All my life, people have dismissed me and told me that I am “paranoid.” I had to look up the definition as a young adult to make sure that I was using the word the same way.
2 : a tendency on the part of an individual or group toward excessive or irrational suspiciousness and distrustfulness of others
Here is what the NSA leaks reveal that my government has been doing to its citizens for years (source):
The NSA collects much more metadata about Internet traffic: who is talking to whom, when, how much, and by what mode of communication. Metadata is a lot easier to store and analyze than content. It can be extremely personal to the individual, and is enormously valuable intelligence. Continue reading
Evidence that the NSA Is Storing Voice Content, Not Just Metadata
Interesting speculation that the NSA is storing everyone’s phone calls, and not just metadata. Definitely worth reading.
I expressed skepticism about this just a month ago. My assumption had always been that everyone’s compressed voice calls is just too much data to move around and store. Now, I don’t know.
There’s a bit of a conspiracy-theory air to all of this speculation, but underestimating what the NSA will do is a mistake. General Alexander has told members of Congress that they can record the contents of phone calls. And they have the technical capability.
NSA Secrecy and Personal Privacy
In an excellent essay about privacy and secrecy, law professor Daniel Solove makes an important point. There are two types of NSA secrecy being discussed. It’s easy to confuse them, but they’re very different.
Of course, if the government is trying to gather data about a particular suspect, keeping the specifics of surveillance efforts secret will decrease the likelihood of that suspect altering his or her behavior.
But secrecy at the level of an individual suspect is different from keeping the very existence of massive surveillance programs secret. The public must know about the general outlines of surveillance activities in order to evaluate whether the government is achieving the appropriate balance between privacy and security. What kind of information is gathered? How is it used? How securely is it kept? What kind of oversight is there? Are these activities even legal? These questions can’t be answered, and the government can’t be held accountable, if surveillance programs are completely classified.
5 Alarming Things We Should Have Already Known About the NSA, Surveillance, and Privacy Before Ed Snowden
1. Whistleblowers have warned us about an out-of-control NSA before.
Before Snowden became a household name, there was Thomas Drake, indicted in 2010 under the Espionage Act after he said publicly that an NSA data collection program might be being used illegally to gather data on Americans. (Drake pled guilty to one small charge. The bigger ones were ultimately dropped.)
And don’t forget William Binney and J. Kirk Wiebe. Each had their homes raided by the FBI in 2007, when they were suspected of being the sources of a 2005 NSA data-collection scandal broken by the New York Times. That scandal circled around the NSA’s Bush-era warrantless wiretapping program.
Details of NSA Data Requests from US Corporations
Facebook (here), Apple (here), and Yahoo (here) have all released details of US government requests for data. They each say that they’ve turned over user data for about 10,000 people, although the time frames are different. The exact number isn’t important; what’s important is that it’s much lower than the millions implied by the PRISM document.
Now the big question: do we believe them? If we don’t, what would it take before we did believe them?
Cost/Benefit Questions NSA Surveillance
John Mueller and Mark Stewart ask the important questions about the NSA surveillance programs: why were they secret, what have they accomplished, and what do they cost?
This essay attempts to figure out if they accomplished anything, and this essay attempts to figure out if they can be effective at all.
Finding Sociopaths on Facebook
My hypothesis is that science will someday be able to identify sociopaths and terrorists by their patterns of Facebook and Internet use. I’ll bet normal people interact with Facebook in ways that sociopaths and terrorists couldn’t duplicate.Anyone can post fake photos and acquire lots of friends who are actually acquaintances. But I’ll bet there are so many patterns and tendencies of “normal” use on Facebook that a terrorist wouldn’t be able to successfully fake it.
Okay, but so what? Imagine you had such an amazingly accurate test…then what? Do we investigate those who test positive, even though there’s no suspicion that they’ve actually done anything? Do we follow them around? Subject them to additional screening at airports? Throw them in jail because we know the streets will be safer because of it? Do we want to live in a Minority Report world?
Petition the NSA to Subject its Surveillance Program to Public Comment
In a request today to National Security Agency director Keith Alexander and Defense Secretary Chuck Hagel, the group argues that the NSA’s recently revealed domestic surveillance program is “unlawful” because the agency neglected to request public comments first. A federal appeals court previously ruled that was necessary in a lawsuit involving airport body scanners.”In simple terms, a line has been crossed,” Marc Rotenberg, executive director of the Electronic Privacy Information Center, told CNET. “The agency’s function has been transformed, and we think the public should have an opportunity to say something about that.”
Love Letter to an NSA Agent
A fine piece: “A Love Letter to the NSA Agent who is Monitoring my Online Activity.”
A similar sentiment is expressed in this video.
New Details on Skype Eavesdropping
Skype, the Internet-based calling service, began its own secret program, Project Chess, to explore the legal and technical issues in making Skype calls readily available to intelligence agencies and law enforcement officials, according to people briefed on the program who asked not to be named to avoid trouble with the intelligence agencies.Project Chess, which has never been previously disclosed, was small, limited to fewer than a dozen people inside Skype, and was developed as the company had sometimes contentious talks with the government over legal issues, said one of the people briefed on the project. The project began about five years ago, before most of the company was sold by its parent, eBay, to outside investors in 2009. Microsoft acquired Skype in an $8.5 billion deal that was completed in October 2011.
US Offensive Cyberwar Policy
More than passively eavesdropping, we’re penetrating and damaging foreign networks for both espionage and to ready them for attack. We’re creating custom-designed Internet weapons, pretargeted and ready to be “fired” against some piece of another country’s electronic infrastructure on a moment’s notice.
This is much worse than what we’re accusing China of doing to us. We’re pursuing policies that are both expensive and destabilizing and aren’t making the Internet any safer. We’re reacting from fear, and causing other countries to counter-react from fear. We’re ignoring resilience in favor of offense.
Motives Aside, the NSA Should Not Spy on Us
For the sake of argument, we may assume that from President Obama on down, government officials sincerely believe that gathering Americans’ telephone and Internet data is vital to the people’s security. Does that make government spying okay?
No, it doesn’t.
Spying’s the Real Story, Not Edward Snowden
I promised myself to stay away from Orwell metaphors for the duration of the latest surveillance-state controversy. But the punditocracy’s recent “two-minutes hate” against National Security Agency whistleblower Edward Snowden has me backsliding already.
Judging by the vicious — and irrelevant — attacks on Snowden’s character, all too many leading pundits and journalists love nothing more than a ritual ragegasm against an alleged enemy of the state.
The Washington Post‘s Richard Cohen calls Snowden a “cross-dressing Little Red Riding Hood”; he’s a “total slacker” with “all the qualifications to become a grocery bagger” jeers Politico‘s Roger Simon. Snowden’s “a grandiose narcissist who deserves to be in prison” offers The New Yorker‘s Jeffrey Toobin; Fox News’s Ralph Peters raises the stakes: a “narcissistic traitor” who belongs on death row.
Schneier on Security: Government Secrets and the Need for Whistle-blowers.
Whistle-blowing is the moral response to immoral activity by those in power. What’s important here are government programs and methods, not data about individuals. I understand I am asking for people to engage in illegal and dangerous behavior. Do it carefully and do it safely, but — and I am talking directly to you, person working on one of these secret and probably illegal programs — do it.
Go read the whole essay at the link at the top. Think. Think!
The amazing video if a great question by Senator Kirk is available here. How is Holder not able to answer this question by Senator Kirk (R-IL). Here is my transcript of the video.
Kirk: “Mr. Attorney General, I want to take you to the Verizon scandal and — which I understand takes us to possibly monitoring up to 120 million calls. You know, when government bureaucrats are sloppy, they’re usually really sloppy. Want to just ask, could you assure to us that no phone inside the Capitol were monitored of members of Congress that would give a future executive branch, if they started pulling this kind of thing off, would give them unique leverage over the legislature?”
Holder: “With all due respect, Senator, I don’t think this is an appropriate setting for me to discuss that issue. I’d be more than glad to come back in a — in an appropriate setting to discuss the issues that you have raised. But in this open forum I don’t . . .”
Kirk: “I would interrupt you and say the correct answer would be say no, we stayed within our lane, and I’m assuring you we did not spy on members of Congress.”
Mikulski: “We are going to stop here because this fully briefed is something that drives us up the wall.”
via John Lott’s Website: Attorney General Holder refuses to answer question on whether the WH was collecting information on members of Congress and Supreme Court Justices.
Larry Page has posted a public refutation of accusations that Google is giving the NSA or other agencies open access to user data:
What the …?
Posted: Friday, June 07, 2013
Dear Google users—
You may be aware of press reports alleging that Internet companies have joined a secret U.S. government program called PRISM to give the National Security Agency direct access to our servers. As Google’s CEO and Chief Legal Officer, we wanted you to have the facts.
First, we have not joined any program that would give the U.S. government—or any other government—direct access to our servers. Indeed, the U.S. government does not have direct access or a “back door” to the information stored in our data centers. We had not heard of a program called PRISM until yesterday. Continue reading
More breaking news about the NSA phone surveillance, admissions by the White House, admissions by the President, admissions that congress knew…. blah blah blah.
The really distressing part (again) is that 58% of the American population is:
- Too stupid to care
- Stupid enough to trust the President (ANY president!) with this information
- Stupid enough trust Congress with this information
- Stupid enough to accept that this is “anti terrorism”
- Stupid enough to think that it ends at watching the durations and numbers of the calls.
We have lost the “war on terror.” Our leaders are now happily terrorizing us.