Monday, November 20, 2017
Search

Domestic Spying - search results

If you're not happy with the results, please do another search

AG Sessions calls for permanent renewal of ‘domestic spying program’ — RT US News

US Attorney General Jeff Sessions is pushing to permanently renew the controversial section 702 of the...

NSA must end planned expansion of domestic spying, lawmakers say

Two members of the House Oversight Committee, a Democrat and a Republican, have asked the director...

Australian Proposal Would Require Suspicionless Domestic Spying by ISPs

NADIA KAYYALI AND JEREMY MALCOLM The Australian government announced new anti-terrorism measures this week, in response to the alleged involvement of Australian citizens with extremist groups in...

Likening NSA Surveillance to Abusive Colonial-Era General Warrants, TRI Asks Appeals Court to Declare...

Likening the National Security Agency’s (NSA) domestic spying program to a modern-day incarnation of the abusive colonial-era general warrants and writs of assistance which prompted the Framers of the U.S. Constitution to adopt the Fourth Amendment’s ban on unreasonable searches and seizures, The Rutherford Institute has asked the United States Court of Appeals for the […]

Spending bill takes first swipe at NSA over domestic spying

Stephen Dinanwashingtontimes.comJanuary 14, 2014 Tucked inside the massive new government spending bill are several demands from...

After 43 years, activists admit theft at FBI office that exposed domestic spying

Michael Isikoff Forty-three years after the mysterious theft of up to 1,000 documents from an FBI office outside Philadelphia, three former political...

New leak: US domestic spying legal

A newly disclosed document shows the NSA can get away with domestic spying in the US.A newly disclosed US National Security Agency document shows...

New Snowden leak shows how the NSA gets away with domestic spying

Newly leaked National Security Agency documents published by the Guardian reveal that the NSA can scour vast databases of personal information by searching for...

Napolitano: Domestic Spying Is Dangerous to Freedom

Andrew NapolitanoReasonAugust 8, 2013 How is it that the government can charge Edward Snowden with espionage...

WTF Dude?? Obama Blatantly Lying ‘We Don’t Have a Domestic Spying Program’

Obama also says the U.S. is not overreacting by closing some U.S. embassies for a week. The president tells Leno, "The odds of dying in a terrorist attack are a lot lower than they are of dying in a car accident, unfortunately."

Who Voted in Congress to Defund the NSA Domestic Spying Program and Who Didn’t

It was a very interesting vote with a majority of Republicans joining the Obama Administration and many Dems in support of the continued funding of the NSA spying program which dragnets the data of American citizens without a warrant.

“Its Legal”: US Congress Gives “Green Light” to Domestic Spying

Following intense pressure from the Obama administration and top intelligence officials, the US House of Representatives defeated an amendment that would have placed constraints...

Zimmermans Feel Chilling Effect of Obama’s Domestic Spying

Family’s wiretapping fears and Michael Hastings’ death showcase the omnipresence of unconstitutional abuses. Kit Daniels Infowars.com July 16, 2013 The Zimmerman family now...

Telecoms Implicated in Bush-Era Domestic Spying Now Starting 'Privacy Coaltion'

Politico is reporting that a group of leading telecommunications corporations has announced that they are forming a privacy coalition to "focus on updating U.S....

‘NSA should come clean about domestic spying’: Ray Kelly

Jennifer BainNew York PostJune 18, 2013 Police Commissioner Ray Kelly launched a stinging rebuke to the...

Multiple New Polls Show Americans Reject Wholesale NSA Domestic Spying

In the 1950s and 60s, the NSA spied on all telegrams entering and exiting the country. The egregious actions were only uncovered after Congress...

Multiple New Polls Show Americans Reject Wholesale NSA Domestic Spying

In the 1950s and 60s, the NSA spied on all telegrams entering and exiting the country. The egregious actions were only uncovered after Congress...

Police State Canada: Communications Security Establishment Canada (CSEC) Runs Massive Domestic Spying Program

On the basis of secret government directives, Canada’s national security apparatus is conducting mass surveillance of Canadians parallel to, if not directly patterned after,...

Unprecedented Coalition Pushes Back on Government’s Domestic Spying

The national security establishment’s latest domestic spying scandal has galvanized a lightning-fast response where nearly 100 civil liberties-minded advocacy groups and technology companies are...

Obama Terms Massive Domestic Spying Programs as 'Modest Encroachment'

Responding to the revelations detailing the US government's massive surveillence programs in recent days, President Obama on Friday said called the two programs--one which...

Obama Terms Massive Domestic Spying Programs as 'Modest Encroachment'

Responding to the revelations detailing the US government's massive surveillence programs in recent days, President Obama on Friday said called the two programs--one which...

‘Beyond Orwellian’: Outrage Follows Revelations of Vast Domestic Spying Program

Outrage and rebuke are flying after explosive news broke late Wednesday that the National Security Agency, claiming authority under the Patriot Act and using a secret court order, has demanded (and been receiving) millions of phone records from Verizon which include all the company's "telephony metadate" for all its US-based customers over a three month period.

June 6-9: Bilderberg Meeting behind Closed Doors. On the Agenda: Domestic Spying, Diffusing Social...

Its four-day meeting occurs annually. It’s a rite of spring. British political economist Will Hutton calls the group the “high priests of globalization.” Powerful...

Domestic Spying and Social Media: Google, Facebook “Back Doors” for Government Wiretaps

The Obama administration is close to announcing its support for a law that would force Google, Facebook and other Internet communications companies to build...

Space-Based Domestic Spying: Kicking Civil Liberties to the Curb

By Tom Burghardt | Last month, I reported that the Department of Homeland Security’s (DHS) space-based domestic spy program run by that agency’s National Applications...

Domestic spying quietly goes on

By Bradley Olson | With Congress on the verge of outlining new parameters for National Security Agency eavesdropping between suspicious foreigners and Americans, lawmakers...

Domestic Spying Far Outpaces Terrorism Prosecutions

By Richard B. Schmitt | The number of Americans being secretly wiretapped or having their financial and other records reviewed by the government has...

An overview of the NSA’s domestic spying program

In Wednesday's Wall Street Journal, Siobhan Gorman pulled together the disparate threads of reporting on what's known of the NSA's secret domestic spy program,...

NSA’s Domestic Spying Grows

Five years ago, Congress killed an experimental Pentagon antiterrorism program meant to vacuum up electronic data about people in the U.S. to search for...

Domestic spying inquiry restarted at DoJ

By DEVLIN BARRETT The Justice Department has reopened a long-dormant inquiry into the government's warrantless wiretapping program, a major policy shift only days into the...

CIA, US Marshals engaged in domestic phone spying — report

CIA technology used to scan data from cellphones overseas has allegedly been used by the US Marshals Service to spy on phones in the...

From NSA Spying and VIPR Sweeps to Domestic Drones: A Round-Up of the Police...

Like clockwork, we’ve ticked back to the annual government shutdown scare that invariably dominates news headlines and sends stocks seesawing for a few scant weeks until, at the very last moment, the nation is miraculously pulled from the brink of disaster. It’s always an entertaining show, with both Republicans and Democrats doing their best to […]

US has no 'domestic' spying program

It was President Obamaâ„¢s sixth appearance on Jay Lenoâ„¢s show ” his fourth as president. US President Barack Obama has denied on a television...

Anti-War Activists Labeled Domestic Terrorists: Military Spying Exposed

Port Militarization Resistance (Photo: Brendan Maslauskas Dunn) ...

Twitter turns tables on UK govt & MI5, blocking access to thwart online spying

Twitter has blocked the British government and its domestic spy agency MI5 from accessing data on potential terrorist threats in a bid to tackle...

No Safe Harbor: How NSA Spying Undermined US Tech and Europeans’ Privacy

Danny O'Brien The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and...

Head of UK’s domestic spy agency calls for greater surveillance powers

The head of the United Kingdom's domestic spy agency, MI5, calls for more surveillance powers to security service agents to monitor electronic communications and...

How Corporations and Law Enforcement Are Spying on Activists

In August 2010, the Federal Bureau of Investigation's Domestic Terrorism Analysis Unit distributed an intelligence bulletin to all field offices warning that environmental extremism...

The Government Spent a Lot of Time in Court Defending NSA Spying Last Year

NADIA KAYYALI EFF was suing the NSA before it was cool. We filed our first lawsuit against the NSA for mass spying in 2008,...

The coming militarization of domestic police forces

Andre Damon  Under the pretense of reining in police militarization in the aftermath of the crackdown on protests in Ferguson, Missouri, the Obama administration has...

The CIA spying scandal and the disintegration of American democracy

Tom Carter Last Thursday, the US Department of Justice quietly announced that it would not launch a criminal investigation following the revelation in March that...

Counter-Intelligence: Spying Deters Democracy

Kim Petersen Scott Noble is an extraordinarily productive filmmaker who has built up an impressive treasure trove of documentaries at Metanoia Films. The films deal with...

Is the “Common Core” Educational Standards Initiative Part of a Domestic Spy Program? The...

Timothy Alexander Guzman, Silent Crow News – In 2009, US President Barack Obama and the Secretary of Education Arne Duncan had announced the “Race to the Top” initiative to reform the American education system. But there is a lot more to know about the new education standards known as the ‘Common Core State Standards Initiative (CCSSI).’ It is not about educating students for a better life or for a successful career, it sounds more like a domestic spy program. In a 2010, Arne Duncan gave a speech on Obama’s education agenda at the UNESCO headquarters in Paris and said:

The North Star guiding the alignment of our cradle-to-career education agenda is President Obama’s goal that, by the end of the decade, America will once again have the highest proportion of college graduates in the world. That goal can only be achieved by creating a strong cradle-to-career continuum that starts with early childhood learning and extends all the way to college and careers 

It is bizarre just to think that the government may want to continue to monitor your progress after high school right through your first job or career.  What happens if you don’t get along with the manager? Will they send you to a re-education camp? Of course I am being sarcastic, but with Washington’s growing police state, who knows? The Department of Education (DOE) released in October 2012 an “Issue Brief” titled ‘Enhancing, Teaching and Learning through Educational Data Mining and Learning Analytics.’ The Educational data mining procedures were described as a program to track student’s progress through their behavioural patterns so that school officials can predict which career path they will most likely choose or if there is enough evidence to suggest that they were most likely to drop out of school. The Issue Brief clearly states how data mining technology would operate:

A student learning database (or other big data repository) stores time-stamped student input and behaviors captured as students work within the system” and “A predictive model combines demographic data (from an external student information system) and learning/behavior data from the student learning database to track a student’s progress and make predictions about his or her future behaviors or performance, such as future course outcomes and dropouts

The US Department of Education’s Common Core standards does raise an important question. Why does the federal government want student’s personal information in order to achieve educational success? The DOE’s “Issue Brief” also stated how predictions must be proven. If they cannot prove that their assessment is correct, then they may collect even more data on the student’s behalf if necessary:

Policymakers bear an ethical responsibility to investigate the validity of any predictive model that is used to make consequential decisions about students. Policymakers must be able to explain the evidence for predictions and the actions taken by the computer system on the basis of learning analytics. Analysts conducting data mining may discover patterns or associations that were previously unknown and that involve sensitive information (e.g., teacher performance or student’s family situation), and validating them with external observations and further data collection will be needed

The 2009 Stimulus bill included the State Fiscal Stabilization Fund (SFSF) which offered governors bailout money for state educational purposes such as the ‘Race to the Top’ program. Competitive grants were offered as an incentive for states to accept Common Core standards for their schools.  To be eligible, states had to adopt standards and assessment procedures provided by the DOE to prepare students for success in college and in their chosen careers after they graduate from high school. It requires states to build student databases such as the Statewide Longitudinal Data Systems (SLDS) to track over “400 data points” including behavior, disciplinary history, family problems, interests and other personal information. Data will then be given to the “Smarter Balanced consortium” which is a state-led consortium working in collaboration with educators, researchers, policymakers, community groups and government bureaucrats to develop assessments that measures student progress toward college and their chosen careers. It is part of the national testing standards that sends completed assessments to the Department of Education so that they can share data with public and private interests.  One particular area concerning the State Fiscal Stabilization Fund’s recommendation is to establish a student data system starting from pre-K. Then States would be eligible to receive funds if they followed the basic requirements:

As part of its application for initial funding, the state must assure that it will take actions to: (a) increase teacher effectiveness and address inequities in the distribution of highly qualified teachers; (b) establish and use pre-K-through-college and career data systems to track progress and foster continuous improvement; (c) make progress toward rigorous college- and career-ready standards and high-quality assessments; and (d) support targeted, intensive support and effective interventions to turn around schools identified for corrective action and restructuring

The standards focus on concepts and procedures of certain areas of concentration for example, English or math. However, each standard is labeled with an alphanumeric code for identification purposes, which is then used to identify which standards are successfully met by the lessons taught to the student. By using a coding system it allows them to track which standards were applied to the student whether in the classroom or through online learning (where third party apps can also keep a record). It can also track how much time was spent on each standard.

Who is behind “Common Core”? 

Common Core Standards was supported and funded by the Bill and Melinda Gates Foundation, Pearson Publishing Company, the Charles Stewart Mott Foundation, the Carnegie Corporation of New York, several Governors and school officials from various states. It is also funded by Rupert Murdock’s News Corp called ‘Amplify Education.’ In 2012, Bob Corcoran of General Electric donated more than $33 million to the Common Core project. In 2013, Reuters reported who funded the $100 million project in an article titled ‘K-12 student database jazzes tech startups, spooks parents’:

The database is a joint project of the Bill & Melinda Gates Foundation, which provided most of the funding, the Carnegie Corporation of New York and school officials from several states. Amplify Education, a division of Rupert Murdoch’s News Corp, built the infrastructure over the past 18 months. When it was ready, the Gates Foundation turned the database over to a newly created nonprofit, inBloom Inc, which will run it.

States and school districts can choose whether they want to input their student records into the system; the service is free for now, though inBloom officials say they will likely start to charge fees in 2015. So far, seven states – Colorado, Delaware, Georgia, Illinois, Kentucky, North Carolina, and Massachusetts – have committed to enter data from select school districts. Louisiana and New York will be entering nearly all student records statewide

The article also stated how the database would operate on a local and federal level:

But the most influential new product may be the least flashy: a $100 million database built to chart the academic paths of public school students from kindergarten through high school. In operation just three months, the database already holds files on millions of children identified by name, address and sometimes social security number. Learning disabilities are documented, test scores recorded, attendance noted. In some cases, the database tracks student hobbies, career goals, attitudes toward school – even homework completion.

Local education officials retain legal control over their students’ information. But federal law allows them to share files in their portion of the database with private companies selling educational products and services

The Bill and Melinda Gates Foundation and their ‘inBloom’ database were one of the data mining programs associated with Common Core. But it has recently failed because New York state legislature forced its state education bureaucrats to shut down the Gates-funded project amid growing opposition of parents and privacy advocates. It was designed to collect student data and store the information in a cloud service and make it available to commercial vendors and apps so that teachers can eventually track student’s progress. Bill Gates and his project has failed and that is only one battle both parents and privacy advocates has won and that is a good start. But it is only one battle, with many more to come. Although the Bill Gates project inBloom has failed, the DOE will still manage to track students.

Collecting Data from “Pre-K through workforce”

Common Core standards require an invasion of privacy in order to educate students, but it comes at a cost. It should concern both students and their families. Will Estrada, director of federal relations for the Home School Legal Defense Association (HSLDA) told World Net Daily what common core’s data collection is capable of achieving once it is fully implemented. He said “It’s their likes and dislikes, grade-point average all the way through school, their home situation, health questions,” he said. “It’s an incredibly invasive collection of information that they are trying to collect in what they call P-20, or pre-K through workforce.”

Private interests in Washington decided back in 2007 to move full force in an attempt to nationalize educational standards and curriculums, which started the early development of the Common Core project. After the stimulus bill was signed in 2009, the DOE’s “Race to the Top” program was born.  The DOE made ‘Race to the Top’ grants competitive so that states would jump aboard rapidly and agree to implement Common Core standards that would be aligned with mandatory national tests. Most US states adopted Common Core for federal money without any approval or votes from legislators’ and without public knowledge.  Parents and communities were not even aware that their states and their elected representatives had adopted Common Core in the first place.  Besides data collection, the education Common Core provides is based on rigorous test taking procedures and memorization. Parents in Brooklyn, New York pulled their children in protest against the standardized tests saying that it brought unnecessary stress onto their children.

Washington’s goal is for Common Core to be implemented in every state by 2015. So far 44 states adopted Common Core standards although it has been an uphill battle for Washington’s education plan, especially when it comes to privacy concerns regarding students’ personal data. With a majority of states adopting Common Core Standards, it seems that there is an uphill battle for the growing anti-common core movement as well. Will parents, privacy advocates and even teachers who oppose Common Core continue the battle well into the future? I believe they will, especially when it involves their children’s education. What is the real agenda behind Common Core? Does collecting personal data so that bureaucrats can analyze your progress over a period of time improve your chances of getting a better education and a career?  After all, they can barely create any new jobs for recent college graduates, yet Secretary Duncan says the US will have the “highest proportion of college graduates” in the world. With NSA revelations spying on the entire planet, it would not surprise me that the Department of Education is setting the stage for a domestic spy program on a personal level.

‘Biggest yet’: Greenwald to publish names of Americans whom NSA is spying on

Glenn Greenwald, who helped Edward Snowden leak sensitive documents about the National Security Agency spying on its citizens, says he’s set to publish his...

Surveillance, Cyberspying, and the Fig Leaf of Democracy

NSA deservedly takes its place with the CIA (like the New Deal in one respect, there are a number of agencies in the alphabet...

Jimmy Carter Says The NSA Are Spying On Him

Andre Damon  RINF Alternative News Jimmy Carter, the 39th president of the United States, told reporters this week that he believes that the National Security Administration...

Malware “Industrialises Spying”: The NSA has “Automated its Spying Operations”

Jonathan Cook  RINF Alternative News The report from Glenn Greenwald and Ryan Gallagher, based on the Edward Snowden leaks reveals that the NSA — surprise, surprise...

CIA Intimidation, Obstruction and Spying on US Congress: Obama’s “High Crimes and Misdemeanors”

Joseph Kishore and Barry Grey  RINF Alternative News The speech delivered Tuesday on the Senate floor by Senator Dianne Feinstein provides clear and direct evidence of...

Forget Metadata … The NSA Is Spying On EVERYTHING

Don’t Get Too Distracted By The Details … The Government Is Spying On ALL Of Your Digital Communications Reprinted with permission The NSA’s spying on everyone’s...

Snowden defends his exposure of NSA’s mass spying in online chat

Ed Hightower  RINF Alternative News NSA whistleblower Edward Snowden answered questions online Thursday posted by an audience via Twitter. The questions ranged from the openly hostile...

Obama’s NSA “Reform” Defends Illegal Spying

Bill Van Auken  RINF Alternative News The Obama White House is preparing a National Security Agency “reform” package that is aimed at legitimizing and institutionalizing the...

US government signals it will not sign no-spying agreement with Germany

Christoph Dreier  RINF Alternative News According to the Süddeutsche Zeitung, negotiations on a no-spying agreement between the United States and Germany look set to fail. The...

500 Years of History Shows that Mass Spying Is Always Aimed at Crushing Dissent

Washington's Blog No matter which government conducts mass surveillance, they also do it to crush dissent, and then give a false rationale...

It’s not paranoia – NSA is spying on everyone

Eugene Robinson President Barack Obama's anticipated reform of the National Security Agency's practices needs to go beyond ending the mass surveillance of...

We’ve Known for Some Time that the NSA Is Spying On Congress

Washington's BlogJanuary 8, 2014 The NSA pretty much admitted to spying on Congress this week. It's not...

Paul: NSA spying unconstitutional

Senator Rand Paul says his lawsuit would allow ordinary people to object having a single generalized warrant cover large numbers of cell phones.Senator Rand...

NSA spying ups anti-US sentiment: Sen.

US Senator Bernie Sanders says the surveillance programs by the National Security Agency caused an increase in anti-American sentiment across the world. In a letter...

US Senator Wants to Know: Is the NSA Spying on Congress?

Perhaps if the documented mis-truths spoken by General Keith Alexander, director of the National Security Agency, had not been so flagrant or if the...

Ruling in favor of US spying appealed

The American Civil Liberties Union and the New York Civil Liberties Union have filed a notice of appeal challenging a US federal judge’s ruling...

War From Above: Domestic Drones Patrolling the Skies of America

Richard Hugus RINF Alternative News Drone aircraft, which we first heard of as weapons of war used by the United States in foreign lands, are now...

Former NSA Chief: Obama Should Keep Spying, Ignore Panel Recommendations

Hayden told USA Today that "there have been no abuses" of the NSA's surveillance. (Screengrab)General Michael Hayden, former head of the CIA and the...

Domestic Drone Testing Coming to a State Near You

An unmanned aerial vehicle flies at the unmanned aircraft flight station at Oklahoma State University in Stillwater, Okla., on Dec. 12. (Photo: AP...

Domestic Drone Testing Sites… Coming to a State Near You

Public institutions in six states have been selected to test commercial drones as part of a Federal Aviation Administration plan to integrate thousands of...

Swedish intelligence service spying on Russia for US National Security Agency

By Jordan Shilton 30 December 2013 Documents released by Edward Snowden reveal that Sweden's National Defence Radio Establishment (FRA) has been collecting large quantities of communications data...

Judge Falls for The Big Lie About NSA Spying

Even Before 9/11, NSA Knew In Real-Time Which Countries Both Parties to Phone Calls Were...

White House Panel Slams NSA, Says Mass Spying Is Unnecessary

Even Commission Which Obama Created Says We Should Rein In the NSA … and Shouldn't...

Obama advisory committee whitewashes US spying programs

By Joseph Kishore 19 December 2013 A report released Wednesday by the Obama administration's hand-picked presidential advisory panel on the National Security Agency's (NSA) spying programs consists...

“Almost Orwellian”: US Judge Indicts NSA Spying

A ruling handed down by a United States District Court judge in Washington Monday found the massive spying operation in which the National Security...

‘Snowden Vindicated’: Judge Rules Against ‘Indiscriminate’ NSA Spying

NSA whistleblower Edward Snowden (Photo: The Guardian)In the biggest legal blow to the National Security Council since the dragnet spying scandal broke in June,...

‘Snowden Vindicated’ as Judge Rules Against ‘Indiscriminate’ NSA Spying

In what is being billed as the biggest legal blow to the National Security Council since the dragnet spying scandal broke in June, a...

Review panel on spying ‘disturbing’

A White House review panel�™s recent conclusion that the National Security Agency should continue a program to collect data on every phone call made...

Canadian Spy Agency Establishes Covert Surveillance Operations Worldwide as Part of NSA Global Spying...

A leaked top-secret US National Security Agency (NSA) memo has provided evidence, straight from the horse's mouth, of the extent to which the Communications...

White House Calls for Cosmetic Changes to Illegal NSA Spying

A hand-picked White House-sponsored panel is due to submit recommendations to the Obama administration this weekend as part of efforts to ensure the continuation...

White House-backed panel to call for cosmetic changes to illegal spying programs

By Joseph Kishore14 December 2013 A hand-picked White House-sponsored panel is due to submit recommendations to the Obama administration this weekend as part of...

Obama panel: NSA should keep spying

Demonstrators rally at the U.S. Capitol to protest spying on Americans by the National Security Agency, as revealed in leaked information by former NSA...

NSA Dragnet: Snowden Leak Reveals Mass Spying During G8, G20 Summits

US may have illegally monitored foreign dignitaries as well as wider populationSteve WatsonInfowars.comNov 28, 2013 The latest revelation to come from the Edward Snowden leaks...

NSA spying cost US companies $35bn

U.S. companies may be hesitant to invest in cloud computing due to concerns over NSA surveillance. International concern about digital spying by the National Security...

Is your TV spying on YOU? It sounds like science fiction but many new...

Guy AdamsDaily Mail.co.ukNovember 26, 2013 You are sitting in bed in your pyjamas, drinking a cup of cocoa. A loved one lies next to you,...

Australian public broadcaster threatened over Indonesia spying revelations

By Will Morrow25 November 2013 A week after the Australian Broadcasting Corporation (ABC) published revelations of Australian spying on the Indonesian president, his wife...

NSA doing FBI’s spying bidding

The Federal Bureau of Investigation (FBI) provides the National Security Agency (NSA) with a technical and legal infrastructure that permits the spying agency to...

US court approved wider NSA spying

The court let the NSA to spy after it transpired it systematically exceeded the limits of a smaller program. A secret US intelligence court allowed...

New Delhi downplays evidence of extensive NSA spying targeting India

By Wasantha Rupasinghe14 November 2013 India's Congress Party-led government has failed to make any official protest to Washington over revelations that the US National...

US, EU Citizens Reject Unchecked Spying

A majority of Europeans and Americans are strongly opposed to their governments' covert surveillance of their own residents and those of allied countries, according...

Is Homeland Security Building a Mercenary Unit? DHS to Hire “Top Secret” Domestic Security...

The Department of Homeland Security is to spend $19 million dollars on a private security force in Wisconsin and Minnesota, an armed unit that...

NSA Spying: Get It All

NSA Spying: Get It Allby Stephen LendmanNSA spies at home and abroad. Anything goes is policy. Obama exceeds what his predecessors began. NSA's pre-9/11 incarnation was a shadow of today's monster.Privacy no longer exists. Advanced technology lets NSA ...

DHS to Hire “Top Secret” Domestic Security Force

Is the Department of Homeland Security building a mercenary unit? Paul Joseph Watson The Department of Homeland Security is to spend $19 million dollars on a...

US, UK governments defend police-state spying

By Patrick Martin4 November 2013 The US and British governments have stepped up their campaign of repression and victimization against Edward Snowden and his...

Fresh revelations of Canada’s role in NSA’s global spying network

By Dylan Lubao and Keith Jones2 November 2013 In partnership with the US National Security Agency (NSA), the Canadian state's eavesdropping agency conducts covert...

Is NSA Spying Really About Blackmail?

A revealing page-one article in today's New York Times (“Tap on Merkel Provides Peek a Vast Spy Net”) reports on how the NSA's global...

US Senate panel votes for NSA spying

The Senate Intelligence Committee has passed a bill which would allow the National Security Agency to continue to collect Americans' phone records and track...

The global NSA spying scandal

30 October 2013 Over the course of the past week, the Obama administration has been rocked by an escalating international diplomatic scandal sparked by...

Spying Scandal Makes Clear That Europe Must Declare Independence

http://www.truthdig.com/report/item/spying_scandal_makes_clear_that_europe_must_declare_independence_20131029/ Posted on Oct 29, 2013 ...

Government May Stop Spying On World Leaders But Not You

Sen. Feinstein opposed to practice of snooping on leaders short of emergency decree by government. Kurt...

Snowden Leaks Force Senate Intelligence Chair to Change Tune on NSA Spying

If Feinstein is “totally opposed” to the surveillance of foreign leaders, why has she given a blank check for such surveillance of most Americans,...

‘Time to reform surveillance state’: Massive ‘Stop Watching Us’ rally challenges NSA spying

Published time: October 26, 2013 23:49 A demonstarator holds up a sign at the "Stop Watching Us: A Rally Against Mass Surveillance" march...

Thousands March in D.C. Against NSA Domestic Surveillance

Kit DanielsInfowars.comOctober 26, 2013 Thousands protested unconstitutional NSA surveillance at the National Mall in Washington, D.C....

Business as Usual: Foreign Spying by NSA for Corporate Espionage

Infowars.comOctober 25, 2013 NSA spied on German and French business communications, which may produce the necessary...

Want to know who’s spying on you online? There’s an app for that

Nick HeathZDNetOctober 25, 2013 Would you like to know who's watching which websites you visit? Well...

NSA spies to ‘smother domestic unrest’

The United States wants to smother domestic unrest in the country by the National Security Agency's vast spying projects, a political analyst says. “To smother...

NSA spies to ‘smother domestic unrest’

The United States wants to smother domestic unrest in the country by the National Security Agency's vast spying projects, a political analyst says. “To smother...

Only intl. community can stop US spying

American activist Daniel Patrick Welch says that only the international community can bring US spying activities to a halt. œI think the stopping point is...

NSA director defends spying efforts

Gen. Keith B. Alexander US National Security Agency Director Gen. Keith B. Alexander has once again defended agency™s surveillance programs, saying he sees no...

US court extends spying on phone calls

The Foreign Intelligence Surveillance Court in the US has ruled that the National Security Agency can continue its secret collection of phone records of...

Hillary Clinton: we need to talk sensibly about spying

Saeed Kamali Dehghan, Nicholas Watt and Alan Travis The GuardianOct. 11, 2013 Hillary Clinton has called for...

Spying for Economic Gain: Canada’s CSEC Targeted Brazilian Energy Firms

A new revelation based on documents leaked by former NSA contractor Edward Snowden that appeared on a Brazilian investigative news show on Sunday night...

Government Lies About Spying Again and Again … Here’s What’s REALLY Going On

Government Officials Fail Honesty Standards of 12 Year Olds Government leaders have been caught in lie after lie about spying … but keep on spouting new lies: The...

NSA: Rogue Spying Writ Large

NSA: Rogue Spying Writ Large by Stephen Lendman No nation in human history ever harmed more millions of people more grievously than America. None ever did it...

Canada: Cover-Up on CSEC’s Spying and the Police-State Apparatus

Even as documents leaked by whistle-blower Edward Snowden continue to surface, further revealing the massive scope and scale of the US National Security Agency's...

NSA Tapping Internet Backbone, Spying On Our Social Networks

New NSA Spying Revelations Senator Diane Feinstein unintentionally confirmed that the NSA is tapping into the Internet's very backbone: Upstream collection… occurs when NSA obtains...

NSA’s Spying On Metadata Violates Our Freedom of Association

Why You Should You Care If the Government Spies On Your Metadata The government has sought to “reassure” us that it is only tracking “metadata”...

NSA chief defends spying on Americans

Collection of bulk phone records by US intelligence agencies is essential to preventing terrorist attacks and œwrong decisions” by Congress could curb this power,...

In Stinging Rebuke at UN, Brazilian President Rails Against NSA Spying

Brazilian president Dilma Rousseff speaks at the United Nations general assembly. (Photo: Spencer Platt/Getty Images)In a furious critique that opened the UN's General Assembly...

Brazil’s president condemns NSA spying

Colum LynchThe Washington PostSeptember 24, 2013 Brazilian President Dilma Rousseff on Tuesday delivered a stinging rebuke...

The Many Ways the Government Is Spying On Us

The Government Is Spying On Us Through Our Computers, Phones, Cars, Buses, Streetlights, At Airports...

Spy Agencies Are Doing WHAT? “The Government is Spying on Essentially Everything We Do

New Revelations Are Breaking Every Day Revelations about the breathtaking scope of government spying are coming so fast that it's time for an updated...

The NSA Domestic Surveillance Lie

“And so in light of the changed environment where a whole set of questions have been raised, some in the most sensationalized manner possible,...

NSA Letter to Families of Employees Reassures Spying is in the Public’s Interest

Letter claims 54 terrorists busted with aid of NSA Adan SalazarInfowars.comSept. 20, 2013 In efforts to quell...

NSA spying on international payments

The US National Security Agency (NSA) widely monitors international payments and financial transactions, the latest revelations about the agency's deep invasion of privacy show....

NYPD Undercover Spying Unit Revealed As Extensive, Far-Reaching

Jessica Desvarieux, TRNN PRODUCER: Welcome to The Real News Network. I'm Jessica Desvarieux in Baltimore.Associated Press reporters Matt Apuzzo and Adam Goldman have uncovered...

Citing Snowden leaks, FISA judge orders release of rulings authorizing domestic surveillance

By Thomas Gaist 16 September 2013 On Friday, Foreign Intelligence Surveillance (FISA) Court Judge Dennis Saylor ruled in favor of the American Civil Liberties Union (ACLU) and...

NSA gets data from Germany’s domestic security agency

rt.comSeptember 14, 2013 Germany' Federal Office for the Protection of the Constitution regularly hands over classified...

NSA Phone-Records Spying Said to Violate Rules for Years

Chris StrohmBloombergSeptember 11, 2013 The U.S. National Security Agency violated rules on surveillance of telephone records...

Mexico leader to discuss alleged U.S. spying with Obama

AFPSept. 4, 2013 Mexican President Enrique Pena Nieto said on Wednesday he would voice concerns about...

Former Salt Lake Mayor: NSA’s Olympics Spying ‘Scandal of the Century’

Former mayor decries unwarranted spying as tyrannical, says citizens should be outraged Adan SalazarInfowars.comAugust 27, 2013 Rocky...

NSA Analysts Intentionally Abused Spying Powers Multiple Times

Chris Strohm Bloomberg August 23, 2013 Some National Security Agency analysts deliberately ignored restrictions on their authority to spy on Americans multiple times in...

Lawless NSA Spying Exposed

Lawless NSA Spying Exposed by Stephen Lendman It's longstanding. It's no secret. It's well known. Now we know more. The Electronic Frontier Foundation (EFF) deserves credit. On...

Rand Paul: NSA spying ‘unconstitutional’

US Senator Rand Paul has said that much of the US National Security Agencyâ„¢s spying program is unconstitutional as he urged congressional hearings on...

Institutionalized US Spying: More Than NSA Involved

Institutionalized US Spying: More Than NSA Involved by Stephen Lendman Washington has 16 known US spy agencies. NSA and CIA are best known. Perhaps few Americans...

Americans urge oversight of US spying

A majority of Americans say oversight on NSAâ„¢s spying is inadequate.Results from a new poll have shown that the majority of American people believe...

You Won’t BELIEVE What’s Going On with Government Spying on Americans

New Revelations Are Breaking Every Day Washington’s Blog August 17, 2013 Revelations about the breathtaking scope of government spying are coming so fast that...

NSA Spying: The Three Pillars of Government Trust Have Fallen

Cindy Cohn and Mark M. Jaycox eff.org August 16, 2013 Photo: Bernard Goldbach and the ACLU With each recent revelation about the...

US court: Oversight of spying limited

US District Judge Reggie B. Walton The leader of the secret court in the US which is supposedly responsible to oversee the US governmentâ„¢s...

US spy chief picked to rein in spying

James Clapper, the US spy master who created controversy by lying to Congress about domestic surveillance, has been picked to head an Å“independent group”...

Is Government Just Spying Like a Giant Peeping Tom … Or Is It Actively...

Washington’s BlogAugust 14, 2013 You know that the NSA and other government agencies are spying on all...

Kerry defends US spying on Brazilians

US Secretary of State John Kerry (R) and Brazilian Foreing Minister Antonio Patriota in Brasilia on August 13, 2013.US Secretary of State John F....

NSA turning Internet into spying tool

Another burst of sunlight permeated the National Security Agency's black box of domestic surveillance last week. According to the New York Times, the NSA is...

Ex-NSA chief: US spying will get worse

Former director of the US National Security Agency, Gen. Michael Hayden, The former director of the US National Security Agency, Gen. Michael Hayden, has...

Kerry May Receive Chilly Reception in Latin America Over NSA Spying

Deb RiechmannAPAugust 11, 2013 Secretary of State John Kerry’s trip to Colombia and Brazil this week...

Obama not to reduce spying

Weâ„¢ve spent much of the afternoon detailing some of President Obamaâ„¢s statements concerning his response to the NSA surveillance revelations, combined with some of...

Obama On NSA Spying: “I Would Be Concerned Too, If I Weren’t Inside The...

Zero HedgeAugust 11, 2013 In what is as close to saying ‘trust us, we’re from the government,’ as...

NSA Spying: Worse Than You Think

NSA Spying: Worse Than You Think by Stephen Lendman It's ugly. It's lawless. It's out-of-control. It''s worse than most people think. It's not getting better. It's...

Obama Spurns NSA Spying Reform

Obama Spurns NSA Spying Reform by Stephen Lendman Huey Long once said fascism will arrive "wrapped in an American flag." In "Friendly Fascism," Bertram Gross (1912...

Obama’s Response To NSA Was To Appease The Public, Not Reduce The Spying

We’ve spent much of the afternoon detailing some of President Obama’s statements concerning his response to the NSA surveillance revelations, combined with some of the documents released by the administration.

Obama Says He’ll “Reform” NSA Spying … Should We Believe Him?

Let’s Look at the Track Record President Obama just announced that he’s making “reforms” to the NSA spying program. Should we believe him? Obama’s claim this week...

Latest NSA Revelations Debunk Obama's "No Spying on Americans" Claim

President Obama with Tonight Show host Jay Leno. (Screenshot)"There is no spying on Americans," said President Obama to talkshow host Jay Leno on Tuesday...

NSA not ‘spying’ on Americans, just ‘overcollecting’ their data

An NSA source has admitted the agency’s data collection technology makes it impossible to intercept communication with foreigners without gathering data on US citizens. This counters Obama’s claim that US surveillance only concerns ‘terrorist threats.’

Obama calls spying ‘mining information’

US President Barack Obama denies that the US government is spying on Americans and other people in the world because he Å“doesnâ„¢t call it...

Obama tries to cover up spying scandal

An American journalist says US President Barack Obama is not only lying about the countryâ„¢s massive spying programs but trying to cover it up...

Hypocrite in Chief? 5 Limits on NSA Spying that Senator Obama Supported But President...

When the House of Representatives recently considered an amendment that would have dismantled the NSA’s bulk phone records collection program,...

Government Officials Hoping Terror Threat ‘Diverts Attention’ From NSA Spying Scandal

news.firedoglake.comAugust 6, 2013in Washington are celebrating the recent announcement of a terror threat...

Ron Paul: Why Won’t They Tell Us the Truth About NSA Spying?

Ron PaulInfowars.comAugust 5, 2013 In 2001, the Patriot Act opened the door to US...

DEA Agents Are Told To Cover Up Spying Program Used Against Americans

John Shiffman and Kristina Cooke Reuters August 5, 2013 A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants...

FBI gives telecom provider spying devices

Photo: Glyn Baker via Wikimedia Commons Citing the authorization of the move under the Patriot Act,...

Berlin axes Cold War-era spying accords with US, Britain

AFPAugust 2, 2013 Germany said Friday it had cancelled surveillance accords dating from the late 1960s...

Amid Growing Concern on Spying, a Vague Terror Warning

Several US missions in predominantly Muslim countries usually open on Sundays. (Photo: EPA)The US State Department, citing unspecified security concerns, has ordered many of...

Obama Defends NSA Domestic Surveillance

UPIAugust 1, 2013 The Obama administration says it takes privacy criticisms over its surveillance programs seriously...

NSA Spying Directly Harms Internet Companies, Silicon Valley, California … And the Entire U.S....

Mass surveillance by the NSA may directly harm the bottom of line of Internet companies, Silicon Valley, California … and the entire national economy. Money News points out: The...

'Ad Hoc Transparency': Obama Admin Declassifies NSA Phone Spying Docs

The Obama administration declassified a series of documents on the National Security Agency's extensive surveillance of Americans' phone data on Wednesday,The Office of the Director...

'Surprise' Obama Visit Bumps Critical Hearing on NSA Spying

A widely anticipated Wednesday hearing from critics of the NSA on the floor of the House has been suddenly pulled after Obama called a...

America’s Real Subversives — The FBI and NSA, Spying on the Public

As the 50th anniversary of the 1963 March on Washington approaches, commemorating that historic gathering where Martin Luther King Jr gave his famous "I have a dream" speech, it is important to recall the extent to which King was targeted by the government's domestic spying apparatus.

America's Real Subversives — The FBI and NSA, Spying on the Public

July 29, 2013  | ...

‘US lawmakers, victims of NSA spying’

US lawmakers campaign to curb the governmentâ„¢s massive NSA spying program is because congressmen could be the main victims of the program themselves, a...

House Votes to Continue Spying on Americans

David AlexanderReutersJuly 25, 2013 A U.S. spy program that sweeps up vast amounts of electronic communications...

Germany and the NSA: Spying BFFs

A demonstration against NSA surveillance at the U.S. Army’s Dagger Complex, thought to be an NSA listening station, near Griesheim, Germany. (Photo: Joachim S....

Mood shifting, Congress may move to limit NSA spying

David Lightman, Kate Irby and Ben Kamisar McClatchy July 21, 2013   Congress is growing increasingly wary of controversial National Security Agency domestic surveillance programs,...

Spying on Americans, Cellphones, Emails: The NSA is on the Line – All of...

When intelligence historian Matthew Aid read the USA Today story last Thursday about how the National Security Agency was collecting millions of phone call...

NSA Spokesman Accidentally Admits that the Government Is Spying On Virtually All Americans

NSA Spying: A Matter of Degree We have long noted that the government is spying on just about everything we do. The NSA has pretended that...

NSA deputy director admits to broader spying

  By ...

NSA deputy director admits to broader spying

  By ...

Whatever Happened to MoveOn.Org? Progressives and NSA Spying

(Photo: frederic.jacobs / Flickr)Ever since the Edward Snowden story about the NSA spying program erupted, there has been a disturbingly eerie silence from progressives. Yes, perfunctory...

The Government Is Spying On ALL Americans’ Digital and Old-Fashioned Communications

Washington’s Blog July 12, 2013 Even now — after all of the revelations by Edward Snowden and other whistleblowers — spying apologists say...

Indignation Across Europe At Revelations of US Spying on Its Citizens

JAISAL NOOR, TRNN PRODUCER: Welcome to The Real News Network. I'm Jaisal Noor in Baltimore. As NSA whistleblower Edward Snowden continues to leak documents shedding...

Senate Set to Confirm New FBI Head Who OK'd Waterboarding, Defends Mass Spying, Indefinite...

At his confirmation hearing to head the FBI, former Bush administration Deputy Attorney General James Comey refused to criticize the broad, ongoing collection of...

Latin American Nations Upset Over NSA Spying, U.S. Interference

The Rio de Janeiro, Brazil-based newspaper O Globo reported on July 9 that former NSA contractor and whistleblower Edward Snowden had provided it with...

Brazil target of massive NSA spying operation

  By ...

Progressives and NSA Spying

Ever since the Edward Snowden story about the NSA spying program erupted, there has been a disturbingly eerie silence from progressives. Yes, perfunctory articles have been...

Government Spying Has Always Focused On Crushing Dissent … Not On Keeping Us Safe

Governments Spy On Their Citizens for Control and Power Top terrorism experts say that mass spying on Americans doesn’t keep us safe. High-level American government officials...

The New York Times and the NSA’s Illegal Spying

This article is excerpted from End Times: The Death of the Fourth Estate by Alexander Cockburn and Jeffrey St. Clair. (CounterPunch/AK Press: 2007). The first...

Documents Expose Predator Drones Spying Extensively in U.S.

Predator drones used by multiple agencies in domestic airspace could be armed. Kit Daniels Infowars.com July 4, 2013 U.S. Customs and Border Protection is...

Celebrate the Fourth by Standing Up to the NSA’s Domestic Spy Grid

Infowars.comJuly 3, 2013 A group of patriotic Americans in Utah have Fourth of July plans, not...

More Government Snooping: The Postal Service Is Spying On You Too!

The NSA isn't the only federal agency collecting your metadata. It turns out the good ole U.S. Postal Service has long been engaged in...

Director of national intelligence apologizes to senators for lying about NSA spying

US director of national intelligence James Clapper has sent a letter to senators in which he apologizes for providing “erroneous” information on NSA data...

New Revelations About NSA Spying Abroad Enrage European Officials

Saturday’s revelations by the German newspaper Der Spiegel that U.S. agents placed bugs in European Union officials’ offices in New York and Washington and hacked...

John Kerry: Spying on Allies is Not Unusual

Alan HallMail OnlineJuly 1, 2013 The US spying scandal deepened today as Secretary of State John...

The Government’s Mass Spying Is An Affront To Democratic Values. Let’s Also Not Pretend...

Washington’s BlogJune 29, 2013 Never mind the fact that — if the government’s spying was really...

More Evidence of Lawless US Spying

More Evidence of Lawless US Spying by Stephen Lendman Post-9/11, unprecedented domestic spying began. It did so extrajudicially. It continues under Obama. It's institutionalized. It's warrantless....

More Evidence of Lawless US Spying

More Evidence of Lawless US Spying by Stephen Lendman Post-9/11, unprecedented domestic spying began. It did so extrajudicially. It continues under Obama. It's institutionalized. It's warrantless....

Wesley Clark Says American People Like NSA Stasi State Spying On Them

Kurt NimmoInfowars.comJune 28, 2013 On Thursday, CNN’s Erin Burnett continued the establishment’s propaganda onslaught...

Global Backlash After Leaks Reveal Hypocrisy of US Spying

Three weeks since news broke that the National Security Administration is conducting a massive international surveillance operation, the US corporate media is still largely...

The Public Doesn’t Believe the NSA … Knows What’s Really Going On With Mass...

Washington’s BlogJune 27, 2013 The government keeps on lying about how it’s spying on Americans without authorization from...

Is the Government Spying On You Through Your Own Computer’s Webcam Or Microphone?

Washington’s BlogJune 25, 2013 We documented earlier today that - if you are near your smart...

Anti-War Activists Targeted as 'Domestic Terrorists'

Port Militarization Resistance (Photo: Brendan Maslauskas Dunn)Anti-war activists who were infiltrated and spied on by the military for years have now been placed on...

NSA Spying and Intelligence Collection: A Giant Blackmail Machine and “Warrantless Wiretapping” Program

Despite a stream of mendacious twaddle from President Obama, congressional grifters and spook agency mouthpieces like Office of the Director of National Intelligence head...

The SINGLE Most Important Step to Protect Yourself from Government Spying

Washington’s BlogJune 24, 2013 Given that the NSA is tapping into your phone calls and spying...

Spying on Americans: The Bush and Obama Administrations’ Justification for Mass Surveillance

The Government Actually DID Spy On the Bad Guys Before 9/11 … and the Boston Bombing Preface: The Bush and Obama administrations both claimed that...

NSA Spying on – and Blackmailing – Top Government Officials and Generals

washingtonsblog.com June 22, 2013 Source of 2005 New York Times Spying Expose Says Spy Agency Targeting Highest-Level American Leaders As we reported yesterday, NSA...

NSA Is Spying on – and Blackmailing – Top Government Officials and Generals

Source of 2005 New York Times Spying Expose Says Spy Agency Targeting Highest-Level American Leaders As...

FBI has received aviation clearance for at least four domestic drone operations

Craig WhitlockThe Washington Post June 21, 2013 The FBI has received clearance from federal aviation officials to...

Sheeple Waking Up To NSA Spying: Privacy Search Engines Booming

Google’s denials of involvement with NSA are unbelievableSteve WatsonInfowars.comJune 20, 2013 Google shares a...

Uncle Sam and Corporate Tech: Domestic Partners Raising “Digital Big Brother”

 A terrible formula has taken hold: warfare state + corporate digital power = surveillance state.  “National security” agencies and major tech sectors have teamed up to...

FBI's Mueller Admits Use of Drones in Domestic Surveillance

At a hearing of the Senate Judiciary Committee on Wednesday, FBI Director Robert Mueller (shown) testified that his agency has used drones to monitor...

FBI's Mueller Admits Use of Drones in Domestic Surveillance

At a hearing of the Senate Judiciary Committee on Wednesday, FBI Director Robert Mueller (shown) testified that his agency has used drones to monitor...

Do You Have ANY IDEA How Widespread the Spying Really Is?

Washington’s Blog June 20, 2013 Preface: Americans now know that the government is spying. But they still have no idea how many of...

The National Security Industrial Complex and NSA Spying: The Revolving Doors Between State Agencies...

When Edward Snowden, an employee of Booz Allen Hamilton — a military contractor based in McLean, Virginia - blew the whistle on the extent of U.S. global electronic...

Privacy Experts Use Naked Body Scanner Ruling In Effort To Stop NSA Spying

“In simple terms, a line has been crossed”Steve WatsonInfowars.comJune 18, 2013 A group of...

Snow job: If government spying on all Americans is such a good thing, then...

Mike AdamsNatural NewsJune 18, 2013 In the run up to the 2012 election, why didn’t Obama...

The Next NSA Spying Shoe to Drop: “Pre-Crime” Artificial Intelligence

Washington’s BlogJune 17, 2013 NSA spying whistleblower Edward Snowden’s statements have been verified.   Reporter Glenn Greenwald has...

The Deeper Meaning of Mass Spying in America: Political and Economic Consequences of ...

Introduction            The exposure of the Obama regime’s use of the National Security Agency to secretly spy on the communications of hundreds of millions of...

The Government’s Spying Is Not As Bad As The Whistleblower Said … It’s WORSE

Whistleblower Claims Validated … and Then Some The government is attacking whistleblower Edward Snowden by claiming that he was lying about the scope of the...

Democrats who attacked Bush for spying on citizens now justify Obama doing far worse

J. D. HeyesNatural NewsJune 16, 2013 I’ve never been much of a fan of the USA...

Jesse Ventura talks about life changing event, NSA spying and more

Infowars.comJune 15, 2013 Former Minnesota Governor Jesse Ventura recounts an interesting life-changing event, and gives his...

Domestic Spy Grid Designed Long Before 9/11

Kit DanielsInfowars.comJune 14, 2013 The domestic spy grid enslaving Americans’ personal data into perpetual,...

NSA Spying Is About Intimidating the Media, American Citizens

Blanket surveillance is about covering up government corruption and chilling free speech, not catching terrorists Alex...

Spies Without Borders: Using Domestic Networks to Spy on the World

Much of the U.S. media coverage of last week’s NSA revelations has concentrated on its impact on the constitutional rights of U.S.-based Internet users....

Spies Without Borders: Using Domestic Networks to Spy on the World

Much of the U.S. media coverage of last week’s NSA revelations has concentrated on its impact on the constitutional rights of U.S.-based Internet users....

22 Nauseating Quotes From Hypocritical Establishment Politicians About The NSA Spying Scandal

Establishment politicians from both major political parties are rushing to defend the NSA and condemn whistleblower Edward Snowden.

IRS Cancels Order for Spying Equipment

Elizabeth HarringtonCNS NewsJune 13, 2013 The Internal Revenue Service (IRS) has cancelled its purchase order for...

European Governments in Crisis over US Spying Revelations

The latest revelations regarding the extent of US surveillance of world communications traffic has led to a chorus of protest and expressions of unease...

Ron Paul: Why Are Republicans Defending Obama Over NSA Spying?

RINO’s line up to support big government Paul Joseph WatsonInfowars.comJune 12, 2013 During an...

NSA surveillance: anger mounts in Congress at ‘spying on Americans’

Dan Roberts and Spencer Ackerman and Alan TravisGuardian.co.ukJune 12, 2013 Anger was mounting in Congress on...

The Rest Of The World Is Absolutely Disgusted With Our Big Brother Spying Methods

Michael T. SnyderThe Economic CollapseJune 12, 2013 The rest of the world has found out...

US to continue NSA spying amid backlash

The Obama administration has indicated no signs of scaling back its massive domestic surveillance operations despite the public exposure of the secret bid by...

86 Civil Liberties Groups and Internet Companies Demand an End to NSA Spying

Rainey Reitmaneff.orgJune 10, 2013 Today, a bipartisan coalition of 86 civil liberties organizations and Internet companies...

27 Edward Snowden Quotes About U.S. Government Spying That Should Send A Chill Up...

Would you be willing to give up what Edward Snowden has given up? He has given up his high paying job, his home, his girlfriend, his family, his future and his freedom just to expose the monolithic spy machinery that the U.S. government has been secretly building to the world.

Twenty TRILLION Phone Calls: “They’ve Been Collecting Data About ALL Domestic Calls Since October...

Mac SlavoSHTFPlan.comJune 11, 2013 “The total influence — economic, political, even spiritual — is felt in...

State of Emergency and “Continuity of Government”: What is the Real Reason the Government...

Are Emergency Plans Meant Only for Nuclear War the Real Justification for Spying? To understand the scope, extent and reason that the government spies on...

Twenty TRILLION Phone Calls: “They’ve Been Collecting Data About ALL Domestic Calls Since October...

In 2011, when we noted that Everything You Do Is Monitored, we weren’t embellishing or fear mongering.

Government Spying: Should We Be Shocked?

Ron PaulInfowars.comJune 10, 2013 Last week we saw dramatic new evidence of illegal government surveillance of...

US senator to sue govt on spying bid

US Republican Senator Rand Paul has declared plans to take legal action against the Obama administration for what he described as its "unconstitutional” electronic surveillance efforts.

Bush-Era Spying 'Made Legal' Under Obama

Despite feigned outrage over the use of "illegal" surveillance techniques employed under the Bush administration, in the follow up to this week's news of...

Bush-Era Spying 'Made Legal' Under Obama

Despite feigned outrage over the use of "illegal" surveillance techniques employed under the Bush administration, in the follow up to this week's news of...

Bush-Era Spying 'Made Legal' Under Obama

Despite feigned outrage over the use of "illegal" surveillance techniques employed under the Bush administration, in the follow up to this week's news of...

“Big Brother Obama” Systematic Spying on Americans: Unconstitutional US Data-Mining

On June 5, London’s Guardianreported part of it. “NSA collecting phone records of millions of Verizon customers daily,” it headlined.On June 6, a follow-up...

The Administration’s domestic Surveillance and Torture programs: Obama appoints former Bush deputy Attorney General...

Last week, sources within the Obama administration announced the president’s plans to appoint James Comey as director of the Federal Bureau of Investigation. He...

UK spying agencies suffer incompetence

A British investigative journalist describes the UK security services as overrun with incompetence and vested business interests, without being subject to checks themselves. The journalist...

We’re Being Watched: How Corporations and Law Enforcement Are Spying on Environmentalists

(Photo illustrations Nadia Khastagir / Design Action)In February 2010 Tom Jiunta and a small group of residents in northeastern Pennsylvania formed the Gas Drilling...

Corporate Spying on Environmental Groups

In February 2010 Tom Jiunta and a small group of residents in northeastern Pennsylvania formed the Gas Drilling Awareness Coalition (GDAC), an environmental organization...

New Precedent: Armed Domestic Drone Strikes Will Soon Be Reality

Anthony GucciardiInfowars.comMay 23, 2013 A new precedent has been set. Despite extensive denial that drone strikes...

Spying on Members of the US Congress: DoJ Tapped Congressional Rooms as Well as...

Has the Obama Department of Justice Violated the Separation of Powers? California Congressman  Devin Nunes (R-CA) says that the Department Of Justice tapped phones...

Spies “R” Us: Institutionalized Spying on Americans

A previous article discussed institutionalized spying on Americans. Anyone can be monitored for any reason or none at all. Manufactured national security threats, silencing dissent,...

Arguments in Supreme Court warrantless spying case

Tom Carter, WSWS | On October 29, the US Supreme Court heard oral arguments in a case challenging the power asserted by the Bush and...

President Obama — It’s time to stop illegal spying on all Americans

Dear President Obama; I know you have a full plate right now but there's something I need to talk to you about. Does anyone on your...

Feds to Judge: Don’t ‘Second Guess’ Bush Domestic Spy Program

By David Kravets The Bush administration on Tuesday urged a federal judge to dismiss lawsuits against the nation's telecommunications companies accused of complying with...

In Courtroom Showdown, Bush Demands Amnesty for Spying Telecoms

By David Kravets | SAN FRANCISCO – The Bush administration on Tuesday will try to convince a federal judge to let stand a law...

A Cover for Illegal Domestic Operations?

By Tom Burghardt | On November 17, U.S. Northern Command (NORTHCOM) and the North American Aerospace Defense Command (NORAD) concluded Vigilant Shield 09 (VS09), described...

Spying on the Future: The U.S. Intelligence Community as Seers Without Sizzle

By Tom Engelhardt The year is 2010 and, yes, Saddam Hussein is gone and there are no American troops in Iraq, but, as the report...

Senate Passes Unconstitutional Spying Bill And Grants Sweeping Immunity To Phone Companies

Today, in a blatant assault upon civil liberties and the right to privacy, the Senate passed an unconstitutional domestic spying bill that violates the...

Spying Telecoms Receive Billions in Government Contracts

By Kurt Opsahl | The telecoms who are being sued for their cooperation in the government's illegal warrantless surveillance program have received billions in government contracts....

New Domestic Satellite Surveillance System

Plans for the Department of Homeland Security to launch a new satellite surveillance system is coming under new criticism on Capitol Hill. Last week,...

State spying that would make the Stasi proud

EDWARD HEATHCOAT AMORY When it was passed into law, the Regulation of Investigatory Powers Act (2000) sounded a pretty innocuous piece of legislation. But in...

Institutionalized Spying On Americans

By Stephen Lendman RINF Alternative News This article reviews two police state tools (among many in use) in America. One is new, undiscussed and largely unknown...

US: Wider Spying Fuels Aid Plan for Telecom Industry

Eric Lichtblau, James Risen and Scott Shane For months, the Bush administration has waged a high-profile campaign, including personal lobbying by President Bush and closed-door...

Top Ten Myths About the Illegal NSA Spying on Americans

MYTH: This is merely a "terrorist surveillance program." REALITY: When there is evidence a person may be a terrorist, both the criminal code and intelligence...

Bush Isn’t Spying on al Qaeda … He’s Spying on You

The extraordinary secrecy surrounding the spying operations revealed in Alberto Gonzales' Senate testimony is not aimed at al-Qaeda, but at the American people. By Robert...

Irresponsible China Bashing

Irresponsible China Bashing

by Stephen Lendman

China bashing reflects official US policy. Washington does it numerous ways. 

It's reprehensible. It's confrontational. It's potentially belligerent. Rogue states operate this way.

No nation spies on more nations than America. None more intrusively. None more aggressively. None more lawlessly.

None for more reasons. None in more ways. None more duplicitous about it. None more involved in cybercrime. More on this below.

China is a major US economic, political and military rival. Washington wants it marginalized, weakened and isolated.

It wants its sovereign independence eliminated. It want pro-Western puppet governance replacing it.

It wants its resources plundered. It wants its people exploited. Bashing China risks open conflict. So does pursuing America's overall imperial objectives.

On May 19, Washington declared unprecedented cyberwar on China. 

The Justice Department headlined "US Charges Five Chinese Military Hackers for Cyber Espionage Against US Corporations and a Labor Organization for Commercial Advantage"

"First Time Criminal Charges Are Filed Against Known State Actors for Hacking"

A federal grand jury indicted five Chinese Peoples Liberation Army officials. Doing so was unprecedented. It was provocative. 

Individuals charged didn't matter. Washington confronted the People's Republic of China directly. It did so by targeting its military.

Charges include "computer hacking, economic espionage and other offenses directed at six American victims in US nuclear power, metals and solar products industries."

They allege conspiracy "to hack into American entities, to maintain unauthorized access to their computers and to steal information from those entities that would be useful to their competitors in China, including state-owned enterprises (SOEs)."

Attorney General Eric Holder claimed "economic espionage by members of the Chinese military and represents the first ever charges against a state actor for this type of hacking."

"The range of trade secrets and other sensitive business information stolen in this case is significant and demands an aggressive response," he said.

FBI Director James Comey claimed "(f)or too long, the Chinese government has blatantly sought to use cyber espionage to obtain economic advantage for its state-owned industries."

Assistant Attorney General for National Security John Carlin said:

"State actors engaged in cyber espionage for economic advantage are not immune from the law just because they hack under the shadow of their country’s flag."

Third Department Chinese People's Liberation Army (PLA) Unit 61398 officials named include Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui.

Alleged companies targeted include Westinghouse, SolarWorld subsidiaries, US Steel, Allegheny Technologies, Alcoa, "the United Steel, Paper and Forestry, Rubber, Manufacturing, Energy, (and) Allied Industrial and Service Workers International Union (USW)."

Charges include:

  • One count of "conspiring to commit computer fraud and abuse."

  • Eight counts of "accessing (or attempting to access) a protected computer without authorization to obtain information for the purpose of commercial advantage and private financial gain."

  • Fourteen counts of "transmitting a program, information, code, or command with the intent to cause damage to protected computers."

  • Six counts of "aggravated identify theft."

  • One count of "economic espionage."

  • One count of "trade secret theft."

Xinhua is China's official press agency. It's a ministry-level department. It provides electronic and print news and information.

On May 20, it headlined "China strongly opposes US indictment against Chinese military personnel," saying:

"China lodged protests with the US side following the announcement, urging the U.S. side to immediately correct its mistake and withdraw the indictment."

"(T)he position of the Chinese government on cyber security is consistent and clear-cut. China is steadfast in upholding cyber security." 

"The Chinese government, the Chinese military and their relevant personnel have never engaged or participated in cyber theft of trade secrets." 

"The US accusation against Chinese personnel is groundless with ulterior motives."

Evidence shows "terminals of Chinese military access to the internet have suffered from great number of foreign cyber attacks in recent years, and a considerable number of such attacks originated from the United States."

"China demands that the US side explain its cyber theft, eavesdropping and surveillance activities against China and immediately stop such activities."

America is "the biggest attacker of China's cyber space."

US attacks "infiltrate and tap Chinese networks belonging to governments, institutions, enterprises, universities and major communication backbone networks." 

"Those activities target Chinese leaders, ordinary citizens and anyone with a mobile phone."

Foreign Ministry spokesman Qin Gang said:

"This US move, which is based on fabricated facts, grossly violates the basic norms governing international relations and jeopardizes China-U.S. cooperation and mutual trust."

Nine or more major online companies cooperate with lawless NSA spying. Google, Microsoft, Yahoo, Facebook, Apple, Skype, YouTube and others are involved.

They do so through NSA's Prism. It gains access to search histories, emails, file transfers and live chats. 

It's gotten directly from US provider servers. Doing so facilitates mass surveillance. NSA spies globally. Its activities reveal rogue agency lawlessness.

NSA targets China intensively. It lawlessly hacks its computer and telecommunications networks. 

It focuses on strategically important information. It does so through its ultra-secret China hacking group.

It conducts cyber-espionage. Huang Chengquing is Beijing's top Internet official. China has "mountains of data," he said.

It reveals widespread US hacking. It's designed to steal government secrets. NSA's Tailored Access Operations (TAO) in involved.

It's ultra-secret. Most NSA personnel and officials know little or nothing about it. Only those with a need to know have full access.

TAO operations are extraordinarily sensitive. They penetrate Chinese computer and telecommunications systems.

They've done so for nearly 16 years. They generate reliable intelligence. They learn what's ongoing in China.

They obtain what Washington most wants to know. It's done by surreptitious hacking.

It cracks passwords. It penetrates computer security systems. It decrypts successfully. It steals hard drive data.

In October 2012, Obama authorized cyber-attacks. He did so by secret presidential directive.

His Offensive Cyber Effects Operations (OCEO) "offer(s) unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging."

Washington "identif(ies) potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power."

Domestic spying works the same way. Anything goes defines policy. Constitutional protections don't matter. Or US statute laws. Or international ones. Or relations with other nations.

Washington rules alone apply. TAO's mandate is penetrating, destroying, damaging, or otherwise compromising targeted sites.

It's the largest, most important NSA Signal Intelligence (SIGINT) Directorate component.

Well over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers are involved.

Their job is identifying sensitive computer systems and supporting telecommunications networks. Their mandate is penetrating them successfully.

They exceed the capability of other US intelligence gathering agencies. Their activities expand exponentially.

China knows what's going on. So do Russia and other nations. They're acutely aware of NSA activities. They knows the threat. They take appropriate countermeasures.

Cyber-attacks constitute war by other means. Doing so compromises freedom. It risks confrontation. It threatens world peace.

It doesn't matter. America operates solely for its own self-interest. For control. For economic advantage.

For being one up on foreign competitors. For information used advantageously in trade, political, and military relations. NSA's get it all mandate explains.

June 5 is a landmark date. It marks the first anniversary of Edward Snowden revelations. He connected important dots for millions.

He revealed lawless NSA spying. He did so in great detail. He's the gift that keeps on giving. 

Western nations collaborate irresponsibly. They do so with major corporations. Privacy no longer exists. 

There's no place to hide. Big Brother watches everyone. Spying goes way beyond protecting national security.

All electronic communications can be monitored, collected and stored. Legal restraints are absent. 

Obama heads the most rogue administration in US history. He exceeds the worst of his predecessors. Congress and American courts permit the impermissible. 

Mass US surveillance is standard practice. It's global. It's all- embracing. It targets world leaders. It's after everything and everyone of possible interest.

No constraints exist. No standards. Rogue states operate this way. America is by far the worst.

Bashing China turns a blind eye to US high crimes. They're too egregious to ignore. 

America is a pariah state. It exceeds the worst in world history. It risks global confrontation. Stopping it matters most. 

It bears repeating what previous articles stressed. Today is the most perilous time in world history. World peace hangs in the balance.

Stephen Lendman lives in Chicago. He can be reached at [email protected] 

His new book as editor and contributor is titled "Flashpoint in Ukraine: US Drive for Hegemony Risks WW III."

http://www.claritypress.com/LendmanIII.html

Visit his blog site at sjlendman.blogspot.com. 

Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network.

It airs three times weekly: live on Sundays at 1PM Central time plus two prerecorded archived programs. 


http://www.progressiveradionetwork.com/the-progressive-news-hour 

NSA’s Fake War on Terror

NSA's Fake War on Terror

by Stephen Lendman

A New America Foundation report suggests it. More on this below.

NSA spying is longstanding. It's ongoing abroad and at home. It has nothing to do with national security. It's unrelated to uncovering terrorist plots. 

Homegrown ones virtually don't exist. Alleged ones are hatched. They're fake. Claiming dozens were foiled in time is false. 

They're Big Lies. Previous articles discussed dozens of innocent victims. They included:

  • a fake shoe bomber;

  • fake underwear bomber;

  • fake Times Square bomber;

  • an earlier one there;

  • fake shampoo bombers;

  • fake Al Qaeda woman planning fake mass casualty attacks on New York landmarks;

  • fake Oregon bomber;

  • fake armed forces recruiting station bomber;

  • fake synagogue bombers;

  • fake Chicago Sears Tower bombers;

  • fake FBI and other building bombers;

  • fake National Guard, Fort Dix and Quantico marine base attackers;

  • fake 9/11 bombers; 

  • fake Boston bombers; and 

  • numerous others. 

At issue is generating fear. Washington's fake war on terror needs public support. FBI operatives are involved. 

Orchestrated stings are used. Innocent victims are entrapped. Familiar schemes repeat. 9/11 is the Big Lie of our time. So is the fake war on terror. 

Innocent victims languish in America's gulag. NSA spying watches everyone. It's unconstitutional. It's for police state control. It's  ending privacy. It's destroying freedom. 

Global spying is espionage. It's for political and economic advantage. It's to be one up on foreign competitors. It's for information used advantageously in trade, political, and military relations.

The New America Foundation (NAF) is an establishment organization. Bilderberg Group/CIA-connected Google CEO Eric Schmidt chairs its board of directors. 

Right-wing ideologue Anne-Marie Slaughter is president and CEO. NAF study co-author Peter Bergen is CNN's national security analyst. His articles appear in establishment publications.

NAF's report is titled "Do NSA's Bulk Surveillance Programs Stop Terrorists?"

Two weeks after Edward Snowden's first revelations were published, Obama lied saying:

"We know of at least 50 threats that have been averted because of this information not just in the United States, but," abroad as well.

NSA director General Keith Alexander repeated the lie claiming:

"information gathered from these programs provided the US government with critical leads to help prevent over 50 potential terrorist events in more than 20 countries around the world."

House Permanent Select Committee on Intelligence chairman Mike Rogers (R. MI) said:

"Fifty-four times (NSA spying) stopped and thwarted terrorist attacks both here and in Europe - saving real lives."

False! According to NAF's analysis, government contentions "about the role that NSA 'bulk' surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading."

Mass NSA surveillance "had no discernible impact on preventing acts of terrorism."

So-called evidence NSA claimed to uncover is easily gotten through conventional investigatory methods.

NAF analyzed 225 instances of alleged post-9/11 terrorism. Only two involved NSA meta-data. 

None were legitimate. Alleged homegrown terrorism is fabricated. So are others abroad. They're fake. NAF's report didn't explain. It said:

"The overall problem for US counterterrorism officials is not that they need vaster amounts of information from the bulk surveillance programs, but that they don’t sufficiently understand or widely share the information they already possess that was derived from conventional law enforcement and intelligence techniques."

On Friday, Obama will address so-called NSA reforms. Last month, his hand-picked advisory committee recommended minor changes. They're too inconsequential to matter.

They legitimized lawless spying. They ignored what federal Judge Richard Leon called unconstitutional. They're "almost Orwellian," he said.

Expect Obama to rubber-stamp continuity. He'll maintain business as usual. He'll stress balancing civil liberties with protecting national security. He'll lie claiming it.

He'll legitimize what Electronic Frontier Foundation's Kurt Opsahl called "heinous." 

He'll leave NSA's worst lawlessness untouched. He'll whitewash its crimes. He'll lie claiming otherwise.

Last November, the General Assembly addressed privacy rights in the digital age. Over 50 member states co-sponsored a resolution. It supports what's too precious to lose.

On December 18, the 193-member body unanimously approved a resolution titled: "The Right to privacy in the digital age."

It reaffirmed a fundamental human right. No one should be denied the right to privacy. No one should be lawlessly spied on. 

The Electronic Frontier Foundation (EFF) called the General Assembly's resolution "one small step for privacy, one giant leap against surveillance."

Obama stacked his so-called Review Group on Intelligence and Communications Technologies with longstanding Washington insiders.

A previous article discussed them. Director of National Intelligence (DNI) head James Clapper supervised. He's an acknowledged perjurer. He's complicit in NSA crimes.

On December 12, Obama's committee released its report. It's titled "Liberty and Security in a Changing World." Its handpicked members included:

  • former acting CIA head Michael Morell;

  • former National Coordinator for Security, Infrastructure Protection, and Counterterrorism Richard Clarke;

  • former Administrator of the White House Office of Information and Regulatory Affairs Cass Sunstein; Francis Boyle calls him a neocon;

  • Democrat party connected/political advocacy group Center for American Progress member Peter Swire; and

  • University of Chicago Law Professor Geoffrey Stone. 

Forty recommendations were made. They stopped well short of what's needed. They legitimized mass surveillance.

They ignored what's most important. Constitutional issues were unaddressed. Mass surveillance is illegal. It's unacceptable everywhere.

It's unrelated to alleged terrorism. It's police state ruthlessness writ large. It's Obama's war on freedom. 

He promised no warrantless spying. Straightaway he authorized it. His explanation fell short and then some. He said:

"When I came into this office, I made two commitments that are more important than any commitment I made: number one to keep the American people safe, and number two to uphold the Constitution."

Americans are less safe than ever. Freedom is disappearing in plain sight. Obama's done more to subvert constitutional law than any previous president. 

He made freedom a four-letter word. He claimed:

"You can't have 100% security and also then have 100% privacy and zero inconvenience."  

"We're going to have to make some choices as a society. I think that on balance, we have established a process and a procedure that the American people should feel comfortable about."

He lied saying mass surveillance "help(s) prevent terrorist attacks." None whatever exist.

He lied again calling NSA spying "modest encroachments on privacy." It's sweeping, pervasive and lawless. It's unrelated to alleged terrorism.

Obama wants Americans to trust him. Why anyone would, they'll have to explain. He's a war criminal multiple times over. He's done more to destroy freedom than any of his predecessors.

He wants it eliminated altogether. He's a serial liar. Nothing he says has credibility. He lied claiming:

"When it comes to telephone calls, nobody is listening to your telephone calls. That's not what this program is about. As was indicated, what the intelligence community is doing is looking at phone numbers and durations of calls."

"They are not looking at people's names and they are not looking at content." Permission to do so, he claimed, requires "go(ing) back to a federal judge just like (for) a criminal investigation."

"With respect to the Internet and emails, this does not apply to US citizens and it does not apply to people living in the United States."

False! Obama authorized sweeping domestic spying. He did so unconstitutionally. He institutionalized it. It's ongoing daily. It's warrantless. 

No one escapes NSA's spying eye. Everything communicated electronically is vulnerable. It's fair game.

NSA's mandate is "Get it all." Phone calls, emails, and other electronic communications are secretly collected. They're gotten without court authorization.

Probable cause isn't needed. Major telecom and Internet companies cooperate. They do so willingly.

All three branches of government are involved. They're complicit in sweeping lawlessness. Police states operate this way. America is by far the worst.

Expect nothing ahead to change. Expect worse with increasingly sophisticated NSA technology. 

Cyberwar on freedom is official US policy. NSA is Big Brother writ large. Privacy no longer exists. Obama's waging war on freedom. It's vanishing in plain sight.

Stephen Lendman lives in Chicago. He can be reached at [email protected] 

His new book is titled "Banker Occupation: Waging Financial War on Humanity."

http://www.claritypress.com/LendmanII.html

Visit his blog site at sjlendman.blogspot.com. 

Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network.

It airs Fridays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.


http://www.progressiveradionetwork.com/the-progressive-news-hour

NSA’s Top Hacking Unit

NSA's Top Hacking Unit

by Stephen Lendman

On December 29, Der Spiegel headlined "Inside TAO: Documents Reveal Top NSA Hacking Unit."

It's "considered to be (its) top secret weapon." Its covert network "infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by" whomever it targets.

More on this below. Snowden documents remain the gift that keeps on giving. Doing so made him a world hero. Washington calls exposing wrongdoing illegal. Lawlessness is official US policy.

Since 1993, Britain's Channel 4 broadcast an alternative Christmas message. It's an antidote to Queen Elizabeth's Royal Christmas Message.

In 1932, King George began them on radio. In 1957, Queen Elizabeth delivered the first televised broadcast. It's typical royal mumbo jumbo. Why Brits tune in they'll have to explain.

Snowden's comments are important. Orwell's warnings "are nothing compared to what we have available today," he said.

"We have sensors in our pockets that track us everywhere we go. Think about what this means for the privacy of the average person."

Children "born today will grow up with no conception of privacy at all." 

"They'll never know what it means to have a private moment to themselves, an unrecorded, unanalyzed thought."

"And that's a problem because privacy matters. (It's) what allows us to determine who we are and who we want to be."

Snowden wants ordinary people to decide how governments monitor them. "All I wanted was for the public to be able to have a say in how they're governed," he explained.

He's doing it by revealing the extent of NSA spying.

"The conversation occurring today will determine the amount of trust we can place both in the technology that surrounds us and the government that regulates it," he said.

"Together we can find a better balance, end mass surveillance, and remind the government that if it really wants to know how we feel, asking is always cheaper than spying."

"I already won," he said. "As soon as the journalists were able to work, everything that I had been trying to do was validated."

"Because, remember, I didn't want to change society. I wanted to give society a chance to determine if it should change itself."

"All I wanted was for the public to be able to have a say in how they are governed."

Not as long as NSA has its way. Not while Congress and US administrations let it. Previous articles discussed its Office of Tailored Operations (TAO).

It's top secret. It has over 1,000 military and civilian hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.

It identifies computer systems and supporting telecommunications networks to attack.

It successfully penetrated Chinese computer and telecom systems. It's been doing it for over 15 years. It does the same thing globally.

Most NSA employees and officials know little or nothing about TAO. Its operations are extraordinarily sensitive. Only those needing to know are kept informed.

Special security clearances are required to gain access to its top secret work spaces. Armed guards keep others out.

Entering requires a correct six digit code. Retinal scanner checks are used. TAO targets foreign computer systems.

It collects hard to get intelligence. It does it by hacking, cracking passwords, compromising computer security systems, stealing hard drive data, and copying all subsequent emails and text messages.

TAO personnel penetrate, steal, damage, destroy or otherwise compromise targeted sites. It's perhaps the most important component of NSA's Signal Intelligence (SIGINT) Directorate.

It lets NSA get information not otherwise available. It can do it without being detected.

Der Spiegel called TAO NSA's 'top operative unit." It's "something like a squad of plumbers," it said. They're "called in when normal access to a target is blocked."

They're "involved in many sensitive operations conducted by American intelligence agencies." They range from counterintelligence to cyberwar to espionage.

Snowden's documents revealed TAO sophistication. It exploits technical weaknesses. It does so secretly, discreetly and efficiently.

It gets the "ungettable." According to a former unnamed TAO chief:

"It is not about the quantity produced but the quality of intelligence that is important," she said. (It's gotten) some of the most significant intelligence our country has ever seen." 

It "access(es) our very hardest targets. (It) needs to continue to grow, and must lay the foundation for integrated Computer Network Operations."

It must "support Computer Network Attacks as an integrated part of military operations. (It has to acquire) pervasive, persistent access on the global network."

Its mandate is conducting aggressive attacks. Through the middle of the last decade, it accessed 258 targets. It did so in 89 countries globally. In 2010, it conducted 279 operations.

It penetrated protected networks of targeted world leaders. It did so against European telecommunications companies.

It cracked Blackberry's encrypted BES email servers. One document said doing so required "sustained TAO operation(al)" effort.

In 1997, TAO was created. At the time, only 2% of the world's population had Internet access. It was a year before Google was founded. Facebook, Twitter and YouTube weren't around. Yahoo was a fledgling operation.

TAO personnel work at NSA's Fort Meade, MD headquarters. They're in San Antonio, TX. They're in other locations. They're housed in their own wings. They're separate from other NSA operations.

Their match Star Trek. They do it for real. They go where no one went before. They do it round-the-clock. They do it globally.

They find ways to hack into global communications systems. They penetrate the most heavily protected ones. 

They do what never before was possible. They do it secretly. They do it without being detected.

TAO employs new kinds of people. They're much younger than other NSA personnel. They're expert hackers. "Their job is breaking into, manipulating, and exploiting computer networks," said Der Spiegel.

They resemble geeks. They act like them. NSA director Keith Alexander is involved in recruiting. He attends major hacker conferences.

Sometimes it's in formal military attire. Other times, he wears jeans and t-shirts. It's to look and act like the geeks he's recruiting. It works.

TAO has operations in Wahiawa, Hawaii, Fort Gordon, GA, Buckley Air Force Base near Denver, Fort Meade, MD, San Antonio, TX and a liaison office near Frankfurt, Germany.

It's the European Security Operations Center (ESOC) "Dagger Complex. It's at a US military compound in Griesheim. It's a suburb of Darmstadt near Frankfort.

It's secured by a tall wire fence. It's topped with barbed wire. It's in relatively modest buildings. They're surrounded by green space. It's for added security.

It's one of Hesse state's best protected sites. NSA's European Cryptologic Center (ECC) is headquartered there. A 2011 NSA report calls it the "largest analysis and productivity (site) in Europe."

Information obtained ends up in Obama's daily briefings. He gets them on average twice weekly. 

NSA considers Germany a prime target. Espionage is prioritized. So is German foreign policy.

Weeks after NSA spying on Angela Merkel was revealed, Berlin still awaits answers on what it's up to in Germany.

Documents Der Spiegel saw revealed intense NSA spying. Its personnel consider German intelligence gotten a "success story."

Tons of information were collected. Former NSA director Michael Hayden told Der Spiegel: "(T)he damage for the German-American relationship is huge."

Post-9/11, he tried working cooperatively with Germany's BND intelligence, he said. "I tried to avoid acting as an occupier," he claimed.

"We extended our cooperation." It's now jeopardized. He admits NSA espionage. "We steal secrets," he said. "We're number one in (doing) it."

NSA isn't malicious, he claims. "We steal stuff to make you safe, not to make you rich." NSA steals everything it gets its hands on. It compromises public safety. It does so globally.

Former NSA employee/whistleblower Thomas Drake said "September 11 was the trigger that (made) Germany a target of high priority." 

Powerful tools are used to do whatever NSA wishes. To infiltrate wherever it wants to go. To steal as much as it can about virtually everything. NSA director Alexander says "get it all."

Der Spiegel called its Texas operations "uniquely impressive." The Texas Cryptologic Center employs less than 60 TAO specialists.

By 2015, plans are to increase staff to about 270. Another 85 specialists work in the Requirements & Targeting division. In 2008, they numbered 13.

Software developers are expected to increase from three in 2008 to 38 in 2015. San Antonio-based operations target Middle East Countries, Cuba, Venezuela, Columbia and Mexico.

According to Washington's planned intelligence operations, around 85,000 computers worldwide were expected to be infiltrated by year end 2013. Most involve TAO operations.

Cyber criminals run them. They hack into computer systems. They send emails disguised as spam. They contain links directing users to virus-infected web sites.

They implant NSA malware this way. They do it without targeted subjects knowing.

A major TAO goal is "subvert(ing) endpoint devices." They include "servers, workstations, firewalls, routers, handsets, phone switches, (and) SCADA systems, etc."

According to Der Spiegel: 

"SCADAs are industrial control systems used in factories, as well as in power plants…(The) most well-known and notorious use of this type of attack was the development of Stuxnet..." 

In spring 2010, Iranian intelligence discovered its malware contamination. It infected its Bushehr nuclear facility. At the time, operations were halted indefinitely.

Israel was responsible. So was Washington. Had the facility gone online infected, Iran's entire electrical power grid could have been shut down.

One of NSA's "most productive operations" is its direct "interdiction." Goods are rerouted from suppliers to secret TAO locations.

According to Der Spiegel:

TAO personnel "carefully open...package(s) in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies." 

"All subsequent steps can then be conducted from the comfort of a remote computer." Operations are conducted globally.

NSA targets virtually everyone. Its ultimate goal is leaving no one behind. Most important are "entire networks and network providers," said Der Spiegel.

Fiber optic cables handling global Internet traffic "along the world's ocean floors" are prime targets.

NSA responded to Der Spiegel's query. It lied saying TAO "is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies."

Domestic spying has nothing to do with national security. It's for control. It's global espionage for economic advantage. It's to be one up on foreign competitors. 

It's for information used advantageously in trade, political, and military relations. It's lawlessly obtained. It's unconstitutional. It doesn't matter.

NSA is one of many US rogue operations. America's 15 other intelligence agencies operate the same way.

Congress, administrations and federal courts are worst of all. They function lawlessly. They legitimize the illegitimate. 

They threaten humanity in the process. Imagine what they plan this year. Expect worse conditions perhaps than earlier. Rogue states operate that way. America is by far the worst.

Stephen Lendman lives in Chicago. He can be reached at [email protected] 

His new book is titled "Banker Occupation: Waging Financial War on Humanity."

http://www.claritypress.com/LendmanII.html

Visit his blog site at sjlendman.blogspot.com. 

Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network.

It airs Fridays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.

http://www.progressiveradionetwork.com/the-progressive-news-hour


http://www.dailycensored.com/nsas-top-hacking-unit/

ACLU v. Clapper Ruling

ACLU v. Clapper Ruling

by Stephen Lendman

A previous article said the following:

On June 11, the ACLU filed suit. It challenged "the constitutionality of the National Security Agency's mass collection of Americans' phone records."

It argued that doing so violates Fourth and First Amendment rights, saying: 

"Because the NSA's aggregation of metadata constitutes an invasion of privacy and an unreasonable search, it is unconstitutional under the Fourth Amendment." 

"The call-tracking program also violates the First Amendment, because it vacuums up sensitive information about associational and expressive activity."

NSA claims authorization under the Patriot Act's Section 215. It's known as the "business records" provision. 

It permits collecting "any tangible thing...relevant" to alleged foreign intelligence or terrorism related investigations. It way oversteps. It's unconstitutional. 

It permits warrantless searches without probable cause. It violates fundamental First Amendment rights. It does so by mandating secrecy. 

It prohibits targeted subjects from telling others what's happening to them. It compromises free expression, assembly and association. 

It does so by authorizing the FBI to investigate anyone based on what they say, write, or do with regard to groups they belong to or associate with.

It violates Fourth and Fifth Amendment protections by not telling targeted subjects their privacy was compromised. It subverts fundamental freedoms for contrived, exaggerated, or nonexistent security reasons.

"Whatever Section 215's 'relevance' requirement might allow, it does not permit the government to cast a seven-year dragnet sweeping up every phone call made or received by Americans," said ACLU.

The 1978 Foreign Intelligence Surveillance Act (FISA) authorized surveillance relating to "foreign intelligence information" between "foreign powers" and "agents of foreign powers." 

It restricts spying on US citizens and residents to those engaged in espionage in America and territory under US control. 

No longer. Today anything goes. America is a total surveillance society. Obama officials claim no authority can challenge them.
Governing this way is called tyranny.

On December 16, Federal District Court of the District of Columbia Judge Richard Leon ruled against NSA spying.

He called it "almost Orwellian" and much more, saying:

"The threshold issue is whether plaintiffs have a reasonable expectation of privacy that is violated when the Government indiscriminately collects their telephone metadata along with the metadata of hundreds of millions of other citizens without any particularized suspicion of wrongdoing, retains all of that metadata for five years, and then queries, analyzes, and investigates that data without prior judicial approval of the investigative targets."

"I cannot imagine a more 'indiscriminate' and 'arbitrary' invasion than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval." 

"Surely, such a program infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment." 

It's core constitutional law. It prohibits unreasonable searches and seizures. Mass NSA surveillance does it lawlessly.

It has nothing to do with national security. Claims otherwise ring hollow. America spies for control. It does so for economic advantage. Espionage is longstanding policy.

Corporate secrets are stolen. So are political ones. Top foreign government and business officials are spied on. Virtually everyone is fair game.

Domestic spying is longstanding. It's unconstitutional. It doesn't matter. Two federal judges disagreed. If ACLU appeals to the Supreme Court, it'll likely lose.

It's stacked with right-wing extremists. Five current justices are Federalist Society members: Chief Justice John Roberts, Antonin Scalia, Samuel Alito, Anthony Kennedy, and Clarence Thomas.

Elena Kagan is ideologically sympathetic. As dean of Harvard Law School, she hired Bush's outgoing Office of Legal Counsel director, Jack Goldsmith. Francis Boyle called him a war criminal.

Kagan bragged about putting him on staff. Boyle quoted her saying she "love(s) the Federalist Society." It's ideologically over-the-top. It's extremely right-wing.

With these type justices on America's High Court, ordinary people haven't a chance. Nor judicial fairness.

In September 2012, Congress overwhelmingly passed the 2012 FISA Amendments Reauthorization Act. 

Obama signed it into law. He called doing so a national security priority. He lied. It reflects police state lawlessness. It extends the 2008 FISA Amendments Act (FAA). It's for another five years.

It authorizes warrantless spying. It does so without naming names or probable cause. It violates Fourth Amendment protections. 

Overseas phone calls, emails, and other communications of US citizens and permanent residents may be monitored without authorization. Perhaps domestic ones covertly. 

Probable cause isn't needed. Anything goes is policy. Constitutional protections don't matter. Police states operate this way.

ACLU lawyers filed suit. It passed through lower courts to the Supremes. In October 2012, High Court justices heard oral arguments. Clapper v. Amnesty International challenged the constitutionality of warrantless spying.

On February 26, the Supreme Court ruled. It dismissed ACLU's case. It violated constitutional protections doing so. 

It ruled against lawyers, journalists, human rights groups, and others challenging protections too important to lose.

It said they couldn't prove surveillance was "certainly impending." They didn't have required standing to sue, they claimed. 

Saying so was absurd on its face. It's a standard never before used. Imposing it denies the legitimate right to sue. Doing so reflects police state justice.

It wasn't the first time fundamental rights were denied. It won't be the last. Warrantless electronic spying is intrusive. It's institutionalized.

Congress approves. So does Obama. America's Supremes violated the public trust. They've done it many times before. They'll do it again. Lawless NSA spying is safe in their hands.

In ACLU v. Clapper, Judge William Pauley heard arguments. ACLU called for the program to be ended. Ahead of the hearing, its legal director, Jameel Jaffer, said:

"This vast dragnet is said to be authorized by Section 215 of the USA Patriot Act, but nothing in the text or legislative history of that provision remotely suggests that Congress intended to empower the government to collect information on a daily basis, indefinitely, about every American’s phone calls."

"This kind of dragnet surveillance is precisely what the fourth amendment was meant to prohibit."

"The constitution does not permit the NSA to place hundreds of millions of innocent people under permanent surveillance because of the possibility that information about some tiny subset of them will become useful to an investigation in the future."

ACLU argued against blanket seizure of its phone records. Doing so violates its core constitutional rights. It compromises its ability to work with journalists, advocacy groups, whistleblowers and others.

It claimed standing because NSA has access to its phone records. It didn't matter. Judge Pauley rejected its challenge. He called mass NSA surveillance legal.

He called it a valuable tool against terrorism. He said it "only works because if collects everything." He either lied or doesn't understand what's going on.

He claimed meta-data collection "represents the government's counter-punch" against Al Qaeda's terror network.

"The collection is broad, but the scope of counterterrorism investigations is unprecedented," he said.

Mass phone data collection "significantly increases the NSA's capability to detect the faintest patterns left behind by individuals affiliated with foreign terrorist organizations." 

"Armed with all the metadata, NSA can draw connections it might otherwise never be able to find."

Without them, he claimed, "the civil liberties of every citizen" would be "imperil(ed)." 

"The question for this court is whether the government's bulk telephony metadata program is lawful. This court finds it is." 

"But the question of whether that program should be conducted is for the other two coordinate branches of government to decide."

Judge Pauley nonsensically said mass telecommunications surveillance could have perhaps prevented 9/11.

"The government learned from its mistake and adapted to confront a new enemy: a terror network capable of orchestrating attacks across the world," he claimed.

"It launched a number of counter-measures, including a bulk telephony metadata collection program - a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data."

It bears repeating. NSA mass surveillance has nothing to do with national security. Pauley knows nothing about spying. His ruling reads like an NSA press handout. His legal judgment leaves much to be desired. 

Most other federal judges are no better. Police state lawlessness remains in good hands. Judge Leon is an exception who proves the rule. 

He's an unheard voice in the wilderness. We need lots more to make a difference. We need them throughout the judiciary. 

We need them on the highest court in the land. We need them in all government branches. We need what we don't have.

Stephen Lendman lives in Chicago. He can be reached at [email protected] 

His new book is titled "Banker Occupation: Waging Financial War on Humanity."

http://www.claritypress.com/LendmanII.html

Visit his blog site at sjlendman.blogspot.com. 

Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network.

It airs Fridays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.

http://www.progressiveradionetwork.com/the-progressive-news-hour


http://www.dailycensored.com/aclu-v-clapper-ruling/

Federal Judge Rules Against Mass Surveillance

Federal Judge Rules Against Mass Surveillance

by Stephen Lendman

On December 16, Federal District Court of the District of Columbia Judge Richard Leon issued a damning 68-page ruling. He called NSA spying unconstitutional. It's "almost Orwellian," he said.

"The threshold issue is whether plaintiffs have a reasonable expectation of privacy that is violated when the Government indiscriminately collects their telephone metadata along with the metadata of hundreds of millions of other citizens without any particularized suspicion of wrongdoing, retains all of that metadata for five years, and then queries, analyzes, and investigates that data without prior judicial approval of the investigative targets."

"I cannot imagine a more 'indiscriminate' and 'arbitrary' invasion than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval." 

"Surely, such a program infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment." 

It prohibits unreasonable searches and seizures. Doing so violates core constitutional law. Mass NSA surveillance does it writ large.

It has nothing to do with national security. America's only enemies are ones it invents. NSA spies globally. It watches everyone. It monitors allies. It's about control. 

It's for economic advantage. It's to be one up on foreign competitors. It's for information used advantageously in trade, political, and military relations.

Domestic spying is longstanding. It's institutionalized. It's unconstitutional. It doesn't matter. Nothing before was done to stop it. Judge Leon took an important first step

ACLU Deputy Legal Director Jameel Jaffer commented on his ruling, saying:

"This is a strongly worded and carefully reasoned decision that ultimately concludes, absolutely correctly, that the NSA’s call-tracking program can’t be squared with the Constitution."

"As Judge Leon notes, the government's defense of the program has relied almost entirely on a 30-year-old case that involved surveillance of a specific criminal suspect over a period of two days."

"The idea that this narrow precedent authorizes the government to place every American under permanent surveillance is preposterous."

"We hope that Judge Leon's thoughtful ruling will inform the larger conversation about the proper scope of government surveillance powers, especially the debate in Congress about the reforms necessary to bring the NSA's surveillance activities back in line with the Constitution."

"The bipartisan USA Freedom Act, which has 130 co-sponsors already, would address the constitutional problems that Judge Leon identifies."

The Electronic Frontier Foundation (EFF) calls the proposed measure "a substantial improvement to America's laws regarding mass surveillance."

At the same time, it's "a floor, not a ceiling." It addresses a small portion of NSA abuses and "overreaching government secrecy."

It leaves important unfinished business. EFF endorses passage. Lots more needs to be done, it stressed.

Judge Leon's ruling marks the first successful NSA legal challenge. Conservative activist Larry Klayman and Charles Strange filed suit (Klayman v. Obama). Strange's son was killed in Afghanistan.

Months earlier, ACLU filed a similar suit (ACLU v. Clapper). It challenged "the constitutionality of the National Security Agency's mass collection of Americans' phone records."

It argued that doing so violates Fourth and First Amendment rights, saying: 

"Because the NSA's aggregation of metadata constitutes an invasion of privacy and an unreasonable search, it is unconstitutional under the Fourth Amendment." 

"The call-tracking program also violates the First Amendment, because it vacuums up sensitive information about associational and expressive activity."

NSA claims authorization under the Patriot Act's Section 215. It's known as the "business records" provision. 

It permits collecting "any tangible thing...relevant" to alleged foreign intelligence or terrorism related investigations. It way oversteps. It's unconstitutional. 

It permits warrantless searches without probable cause. It violates fundamental First Amendment rights. It does so by mandating secrecy. 

It prohibits targeted subjects from telling others what's happening to them. It compromises free expression, assembly and association. 

It does so by authorizing the FBI to investigate anyone based on what they say, write, or do with regard to groups they belong to or associate with.

It violates Fourth and Fifth Amendment protections by not telling targeted subjects their privacy was compromised. It subverts fundamental freedoms for contrived, exaggerated, or nonexistent security reasons.

"Whatever Section 215's 'relevance' requirement might allow, it does not permit the government to cast a seven-year dragnet sweeping up every phone call made or received by Americans," said ACLU.

On November 22, US District Court for the Southern District of New York Judge William Pauley heard arguments. He hasn't yet ruled.

Judge Leon granted plaintiffs' request for a preliminary injunction. He ordered the Obama administration to stop collecting their phone data. 

He ruled whatever it currently has must be destroyed. At the same time, he stayed his ruling. He cited potential "significant national security interests at stake."

He gave Obama's Justice Department time to appeal. He said his decision applies only to plaintiffs. It doesn't affect NSA's mass data-mining.

At the same time, his ruling is an important first step. For years, he said, constitutional issues were adjudicated under "a cloak of secrecy."

He referred to the unaccountable FISA court. It's virtually rubber-stamp. It mocks judicial fairness and legitimacy. 

Judge Leon's ruling is an important step in the right direction. "While Congress has great latitude to create statutory scheme like FISA," he said, "it may not hang a cloak of secrecy over the Constitution."

EFF called his decision "historic." Ruling for Klayman and Strange symbolically condemns mass surveillance.

Obama's Justice Department relies on two Supreme Court rulings. In Miller v. United States (1976), the Supreme Court ruled:

"The Fourth Amendment does not prohibit the obtaining of information revealed to a third-party and conveyed by him to Government authorities, even if it is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third-party will not be betrayed." 

The Court added that information revealed to another source "takes the risk (of being) conveyed" to someone else.

In Smith v. Maryland (1979), the High Court extended the so-called third party doctrine to telephone communications. 

It said in "expos(ing) that information" to phone company equipment, individuals "assumed the risk that the company would reveal to police the numbers dialed."

In US v. Jones (2012), Supreme Court Justice Sonia Sotomayor acknowledged the need to update Fourth Amendment protections, saying:

"People disclose the phone numbers that they dial or text to their cellular providers, the URLS that they visit and the e-mail addresses with which they correspond to their Internet service providers, and the books, groceries and medications they purchase to online retailers." 

"I would not assume that all information voluntarily disclosed to some member of the public for a limited purpose is, for that reason alone, disentitled to Fourth Amendment protection."

In United States v. US District Court (the so-called Keith case) (1972), a unanimous Supreme Court ruling upheld Fourth Amendment protections in cases involving domestic surveillance targeting a domestic threat.

Judge Leon addressed Smith v. Maryland, saying:

"The question before me is not the same question that the Supreme Court confronted in Smith." It's "a far cry from the issue in this case."

He differentiated between then and now. Obtaining limited information on one person is vastly different from daily mass surveillance. He was blunt stating:

"This short-term, forward looking (as opposed to historical), and highly-limited data collection is what the Supreme Court was assessing in Smith." 

"The NSA telephony metadata program, on the other hand, involves the creation and maintenance of a historical database containing five years' worth of data." 

"And I might add, there is the very real prospect that the program will go on for as long as America is combatting terrorism, which realistically could be forever."

"Admittedly, what metadata is has not changed over time." 

"As in Smith, the types of information at issue in this case are relatively limited: phone numbers dialed, date, time, and the like." 

"But the ubiquity of phones has dramatically altered the quantity of the information that is now available, and more importantly, what that information can tell the Government about people’s lives."

"Put simply, people in 2013 have an entirely different relationship with phones than they did thirty-four years ago."

"Whereas some may assume that these cultural changes will force people to 'reconcile themselves' to an 'inevitable' 'diminution of privacy that new technology entails,' I think it is more likely that these trends have resulted in a greater expectation of privacy and a recognition that society views that expectation as reasonable."

In other words, privacy intrusions today are simple. They happen with digital age technology ease. Greater diligence is required to protect rights too important to lose. 

Courts and Congress are obligated to do so. Judge Leon's ruling represents an important first step in the right direction. Lots more needs to be done.

A Final Comment

Edward Snowden issued a statement. He praised Judge Leon's ruling, saying:

"I acted on my belief that the NSA's mass surveillance programs would not withstand a constitutional challenge, and that the American public deserved a chance to see these issues determined by open courts." 

"Today, a secret program authorized by a secret court was, when exposed to the light of day, found to violate Americans. rights. It is the first of many."

Separately, he offered to help Brazil investigate harmful NSA spying. He'll do it in return for permanent political asylum. He said so in an open letter to all Brazilians. Folha de S. Paulo published it. 

It's a Brazilian daily broadsheet. Snowden in part said:

"I've expressed my willingness to assist where it's appropriate and legal, but, unfortunately, the US government has been working hard to limit my ability to do so." 

"Until a country grants me permanent political asylum, the US government will continue to interfere with my ability to speak out."

Brazilian senators asked Snowden for help. He's willing to provide it.

"I don't want to live in a world where everything that I say, everything I do, everyone I talk to, every expression of creativity or love or friendship is recorded." 

"That's not something I'm willing to support, it's not something I'm willing to build, and it's not something I'm willing to live under."

It remains to be seen if Brazil takes him up on his offer. Snowden urged it, concluding:

"If Brazil hears only one thing from me, let it be this: when all of us band together against injustices and in defense of privacy and basic human rights, we can defend ourselves from even the most powerful systems."

Stephen Lendman lives in Chicago. He can be reached at [email protected] 

His new book is titled "Banker Occupation: Waging Financial War on Humanity."

http://www.claritypress.com/LendmanII.html

Visit his blog site at sjlendman.blogspot.com. 

Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network.

It airs Fridays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.

http://www.progressiveradionetwork.com/the-progressive-news-hour


http://www.dailycensored.com/fedeeral-judge-rules-mass-surveillance/

The Ghost of Authoritarianism in the Age of the Shutdown

http://www.truthdig.com/report/item/the_ghost_of_authoritarianism_in_the_age_of_the_shutdown_20131018/

Posted on Oct 18, 2013

By Henry A. Giroux, Truthout

This piece first appeared at Truthout before the government shutdown was resolved.

In the aftermath of the reign of Nazi terror in the 1940s, the philosopher Theodor Adorno wrote:

National Socialism lives on, and even today we still do not know whether it is merely the ghost of what was so monstrous that it lingers on after its own death, or whether it has not yet died at all, whether the willingness to commit the unspeakable survives in people as well as in the conditions that enclose them.

Adorno’s words are as relevant today as they were when he first wrote them. The threat of authoritarianism to citizen-based democracy is alive and well in the United States, and its presence can be felt in the historical conditions leading up to the partial government shutdown and the refusal on the part of the new extremists to raise the debt ceiling. Adorno believed that while the specific features and horrors of mid-century fascism such as the concentration camps and the control of governments by a political elite and the gestapo would not be reproduced in the same way, democracy as a political ideal and as a working proposition would be under assault once again by new anti-democratic forces all too willing to impose totalitarian systems on their adversaries.

For Adorno, the conditions for fascism would more than likely crystallize into new forms. For instance, they might be found in the economic organization of a society that renders “the majority of people dependent upon conditions beyond their control and thus maintains them in a state of political immaturity. If they want to live, then no other avenue remains but to adapt, submit themselves to the given conditions.” In part, this speaks to the role of corporate-controlled cultural apparatuses that normalize anti-democratic ideologies and practices as well as to the paramount role of education in creating a subject for whom politics was superfluous. For Adorno, fascism in its new guise particularly would launch a systemic assault on the remaining conditions for democracy through the elimination of public memory, public institutions in which people could be educated to think critically and the evisceration of public spaces where people could learn the art of social citizenship, thoughtfulness and critical engagement. He also believed that the residual elements of the police state would become emergent in any new expression of fascism in which the corporate and military establishments would be poised to take power. Adorno, like Hannah Arendt, understood that the seeds of authoritarianism lie in the “disappearance of politics: a form of government that destroys politics, methodically eliminating speaking and acting human beings and attacking the very humanity of first a selected group and then all groups. In this way, totalitarianism makes people superfluous as human beings.”

The American political, cultural, and economic landscape is inhabited by the renewed return of authoritarianism evident in the ideologies of religious and secular certainty that legitimate the reign of economic Darwinism, the unchecked power of capital, the culture of fear and the expanding national security state. The ghosts of fascism also are evident in what Charles Derber and Yale Magress call elements of “the Weimer Syndrome,” which include a severe and seemingly unresolvable economic crisis, liberals and moderate parties too weak to address the intensifying political and economic crises, the rise of far-right populist groups such as the Tea Party and white militia, and the emergence of the Christian Right, with its racist, anti-intellectual and fundamentalist ideology. The underpinnings of fascism are also evident in the reign of foreign and domestic terrorism that bears down on the so called enemies of the state (whistleblowers and nonviolent youthful protesters) and on those abroad who challenge America’s imperial mission; it is also visible in a growing pervasive surveillance system buttressed by the belief that everyone is a potential enemy of the state and should be rightfully subject to diverse and massive assaults on rights to privacy and assembly.

The return to authoritarianism can also be seen in the pervasive and racist war on youths, whether one points to a generation of young people saddled with unspeakable debt, poverty and unemployment, or the ongoing criminalization of behaviors that either represent trivial infractions, such as violating a dress code, or more serious forms of terrorism, such as incarcerating increasing numbers of low-income whites and poor minority youths. Americans live at a time when the history of those who have been cheated, murdered or excluded is being destroyed. Eliminated from this history are the collective narratives of struggle, resistance and rebellion against various forms of authoritarianism. We live in a time in which the politics of the moral coma is alive and well and is most visible in the ways in which the rise of the new extremism in the United States is being ignored. The repudiation of intellectual responsibility confirms what Leo Lowenthal once called the “regression to sheer Darwinism - or perhaps one should say infantilism,” along with any sense of moral accountability toward others or the common good. The government shutdown offers a clear case of a kind of historical and social amnesia and a rare glimpse of the parameters of the new authoritarianism.

During the past few decades, it has become clear that those who wield corporate, political and financial power in the United States thrive on the misery of others. Widening inequality, environmental destruction, growing poverty, the privatization of public goods, the attack on social provisions, the elimination of pensions and the ongoing attacks on workers, young protesters, Muslims and immigrants qualify as just a few of the injustices that have intensified with the rise of the corporate and financial elite since the 1970s. None of these issues are novel, but the intensification of the attacks and the visibility of unbridled power and arrogance of the financial, corporate and political elite that produces these ongoing problems are new and do not bode well for the promise of a democratic society.

Such failings are not reducible either to the moral deficiencies and unchecked greed of both major political parties or the rapacious power of the mega banks, hedge funds and investment houses. Those intellectuals writing to acknowledge the current state of politics in America understand the outgrowth of a mix of rabid racism, religious fundamentalism, civic illiteracy, class warfare and a savage hatred of the welfare state that now grips the leadership of the Republican Party. The new extremists and prophets of authoritarianism are diverse, and their roots are in what Chris Hedges calls the radical Christian right, Michael Lind calls the reincarnation of the old Jeffersonian-Jacksonian right and what Robert Parry and Andrew O’Hehir call racist zealots. All of these elements are present in American politics, but they are part of a new social formation in which they share, even in their heterogeneity, a set of organizing principles, values, policies, modes of governance and ideologies that have created a cultural formation, institutional structures, values and policies that support a range of anti-democratic practices ranging from the militarization of public life and acts of domestic terrorism to the destruction of the social state and all those public spheres capable of producing critical and engaged citizens.

Needless to say, all of these groups play an important role in the rise of the new extremism and culture of cruelty that now characterizes American politics and has produced the partial government shutdown and threatens economic disaster with the debt-ceiling standoff. What is new is that these various fundamentalist registers and ideological movements have produced a coalition, a totality that speaks to a new historical conjuncture, one that has ominous authoritarian overtones for the present and future. There is no talk among the new extremists of imposing only an extreme Christian religious orthodoxy on the American people or simply restoring a racial state; or for that matter is there a singular call for primarily controlling the economy. The new counter-revolutionaries and apostles of the Second Gilded age are more interested in imposing a mode of authoritarianism that contains all of these elements in the interest of governing the whole of social life. This suggests a historical conjuncture in which a number of anti-democratic forces come together to “fuse and form a kind of configuration” - a coming together of diverse political and ideological formations into a new totality. The partial government shutdown is a precondition and test run for a full coup d’état by the social formations driving this totality. And while they may lose the heated battle over the government shutdown and the debt ceiling, they have succeeded in executing their project and giving it some legitimacy in the dominant media.

Hiding beneath the discourse of partisan politics as usual, the authoritarian face of the new extremism is overlooked in the dominant media by terms such as “the opposing party,” “hard-line conservatives” or, in the words of New York Times columnist Sam Tanenhous, the party of “a post consensus politics.” In fact, even progressives such as Marian Wright Edelman fall into this trap in writing that “some members of Congress are acting like children - or, more accurately, worse than children.” In this case, the anti-democratic ideologies, practices and social formations at work in producing the shutdown and the potential debt-ceiling crisis are not merely overlooked but incorporated into a liberal discourse that personalizes, psychologizes or infantilizes behaviors that refuses to acknowledge or, in fact, succumbs to totalitarian tendencies.

There is no sense in the mainstream liberal and conservative discourses that a new authoritarianism haunts the current notion and ideal of governance and is the culmination of what Hannah Arendt once viewed as a historical trend toward the limiting, if not elimination, of the political as it relates to and furthers the promise of a democracy to come. The wider contexts of power and politics disappear in these discourses. We get a glimpse of this erasure in a statement by former Texas congressman and Republican Party House majority leader Dick Armey. In commenting on the shutdown, Armey raises the issue of “How does a guy like Ted Cruz, who’s relatively new in town, who nobody knows, who hasn’t even unpacked his bags, drive this whole process?” What Armey ignores in this revealing and stark assessment is that the very cultural, economic and political conditions that he has helped to put in place along with a range of other right-wing ideologues helped to create the perfect storm for Cruz to appear and set in motion the authoritarian tendencies that have been percolating in the social order since the late 1970s.

What is clear in the current impasse is that the Republican Party has held the U.S. government hostage, in part, because it disagrees with a health initiative that has been endorsed by a large segment of the American people, been deemed legal by the Supreme Court and played a significant role in getting Barack Obama re-elected. For some, these practices resemble a politics that appropriates the gangster tactics of extortion, but this understanding is only partially true. There is a deeper order of politics at work here, and there is more at stake than simply defunding the Affordable Care Act. As Bill Moyers points out, the attack on the Affordable Care Act is only one target in the sights of the new extremists. He writes:

Despite what they say, Obamacare is only one of their targets. Before they will allow the government to reopen, they demand employers be enabled to deny birth control coverage to female employees. They demand Obama cave on the Keystone pipeline. They demand the watchdogs over corporate pollution be muzzled, and the big, bad regulators of Wall Street sent home. Their ransom list goes on and on. The debt ceiling is next.

Moyers is correct, but his argument can be extended. What Americans are witnessing is a politics that celebrates a form of domestic terrorism, a kind of soft militarism and a hyper-masculine posturing in which communities are organized around resentment, racism and symbolic violence. With the partial government shutdown and the looming debt ceiling crisis engineered by the extremists driving the Republican Party, the amount of human suffering, violence and hardships that many individuals and families are experiencing border on catastrophic and open up a whole new act in the theater of cruelty, state violence, human misery and the exercise of raw and savage power.

The assassins now in power are cultivating a culture of fear, vengeance and hatred not only directed at disposable populations such as the poor, low-income minority youths, whistleblowers, immigrants and those who are disabled, uninsured and unemployed - but also at civil liberties, labor unions, women’s reproductive rights and voting rights. Neoliberal common sense now colonizes everyday life and spreads the market-driven gospel of privatization, commodification, deregulation and free trade. Competitiveness, self-interest and decentralization are the new mantras governing society and provide the ideological scaffolding for “moulding identities and characterizing social relations.” The pursuit of the public good, social justice and equality has been replaced by the crude discourse of commerce, the drive for profits and “rational choice models that internalize and thus normalize market-oriented behaviour.” Entrepreneurial identities replace all modes of solidarity invested in democratic principles, and self-interested actors supplant the discourse of the public good. The production of capital, services and material goods “are at the heart of the human experience.”

The connection between private troubles and public considerations has been broken. The many problems the American people now face - from unemployment and poverty to homelessness - regardless of the degree to which they are caused by larger social, economic and political forces are now individualized, placed on the shoulders of the victims who are now solely responsible for the terror, hardship and violence they experience. The shutdown is not another example of an egregiously inept and morally corrupt group of politicians, it is a flashpoint registering the degree to which the United States has become an authoritarian state, one now governed by a system in which economics drives politics, irrationality trumps reason, the public good is canceled out by an unchecked narcissism and ethical considerations are subordinated to the drive for profits at any cost.

For those who have refused to participate in the willful amnesia that marks the contemporary slide into authoritarianism, the totalitarian practices of the past few decades have been quite clear. Domestic spying; secret prisons; kill lists; military aggression; the rise of corporatism; the death-dealing culture of hyper-masculinity, drones and the spectacle of violence; and a monochromatic media have not only registered a shift from state power to corporate power but also a move from the welfare state to the warfare state. Consumer sovereignty erases the rights and obligations of citizens and eviscerates ethical claims and social responsibilities from the meaning of politics. Government is viewed as the enemy, except when it benefits the rich, corporations and hedge fund executives. At the same time that social programs are viewed as a pathology and drain on the state, intellectuals are incorporated into a spectacle of conformity where they lose their voices and become normalized.

The hijacking of democracy by extremists in and outside of the government appears completely disassociated from the needs of the American people, and as such the instruments of dominant politics, power and influence appear unaccountable. And unaccountability is the stuff of political tyrants, not simply religious fanatics or market fundamentalists; it has been a long time in the making and has been fed by a relentless culture of fear, warfare, greed, inequality, unbridled power formations, the destruction of civil liberties and a virulent racism that has a long history in the United States and has gone into overdrive since the 1980s, reaching its authoritarian tipping point after the tragedy of 9/11.

Obama may not be responsible for the government shutdown and the debt ceiling crisis, but he can be charged with furthering a climate of lawlessness that feeds the authoritarian culture supportive of a range of political, economic and cultural interests. The American anti-war activist Fred Branfman argues that:

Under Mr. Obama, America is still far from being a classic police-state of course. But no President has done more to create the infrastructure for a possible future police-state. This infrastructure will clearly pose a serious danger to democratic ideals should there be more 9/11s, and/or increased domestic unrest due to economic decline and growing inequality, and/or massive global disruption due to climate change.

The new extremists in the Republican Party are simply raising the bar for the authoritarian registers and illegal legalities that have emerged under Bush and Obama in the past decade - including the bailing out of banks guilty of the worst forms of corporate malfeasance, the refusal to prosecute government officials who committed torture, the undermining of civil liberties with the passage of the Patriot Act, the National Defense Authorization Act, the establishment of a presidential kill list and the authorization of widespread surveillance to be used against the American people without full transparency.

The current crisis has little to do with what some have called a standoff between the two major political parties. It is has been decades in the making and is part of a much broader coup d’état to benefit the financial elite, race baiters, war mongers and conservative ideologues such as the right-wing billionaires, David and Charles Koch, Rand Paul, Ted Cruz, Americans for Prosperity, the Club for Growth, the Heritage Foundation policy hacks and other extremist individuals and organizations that believe that democracy poses a threat to a government that should be firmly in the hands of Wall Street and other elements of the military-industrial-surveillance-prison complex.

The willingness and recklessness of the new extremists to throw most of the American people, if not all vestiges of economic security and democracy, into political and economic chaos is a measure of the depth and degree to which the United States has become subject to a new form of authoritarianism. Not only has the shutdown caused the American public $300 million a day and portends a financial catastrophe, but it has shut down programs such as WIC that provide funding for “nearly nine million pregnant women, recent mothers, and their children under age five who rely on the program’s supplemental vouchers for healthy food, expensive infant formula, and other necessities. Fifty-three percent of all infants born in the U.S. are fed through the WIC program.”  Nineteen thousand students in Head Start have lost their funding, 800,000 federal workers have been furloughed, and life-saving research for “children with serious medical needs has been affected.” In Maine, many of the poor will go without funds for heating, the Environmental Protection Agency has furloughed more than 16,000 workers, or 95 percent of its workforce, prompting what Sara Chieffo, the legislative director of the League of Conservation Voters, has called “a polluter’s heyday.”

It gets worse. Thousands of safety inspectors for the Federal Aviation Administration no longer on the job because of the shutdown will not be able to perform “included inspections for the de-icing of aircraft on the tarmac and checks that pilots do not fly longer than allowed.” As Think Progress has pointed out, this heavy-handed exercise of raw power means more people will get sick because routine food inspections by the FDA will be dramatically reduced, cutbacks in the staff of the Centers for Disease Control and Prevention (CDC) will put the country at risk for the spread of infectious diseases, many low-income poor will be cut off from needed nutritional assistance, agencies that conduct workplace inspections and ensure worker safety will not be on the job, and the work of public health researchers may be set back for years. In fact, the CDC and the Food and Drug Administration, which already were underfunded for years, are “scrambling to recall furloughed employees to deal with a dangerous food-borne salmonella outbreak and a lethal Hepatitis outbreak in Hawaii.”  As Michal Meurer and Candice Bernd point out, food-borne illnesses pose a real and dangerous threat to the American public, and the government shutdown should be seen as part of a broader right-wing plan to dismantle regulatory agencies, regardless of the lethal impact they may have on the American people. The food safety system is in crisis not for lack of resources and expertise but because of willful recklessness put into place through the right-wing policies of the new authoritarianism. There is more at work here than the recklessness of Senators Ted Cruz, Rand Paul, Marco Rubio and other Tea Party Republicans, bankrolled by a handful of billionaires; there is also the echo of authoritarianism that now saturates the American cultural and political landscape, endlessly normalizing itself in the media and other cultural apparatuses that showcase and normalize its corrupt politics, racist and class-based ideologies and culture of cruelty, all enabled under the sanctity of the market and in the name of state security. The shutdown and debt ceiling crisis signal the depth and degree to which the United States has become subject to a new form of authoritarianism.

A new type of criminal regime now drives American politics, one devoid of any sense of justice, equality and honor. It thrives on fear, the false promise of security and an egregious fusion of economic, religious and racist ideologies that have become normalized. This new dystopia wants nothing more than the complete destruction of the formative culture, collectives and the institutions that make democracy possible. Inequality is its engine, and disposability is the reward for large segments of the American public. It ideologies and structure of politics often have been hidden from the American public. The shutdown and debt-ceiling crisis have forced the new authoritarianism out of the shadows into the light. The lockdown state is on full display with its concentrated economic power and the willingness of the apostles of authoritarianism to push millions of people into ruin. Paraphrasing Eric Cazdyn, all of society is now at the mercy of a corporate, religious, and financial elite just as “all ideals are at the mercy of [a] larger economic logic.” The category of hell is alive and well in the racist and imperial enclaves of the rich, the bigoted, the bankers and hedge fund managers.

The question that remains is how can politics be redefined through a new language that is capable of articulating not only what has gone wrong with the United States but how the forces responsible can be challenged in new ways by new social formations and collective movements?  The crisis caused by the shutdown needs to be addressed through a discourse in which the ghosts and traces of historical modes of authoritarianism can be revealed in tandem with its newly revised edition. This is a daunting task, but too much is at stake to not take it up. The authoritarianism that rules American society functions as more than an apology for inequality, the ruthlessness of the market and the savage costs it imposes on the American public; it also represents a present danger that cannot be repeated in the future. Authoritarianism in its present form in America is the result of the formative culture, modes of civic education and sites of public pedagogy necessary for a viable democratic society degenerating into caricature, or what Adorno called an “empty and cold forgetting.” The ghost has become a reality, although it has been reconfigured to adjust to the specificity of the American political, economic and cultural landscape in the 21st century. In 2004, I wrote a book titled The Terror of Neoliberalism: The New Authoritarianism and the Eclipse of Democracy. What is different almost a decade later is a mode of state repression and an apparatus of symbolic and real violence that is not only more pervasive and visible but also more unaccountable, more daunting in its arrogance and disrespect for the most fundamental elements of justice, equality and civil liberties.

The new authoritarianism must be exposed as a politic of disaster and a new catastrophe, one that is rooted in large-scale terror and the death of the civic imagination. It has to be contoured with a sense of hope and possibility so that intellectuals, artists, workers, educators and young people can imagine otherwise in order to act otherwise.  If we have entered into an era of what Stanley Aronowitz calls “the repressive authoritarian state,” there are signs all over the globe that authoritarianism in its various versions is being challenged in countries that extend from Egypt and Greece to Chile and Mexico. The radical imagination is alive, but it has to be a site of struggle by those committed to creating a new politics, modes of identity, social relations, power arrangements and moral values that offer the glimpse of political and economic emancipation.

psyberartist (CC BY 2.0)

Empire of the Senseless

For the sake of argument, let’s assume the following to be true: Barack Obama is not a stooge, a cipher, an empty suit, or a puppet. He is not incompetent, indecisive, or deranged. He is, in fact, intelligent, purposeful, and rational. Let us further assume that Obama is sincere in his actions, if not always his rhetoric, and that his actions, from the persecution of whistleblowers to the assassination of American citizens, are premeditated, planned, intentional and taken without ambivalence.

What do we make of this? On the surface, it means that Obama is as culpable as he is capable. His icy certitude has always been his most grating affectation. Yet there is no one to hold him accountable for his crimes against the Constitution, high and low, not even the Visigoths of the House.  Despite the daily hysterics fulminating from the editorial page of the Wall Street Journal, Obama is the choice of the elites, the man they want at the helm at this fraught moment for global capitalism. It’s his competence that makes him so dangerous.

Obama is the executive manager of what the British punk band the Mekons called the “Empire of the Senseless”. By this, I don’t mean an empire that is inchoate, but a government that doesn’t sense, that doesn’t feel, that is immune to the conditions and desires of the governed. America has degenerated into a sham state, a republic of the observed and monitored, where government operations are opaque and menacing. A pervasive dread seems to envelope the nation.

So, in the face of this reality, we confront, once more, Lenin’s piercing question: what is to be done? This is not a metaphysical exercise any more, but an existential and practical one of the most extreme urgency. How do we respond to an ossified state that serves abstract interests yet remains chillingly indifferent to human suffering? Moreover, where do we turn when the institutions that once served as forces of social change are now largely kaput.

The politics of lesser evilism remains a crippling idée fixe for most of the Left, despite the carnage strewn across the landscape by the politicians they have enabled over the last two decades: from the Clintons to John Kerry and Obama. The Democratic Party itself has become a parody of a political enterprise, a corporate-financed ghost ship for the gullible, the deluded and the parasitical. For all practical purposes the party has been superceded as a functional entity by pseudo-interest groups like MoveOn and their new house organ, MSNBC, which provide daily distractions from and rationalizations for each new Obama transgression.

To a great measure, the responsibility for the fatal ease with which Obama has been able to implement his draconian policies, from domestic spying to drone strikes, must be borne by the timid response of the political left, who have serially denied what they knew to be Obama’s true agenda, an agenda of neoliberal austerity at home and imperial aggression abroad—an agenda that was incubating from the moment the young senator hand-picked Joseph Lieberman to be his ideological mentor in the US Senate.

Predictably, the more they indulge Obama, the more he tends to ignore, if not psychologically resent, their existence. For most of us, the economy is still crashing. A recent analysis by UC Berkeley’s Emmanuel Saez and Thomas Piketty of the Paris School of Economics, revealed that 95 percent of the economic gains since the recession began have been captured by the top one percent. This was not an accidental outcome. Obama’s economic plan was geared to generate precisely this result. But no one wants to talk about it on the Left.

Witness the president’s rare conclave with the Congressional Black Caucus. With black poverty and unemployment rates at startling highs, Obama swatted away meek queries about the savage toll his economic policies have inflicted on urban America and pressed the delegation to publicly cheerlead for his scheme to shower Syria with cruise missiles. The CBC members sat mutely, soaking in Obama’s humiliating lecture, while black America remains under a state of economic siege.

This brazen act was soon followed by Obama’s announcement that he had picked Jeffrey Zients to head the National Economic Council. Who is Zients you ask? Well, he was a top executive at Mitt Romney’s Bain Capital, plotting takeovers, mass firings, raids on pensions and de-unionization of factories. He did so well at this grim job that his net worth now tops $100 million. One might view this appointment as an act of casual sadism, rubbing salt in the wounds of progressives. But the Left is so moribund, so deeply immured in a political coma that the insult didn’t even prompt the slightest protest, not even a vestigial yelp for old time’s sake.

Liberals seem to have finally come to terms with their own vacuity.

What about the rest of us? What do we do? Here we must turn to the heroic revelations of Edward Snowden, which denuded the government’s aspirations toward a kind of roving omniscience, probing and recording the most intimate beliefs and intentions of its citizens. After the initial tingles of paranoia fade, we might be able to view this as a perversely liberating condition. What a relief! We no longer have to hide our discontent, our efforts to make sense of the senseless. We are free to become the sovereigns of our own actions without fear of disclosure.

And so we remain, nearly all of us, left and right, clinging stubbornly to the tiny freedoms that remain: to object, to denounce and to resist, until a real oppositional force emerges. Or SEAL Team Six shows up at the back door.

Note: 

On October 7th, CounterPunch published an article by gonzo journalist Ruth Fowler titled Regressive Feminism: Of Sinead, Miley and Amanda. Some of the language in the essay was crude and found to be offensive by many readers. Even CounterPunch staffers recoiled at the use of the word “cunt” and the phrase “should probably be kicked in the vagina.” Ms. O’Connor contacted me to express her genuine outrage at the essay and the fact she felt the language was an incitement to sexual violence. Of course, we find sexual violence of any kind abhorrent. These kinds of phrases are often especially traumatic to those who have experienced sexual abuse. At her request, I have removed the offensive sentences. We apologize to Sinead O’Connor, a musician we have long admired and a known victim of sexual violence and to other victims of sexual violence. We hereby pledge to refrain from publishing any future articles containing such offensive and distressing language.–JSC

Jeffrey St. Clair is the author of Been Brown So Long It Looked Like Green to Me: the Politics of NatureGrand Theft Pentagon and Born Under a Bad Sky. His latest book is Hopeless: Barack Obama and the Politics of Illusion. He can be reached at: [email protected]

Amash: NSA Docs Were Withheld From Congress By Higher Ups

Rep. Justin Amash, the Congressman who attempted to defund the NSA recently in the wake of the domestic spying revelations has indicated that he believes the House Intelligence Committee withheld information it had about the programs from selected representatives.

Has the US war on terror just had its Cronkite moment?

Revelations about US domestic spying and the NSA's massive PRISM web-surveillance program have harmed not only trust in the Obama administration, but also confidence in US bond markets, which could have dire consequences.

8 Ways Obama Is As Bad — Or Worse — Than Bush On Civil...

Despite a rare court victory on Friday, Obama's legacy is dismal.

Photo Credit: WhiteHouse.gov

March 18, 2013  |  

Like this article?

Join our email list:

Stay up to date with the latest headlines via email.

Civil libertarians won a rare court victory against the Obama Administration’s ‘War on Terror’ on Friday when a U.S. District Court blocked the FBI from ordering telecom companies to turn over their customer’s data, such as e-mails and other records, and blocked FBI gag orders on this domestic spying program.

“In today's ruling, the court held that the gag order provisions of the statute violate the First Amendment and that the review procedures violate separation of powers,” Electronic Frontier Foundation lawyers, who brought the suit, said. “Because those provisions were not separable from the rest of the statute, the court declared the entire statute unconstitutional.”

This is the second time in recent months that civil libertarians have won a court victory over the Obama administration, although it is all but certain that it will appeal and seek to suspend the ruling. Last fall, a federal court suspended a section of a major defense bill that gave the government permission to arrest people who were suspected of speaking with alleged terrorists, which included several journalists who sued. However, another federal court reinstated that provision pending appeal.

“What is appears to illustrate is there are probably duel U.S. Pakistani nationals or maybe U.S. Afghan nationals who are being detained in military facilities and denied due process,” said Chris Hedges, an ex-foreign correspondent who sued.

What these developments underscore is that the Obama Administration barely differs from the George W. Bush Administration when it comes to the ‘War on Terrorism.’ While the Obama Administration has not continued specific tactics used by his predecessor, such as CIA black sites and specific torture techniques known as “enhanced interrogation,” it has gone further than Bush in other areas, such as with targeted assassinations using drones, and expanding the domestic national security state.

“There are the two War on Terror presidents,” wrote Glenn Greenwald recently. “ George Bush seized on the 9/11 attack to usher in radical new surveillance and detention powers in the PATRIOT ACT, spied for years on the communications of US citizens without the warrants required by law, and claimed the power to indefinitely imprison even US citizens without charges in military brigs.

“His successor, Barack Obama, went further by claiming the power not merely to detain citizens without judicial review but to assassinate them (about which the New York Times said: ‘It is extremely rare, if not unprecedented, for an American to be approved for targeted killing’). He has waged an unprecedented war on whistleblowers, dusting off [Woodrew] Wilson’s Espionage Act of 1917 to prosecute more then double the number of whistleblowers than all prior presidents combined. And he has draped his actions with at least as much secrecy, if not more so, than any president in US history.”

Let’s go through these and other areas that, as the National Journal said, should result in an “F” for Obama when historians assess his civil liberties record.

This February, BillMoyers.com published a list of eight contrasting the Obama and Bush Administrations on civil liberties. On six of the eight areas, Obama expanded or codified his predecessor’s policies:

1. Patriot Act is renewed on May 27, 2011: “Obama signs a renewal of several of the Patriot Act’s most controversial segments, including the use of ‘ roving wiretaps,’ the government’s expanded access to business records, and the ‘lone wolf’ provision, which allows surveillance of individuals not affiliated with any known terrorist organization. 

2. Wiretaps and Data Collections: “On December 30, 2012, Obama signs a five-year extension of the FISA Amendments Act. Provisions for more oversight and public disclosure failed to pass Congress.” (This is the law that the Electronic Frontier Foundation challenged and won a U.S. District Court injunction against last week. The administration has 90 days to appeal.)

US Supreme Court Justices attack US Voting Rights Act

law

 by Ed Hightower

On Wednesday, the US Supreme Court heard oral arguments in the case of Shelby County v. Holder, which challenges the key enforcement provisions of the Voting Rights Act (VRA) of 1965.

Right-wing justices Antonin Scalia, Samuel Alito and John Roberts made clear their opposition to the act. Justice Clarence Thomas, the fourth member of the far-right bloc on the court was, as usual, silent, and the “swing vote,” Justice Anthony Kennedy, acidly questioned the continued relevance of the landmark ruling.

The tenor of these reactionaries suggested the existence of a five-vote majority to either overturn or eviscerate the provisions of the law that require states of the former Jim Crow South and certain other jurisdictions to pre-clear changes in voting procedures with the federal government, so as to insure the right of blacks and other minorities to vote.

The very fact that the Supreme Court agreed to hear the challenge to the Voting Rights Act, which had been rejected by the federal trial court and the Court of Appeals for the DC Circuit, is indicative of the ferocity of the assault on democratic rights being waged by the ruling class. It reflects the aggressive posture of the court’s right-wing bloc, which may be poised to usurp the power of Congress, as stipulated in the 15th Amendment of the Constitution outlawing voting discrimination based on race, to pass legislation to enforce the Amendment’s provisions. Congress has repeatedly voted to extend the VRA, most recently in 2006, when both houses voted overwhelmingly to extend the act for another 25 years (98 to 0 in the Senate, 390 to 33 in the House).

The Voting Rights Act marked the high water mark of the civil rights movement of the 1950s and 1960s. In the preceding decades, African Americans, who were guaranteed all of the constitutional rights of whites through the 14th and 15th amendments to the Constitution passed in the aftermath of the Civil War, nevertheless suffered severe repression at the hands of state and local governments in the American South, including de facto disenfranchisement through poll taxes and literacy tests backed up by brutal violence and terror.

In the mass struggles of the 1950s and 1960s, hundreds of thousands of African Americans in the South backed by white workers and youth across the country fought against legal segregation in marches, sit-ins and protests, many of which met with violent attack both from state and local authorities and from organized terror groups such as the Ku Klux Klan. Bombings, lynchings and beatings claimed many lives.

The outcome of these struggles was the Civil Rights Act of 1964 and the Voting Rights Act of 1965. The VRA covered all of Alabama, Georgia, Louisiana, Mississippi, South Carolina, Virginia and Alaska, as well as parts of Arizona, Hawaii and Idaho. In 1975, Texas was added due to findings of persistent discrimination against non-English-speaking persons. Today, all or part of 16 states fall under the pre-clearance requirement of the VRA.

Immediately after the 2006 renewal of the VRA by Congress, a Texas municipality challenged it on grounds similar to those at issue in Shelby County. In its review of that case, commonly referred to as NAMUDNO (Northwest Austin Municipal Utility District Number One v. Holder), seven Supreme Court justices signed on to an opinion by Chief Justice Roberts that depicted Sections 4 and 5 of the act, the key enforcement sections, as outdated, and the 2006 congressional renewal as failing to take into account progressive changes in the South.

Shelby County largely concerns Section 5 of the Voting Rights Act, the pre-clearance provision. The suit also targets Section 4 of the act, which defines which jurisdictions will be subjected to the pre-clearance requirement.

Attorneys for Shelby County, Alabama argue that jurisdictions in their state should not be treated differently from those in any other state, claiming that there is no more overt discrimination against minority voters in Alabama jurisdictions than in any other state. During oral arguments, Alabama’s attorney brushed aside evidence of recurrent and frequent attempts to disenfranchise minority voters in Alabama and the states in question, insisting that the pre-clearance requirement posed an unacceptable intrusion into the sovereign state’s interest in managing elections within its borders.

The questioning by justices Scalia, Roberts and Alito, with Kennedy largely following suit, indicates a possible if not probable overturn of at least Section 4 of the VRA, leaving it up to Congress to create a new formula for determining which jurisdictions fall under the scope of pre-clearance, a remote prospect in the present political context that would have much the same effect as striking Sections 4 and 5 altogether.

Scalia’s contributions were particularly provocative. Referring to the ever-broader support for the VRA at each successive congressional renewal, Scalia made the following extraordinary comment:

“Now, I don’t think that’s attributable to the fact that it is so much clearer now that we need this. I think it is attributable, very likely attributable, to a phenomenon that is called perpetuation of racial entitlement…It’s a concern that this is not the kind of a question you can leave to Congress.”

Justice Kennedy posed the unrelated and almost nonsensical question to the government’s lawyer: “If Alabama wants to have monuments to the heroes of the civil rights movement, if it wants to acknowledge the wrongs of its past, is it better off doing that if it’s an [sic] own independent sovereign or if it’s under the trusteeship of the United States Government?”

The nominally liberal justice Stephen Breyer appeared inclined to conciliate with the right-wing majority, asking the government’s attorney, “What is the standard for when it [the VRA] runs out? Never? That’s something you have heard people worried about.”

The overturning or emasculation of the VRA would serve as a green light for broader attacks on democratic rights, and the right to vote in particular. Shelby County takes place in the context of more than a decade of mounting attacks on the right to vote, beginning with the infamous Gore v. Bush decision of December 2000, in which the Supreme Court shut down the counting of votes in Florida and handed the presidency to George W. Bush.

More recently, the Supreme Court ruled in Citizens United that corporations had the right to donate unlimited cash to election campaigns. This term it is hearing a suit to lift all restrictions on the amount of money individuals can donate to candidates for office. The domination of the electoral process and the political system by corporate money is being institutionalized and written into the law of the land.

The recent spate of disenfranchising measures adopted by states across the US in the form of voter ID laws, the curtailment of early voting and the purging of voter rolls represents more than just a gift to the Republican Party, whose strategists fear changing demographics will contribute to future electoral losses. It represents an ongoing and escalating break with democratic norms on the part of the corporate-financial elite.

The attack on the Voting Rights Act is an attack not just on minority workers, but on the democratic rights of the working class as a whole.

American and world capitalism face the deepest economic crisis since the Great Depression of the 1930s, and with it, growing resistance to relentless attacks on workers’ livings standards. This is the source of the turn by the ruling class toward police state forms of rule, from indefinite military detention and domestic spying to the authority claimed by President Obama to assassinate people branded as terrorists, including US citizens.

Media Covered Up US Assassination Base in Saudi Arabia

disinformation

For more than a year, several major US media outlets—including theWashington Post and the New York Times —deliberately concealed the existence of a US drone base in Saudi Arabia. The base was used to carry out many of the CIA’s extra-judicial assassinations, including the killing of at least two US citizens.

The decision not to report on the location of the base was made at the direct request of the Obama administration, underscoring once again the role of the media as an auxiliary arm of the state.

The drone base’s location was finally reported in an article published this week in the Times, shortly before a Senate hearing for John Brennan, who has been nominated by Obama to head the CIA. Brennan reportedly played a key role in establishing the base in Saudi Arabia, and has been central in the drawing up of the administration’s “kill list” of individuals to be assassinated.

The revelation came a day after NBC News released a leaked Justice Department white paper giving the administration’s legal rationale for assassinating US citizens, including Anwar Al-Awlaki in September 2011, one of those killed using drones from the Saudi base. Al-Awlaki’s 16-year old son, also a US citizen, was assassinated in a separate attack. (See, “The police state implications of Obama’s assassination program”)

Attempting to justify the decision not to report on the location of the drone base, Times managing editor Dean Baquet told the newspaper’s public editor, Margaret Sullivan, that, until the nomination of Brennan, the location of the drone base was a mere “footnote” to stories about the assassination program.

This false rationalization—that the location of the base was not particularly important or newsworthy—is contradicted by further statements from Baquet. Sullivan writes, “The government’s rationale for asking that the location be withheld was this: Revealing it might jeopardize the existence of the base and harm counterterrorism efforts. ‘The Saudis might shut it down because the citizenry would be very upset,’ [Baquet] said.”

Baquet added, “We have to balance that concern with reporting the news.”

Baquet and the Times are so deeply integrated into the state apparatus that they do not realize how devastating this statement is. The interests of the state—in engaging and covering up criminal actions abroad—have to be “balanced” with the ostensible task of the Times, to report the news. The newspaper accepts, moreover, the entire rationale of the “war on terror.”

Sullivan adds, “Mr. Baquet said he had a conversation with a C.I.A. official about a month ago and, at that time, agreed to continue withholding the location, as it had done for many months.”

According to Sullivan, as this week’s Times article was being prepared, the CIA and government were informed that the newspaper was planning on revealing the location and that “officials should contact Mr. Baquet if they wanted to discuss it further.” This time, there was no objection from the Obama administration.

In other words, the Times and its reporters are in regular discussion with the CIA over what is and is not “fit to print.”

By Baquet’s own admission, the Times decided not to expose the location of the base because it could cause problems for US ally Saudi Arabia, a despotic monarchy that is a lynchpin to the broader strategy of American imperialism in the Middle East. The monarchy plays a key role not only in the drone assassination program, but also the war in Syria and efforts to suppress popular uprisings throughout the region against pro-US governments.

There is widespread opposition within Saudi Arabia to the presence of the US military. After the 2003 US invasion of Iraq, bases were formally removed, though there remained a large military-intelligence presence in the country.

The Times was also covering for Brennan, currently the director of the National Counterterrorism Center under Obama. Brennan was a former CIA station chief in Saudi Arabia and evidently had close connections to the Saudi monarchy, helping to negotiate the establishment of the base. A base in Saudi Arabia is particularly important due to its proximity to Yemen, where al-Awlaki was killed; Iran, where US spy drones are known to operate; and North Africa.

The American media in general, and the New York Times in particular, has a long and sordid record of collusion with the government in promoting war and covering up for crimes, at home and abroad. Particularly since the attacks of September 11, the media has integrated itself more thoroughly into the state apparatus, going far beyond the “embedded” reporters that travel with the US military.

One particularly egregious example was the decision by the New York Timesto withhold publication of National Security Agency’s illegal domestic spying program at the request of the Bush administration for over a year. The period in which the newspaper sat on the information without informing the American people included the 2004 US elections. (See, “A damning admission: New York Times concealed NSA spying until after 2004 elections”)

When the newspaper published a report on the destruction of the CIA videotapes of torture in 2007, it acknowledged that this came only after discussions with the government and evidently another lengthy delay. (See, “New York Times bows to White House pressure over CIA tapes story”)

There can be no doubt that there are many more crimes carried out by the government that are known to the editors of the Times and other major American media, but remain concealed from the American people.

Five Questions For John Brennan

I’m sure I could grill John Brennan for hours. But after a lot of thought, here are the five questions I believe most important that should be asked of him today.

1) Do you plan to continue lying to Americans?

You have made a number of demonstrable lies to the American people, particularly regarding the drone program and the Osama bin Laden raid. Most egregiously in 2011, you claimed“there hasn’t been a single collateral death” in almost a year from drone strikes; when challenged, you revised that by saying, “the U.S. government has not found credible evidence of collateral deaths,” even in spite of a particularly egregious case of civilian deaths just months earlier. On what basis did you make these assertions? What definition of civilian were you using in each assertion? (More background)

In addition, in a speech purportedly offering transparency on the drone program, you falsely suggested we know the identities of all people targeted by drones. Why did you choose to misrepresent the kind of intelligence we use in some strikes?

2) What was the intelligence supporting the first attempt to kill Anwar al-Awlaki?

The US government’s first attempt to kill Anwar al-Awlaki with a drone strike was December 24, 2009. WikiLeaks cables make it clear that Awlaki was a primary target of that strike, not just intended collateral damage. Yet the Webster report makes clear that on that day — that is, until the Underwear Bomber attempt the next day — the Intelligence Community did not consider Awlaki to be operational. Thus, the strike seems to have been approved before he fulfilled the criteria of the white paper released the other day, which authorizes the targeting of senior operational leaders of groups like AQAP. What was the legal basis for targeting this American citizen at a time when the IC did not believe him to be operational? (More background)

3) Will your close friendships with Saudis cloud your focus on the US interest?

In a fawning profile the other day, Daniel Klaidman nevertheless laid out the following points:

  • You considered Yemen to be a “domestic conflict.”
  • You opposed signature strikes in the country.
  • You nevertheless approved signature strikes in Yemen because of personal entreaties from people you know from when you were stationed on the Arabian peninsula in the 1990s.

In addition, recent reports have confirmed that the drone strike that killed Anwar al-Awlaki was launched from Saudi territory.Were the personal entreaties you responded to from Yemenis or Saudis (or both)?What role did the Saudis have in the Awlaki strike? Did they have an operational role?As someone with such close ties to liaison sources, how have you and will you manage to prioritize the interests of the United States over the interests of friends you have from two decades ago?To what degree is your intelligence sharing — especially with the Saudis — a stovepipe that creates the same risks of intelligence failures that got us into the Iraq War? (More background)

4) What role did you have in Bush’s illegal wiretap program?

The joint Inspector General report on the illegal wiretap program reported that entities you directed — the Terrorist Threat Integration Center in 2003 and 2004, and the National Counterterrorism Center in 2004 and 2005 — conducted the threat assessments for the program.What role did you have, as the head of these entities, in the illegal wiretapping of Americans? To what extent did you know the program violated FISA? What role did you have in counseling Obama to give telecoms and other contractors immunity under the program? What influence did you have in DOJ decisions regarding suits about the illegal program, in particular the al-Haramain case that was thrown out even after the charity had proved it had been illegally wiretapped? Did you play any role in decisions to investigate and prosecute whistleblowers about this and other programs, notably Thomas Drake? (More background)

5) Did you help CIA bypass prohibitions on spying domestically with the NYPD intelligence (and other) programs?

In your additional prehearing questions, you admit to knowing about CIA’s role in setting up an intelligence program that profiled Muslims in New York City. What was your role in setting up the program? As someone with key oversight over personnel matters at the time, did you arrange Larry Sanchez’ temporary duty at the NYPD or CIA training for NYPD detectives?Have you been involved in any similar effort to use CIA resources to conduct domestic spying on communities of faith? You said the CIA provides (among other things) expertise to local groups spying on Americans. How is this not a violation of the prohibition on CIA spying on Americans? (More background)

Obama Declares Global Cyberwar

Cyber Warfare: US Military Hackers and Internet Spies

Throughout his tenure, Obama governed lawlessly for the monied interests that own him. He’s waged no-holds-barred war on humanity.

Strategy includes homeland tyranny, fear-mongering, saber rattling, hot wars, proxy ones, drone ones, domestic political ones, geopolitical ones, financial ones, anti-populist ones, sanctions, subversion, sabotage, targeted assassinations, mass murder, cyberwar, and more.

In May 2009, Obama prioritized cybersecurity. He called cyber-threats “one of the most serious economic and national security challenges we face as a nation.”

“America’s economic prosperity in the 21st century will depend on cybersecurity.”

He ordered a top-to-bottom review. A Cyberspace Policy Review report followed. He waged cyberwar on Iran. He did so cooperatively with Israel.

In spring 2010, Iranian intelligence discovered Stuxnet malware contamination. The computer virus infected its Bushehr nuclear facility. At the time, operations were halted indefinitely.

Israel was blamed. Washington was involved. Had the facility gone online infected, Iran’s entire electrical power grid could have been shut down.

A more destructive virus called Flame malware is known. Internet security experts say it’s 20 times more harmful than Stuxnet. Iran’s military-industrial complex is targeted. So is its nuclear program. Maximum disruption is planned.

Obama supports draconian cybersecurity bills. Passage threatens constitutional freedoms.

Targeted assassinations eliminate America’s enemies. Lawless domestic spying is policy. So is warrantless wiretapping. Americans are as vulnerable as others.

Obama’s waging war on humanity. He’s doing it multiple ways. Last October, he signed an executive order. It expanded military authority. It authorized cyberattacks. It redefined defense. Doing so lawlessly legitimizes aggression.

In November, Presidential Policy Directive 20 followed. It’s secret. It set guidelines for confronting cyberspace threats.

Last fall, Defense Secretary Leon Panetta warned of a “cyber Pearl Harbor.” It could “cause physical destruction and loss of life,” he said. It could “paralyze and shock the nation and create a new profound sense of vulnerability.”

US officials never lack for hyperbole. Fear-mongering is longstanding policy. So are Big Lies, false flags, and other pretexts for wars, other military actions, and disruptive ones.

Cyberwar capability adds to America’s arsenal. Preemption adds another dirty tactic.

In early February, US media reports headlined stepped-up cyberwar. Preemption is prioritized. Nation states, organizations, and individuals are fair game.

US Cyber Command (USCYBERCOM) has full operational control. It’s a cyber hit squad. It’s part of the US Strategic Command.

It’s based at Fort Meade, MD. General Keith Alexander serves as National Security Agency (NSA) director and US Cyber Command head.

The New York Times cited a secret legal review. It affords Obama sweeping preemptive cyberattack powers.

It permits him “to order a preemptive strike if the United States detects (allegedly) credible evidence of a major digital attack looming from abroad.”

His word alone is policy. Corroborating evidence isn’t needed. Efforts to protect classified and proprietary information are increasing.

The Washington Post said wireless and technology giants are battling over a plan to create super Wi-Fi networks.

The Wall Street Journal said Google, Microsoft and Amazon are competing to control cloud computing business.

The Christian Science Monitor said preemptive cyberwar entered America’s arsenal. It “nugded up along side other” approved tactics and techniques.

New policies govern how intelligence agencies work. They’ve been unrestrained before. They’ll have greater powers now.

The New York Times said they’ll be able to “carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war.”

Rules of engagement are classified. Effectively there are none. Cyber-warriors are freewheeling. They’re unrestrained.

They’ll operate anywhere globally. China is a target of choice. It’s America’s main economic and geopolitical competitor.

An unnamed US official said new cyberwar strategy is “far more aggressive than anything” used or recommended before. The gloves are off. Anything goes.

Major disruptions can occur without firing a shot. Military and/or civilian power grids can be crippled. So can financial systems and communications networks.

Another unnamed US official said cyberweapons are so powerful that “they should be unleashed only by” presidential order. Exceptions would be tactical strikes.

Examples include disabling command and control as well as ground radar ahead of conventional strikes. At the same time, most cyberoperations are presidential prerogatives.

Expect Obama to take full advantage. Extrajudicial operations are prioritized. Rule of law principles are spurned. Operational procedures have been in development for over two years.

They’re headlined now. They coming out when cyberattacks more often target US companies and critical infrastructure. An unnamed US power station was crippled for weeks.

The New York Times, Washington Post, and Wall Street Journal reported cyberattacks. Obama prioritizes preemption. Doing so has no legal standing. Self-defense alone is justified. Acting on suspicions without evidence is aggression.

New rules serve Washington. Lawyers get marching orders. They’re well paid to subvert accepted legal standards. Doing so doesn’t change them.

What constitutes “reasonable and proportionate force” resides in the eye of the aggressor. New guidelines exclude the Pentagon from defending US companies or individuals without presidential authority.

Doing so is Homeland Security’s prerogative. The FBI has investigatory authority. Cybersecurity legislation remains stalled in Congress. Expect stepped up efforts for passage.

Doing so will more greatly comprise freedom. Full-blown tyranny approaches. It’s a hair’s breadth away. Whistleblowers are targeted. Dissent is endangered.

There’s no place to hide. Big Brother’s expanding exponentially. Cyber-preemption adds greater police state power.

On February 3, a Washington Post editorial headlined “Cyberwar, out of the shadows,” saying:

US Cyber Command is expanding exponentially. Doing so “is indicative of how conflict is moving toward center stage for the military, a domain similar to land, sea, air and outer space.”

It’s heading America toward unchallenged dominance.

In May 2000, the Pentagon’s Joint Vision 2020 called for “full spectrum dominance” over all land, surface and sub-surface sea, air, space, electromagnetic spectrum and information systems with enough overwhelming power to fight and win global wars against any adversary.

Doing so includes nuclear weapons use preemptively. Non-nuclear countries and adversaries are fair game.

Cyber Command includes:

(1) “Combat mission forces” cooperatively with military units.

(2) “Protection forces” to defend Pentagon networks.

(3) “National mission forces” to head off threats to critical infrastructure. They’ll operate outside America. They’ll function anywhere if authorized. They’ll strike US adversaries preemptively.

Targeting cuts both ways. Incoming attacks can precede or follow US ones. Secrecy is prioritized but compromised. Spies have clever ways of doing it.

Rules of engagement aren’t clear. Public information is limited. Sunlight is the best disinfectant. Policy need generous doses.

“If conflict in cyberspace is underway,” said the Post, “then it is important to sustain support for the resources and decisions to fight it, and that will require more candor.”

Expect little forthcoming from the most secretive administration in US history. Obama’s first term prioritized homeland repression and lawless aggression. Imagine what he has in mind for term two.

Stephen Lendman lives in Chicago and can be reached at [email protected] 

His new book is titled “Banker Occupation: Waging Financial War on Humanity.”

http://www.claritypress.com/LendmanII.html

Visit his blog site at sjlendman.blogspot.com and listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network Thursdays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.

http://www.progressiveradionetwork.com/the-progressive-news-hour

http://www.dailycensored.com/obama-declares-global-cyberwar/

Mass shootings kill far more than Muslim American terrorism — research

People hold signs memorializing Sandy Hook Elementary School as they participate in the March on Washington for Gun Control. (Reuters / Jonathan Ernst)

People hold signs memorializing Sandy Hook Elementary School as they participate in the March on Washington for Gun Control. (Reuters / Jonathan Ernst)

Mass shooting fatalities by far exceed the number of those killed in Muslim-related terrorism in the US, new research says. The number of terrorist incidents involving Muslim Americans has shown a dramatic drop since 2009.

­Fourteen Muslim-Americans committed or were charged with terrorist crimes in 2012, down from 21 in 2011, 26 in 2010 and 49 in 2009, according to the fourth annual report by North Carolina's Triangle Center on Terrorism and Homeland Security.

(Image from tcths.sanford.duke.edu)
(Image from tcths.sanford.duke.edu)

Of the 14 offenders in 2012, only one was accused of executing a violent attack (the bombing of a Social Security office in Casa Grande, Ariz.). The other perpetrators were arrested at an early stage of their terrorist plots.

The author of the research, sociology professor Charles Kurzman, who has been studying the issue for the past three years, concluded that "the number of Muslim-Americans indicted for support of terrorism — financing, false statements, and other connections with terrorist plots and organizations, aside from violent plots — fell from 27 individuals in 2010 to 8 in 2011, bringing the total to 462 since 9/11."

“Online, there’s all sorts of radical material out there — exhortations to violence, [instructions], and yet despite it being out there, so few people are taking it up,” Kurzman told Wired magazine.  

The research shows that excessive fear of homegrown terrorism by radicalized Muslim Americans is unfounded.  

In just 2012 alone, mass shootings claimed lives of at least 66 Americans – “twice as many fatalities as from Muslim-American terrorism in all 11 years since 9/11,” Kurzman’s team noted.

But despite the constant drop in the number of homegrown US Muslim terrorists, law enforcement and homeland security has not eased scrutiny of Muslim Americans.

The FBI continues geo-mapping Muslims regardless of their involvement in any crime, Wired says, moreover the Patriot Act has been extended until at least 2015 and other contentious post-9/11 laws that remain in place.

After the September 11 terrorist attacks, the New York Police Department embarked on a mission to preclude any repeat of the tragedy, which resulted in monitoring Muslim activities in New York – and far beyond.

It was discovered that the NYPD had been conducting clandestine surveillance of Muslims and collecting intelligence everywhere from local markets to mosques and even in cities abroad.

And while Muslim-Americans came opposed the surveillance, New York mayor, Michael Bloomberg stood by the NYPD practice saying that the rest of the world should be thankful for the department’s activity. He defended the NYPD's right to go anywhere in the country in search of terrorists without telling local police.

Last summer, a group of Muslims filed another case against the NYPD over its domestic spying out of its jurisdiction in New Jersey.

The authors of the research do not rule out that the decline might be due to counter-terrorism policies that help to disrupt and deter home grown US Muslim terrorism. At the same time, Kurzman says, the mismatch between the scale of the terrorism problem and the scale of the government’s response is surprising.

Law enforcement, including “informants and undercover agents,” were involved in “almost all of the Muslim-American terrorism plots uncovered in 2012,” the report says.

“Until public opinion starts to recognize the scale of the problem has been lower than we feared, my sense is that public officials are not going to change their policies,” Kurzman was cited by Wired as saying.

How the Anti-Defamation League Fuels Islamophobia

The ADL's anti-Arab, pro-Israel mindset has led the group to perpetuate an anti-Muslim worldview.

Abraham Foxman, the head of the Anti-Defamation League, at a Hudson Union Society event in January 2011.
Photo Credit: Justin Hoch/Wikimedia Commons

February 1, 2013  |  

Like this article?

Join our email list:

Stay up to date with the latest headlines via email.

The Anti-Defamation League bills itself, and is typically seen by many in the mainstream Jewish community and beyond, as the "nation's premier civil rights/human relations agency.”[1] In fact, the ADL’s conduct over the years is at odds with this one-dimensional view of the group as a long-time champion of civil liberties. The ADL mission statement, for instance, describes it as a group that “fights all forms of bigotry, defends democratic ideals and protects civil rights for all."[2] Yet, a record going back decades shows something very different, including a shift “from civil rights monitoring to espionage and intelligence gathering.”[3] Mistrust of the ADL among those concerned about civil and human rights has deep roots.

In the 1970s, the ADL, which had been tracking neo-Nazis and other right-wing U.S. groups, began to also focus on critics of Israeli policies.[4] Since the 1970s, the ADL and its chapters have issued numerous publications to expose alleged “Arab propaganda” on university campuses and to silence and intimidate Arab Americans and others who did not share their perspective on Israel.[5] Branding any criticism of Israel as “anti-Semitism,” ADL publications like Pro-Arab Propaganda in America: Vehicles and Voices, a Handbook (1983) effectively developed a “ blacklist” of faculty, staff, and campus groups.[6] The Middle East Studies Association singled out “the New England Regional Office of the ADL for circulating a document on college campuses ‘listing factually inaccurate and unsubstantiated assertions that defame specific students, teachers, and researchers as 'pro Arab propagandists.’"[7]

Front-page investigative reports in the San Francisco Examiner during the winter and spring of 1993 revealed that the ADL had been carrying out surveillance of almost 10,000 people and 950 organizations.[8] The Examiner reported that the ADL particularly targeted Arab Americans and Arab American organizations and also spied on such groups as the ACLU, ACT UP, Artists Against Apartheid, Americans for Peace Now, Asian Law Caucus, Greenpeace, NAACP, New Jewish Agenda, and the United Farm Workers, as well as three current or past members of Congress.[9] The FBI had also found that the ADL had been sending surveillance information on U.S. anti-apartheid groups to South Africa (which was an ally of Israel).[10]

The San Francisco Examiner exposé revealed that the ADL’s domestic spying involved a San Francisco police officer and a “full-time salaried undercover investigator,” who had been working for the ADL for 32 years.[11] Running “a public/private spying ring,” the ADL received aid from local police and federal agencies.[12] The Examiner reported that “FBI documents released through the Freedom of Information Act show that special agents in charge of FBI field offices throughout the nation were explicitly ordered by Bureau headquarters in Washington, D.C. during the 1980s to cooperate with the ADL.”[13] Six years after the filing of a class action suit coordinated by the American-Arab Anti-Discrimination Committee (ADC), the ADL was fined in 1999 and “under the permanent injunction issued by Federal Judge Richard Paez . . . [was] permanently enjoined from engaging in any further illegal spying against Arab-American and other civil rights groups.”[14] As Nabeel Abraham has written in “Anti-Arab Racism and Violence in the United States,” “The overall effect of the ADL’s practices is to reinforce the image of Arabs as terrorists and security threats, thereby creating a climate of fear, suspicion, and hostility toward Arab-Americans and others who espouse critical views of Israel, possibly leading to death threats and bodily harm.”[15]

*****

The ADL’s anti-Arab, staunchly pro-Israel mindset, which was behind decades of illegal spying, enabled it to easily incorporate an anti-Muslim worldview that has become increasingly pervasive after 9/11.[16] This has been a period of growing popularity for the “clash of civilizations theory,” which characterizes the causes of conflict in the post-Cold War world as fundamental “cultural” differences between Islamic and Western civilizations, rather than history, politics, imperialism, neo-colonialism, struggles over natural resources, or other factors.[17] Further, the Islamophobic belief that all Muslims were responsible for the 9/11 attacks and that all Muslims, as well as Arabs and South Asians, should be targeted provides a dominant U.S. narrative that brands all members of these groups as “terrorists,” “potential terrorists,” or “terrorist-sympathizers.”[18] Like others within and outside the Jewish community, the ADL views the U.S. focus on the domestic and global “war on terror” as integral to ensuring Israeli security and maintaining the United States’ “special” relationship with Israel.

Pentagon’s New Massive Expansion of ‘Cyber-Security’ Unit is About Everything Except Defense

As the US government depicts the Defense Department as shrinking due to budgetary constraints, the Washington Post this morning announces "a major expansion of [the Pentagon's] cybersecurity force over the next several years, increasing its size more than fivefold."

The National Security Agency (NSA) headquarters in Fort Meade, Maryland. Among other forms of intelligence-gathering, the NSA secretly collects the phone records of millions of Americans, using data provided by telecom firms AT&T, Verizon and BellSouth. (Photo: NSA/Getty Images)

Specifically, says the New York Times this morning, "the expansion would increase the Defense Department's Cyber Command by more than 4,000 people, up from the current 900." The Post describes this expansion as "part of an effort to turn an organization that has focused largely on defensive measures into the equivalent of an Internet-era fighting force." This Cyber Command Unit operates under the command of Gen. Keith Alexander, who also happens to be the head of the National Security Agency, the highly secretive government network that spies on the communications of foreign nationals - and American citizens.

The Pentagon's rhetorical justification for this expansion is deeply misleading. Beyond that, these activities pose a wide array of serious threats to internet freedom, privacy, and international law that, as usual, will be conducted with full-scale secrecy and with little to no oversight and accountability. And, as usual, there is a small army of private-sector corporations who will benefit most from this expansion.

Disguising aggression as "defense"

Let's begin with the way this so-called "cyber-security" expansion has been marketed. It is part of a sustained campaign which, as usual, relies on blatant fear-mongering.

In March, 2010, the Washington Post published an amazing Op-Ed by Adm. Michael McConnell, Bush's former Director of National Intelligence and a past and current executive with Booz Allen, a firm representing numerous corporate contractors which profit enormously each time the government expands its "cyber-security" activities. McConnell's career over the last two decades - both at Booz, Allen and inside the government - has been devoted to accelerating the merger between the government and private sector in all intelligence, surveillance and national security matters (it was he who led the successful campaign to retroactively immunize the telecom giants for their participation in the illegal NSA domestic spying program). Privatizing government cyber-spying and cyber-warfare is his primary focus now.

McConnell's Op-Ed was as alarmist and hysterical as possible. Claiming that "the United States is fighting a cyber-war today, and we are losing", it warned that "chaos would result" from an enemy cyber-attack on US financial systems and that "our power grids, air and ground transportation, telecommunications, and water-filtration systems are in jeopardy as well." Based on these threats, McConnell advocated that "we" - meaning "the government and the private sector" - "need to develop an early-warning system to monitor cyberspace" and that "we need to reengineer the Internet to make attribution, geolocation, intelligence analysis and impact assessment - who did it, from where, why and what was the result - more manageable." As Wired's Ryan Singel wrote: "He's talking about changing the internet to make everything anyone does on the net traceable and geo-located so the National Security Agency can pinpoint users and their computers for retaliation."

The same week the Post published McConnell's extraordinary Op-Ed, the Obama White House issued its own fear-mongering decree on cyber-threats, depicting the US as a vulnerable victim to cyber-aggression. It began with this sentence: "President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter." It announced that "the Executive Branch was directed to work closely with all key players in US cybersecurity, including state and local governments and the private sector" and to "strengthen public/private partnerships", and specifically announced Obama's intent to "to implement the recommendations of the Cyberspace Policy Review built on the Comprehensive National Cybersecurity Initiative (CNCI) launched by President George W. Bush."

Since then, the fear-mongering rhetoric from government officials has relentlessly intensified, all devoted to scaring citizens into believing that the US is at serious risk of cataclysmic cyber-attacks from "aggressors". This all culminated when Defense Secretary Leon Panetta, last October, warned of what he called a "cyber-Pearl Harbor. This "would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation and create a profound new sense of vulnerability." Identifying China, Iran, and terrorist groups, he outlined a parade of horribles scarier than anything since Condoleezza Rice's 2002 Iraqi "mushroom cloud":

"An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches. They could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country."

As usual, though, reality is exactly the opposite. This new massive new expenditure of money is not primarily devoted to defending against cyber-aggressors. The US itself is the world's leading cyber-aggressor. A major purpose of this expansion is to strengthen the US's ability to destroy other nations with cyber-attacks. Indeed, even the Post report notes that a major component of this new expansion is to "conduct offensive computer operations against foreign adversaries".

It is the US - not Iran, Russia or "terror" groups - which already is the first nation (in partnership with Israel) to aggressively deploy a highly sophisticated and extremely dangerous cyber-attack. Last June, the New York Times' David Sanger reported what most of the world had already suspected: "From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran's main nuclear enrichment facilities, significantly expanding America's first sustained use of cyberweapons." In fact, Obama "decided to accelerate the attacks . . . even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran's Natanz plant and sent it around the world on the Internet." According to the Sanger's report, Obama himself understood the significance of the US decision to be the first to use serious and aggressive cyber-warfare:

"Mr. Obama, according to participants in the many Situation Room meetings on Olympic Games, was acutely aware that with every attack he was pushing the United States into new territory, much as his predecessors had with the first use of atomic weapons in the 1940s, of intercontinental missiles in the 1950s and of drones in the past decade. He repeatedly expressed concerns that any American acknowledgment that it was using cyberweapons - even under the most careful and limited circumstances - could enable other countries, terrorists or hackers to justify their own attacks."

The US isn't the vulnerable victim of cyber-attacks. It's the leading perpetrator of those attacks. As Columbia Professor and cyber expert Misha Glenny wrote in the NYT last June: Obama's cyber-attack on Iran "marked a significant and dangerous turning point in the gradual militarization of the Internet."

Indeed, exactly as Obama knew would happen, revelations that it was the US which became the first country to use cyber-warfare against a sovereign country - just as it was the first to use the atomic bomb and then drones - would make it impossible for it to claim with any credibility (except among its own media and foreign policy community) that it was in a defensive posture when it came to cyber-warfare. As Professor Glenny wrote: "by introducing such pernicious viruses as Stuxnet and Flame, America has severely undermined its moral and political credibility." That's why, as the Post reported yesterday, the DOJ is engaged in such a frantic and invasive effort to root out Sanger's source: because it reveals the obvious truth that the US is the leading aggressor in the world when it comes to cyber-weapons.

This significant expansion under the Orwellian rubric of "cyber-security" is thus a perfect microcosm of US military spending generally. It's all justified under by the claim that the US must defend itself from threats from Bad, Aggressive Actors, when the reality is the exact opposite: the new program is devoted to ensuring that the US remains the primary offensive threat to the rest of the world. It's the same way the US develops offensive biological weapons under the guise of developing defenses against such weapons (such as the 2001 anthrax that the US government itself says came from a US Army lab). It's how the US government generally convinces its citizens that it is a peaceful victim of aggression by others when the reality is that the US builds more weapons, sells more arms and bombs more countries than virtually the rest of the world combined.

Threats to privacy and internet freedom

Beyond the aggressive threat to other nations posed by the Pentagon's cyber-threat programs, there is the profound threat to privacy, internet freedom, and the ability to communicate freely for US citizens and foreign nationals alike. The US government has long viewed these "cyber-security" programs as a means of monitoring and controlling the internet and disseminating propaganda. The fact that this is all being done under the auspices of the NSA and the Pentagon means, by definition, that there will be no transparency and no meaningful oversight.

Back in 2003, the Rumsfeld Pentagon prepared a secret report entitled "Information Operations (IO) Roadmap", which laid the foundation for this new cyber-warfare expansion. The Pentagon's self-described objective was "transforming IO into a core military competency on par with air, ground, maritime and special operations". In other words, its key objective was to ensure military control over internet-based communications:

dod cyber

It further identified superiority in cyber-attack capabilities as a vital military goal in PSYOPs (Psychological Operations) and "information-centric fights":

dod cyber

And it set forth the urgency of dominating the "IO battlespace" not only during wartime but also in peacetime:

dod cyber

As a 2006 BBC report on this Pentagon document noted: "Perhaps the most startling aspect of the roadmap is its acknowledgement that information put out as part of the military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans." And while the report paid lip service to the need to create "boundaries" for these new IO military activities, "they don't seem to explain how." Regarding the report's plan to "provide maximum control of the entire electromagnetic spectrum", the BBC noted: "Consider that for a moment. The US military seeks the capability to knock out every telephone, every networked computer, every radar system on the planet."

Since then, there have been countless reports of the exploitation by the US national security state to destroy privacy and undermine internet freedom. In November, the LA Times described programs that "teach students how to spy in cyberspace, the latest frontier in espionage." They "also are taught to write computer viruses, hack digital networks, crack passwords, plant listening devices and mine data from broken cellphones and flash drives." The program, needless to say, "has funneled most of its graduates to the CIA and the Pentagon's National Security Agency, which conducts America's digital spying. Other graduates have taken positions with the FBI, NASA and the Department of Homeland Security."

In 2010, Lawrence E. Strickling, Assistant Secretary of Commerce for Communications and Information, gave a speech explicitly announcing that the US intends to abandon its policy of "leaving the Internet alone". Noting that this "has been the nation's Internet policy since the Internet was first commercialized in the mid-1990s", he decreed: "This was the right policy for the United States in the early stages of the Internet, and the right message to send to the rest of the world. But that was then and this is now."

The documented power of the US government to monitor and surveil internet communications is already unfathomably massive. Recall that the Washington Post's 2010 "Top Secret America" series noted that: "Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." And the Obama administration has formally demanded that it have access to any and all forms of internet communication.

It is hard to overstate the danger to privacy and internet freedom from a massive expansion of the National Security State's efforts to exploit and control the internet. As Wired's Singel wrote back in 2010:

"Make no mistake, the military industrial complex now has its eye on the internet. Generals want to train crack squads of hackers and have wet dreams of cyberwarfare. Never shy of extending its power, the military industrial complex wants to turn the internet into yet another venue for an arms race.

Wildly exaggerated cyber-threats are the pretext for this control, the "mushroom cloud" and the Tonkin Gulf fiction of cyber-warfare. As Singel aptly put it: "the only war going on is one for the soul of the internet." That's the vital context for understanding this massive expansion of Pentagon and NSA consolidated control over cyber programs.

Bonanza for private contractors

As always, it is not just political power but also private-sector profit driving this expansion. As military contracts for conventional war-fighting are modestly reduced, something needs to replace it, and these large-scale "cyber-security" contracts are more than adequate. Virtually every cyber-security program from the government is carried out in conjunction with its "private-sector partners", who receive large transfers of public funds for this work.

Two weeks ago, Business Week reported that "Lockheed Martin Corp., AT&T Inc., and CenturyLink Inc. are the first companies to sign up for a US program giving them classified information on cyber threats that they can package as security services for sale to other companies." This is part of a government effort "to create a market based on classified US information about cyber threats." In May, it was announced that "the Pentagon is expanding and making permanent a trial program that teams the government with Internet service providers to protect defense firms' computer networks against data theft by foreign adversaries" - all as "part of a larger effort to broaden the sharing of classified and unclassified cyberthreat data between the government and industry."

Indeed, there is a large organization of defense and intelligence contractors devoted to one goal: expanding the private-public merger for national security and intelligence functions. This organization - the Intelligence and National Security Alliance (INSA) - was formerly headed by Adm. McConnell, and describes itself as a "collaboration by leaders from throughout the US Intelligence Community" and " combines the experience of senior leaders from government, the private sector, and academia."

As I detailed back in 2010, one of its primary goals is to scare the nation about supposed cyber-threats in order to justify massive new expenditures for the private-sector intelligence industry on cyber-security measures and vastly expanded control over the internet. Indeed, in his 2010 Op-Ed, Adm. McConnell expressly acknowledged that the growing privatization of internet cyber-security programs "will muddy the waters between the traditional roles of the government and the private sector." Indeed, at the very same time McConnell published this Op-Ed, the INSA website featured a report entitled "Addressing Cyber Security Through Public-Private Partnership." It featured a genuinely creepy graphic showing the inter-connectedness between government institutions (such as Congress and regulatory agencies), the Surveillance State, private intelligence corporations, and the Internet:

Private-sector profit is now inextricably linked with the fear-mongering campaign over cyber-threats. At one INSA conference in 2009 - entitled "Cyber Deterrence Conference" - government officials and intelligence industry executives gathered together to stress that "government and private sector actors should emphasize collaboration and partnership through the creation of a model that assigns specific roles and responsibilities."

As intelligence contractor expert Tim Shorrock told Democracy Now when McConnell - then at Booz Allen - was first nominated to be DNI:

Well, the NSA, the National Security Agency, is really sort of the lead agency in terms of outsourcing . . . . Booz Allen is one of about, you know, ten large corporations that play a very major role in American intelligence. Every time you hear about intelligence watching North Korea or tapping al-Qaeda phones, something like that, you can bet that corporations like these are very heavily involved. And Booz Allen is one of the largest of these contractors. I estimate that about 50% of our $45 billion intelligence budget goes to private sector contractors like Booz Allen.

This public-private merger for intelligence and surveillance functions not only vests these industries with large-scale profits at public expense, but also the accompanying power that was traditionally reserved for government. And unlike government agencies, which are at least subjected in theory to some minimal regulatory oversight, these private-sector actors have virtually none, even as their surveillance and intelligence functions rapidly increase.

What Dwight Eisenhower called the military-industrial complex has been feeding itself on fear campaigns since it was born. A never-ending carousel of Menacing Enemies - Communists, Terrorists, Saddam's chemical weapons, Iranian mullahs - has sustained it, and Cyber-Threats are but the latest.

Like all of these wildly exaggerated cartoon menaces, there is some degree of threat posed by cyber-attacks. But, as Single described, all of this can be managed with greater security systems for public and private computer networks - just as some modest security measures are sufficient to deal with the terrorist threat.

This new massive expansion has little to do with any actual cyber-threat - just as the invasion of Iraq and global assassination program have little to do with actual terrorist threats. It is instead all about strengthening the US's offensive cyber-war capabilities, consolidating control over the internet, and ensuring further transfers of massive public wealth to private industry continue unabated. In other words, it perfectly follows the template used by the public-private US National Security State over the last six decades to entrench and enrich itself based on pure pretext.

© 2013 Guardian News and Media Limited

Glenn Greenwald

Pentagon’s New Massive Expansion of ‘Cyber-Security’ Unit is About Everything Except Defense

As the US government depicts the Defense Department as shrinking due to budgetary constraints, the Washington Post this morning announces "a major expansion of [the Pentagon's] cybersecurity force over the next several years, increasing its size more than fivefold."

The National Security Agency (NSA) headquarters in Fort Meade, Maryland. Among other forms of intelligence-gathering, the NSA secretly collects the phone records of millions of Americans, using data provided by telecom firms AT&T, Verizon and BellSouth. (Photo: NSA/Getty Images)

Specifically, says the New York Times this morning, "the expansion would increase the Defense Department's Cyber Command by more than 4,000 people, up from the current 900." The Post describes this expansion as "part of an effort to turn an organization that has focused largely on defensive measures into the equivalent of an Internet-era fighting force." This Cyber Command Unit operates under the command of Gen. Keith Alexander, who also happens to be the head of the National Security Agency, the highly secretive government network that spies on the communications of foreign nationals - and American citizens.

The Pentagon's rhetorical justification for this expansion is deeply misleading. Beyond that, these activities pose a wide array of serious threats to internet freedom, privacy, and international law that, as usual, will be conducted with full-scale secrecy and with little to no oversight and accountability. And, as usual, there is a small army of private-sector corporations who will benefit most from this expansion.

Disguising aggression as "defense"

Let's begin with the way this so-called "cyber-security" expansion has been marketed. It is part of a sustained campaign which, as usual, relies on blatant fear-mongering.

In March, 2010, the Washington Post published an amazing Op-Ed by Adm. Michael McConnell, Bush's former Director of National Intelligence and a past and current executive with Booz Allen, a firm representing numerous corporate contractors which profit enormously each time the government expands its "cyber-security" activities. McConnell's career over the last two decades - both at Booz, Allen and inside the government - has been devoted to accelerating the merger between the government and private sector in all intelligence, surveillance and national security matters (it was he who led the successful campaign to retroactively immunize the telecom giants for their participation in the illegal NSA domestic spying program). Privatizing government cyber-spying and cyber-warfare is his primary focus now.

McConnell's Op-Ed was as alarmist and hysterical as possible. Claiming that "the United States is fighting a cyber-war today, and we are losing", it warned that "chaos would result" from an enemy cyber-attack on US financial systems and that "our power grids, air and ground transportation, telecommunications, and water-filtration systems are in jeopardy as well." Based on these threats, McConnell advocated that "we" - meaning "the government and the private sector" - "need to develop an early-warning system to monitor cyberspace" and that "we need to reengineer the Internet to make attribution, geolocation, intelligence analysis and impact assessment - who did it, from where, why and what was the result - more manageable." As Wired's Ryan Singel wrote: "He's talking about changing the internet to make everything anyone does on the net traceable and geo-located so the National Security Agency can pinpoint users and their computers for retaliation."

The same week the Post published McConnell's extraordinary Op-Ed, the Obama White House issued its own fear-mongering decree on cyber-threats, depicting the US as a vulnerable victim to cyber-aggression. It began with this sentence: "President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter." It announced that "the Executive Branch was directed to work closely with all key players in US cybersecurity, including state and local governments and the private sector" and to "strengthen public/private partnerships", and specifically announced Obama's intent to "to implement the recommendations of the Cyberspace Policy Review built on the Comprehensive National Cybersecurity Initiative (CNCI) launched by President George W. Bush."

Since then, the fear-mongering rhetoric from government officials has relentlessly intensified, all devoted to scaring citizens into believing that the US is at serious risk of cataclysmic cyber-attacks from "aggressors". This all culminated when Defense Secretary Leon Panetta, last October, warned of what he called a "cyber-Pearl Harbor. This "would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation and create a profound new sense of vulnerability." Identifying China, Iran, and terrorist groups, he outlined a parade of horribles scarier than anything since Condoleezza Rice's 2002 Iraqi "mushroom cloud":

"An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches. They could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country."

As usual, though, reality is exactly the opposite. This new massive new expenditure of money is not primarily devoted to defending against cyber-aggressors. The US itself is the world's leading cyber-aggressor. A major purpose of this expansion is to strengthen the US's ability to destroy other nations with cyber-attacks. Indeed, even the Post report notes that a major component of this new expansion is to "conduct offensive computer operations against foreign adversaries".

It is the US - not Iran, Russia or "terror" groups - which already is the first nation (in partnership with Israel) to aggressively deploy a highly sophisticated and extremely dangerous cyber-attack. Last June, the New York Times' David Sanger reported what most of the world had already suspected: "From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran's main nuclear enrichment facilities, significantly expanding America's first sustained use of cyberweapons." In fact, Obama "decided to accelerate the attacks . . . even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran's Natanz plant and sent it around the world on the Internet." According to the Sanger's report, Obama himself understood the significance of the US decision to be the first to use serious and aggressive cyber-warfare:

"Mr. Obama, according to participants in the many Situation Room meetings on Olympic Games, was acutely aware that with every attack he was pushing the United States into new territory, much as his predecessors had with the first use of atomic weapons in the 1940s, of intercontinental missiles in the 1950s and of drones in the past decade. He repeatedly expressed concerns that any American acknowledgment that it was using cyberweapons - even under the most careful and limited circumstances - could enable other countries, terrorists or hackers to justify their own attacks."

The US isn't the vulnerable victim of cyber-attacks. It's the leading perpetrator of those attacks. As Columbia Professor and cyber expert Misha Glenny wrote in the NYT last June: Obama's cyber-attack on Iran "marked a significant and dangerous turning point in the gradual militarization of the Internet."

Indeed, exactly as Obama knew would happen, revelations that it was the US which became the first country to use cyber-warfare against a sovereign country - just as it was the first to use the atomic bomb and then drones - would make it impossible for it to claim with any credibility (except among its own media and foreign policy community) that it was in a defensive posture when it came to cyber-warfare. As Professor Glenny wrote: "by introducing such pernicious viruses as Stuxnet and Flame, America has severely undermined its moral and political credibility." That's why, as the Post reported yesterday, the DOJ is engaged in such a frantic and invasive effort to root out Sanger's source: because it reveals the obvious truth that the US is the leading aggressor in the world when it comes to cyber-weapons.

This significant expansion under the Orwellian rubric of "cyber-security" is thus a perfect microcosm of US military spending generally. It's all justified under by the claim that the US must defend itself from threats from Bad, Aggressive Actors, when the reality is the exact opposite: the new program is devoted to ensuring that the US remains the primary offensive threat to the rest of the world. It's the same way the US develops offensive biological weapons under the guise of developing defenses against such weapons (such as the 2001 anthrax that the US government itself says came from a US Army lab). It's how the US government generally convinces its citizens that it is a peaceful victim of aggression by others when the reality is that the US builds more weapons, sells more arms and bombs more countries than virtually the rest of the world combined.

Threats to privacy and internet freedom

Beyond the aggressive threat to other nations posed by the Pentagon's cyber-threat programs, there is the profound threat to privacy, internet freedom, and the ability to communicate freely for US citizens and foreign nationals alike. The US government has long viewed these "cyber-security" programs as a means of monitoring and controlling the internet and disseminating propaganda. The fact that this is all being done under the auspices of the NSA and the Pentagon means, by definition, that there will be no transparency and no meaningful oversight.

Back in 2003, the Rumsfeld Pentagon prepared a secret report entitled "Information Operations (IO) Roadmap", which laid the foundation for this new cyber-warfare expansion. The Pentagon's self-described objective was "transforming IO into a core military competency on par with air, ground, maritime and special operations". In other words, its key objective was to ensure military control over internet-based communications:

dod cyber

It further identified superiority in cyber-attack capabilities as a vital military goal in PSYOPs (Psychological Operations) and "information-centric fights":

dod cyber

And it set forth the urgency of dominating the "IO battlespace" not only during wartime but also in peacetime:

dod cyber

As a 2006 BBC report on this Pentagon document noted: "Perhaps the most startling aspect of the roadmap is its acknowledgement that information put out as part of the military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans." And while the report paid lip service to the need to create "boundaries" for these new IO military activities, "they don't seem to explain how." Regarding the report's plan to "provide maximum control of the entire electromagnetic spectrum", the BBC noted: "Consider that for a moment. The US military seeks the capability to knock out every telephone, every networked computer, every radar system on the planet."

Since then, there have been countless reports of the exploitation by the US national security state to destroy privacy and undermine internet freedom. In November, the LA Times described programs that "teach students how to spy in cyberspace, the latest frontier in espionage." They "also are taught to write computer viruses, hack digital networks, crack passwords, plant listening devices and mine data from broken cellphones and flash drives." The program, needless to say, "has funneled most of its graduates to the CIA and the Pentagon's National Security Agency, which conducts America's digital spying. Other graduates have taken positions with the FBI, NASA and the Department of Homeland Security."

In 2010, Lawrence E. Strickling, Assistant Secretary of Commerce for Communications and Information, gave a speech explicitly announcing that the US intends to abandon its policy of "leaving the Internet alone". Noting that this "has been the nation's Internet policy since the Internet was first commercialized in the mid-1990s", he decreed: "This was the right policy for the United States in the early stages of the Internet, and the right message to send to the rest of the world. But that was then and this is now."

The documented power of the US government to monitor and surveil internet communications is already unfathomably massive. Recall that the Washington Post's 2010 "Top Secret America" series noted that: "Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." And the Obama administration has formally demanded that it have access to any and all forms of internet communication.

It is hard to overstate the danger to privacy and internet freedom from a massive expansion of the National Security State's efforts to exploit and control the internet. As Wired's Singel wrote back in 2010:

"Make no mistake, the military industrial complex now has its eye on the internet. Generals want to train crack squads of hackers and have wet dreams of cyberwarfare. Never shy of extending its power, the military industrial complex wants to turn the internet into yet another venue for an arms race.

Wildly exaggerated cyber-threats are the pretext for this control, the "mushroom cloud" and the Tonkin Gulf fiction of cyber-warfare. As Singel aptly put it: "the only war going on is one for the soul of the internet." That's the vital context for understanding this massive expansion of Pentagon and NSA consolidated control over cyber programs.

Bonanza for private contractors

As always, it is not just political power but also private-sector profit driving this expansion. As military contracts for conventional war-fighting are modestly reduced, something needs to replace it, and these large-scale "cyber-security" contracts are more than adequate. Virtually every cyber-security program from the government is carried out in conjunction with its "private-sector partners", who receive large transfers of public funds for this work.

Two weeks ago, Business Week reported that "Lockheed Martin Corp., AT&T Inc., and CenturyLink Inc. are the first companies to sign up for a US program giving them classified information on cyber threats that they can package as security services for sale to other companies." This is part of a government effort "to create a market based on classified US information about cyber threats." In May, it was announced that "the Pentagon is expanding and making permanent a trial program that teams the government with Internet service providers to protect defense firms' computer networks against data theft by foreign adversaries" - all as "part of a larger effort to broaden the sharing of classified and unclassified cyberthreat data between the government and industry."

Indeed, there is a large organization of defense and intelligence contractors devoted to one goal: expanding the private-public merger for national security and intelligence functions. This organization - the Intelligence and National Security Alliance (INSA) - was formerly headed by Adm. McConnell, and describes itself as a "collaboration by leaders from throughout the US Intelligence Community" and " combines the experience of senior leaders from government, the private sector, and academia."

As I detailed back in 2010, one of its primary goals is to scare the nation about supposed cyber-threats in order to justify massive new expenditures for the private-sector intelligence industry on cyber-security measures and vastly expanded control over the internet. Indeed, in his 2010 Op-Ed, Adm. McConnell expressly acknowledged that the growing privatization of internet cyber-security programs "will muddy the waters between the traditional roles of the government and the private sector." Indeed, at the very same time McConnell published this Op-Ed, the INSA website featured a report entitled "Addressing Cyber Security Through Public-Private Partnership." It featured a genuinely creepy graphic showing the inter-connectedness between government institutions (such as Congress and regulatory agencies), the Surveillance State, private intelligence corporations, and the Internet:

Private-sector profit is now inextricably linked with the fear-mongering campaign over cyber-threats. At one INSA conference in 2009 - entitled "Cyber Deterrence Conference" - government officials and intelligence industry executives gathered together to stress that "government and private sector actors should emphasize collaboration and partnership through the creation of a model that assigns specific roles and responsibilities."

As intelligence contractor expert Tim Shorrock told Democracy Now when McConnell - then at Booz Allen - was first nominated to be DNI:

Well, the NSA, the National Security Agency, is really sort of the lead agency in terms of outsourcing . . . . Booz Allen is one of about, you know, ten large corporations that play a very major role in American intelligence. Every time you hear about intelligence watching North Korea or tapping al-Qaeda phones, something like that, you can bet that corporations like these are very heavily involved. And Booz Allen is one of the largest of these contractors. I estimate that about 50% of our $45 billion intelligence budget goes to private sector contractors like Booz Allen.

This public-private merger for intelligence and surveillance functions not only vests these industries with large-scale profits at public expense, but also the accompanying power that was traditionally reserved for government. And unlike government agencies, which are at least subjected in theory to some minimal regulatory oversight, these private-sector actors have virtually none, even as their surveillance and intelligence functions rapidly increase.

What Dwight Eisenhower called the military-industrial complex has been feeding itself on fear campaigns since it was born. A never-ending carousel of Menacing Enemies - Communists, Terrorists, Saddam's chemical weapons, Iranian mullahs - has sustained it, and Cyber-Threats are but the latest.

Like all of these wildly exaggerated cartoon menaces, there is some degree of threat posed by cyber-attacks. But, as Single described, all of this can be managed with greater security systems for public and private computer networks - just as some modest security measures are sufficient to deal with the terrorist threat.

This new massive expansion has little to do with any actual cyber-threat - just as the invasion of Iraq and global assassination program have little to do with actual terrorist threats. It is instead all about strengthening the US's offensive cyber-war capabilities, consolidating control over the internet, and ensuring further transfers of massive public wealth to private industry continue unabated. In other words, it perfectly follows the template used by the public-private US National Security State over the last six decades to entrench and enrich itself based on pure pretext.

© 2013 Guardian News and Media Limited

Glenn Greenwald

Obama: Radical or Rhetoric? * Rule of Law * Climate Change

WASHINGTON - January 22 - Following President Obama’s inauguration speech, CNN stated: “His was a call for radical changes even as a divided Congress rules over an undecided nation.”

SHAHID BUTTAR, [email], @bordc
Buttar is executive director of the Bill of Rights Defense Committee. He said today: “Some critics of Mr. Obama’s inaugural address may describe his comments as radical. But insisting on values as fundamental as ‘equality before the law’ and the ‘enduring strength of our Constitution’ are hardly radical. Indeed, they are simply restatements of principles that have long united America.

“If observers want to criticize the president, they should instead challenge his derogation in practice of the same values he professes in his lofty speeches. The President’s first term unfortunately witnessed a continued extension of the Bush-Cheney legacy, and he seems no more inclined than his neo-con predecessors to heed longstanding constitutional limits on executive power.

“Extrajudicial assassination using armed drone aircraft, the use of unmanned aerial drones to conduct domestic spying without warrants, the NSA’s dragnet warrantless spying program, the FBI’s resurrection of COINTELPRO, the unprecedented crackdown on immigrants under President Obama, the use of immigration enforcement as a pretext to create a national biometric identification scheme for all Americans (including citizens), the continuation of racial profiling in the drug war and the new threat of military detention within the U.S. all reflect a dangerous side to the president’s legacy that undermines the rights of all Americans, regardless of political party or ideology.”

DAPHNE WYSHAM, via Lacy MacAuley, [email]
Wysham is a fellow at the Institute for Policy Studies and is the founder and co-director of the Sustainable Energy and Economy Network. She said today: “Obama is finally and fearlessly uttering the words ‘climate change’ in the context of needing to take aggressive action. While this is welcome news to climate change activists, the words will be meaningless unless a) the Obama Administration rejects the Keystone XL tar sands pipeline; b) Obama selects a new EPA administrator who is willing to take action under the Clean Air Act to rein in CO2 emissions from all sources; c) he stops pushing for dangerous energy development deep offshore in the Gulf, in the Arctic and via continued fracking for oil and gas; d) he pursues a renewable energy standard for the entire country; and e) he directs our publicly financed development banks and export credit agencies to get out of fossil fuels entirely."

Obama: Radical or Rhetoric? * Rule of Law * Climate Change

WASHINGTON - January 22 - Following President Obama’s inauguration speech, CNN stated: “His was a call for radical changes even as a divided Congress rules over an undecided nation.”

SHAHID BUTTAR, [email], @bordc
Buttar is executive director of the Bill of Rights Defense Committee. He said today: “Some critics of Mr. Obama’s inaugural address may describe his comments as radical. But insisting on values as fundamental as ‘equality before the law’ and the ‘enduring strength of our Constitution’ are hardly radical. Indeed, they are simply restatements of principles that have long united America.

“If observers want to criticize the president, they should instead challenge his derogation in practice of the same values he professes in his lofty speeches. The President’s first term unfortunately witnessed a continued extension of the Bush-Cheney legacy, and he seems no more inclined than his neo-con predecessors to heed longstanding constitutional limits on executive power.

“Extrajudicial assassination using armed drone aircraft, the use of unmanned aerial drones to conduct domestic spying without warrants, the NSA’s dragnet warrantless spying program, the FBI’s resurrection of COINTELPRO, the unprecedented crackdown on immigrants under President Obama, the use of immigration enforcement as a pretext to create a national biometric identification scheme for all Americans (including citizens), the continuation of racial profiling in the drug war and the new threat of military detention within the U.S. all reflect a dangerous side to the president’s legacy that undermines the rights of all Americans, regardless of political party or ideology.”

DAPHNE WYSHAM, via Lacy MacAuley, [email]
Wysham is a fellow at the Institute for Policy Studies and is the founder and co-director of the Sustainable Energy and Economy Network. She said today: “Obama is finally and fearlessly uttering the words ‘climate change’ in the context of needing to take aggressive action. While this is welcome news to climate change activists, the words will be meaningless unless a) the Obama Administration rejects the Keystone XL tar sands pipeline; b) Obama selects a new EPA administrator who is willing to take action under the Clean Air Act to rein in CO2 emissions from all sources; c) he stops pushing for dangerous energy development deep offshore in the Gulf, in the Arctic and via continued fracking for oil and gas; d) he pursues a renewable energy standard for the entire country; and e) he directs our publicly financed development banks and export credit agencies to get out of fossil fuels entirely."

What If Government Steals Liberty

The Obama Spyathon

The issue of federal government surveillance of Americans has largely occupied Washington politicians and the media since President Donald Trump first accused the administration...

Why Vault 7 Tools Used by Private Contractors Shows US Intel Needs a Ground-Up...

The Vault 7 exposé by WikiLeaks neglected to mention the most important part of the disclosure. Sure, the CIA has all these tools available....

The Disappearance of Bipartisanship on the Intelligence Committees

Photo by Nicolas Raymond | CC BY 2.0 There is a political myth in Washington that the Senate and House intelligence committees, unlike other congressional...

Power to the People

“You gotta remember, establishment, it’s just a name for evil. The monster doesn’t care whether it kills all the students or whether there’s a...

AT&T sold access to customer data to law enforcement – report

New documents show telecommunications giant AT&T sold customer data to local law enforcement departments for a...

‘Nothing to See Here’ Is Pundit Takeaway on DNC Leaks

The Atlantic‘s Russell Berman (10/13/16) says you “shouldn’t be surprised” by what’s in the leaked Clinton campaign emails. Leaks from Hillary Clinton’s campaign emails have...

FBI Overwhelmed by Terror Suspects

“They envy our freedom” no longer, if it ever did, explains why Islamic extremists seek to mount attacks against civilians in the United States....

After Orlando, Democrats and Republicans Clamor for Expanded Police State

The horrific massacre in Orlando has once again thrust the specter of domestic terrorism into the limelight, and into the media space.  Pundits and...

Poland’s Patriot Act: PiS government proposes new anti-terrorism law

Via WSWS. This piece was reprinted by RINF Alternative News with permission or license. Dorota Niemitz Seizing on the terrorist attacks in Brussels on March 22,...

Black Lives Matter sides with Apple in iPhone encryption battle

As the fight over the San Bernardino shooter’s encrypted iPhone continues, Black Lives Matter activists and...

Behind FBI’s Data-Access Fight with Apple

FBI Director James Comey gained his reputation for integrity by standing up to George W. Bush’s White House on a domestic spying issue but...

The Spies Who Ruin Us

In an effort to draw attention away from the intelligence failures that permitted the attacks of 9/11 and create the impression that it was doing...

After Paris attacks, neo-fascists surge in polls for French regional elections

By Kumaran Ira Since the November 13 terror attack in Paris, the neo-fascist National Front (FN) has emerged as the main beneficiary of the law-and-order hysteria...

On Veterans Day, Who Should Thank Whom?

“You weep for Santiago, and you curse the Marines. You have that luxury. (…) You don’t want the truth because deep down in places...

America’s Short-sighted ‘Grand Strategy’

By Franklin Spinney The contemporary theory and practice of grand strategy by the United States can be summarized in the sound byte uttered in 2001...

French president rejects bid to assist WikiLeaks founder

Via WSWS. This piece was reprinted by RINF Alternative News with permission or license. By Patrick Martin French President François Hollande has rejected suggestions that his government...

Unsatisfied with Weak Spy Reforms, Movement Snowden Built Vows to Fight On

'Two years ago, debating these modest changes would’ve been unthinkable, and it is absolutely a vindication for Edward Snowden.' Jon Queally (Common Dreams) - The law itself...

Greenwald: Obama, Media ‘Irresponsible’ for Scaring Public Over Patriot Act

"The whole world has changed when it comes to this debate as a result of the revelations of Edward Snowden" (Common Dreams) - The Patriot Act...

Big Brother finds new way to track every vehicle owner

We predicted it would happen. A year after the Department of Homeland Security (DHS) scuttled plans to build its own nationwide database of vehicle...

Top NSA Whistleblower: Federal Government Has Gone Rogue

Binney, a 36-year veteran of the NSA, detailed multiple aspects of the agency’s current agenda, including its “treasonous” role in lying to judges in...

Failure to pass US surveillance reform bill could still curtail NSA powers

If the Senate doesn’t pass the USA Freedom Act after the midterm elections, a key section of the Patriot Act could expire Two members of...

Snowden: ‘If You Live in New Zealand, You Are Being Watched’

Alongside reporting on new documents, former NSA analyst turned whistleblower calls out nation's prime minister for making "categorically false" statements on mass surveillance Jon Queally NSA...

Thirteen years after the September 11 attacks: CIA torture and the “war on terror”

Joseph Kishore Today marks the thirteenth anniversary of the terrorist attacks of September 11, 2001. The events of that day were followed within days by...

Obama administration added 1.5 million names to US terrorist watch list

Niles Williamson The Obama administration has added more than 1.5 million names to the US terrorist watch list over the past five years, according to...

Newly Obtained Emails Contradict Administration Claims on Guardian Laptop Destruction

Glenn Greenwald On July 20, 2013, agents of the U.K. government entered The Guardian newsroom in London and compelled them to physically destroy the computers they were using to...

NSA Whistleblower Binney: NSA Recording 80% of U.S. Phone Calls

NSA whistleblower William Binney (shown) has made the startling claim that the NSA is recording the audio of at least 80 percent of Americans' telephone calls....

Last Minute US Govt Claims Put Halt to Greenwald ‘Bombshell’

Journalist says his team is investigating objections raised Jon Queally At midday on Monday, journalist Glenn Greenwald announced that revelations he has termed among "the most important" to...

ACLU report exposes US federal government’s role in creating “paramilitary police”

Andre Damon The American Civil Liberties Union (ACLU) released an extensive report Monday on the militarization of the police in the US, showing that the...

Your Local Police May Be Collecting Metadata

When talking of freewheeling domestic spying, it would behoove us to remember that it’s not just the National Security Agency (NSA) that needs reform...

Police violence and the American gulag

Andre Damon Recent weeks have seen a proliferation of violent and often fatal attacks by police in cities and towns across the United States. * Last...

Illegal NSA Surveillance of Americans: Secret Authorizations Granted by Bush and Obama

Eric Zuesse RINF Alternative News The May 13th PBS “Frontline” documents that on 4 October 2001, President George W. Bush signed a secret authorization for the...

The Snowden Saga Begins: “I Have Been to the Darkest Corners of Government, and...

Glenn Greenwald On December 1, 2012, I received my first communication from Edward Snowden, although I had no idea at the time that it was...

‘Just Salute and Follow Orders’: When Secrecy and Surveillance Trump the Rule of Law

“The Secret Government is an interlocking network of official functionaries, spies, mercenaries, ex-generals, profiteers and superpatriots, who, for a variety of motives, operate outside the legitimate institutions of government. Presidents have turned to them when they can’t win the support of the Congress or the people, creating that unsupervised power so feared by the framers […]

Facebook Facial Recognition Software Has Almost Human Accuracy

 Joe Wolverton, II, J.D. Facebook may soon possess the power to match faces to users with almost human-like accuracy. According to the social-media giant, sophisticated facial...

Bill Moyers Discussion Calls Out Our Unelected, “Deep State,” Shadow Government

Richard Clark  RINF Alternative News What follows here is a synopsis of a discussion between Bill Moyers and Mike Lofgren, a disillusioned government insider who now says in...

A New Assault on Freedom of the Press

Andrew P. Napolitano  RINF Alternative News Last week, a little noticed clash took place on Capitol Hill involving the fundamental values underlying the First Amendment. The...

Resisting the surveillance state of mind

Norman Solomon RINF Alternative News We must not let the NSA's snooping define a new era in which privacy is a relic  Eight months after whistle-blower Edward...

Hold Clapper Accountable for any Terrorist Attack on U.S.

Donn Marten  RINF Alternative News Constantly under pressure for the illegal surveillance activities of the NSA that are now fully blossoming to include what are the...

US media blacks out Snowden interview exposing death threats

Bill Van Auken  RINF Alternative News The former National Security Agency contractor Edward Snowden appeared Sunday night in his first extended television interview. Citing published statements...

Cut Off the NSA’s Juice

Norman Solomon  RINF Alternative News The National Security Agency depends on huge computers that guzzle electricity in the service of the surveillance state. For the NSA’s...

Forget the Goodfellas, The NSA and CIA are Criminal Enterprises

David R. Hoffman  RINF Alternative News When I first started writing for Pravda.Ru over ten years ago, I thought I could help change the world. However, at some...

Obama’€™s Lies, NSA Spies, and the Sons of Liberty: Will You Choose Dangerous Freedom...

John W. Whitehead RINF Alternative News President Obama has managed, with singular assistance from Congress and the courts, to mangle the Constitution through repeated abuses, attacks,...

Obama’s Lies, NSA Spies, and the Sons of Liberty: Will You Choose Dangerous Freedom...

“All governments are run by liars.”—Independent journalist I.F. “Izzy” Stone President Obama has managed, with singular assistance from Congress and the courts, to mangle the Constitution through repeated abuses, attacks and evasions. This is nothing new, as I’ve documented in my book A Government of Wolves: The Emerging American Police State. However, with his recent speech […]

Gov’t That Surveilled MLK in Bid to Destroy Him Wants Us to Trust Them

Juan Cole  RINF Alternative News Among the ironies of Barack Obama trying to sell us the gargantuan NSA domestic spying program is that such techniques of...

Surveillance Equals Freedom?

Daniel McAdams  RINF Alternative News Speaking from a set that could have been designed by Leni Riefenstahl, President Obama yesterday informed us that not only does our...

Obama’s War on Freedom

Stephen Lendman  RINF Alternative News Perhaps no president in US history disappointed supporters more than Obama. He pledged “change you can believe it.” He promised hope. He...

4 Questionable Claims Obama Has Made on NSA Surveillance

Kara Brandeisky  RINF Alternative News Today President Obama plans to announce some reportedly limited reforms to National Security Agency surveillance programs. Since the first disclosures based on documents provided...

Obama’s War on Freedom

Obama's War on Freedomby Stephen LendmanPerhaps no president in US history disappointed supporters more than Obama. He pledged "change you can believe it." He promised hope.He did Lincoln one better. He fooled most people enough times to matter. He nev...

NSA’s Fake War on Terror

A New America Foundation report suggests it. More on this below. NSA spying is longstanding. It's ongoing abroad and at home. It has nothing to...

N.S.A. Devises Radio Pathway Into Computers

DAVID E. SANGER and THOM SHANKERNY TimesJanuary 15, 2014 WASHINGTON – The National Security Agency has...

NSA to Congress: [email protected] Off

Washington's BlogJanuary 15, 2014 We've shown that the NSA has been spying on Congress for some...

Record Growth For Privacy Search Engines In Wake Of NSA Revelations

“Snowden Effect” Sees Web Browsers Steering Clear Of Big Names Steve WatsonInfowars.comJanuary 14, 2014When...

Only a FOOL Still Believes the NSA

Washington's BlogJanuary 14, 2013 The NSA and other intelligence officials have been repeatedly caught lying about...

MLK: Also a victim of NSA surveillance

Abdus-Sattar Ghazali RINF Alternative News Martin Luther King Jr. day is being celebrated on January 20th 2014 amid heated debate on massive dragnet surveillance by the...

NSA makes final push to retain most mass surveillance powers

Spencer AckermanLondon GuardianJanuary 11, 2014 The National Security Agency and its allies are making a final...

Nasa spacecraft spots ‘potentially hazardous’ new asteroid

Lucy KinderLondon TelegraphJanuary 10, 2014 Nasa's newly reactivated asteroid hunting space telescope has spotted its first...

Obama’s phony campaign against inequality

Andre Damon  RINF Alternative News President Obama, announcing his so-called “economic promise zone” initiative in a White House speech on Thursday, gave a performance that expressed...

‘Burglars’ Revealed: Sixties Activists Who Stole FBI COINTELPRO Files

John and Bonnie Raines, two of the burglars, at home in Philadelphia with their grandchildren. (Photo: Mark Makela for The New York Times)In an...

Exonerate Edward Snowden Unconditionally!

Exonerate Edward Snowden Unconditionally!by Stephen LendmanIt's long past time to stop Obama's war on whistleblowers. It's time to hold him accountable for waging it.Whistleblowing is a national imperative. Exposing government wrongdoing is essential. ...

Crazy King Says Rand Paul Hates America For Defending Fourth Amendment

Congressional intel chair says Paul “doesn't deserve to be a U.S. Senator.”Steve WatsonInfowars.comJanuary...

Obama’s Fraudulent Defense of the Unemployed

Andre Damon As Congress reassembles following the holiday break, the White House and the Democratic Party are seeking to perpetrate a political fraud on the...

Big Sis: No clemency for Edward Snowden

Justin SinkThe HillJanuary 4, 2013 Former Homeland Security Secretary Janet Napolitano said Friday that she “would...

U.S. court allows more phone snooping

ReutersJanuary 4, 2013 The secretive U.S. Foreign Intelligence Surveillance Court on Friday renewed the authority of...

US court upholds memo on phone records

A US federal appeals court upholds a Justice Department memo that allows the government to acquire American citizensâ„¢ phone records even when there is...

Crazed Hypocrite King Calls Snowden “Terrorist Appeaser”, Labels NY Times “An Accomplice”

Congressman openly supported IRA terrorists Steve WatsonInfowars.comJanuary 2, 2014 GOP Congressman Peter King, who openly expressed support...

Crazed Hypocrite King Calls Snowden “Terrorist Appeaser”, Labels NY Times “An Accomplice”

Congressman openly supported IRA terrorists Steve WatsonInfowars.comJanuary 2, 2014 GOP Congressman Peter King, who openly expressed support...

NSA seeks to build quantum computer that could crack most types of encryption

Steven Rich and Barton GellmanWashington PostJanuary 3, 2014 In room-size metal boxes ­secure against electromagnetic...

Obama and the Left

New Year's Day, Michael Moore grudgingly, in a New York Times op-ed, finds something positive in Obamacare–not good enough, when comprehensive political-economic condemnation is...

Clues to Future Snowden Leaks Found In His Past

Washington's BlogJanuary 2, 2014 Only a tiny fraction of Snowden's documents have been published. What's still to...

Inconsistencies and Unanswered Questions: The Risks of Trusting the Snowden Story

Last June, Glenn Greenwald at The Guardian revealed that Edward Snowden was the NSA insider behind “one of the most significant leaks in US...

Apple Denies Ever Working With The NSA

Zero HedgeJanuary 1, 2014 Yesterday, we broke the story that during the 30th Chaos Communication Congress,...

This is What Really Happens in the Drone Program from an Insider

libertyblitzkrieg.comDecember 31, 2013 Over the weekend, Heather Linebaugh wrote a powerful Op-ed in The Guardian newspaper...

NSA has complete control of your iPhone, can activate your microphone and camera without...

Joshua CookBen Swann.comDecember 31, 2013 Leaked documents now show what we all suspected: the NSA can...

The Biggest Stories of 2013

Infowars.comDecember 30, 2013 Alex takes calls from listeners on what they think is the largest story...

Despite the Doom and Gloom Part III: My 2013 Holiday Message

Vigilant CitizenDecember 26, 2013 At the beginning of 2013, I told myself: “This year should be...

Edward Snowden: ‘I already won’

Bridie JabourLondon GuardianDecember 24, 2013 Whistleblower Edward Snowden has declared “mission accomplished”, seven months after revelations...

Border Patrol to Test High-Tech Surveillance Balloons Along Mexican Border

Steve Neavlingticklethewire.comDecember 22, 2013 Forget drones. The U.S. Border Patrol is testing the abilities of helium-filled balloons...

Former CIA Head: Snowden “Should Be Hanged By The Neck Until He Is Dead”

Globalists pine for return of the Middle AgesSteve WatsonInfowars.comDecember 18, 2013 In a statement...

NSA Official Says First Amendment Should Be “Reformed”

Adds that Obama should crack down on free press Steve WatsonInfowars.comDecember 17, 2013 An unnamed official with the NSA told a reporter during a recent media...

The Video Clip That Proves a ‘Shadow Government’

NSA Director Alexander has to ask permission to answer a question Paul Joseph WatsonInfowars.comDecember 16, 2013 One of the more jaw-dropping moments to emerge out...

New documents expose more NSA programs

By Robert Stevens 14 December 2013 New documents published by the Washington Post from Edward Snowden, the former National Security Agency (NSA) whistle-blower, reveal that the...

Obama and Mandela

11 December 2013 The speech delivered Tuesday by Barack Obama at the memorial to former African National Congress leader and South African President Nelson...

Canadian Conservatives’ Cyber-Bullying Bill – A Pretext for Expanding Police Surveillance

Under legislation now before parliament, Canada's Conservative government is seeking to greatly expand the state's power to spy on Canadians' use of the Internet,...

Canadian Conservatives’ cyber-bullying bill–a pretext for expanding police surveillance

By Dylan Lubao10 December 2013 Under legislation now before parliament, Canada's Conservative government is seeking to greatly expand the state's power to spy on...

Warrantless Cellphone ‘Tower Dumps’ Becoming Go-To Tool For Law Enforcement

from the just-get-it-all,-you-never-know-when-you'll-need-it dept Tim CushingTech DirtDecember 6, 2013 Our founding fathers understood the problems with overly-broad warrants and the dangers posed by unreasonable searches and...

Drone Nation — Infographic

Homeland-security-degree.orgDecember 3, 2013 The American love affair with drones (officially called unmanned aerial vehicles) extends to both military and law enforcement uses. The U.S. isn't...

Top 10 ways US is most corrupt country

The rich are well placed to bribe our politicians to reduce taxes on the rich. While it is true that you don't typically have to...

Lawmaker: Amazon Drone Could Photograph Your Home

Companies could use UAVs to gather private information Paul Joseph WatsonInfowars.comDecember 3, 2013 Following the announcement of Amazon's plan to deliver items using drones within...

Juggernaut of Deceit

Every day brings a new outrage. Obama in the saddle is like the Four Horsemen of the Apocalypse rolled into one. Several articles and...

Snowden document confirms US-backed mass surveillance in Australia

By Mike Head3 December 2013 Australia's intelligence apparatus mines the telecommunications data of ordinary Australians, and hands over the material to the US and...

Expert: Amazon Drones Will Crash Into People

Surveillance cameras could be attached to drones to prevent theft Paul Joseph WatsonInfowars.comDecember 2, 2013 A UAV expert has warned that Amazon's ambitious policy to...

Expert: Amazon Drones Will Crash Into People

Surveillance cameras could be attached to drones to prevent theft Paul Joseph WatsonInfowars.comDecember 2, 2013 A UAV expert has warned that Amazon's ambitious policy to...

Honor, Deception Amid Air Force’s Cadet Spy System

Dave PhilippsMilitary.comDecember 2, 2013 Facing pressure to combat drug use and sexual assault at the Air Force Academy, the Air Force has created a secret...

DHS Promotes Snitch Program ‘To Keep Shoppers Safe’

Businesses at malls carrying out “training exercises” with governmentSteve WatsonInfowars.comNov 29, 2013 The Department of Homeland Security is encouraging Americans to snitch on each other...

NSA strategy document envisions unrestrained global surveillance

By Tom Carter26 November 2013 A top secret National Security Administration (NSA) strategy document leaked by whistleblower Edward Snowden envisions spying on “anyone, anytime,...

NSA strategy document envisions unrestrained global surveillance

By Tom Carter26 November 2013 A top secret National Security Administration (NSA) strategy document leaked by whistleblower Edward Snowden envisions spying on “anyone, anytime,...

D.C. cops go ‘nuclear’ with traffic cameras

Andrea NobleWashington TimesNovember 25, 2013 Traffic camera on a traffic light pole, via Wikimedia Commons A drivers' advocacy group is decrying the latest expansion of the...

Revealed: Northrop Grumman’s Unmarked Gray Helicopter Drone

Next generation UAV to spy on Americans? Paul Joseph WatsonInfowars.comNovember 25, 2013 Infowars has obtained a photograph of an unmarked gray helicopter drone manufactured by...

Map Shows The NSA’s Massive Worldwide Malware Operations

CONNOR SIMPSONThe Atlantic WireNovember 24, 2013 A new map details how many companies across the world have been infected by malware by the National Security...

FBI, using secretive DITU department, aids NSA’s surveillance work

rt.comNovember 22, 2013 While much of the American public and international community have expressed alarm at the far-reaching US National Security Agency's surveillance programs, the...

US Supreme Court refuses to block Texas anti-abortion law, declines to hear NSA surveillance...

By Thomas Gaist and Tom Carter22 November 2013 The Supreme Court on Tuesday refused to block a reactionary Texas law imposing arbitrary restrictions on...

House committees vie for dominance over NSA reforms

Tony RommPoliticoNovember 21, 2013 A turf battle is brewing in the House over which committee will get a first crack at NSA reform — and...

EFF: NSA Primary Souces

eff.org November 21, 2013 The NSA’s domestic spying program, known in official government documents as the “President’s Surveillance Program,” ("The Program") was implemented by President George...

Paul To Obama: “Enough Is Enough, We Want Our Freedoms Back”

“Will we be sunshine patriots, or will we stand up like free men and women?” Steve WatsonInfowars.comNov 21, 2013 Kentucky Senator Rand Paul has issued a...

“The Grid” Detroit

Drastik MeazuresPlanet InfowarsNovember 19, 2013 Hey everybody, made a little video documenting some interesting ”white boxes” and other devices attached to street lights and buildings...

New Zealand-US military exercise rehearses for Pacific war

By Tom Peters19 November 2013 The New Zealand province of South Canterbury is currently hosting the country's largest ever international military exercise. Operation Southern...

Supreme Court blocks challenge to NSA phone tracking

RTNovember 18, 2013 The Supreme Court announced Monday morning that it would not be considering at this time a complaint filed months earlier that challenged...

We Don’t Wanna Hear It: Supreme Court Rejects Challenge to NSA’s Bulk Collection Program

The Supreme Court on Monday refused to consider a challenge to the National Security Agency's global sweep of telephone and communications. (File)The U.S. Supreme...

.New Mesh Network Documents Confirm Police Vehicle’s Real-Time Access To DHS Spy Cameras

Mikael Thalen Infowars.comNovember 16, 2013 Following bombshell documents released by Storyleak and Infowars last Tuesday uncovering Seattle's expansive $2.6 million Homeland Security funded mesh network...

Feinstein promotes bill to strengthen NSA and its warrantless searches

Spencer AckermanThe GuardianNovember 15, 2013 A Senate bill promoted as a surveillance reform would codify the ability of the National Security Agency to search its...

Ex-FBI agent pleads guilty to leaking secrets about Yemen operation to AP

Michael Tarmjournalgazette.netNovember 15, 2013 A former FBI explosives expert was sentenced Thursday to roughly 3 1/2 years in prison for possessing and disclosing secret information,...

CIA Creating Vast Database of American’s Personal Financial Records: Report

Claiming the same authority as the NSA does for its bulk collection of domestic internet and phone data, the clandestine Central Intelligence Agency is...

Intelligence agency seeks facial recognition upgrade

Ray LockerUSA TodayNovember 13, 2013 The U.S. intelligence community is pushing a leap forward in facial recognition software that will enable it to determine better...

NSA Can Track Your Location Even When Your Phone is Turned Off

Feds have had technology for at least 10 years Paul Joseph WatsonInfowars.comNovember 13, 2013 Did you know that the NSA can track the location of...

NSA Can Track Your Location Even When Your Phone is Turned Off

Feds have had technology for at least 10 years Paul Joseph WatsonInfowars.comNovember 13, 2013 Did you know that the NSA can track the location of...

Seattle Police Deactivate Wi-Fi Spy Grid After Privacy Outcry

SPD admit mesh network was never turned off after DHS testing phase Paul Joseph WatsonInfowars.comNovember 13, 2013 Following a privacy outcry concerning a wi-fi “mesh...

LEAKED: Secret Documents Reveal DHS Spy Grid

Infowars.comNovember 13, 2013 Government documents obtained exclusively by Infowars expose massive DHS domestic spy grid designed to track citizens in real time through mega government...

Survey: NSA Stasi State Cows Journalists Into Self-censorhip

Global elite shapes flow of information through intimidation of journalists Kurt NimmoInfowars.comNovember 12, 2013 The Stasi surveillance state, exemplified by NSA snooping, has very little if...

Las Vegas Installs “Intellistreets” Light Fixtures Capable Of Recording Conversations

Mikael ThalenInfowars.comNovember 9, 2013 The Las Vegas Public Works Department has begun testing a newly installed street light system around City Hall with wide-ranging capabilities...

At some schools, ‘Big Brother’ is watching

Kelly Wallacecnn.comNovember 8, 2013 Just as parents are grappling with how to keep their kids safe on social media, schools are increasingly confronting a controversial...

Globalization and the Police State: CIA Pays AT&T to Spy on Phone Data

The report Thursday of a CIA-AT&T operation exposes a whole new layer of state-corporate spying on the people of the United States and the...

D-Day: FAA preps for invasion of 7,500 drones in U.S. airspace within five years

Kellan HowellWashington TimesNovember 8, 2013 The chief of the Federal Aviation Administration predicted Thursday that U.S. airspace could be crowded with as many as 7,500...

CIA pays AT&T to spy on phone data

By Bill Van Auken8 November 2013 The report Thursday of a CIA-AT&T operation exposes a whole new layer of state-corporate spying on the people...

CIA Pays Telecoms Millions for Your Personal Information

Kurt NimmoInfowars.comNovember 7, 2013 President Jimmy Carter and Senator Frank Church in 1977. Photo: National Archives and Records Administration On Thursday, the New York Times reported...

Made-in-China kitchen appliances found to contain hidden Wi-Fi circuitry that installs malware on your...

J.D. HeyesNatural NewsNovember 6, 2013 As the author of the insightful, prophetic book “1984,” even George Orwell's discussed “surveillance society” wasn't so sinister as to...

FBI Spied On Antiwar.com for 6 Years

Spencer Ackermantheguardian.comOctober 6, 2013 The FBI monitored a prominent anti-war website for years, in part because agents mistakenly believed it had threatened to hack the...

Germany Rejects Asylum for Snowden

Kurt NimmoInfowars.comNovember 6, 2013 Despite the fact more than 50 German public figures have called for the country to give whistleblower Edward Snowden asylum, the...

Snowden justifies NSA leaks

William CummingsUSA TodayNovember 4, 2013 The German magazine Der Spiegel published an open letter it says was written by former U.S. intelligence contractor Edward Snowden,...

Edward Snowden Releases “A Manifesto For The Truth”

zerohedge.comNovember 3, 2013 While Edward Snowden may be reviled at the top echelons of Western developed nations and is wanted in his native US on...

Portrait of the NSA: No Detail Too Small in Quest for Total Surveillance

Barack Obama hailed United Nations secretary general Ban Ki-moon as a "good friend" after the two had sat down in the White House in...

Brits rule Snowden reporter’s partner involved in ‘espionage’ and ‘terrorism’

Mark Hosenballreuters.comNovember 2, 2013 British authorities claimed the domestic partner of reporter Glenn Greenwald was involved in “terrorism” when he tried to carry documents from...

GCHQ and European spy agencies worked together on mass surveillance

Julian BorgerLondon GuardianNovember 2, 2013 The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic...

RINFORMATION

USA Topics 9/11 Agenda 21 Assassinations Banks Bush, George Jr Boston Bombings Bohemian Grove CIA Cointelpro Corruption DARPA Democrats Disinformation Congress Drones Eugenics FBI Federal Reserve Guantanamo HAARP ...

Latest Declassified NSA Records Show NSA Believes It Can Spy On Everyone’s Location Based...

from the of-course-it-does dept Mike MasnickTech DirtOctober 29, 2013 James Clapper has declassified another batch of documents...

Startup Gets Computers to Read Faces, Seeks Purpose Beyond Ads

David TalbotMIT Technology ReviewOctober 28, 2013 Face Code: Using images captured from simple webcams, Affectiva's software...

Obama ‘approved tapping Angela Merkel’s phone 3 years ago’

Philip SherwellThe TelegraphOctober 27, 2013 Chancellor of Germany Angela Merkel President Barack Obama was dragged into the...

NSA surveillance: Merkel’s phone may have been monitored ‘for over 10 years’

Kevin Rawlinson London GuardianOctober 27, 2013 New claims emerged last night over the extent that US...

NSA Propaganda Video Among Highest Downvote Percentages in Youtube History

Anthony Gucciardi Infowars.comOctober 27, 2013 The very epitome of propaganda, a video put out by the...

Who Killed Michael Hastings?

Early in the morning on June 18, a brand new Mercedes C250 coupe was driving through the Melrose intersection on Highland Avenue in Hollywood...

Leaked memos reveal GCHQ efforts to keep mass surveillance secret

Guy TaylorLondon GuardianOctober 26, 2013 The UK intelligence agency GCHQ has repeatedly warned it fears a...

NSA monitored calls of 35 world leaders after US official handed over contacts

James BallThe GuardianOctober 24, 2013 The NSA memo suggests that such surveillance was not isolated as...

Report: NSA Spied on 124 Billion Phone Calls in One Month

Adam KredoWashington Free BeaconOctober 24, 2013 The National Security Agency recorded information about more than 124...

U.S. may have bugged German chancellor’s mobile, report suggests

David Meyergigaom.comOctober 23, 2013 Angela Merkel. Photo: Arne List Yet more awkwardness looms at Thursday's U.S-EU summit....

Full Spectrum Military Surveillance of Americans Gets a Boost

Kurt NimmoInfowars.comOctober 23, 2013 Gen. Michael Hayden. Photo: Air Force ISR Agency According to former NSA boss...

The Cybersecurity Industry Is Hiring, But Young People Aren’t Interested

Ben Richmondmotherboard.vice.comOctober 23, 2013 Check it out, I'm working on a reboot of The Graduate, set...

TSA Knows All About You

New procedure surpasses the TSA's Secure Flight Kurt NimmoInfowars.comOctober 22, 2013 Even before you get on that...

Leak Shows NSA Grabbed Data On 70 Million French Phone Calls In Less Than...

from the no-wonder-its-data-centers-are-bursting-into-flames dept Tim CushingTechDirtOctober 21, 2013 Another leak has been released from Edward Snowden's files,...

Dianne Feinstein insists NSA’s massive snooping operations are ‘not surveillance’

Paul LewisThe GuardianOctober 21, 2013 Dianne Feinstein, the chair of the US Senate committee charged with...

Photo: Cops Caught Filming Pro-Gun Demonstrators Outside Alamo

Cops nervously surveil Second Amendment supporters Infowars.comOctober 20, 2013 Safely perched stories above the historic and...

British spies mislead MPs over Tempora

GCHQ has been running Tempora to harvest, store and analyse millions of phone calls, emails and search engine queries.Britain™s spying agencies have been accused...

The Ghost of Authoritarianism in the Age of the Shutdown

The Ghost of Authoritarianism in the Age of the Shutdown by Henry A. Giroux In the aftermath of the reign of Nazi terror in the 1940s, the...

MI5 seeking to justify military action

An anti-war activist has accused Britain's domestic spying apparatus MI5 of seeking to justify the country™s future interventions into foreign states under the pretext...

Once you get into the Obamacare website, you can’t get out

Jason Millman an Kyle CheneyPoliticoOct. 9, 2013 Once you finally make it into HealthCare.gov, it's not...

MI5 chief: Muslims pose threat to UK

The director general of Britain™s domestic spying apparatus MI5 has accused the country™s Muslim community of posing threat to what he describes as ˜the...

Maryland partners with Facebook to censor content ‘without societal value’ in new cyberbullying law

from the administrators-seek-to-control-off-campus-life-as-well dept Tim CushingTechDirtOct. 8, 2013 We saw Nova Scotia deliver the worst in cyberbullying...