA claims collecting information on Americans while targeting foreigners suspected of terrorism "does not constitute a violation."

It "does not have to be reported" for inclusion in quarterly congressional reports, it said. Once obtained, communications of Americans are freely searched.

A second WaPo article headlined "Court: Ability to police US spying program limited," saying:

The FISA court's chief judge said the body lacks tools to "independently verify how often the government's surveillance breaks the court's rules that aim to protect Americans' privacy."

According to chief FISA court Judge Reggie B. Walton:

"The FISC is forced to rely upon the accuracy of the information that is provided to the Court."

"The FISC does not have the capacity to investigate issues of noncompliance, and in that respect the FISC is in the same position as any other court when it comes to enforcing (government) compliance with its orders."

WaPo said the FISA court can demand and obtain more information about cases. It's unclear how often it happens. The court's largely rubber stamp. It's complicit with lawless spying.

On August 15, the Electronic Frontier Foundation (EFF) headlined "NSA Spying: The Three Pillars of Government Trust," saying:

US officials lied. They claim rigorous executive, congressional and judiciary oversight of NSA activities. Doing so they say assures no lawless privacy invasions.

"Today, the Washington Post confirmed that two of those oversight pillars - the Executive branch and the court overseeing the spying, the Foreign Intelligence Surveillance Court (FISA court) - don't really exist," said EFF.

"The third pillar came down slowly over the last few weeks, with Congressional revelations about the limitations on its oversight, including what Representative Sensennbrenner called 'rope a dope' classified briefings."

Trust in government oversight's no longer warranted. It never was. For sure it's not now.

Snowden explained in stark detail. So did whistleblowers Russell Tice, Mark Klein and others. Unconstitutional data-mining is longstanding practice. All three branches of government are involved.

They're complicit in sweeping lawless spying. Millions of Americans are affected. According to EFF:

"The pattern is now clear and it's getting old. With each new revelation the government comes out with a new story for why things are really just fine, only to have that assertion demolished by the next revelation."

"It's time for those in government who want to rebuild the trust of the American people and others all over the world to come clean and take some actual steps to rein in the NSA."

"And if they don't, the American people and the public, adversarial courts, must force change upon it."

"The three pillars of American trust have fallen. It's time to get a full reckoning and build a new house from the wreckage, but it has to start with some honesty."

"Join EFF in calling for a full investigation by emailing Congress today."

"For far too long, secret law and a secret surveillance state have been a dark shadow on Americans' freedom. It's time to shine a light on NSA's spying."

It's time to fully expose its dark side. It's time to stop America heading for full-blown tyranny. It's time to do it now.

-###-

Stephen Lendman lives in Chicago and can be reached at lendmanstephen@sbcglobal.net.

His new book is titled "Banker Occupation: Waging Financial War on Humanity"

http://www.claritypress.com/Lendman.html

Visit his blog site at sjlendman.blogspot.com

Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network.

It airs Fridays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.

http://www.progressiveradionetwork.com/the-progressive-news-hour

http://www.dailycensored.com/nsa-caught-red-handed/

No feedback yet

Voices

Voices

  • By Kathy Kelly, World BEYOND War The Biblical Book of Job chronicles a string of catastrophes relentlessly plaguing the main character, Job, who loses his prosperity, his home, his health, and his children. Eventually, an agonized Job curses his own…
  • LifeSiteNews The president-elect praised the former Democratic congresswomen and said she'll bring a 'fearless spirit' to the intelligence community as a member of his cabinet. President-elect Donald Trump announced Wednesday that he would nominate…
  • Paul Craig Roberts There’s many a slip between cup and lip I have been speaking with MAGA Americans and, as I suspected, there is little comprehension of the vast impediments to renewal. The swamp that Trump is to drain is entrenched and…
  • PDF's for Einstein, Dr. Rosaly M. C. Lopes, Darwin, Lorenzo Langstroth, Marie Curie, Shakespeare & Many More! by Tracy Turner Shakespeare, Curie, Orwell, Hemingway, Dostoevsky, Lopes, Einstein Dr. Rosaly Lopes Director of the Planetary Science…
  • RT.com Speaking just one day after the Republican candidate's US election victory, the Russian president explained Moscow's position on a range of global issues Russian President Vladimir Putin addressed pressing global issues at Sochi's annual Valdai…
  • The Pretender's Magic is their diversity in musical range. Mystifying the sultry blues of "Blue Sun" to the punk-infused anthems like "Brass in Pocket," the band slips into these heterogeneous grooves with greased skids. Chrissie's wide-ranging influences pair with The Pretenders, evolving while retaining core elements of its personality. The eclectic portfolio will consistently deliver a "new" live surprise. Sorry, but there is no raucous Lynyrd Skynyrd "Play Free Bird" here. Everybody has a favorite, many favorites. The diversity of the songs makes every new and old fan curious to learn more about one aspect or another of the band's expression.
  • By Joe Granville When the formula is calculated, it yields a very small probability—around 1.45 × 10⁻¹⁴, or 0.00014%. This result suggests that, mathematically, Trump's victory is extremely unlikely under these assumptions. A centrist in the Tea Party,…
  • by Ellen Brown Buncombe County North Carolina – damage after Hurricane Helene floods. NCDOTcommunications, CC BY 2.0 https://creativecommons.org/licenses/by/2.0, via Wikimedia Commons Asheville, North Carolina, is known for its historic architecture,…
  • By: Brett Redmayne-Titley "When injustice becomes law, resistance becomes duty." It is not inaccurate to determine that we, the remaining moral world, are in reality also Palestinian by metaphor. Likewise, we are all individually disenfranchised,…
  • Paul Craig Roberts The Democrats are set to steal the election. They have everything in place except enough votes to hide their theft. Watch the video of the Trump Grand Finale, listen to the speeches by Robert Kennedy and Tucker Carlson. Marvel at the…
November 2024
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

  XML Feeds

blog soft
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi