{"id":54900,"date":"2013-08-01T06:24:13","date_gmt":"2013-08-01T05:24:13","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/breaking-news\/guardian-newspaper-reveals-wider-internet-surveillance\/54900\/"},"modified":"2013-08-01T06:24:13","modified_gmt":"2013-08-01T05:24:13","slug":"guardian-newspaper-reveals-wider-internet-surveillance","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/breaking-news\/guardian-newspaper-reveals-wider-internet-surveillance\/","title":{"rendered":"Guardian newspaper reveals wider Internet surveillance"},"content":{"rendered":"<div id=\"content\">\n<h3 class=\"nomargin\">\u00a0<\/h3>\n<h5>\n      By<br \/>\n      Andre Damon<br \/>\n      <br \/>1 August 2013<br \/>\n  <\/h5>\n<p><span>The British <\/span><em>Guardian<\/em><span> newspaper, which first carried National Security Agency whistle-blower Edward Snowden\u2019s revelations of massive and illegal government spying, on Wednesday published a report by journalist Glenn Greenwald detailing the NSA\u2019s \u201cwidest-reaching\u201d program for internet spying. The program, called XKeyscore, allows the intelligence agency to carry out everything from dragnet surveillance to the reading of the contents of individual emails.<\/span><\/p>\n<p>The system allows intelligence agents to access, sort and monitor almost all Internet traffic anywhere in the world, including the specific content of communications. It can, for example, be used to generate lists of all people who visit any web site. Once such lists are compiled, nearly all of the Internet communications of the people listed can be intercepted.<\/p>\n<p>The <em>Guardian<\/em>\u2019s report exposes as contemptible lies the official claim, repeated by President Obama, US intelligence chief James Clapper, top officials of the NSA and the Federal Bureau of Investigation, and both Democratic and Republican congressmen, that the NSA is not able to read the contents of individual communications without extensive legal oversight and review.<\/p>\n<p>As the <em>Guardian<\/em> report makes clear, the sweeping and intrusive searches of \u201cemails, social media activity and browsing history\u201d made possible by the XKeyscore system require no prior authorization.<\/p>\n<p>The exposure of the XKeyscore program follows earlier revelations, based on documents unveiled by Snowden, that the nation\u2019s major telephone companies routinely turn over all of their records of phone calls to the NSA, and that the agency operates a vast global Internet wiretapping system known as PRISM.<\/p>\n<p>The report by the <em>Guardian<\/em> ran the same day that the White House released previously classified documents, all highly redacted, including two reports on the NSA\u2019s \u201cbulk collection program\u201d and a Foreign Intelligence Surveillance (FISA) court order outlining procedures for monitoring domestic telephone calls. The administration claimed the documents showed that no eavesdropping could take place unless intelligence agencies first showed they had demonstrable suspicions, and that all such actions were subject to oversight by the FISA court.<\/p>\n<p>The release of the documents is part of the administration\u2019s campaign of damage control and misinformation, aimed at confusing and dissipating popular opposition to the spying programs. It is meant to demonstrate \u201ctransparency\u201d regarding secret programs that are routinely rubber-stamped by the secret FISA court, which stands outside of the regular judicial system.<\/p>\n<p>Even if one were to assume that the NSA, FBI and other intelligence agencies actually abide by the procedures outlined in these documents\u2013and they do not\u2013that would not alter the fact that the warrantless, dragnet seizure of personal communications stands in flagrant violation of the Fourth Amendment to the US Constitution, which bars unreasonable and arbitrary searches and seizures.<\/p>\n<p>The release of the documents was timed to coincide with a hearing of the Senate Judiciary Committee into the domestic surveillance programs, in which a number of the committee\u2019s members sought to posture as critics, while signaling that they supported the continuation of the programs.<\/p>\n<p>The hearing was yet another scripted, stage-managed love-fest between Congress and the intelligence agencies. Intended to demonstrate congressional oversight of the NSA and FBI, it was, in reality, part of the official whitewash of the spying operations orchestrated by the White House with the complicity of both political parties and the media.<\/p>\n<p>Testimony was provided by Deputy Attorney General James Cole, NSA Deputy Director John C. Inglis, and FBI Deputy Director Sean M. Joyce, all of whom gave worthless and false assurances that the surveillance programs were perfectly legal and posed no threat to democratic rights, while spouting the official line that they were essential to protecting the American people from terrorist attack.<\/p>\n<p>Not a single senator from either party, in the course of a three-hour hearing, questioned the constitutionality of the surveillance programs.<\/p>\n<p>The committee\u2019s chairman, Patrick Lehey of Vermont, after a few empty phrases about \u201ctransparency\u201d and \u201coversight,\u201d concentrated his fire not on the illegality and undemocratic character of these programs, but on the failure of those who run them to prevent Edward Snowden from exposing their criminal nature to the American people.<\/p>\n<p>Dianne Feinstein, the second-ranking Democrat on the Judiciary Committee and chairwoman of the Senate Intelligence Committee, published an op-ed piece in the <em>Washington Post<\/em> Wednesday entitled \u201cMake NSA Programs More Transparent,\u201d in which she called for \u201cchanges to the NSA call-records program in an effort to increase transparency and improve privacy protections.\u201d<\/p>\n<p>All of Feinstein\u2019s proposals, which include expanding the \u201cideological diversity\u201d of the FISA court and more regular public disclosures of the number of telephone records being monitored, are entirely cosmetic, designed to create the illusion of public oversight while leaving the Big Brother spying programs intact.<\/p>\n<p>Feinstein\u2019s op-ed parroted the White House lie that the programs are not intended to \u201clisten to phone calls\u201d and stressed that only a group of less than two dozen \u201chighly vetted NSA analysts\u201d have access to the data\u2013as though that fact would serve to reassure the American people!<\/p>\n<p>The threadbare pretenses of legality and oversight of the spy agencies were demolished by Wednesday\u2019s revelations in the <em>Guardian<\/em>, which underscore the ubiquitous character of the government\u2019s surveillance programs and the fact that intelligence agencies can collect a vast array of private communications with the ease-of-use of an Internet search engine.<\/p>\n<p>As the <em>Guardian<\/em> piece noted, \u201cXKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant.\u201d<\/p>\n<p>XKeyscore is the \u201cwidest-reaching\u201d of the numerous digital data-gathering and mining systems in place at the NSA. It provides an interface for NSA intelligence agents to not only intercept single communications, but also to conduct massive database sweeps for the purpose of drawing up lists of suspects.<\/p>\n<p>The program allows intelligence officials to conduct surveillance even when their targets are unknown, or are performing supposedly anonymous activity such as browsing the web. Unlike other systems, it does not require a \u201cstrong selector,\u201d such as an email address or IP address, to conduct surveillance.<\/p>\n<p>Such a sweeping apparatus of domestic spying and, ultimately, repression is not known to have been implemented anywhere else in the world, even under the most repressive dictatorships. While the exact number of records recorded by the system is not known, it is likely to be in the range of billions every day.<\/p>\n<p>Wednesday\u2019s revelations, and the response of the political establishment, underscore that there exists no opposition to the unchecked expansion of the US government\u2019s police powers within either the Democratic or Republican parties.<\/p>\n<p><!-- Start of Missing Component Binding --><br \/>\n<!--\nunbound-region-left3\n--><br \/>\n<!-- End of Missing Component Binding --><\/p><\/div>\n<p>&#8216;<br \/>\n  \t\t  \t];<br \/>\n  \t\t  \tvar html = htmlArray.join(&#8221;);<br \/>\n  \t\t  \tvar pCount = $(&#8216;#content&#8217;).children(&#8216;p&#8217;).length;<br \/>\n  \t\t  \tvar position = Math.floor(pCount*0.1);<br \/>\n        \t$(&#8216;#content&#8217;).children(&#8216;p&#8217;).eq(position).before(html);<br \/>\n        \t$(&#8216;#inline-appeal&#8217;).children(&#8216;form&#8217;).children(&#8216;.more-options&#8217;).children(&#8216;a&#8217;).click(function() {<br \/>\n  \t\t\t\t$(&#8216;#inline-appeal&#8217;).children(&#8216;.initially-hidden&#8217;).show();<br \/>\n  \t\t\t\t$(this).parent().hide();<br \/>\n  \t\t\t\treturn false;<br \/>\n  \t\t\t});<br \/>\n  \t\t}<br \/>\n  \t}<\/p>\n<p>  \tfunction appendBottomAppeal() {<br \/>\n  \t\tif (!$(&#8216;#content&#8217;).is(&#8216;.width72,.category&#8217;)) {<br \/>\n  \t\t\tvar htmlArray = [<br \/>\n  \t\t\t\t&#8216;<\/p>\n<p>&#8216;<br \/>\n  \t\t  \t];<br \/>\n  \t\t  \tvar html = htmlArray.join(&#8221;);<br \/>\n  \t\t  \tif ($(&#8216;#article-tools&#8217;).length &gt; 0) {<br \/>\n  \t\t  \t\t$(&#8216;#article-tools&#8217;).before(html);<br \/>\n  \t\t  \t} else {<br \/>\n\t  \t\t  \t$(&#8216;#content&#8217;).append(html);<br \/>\n  \t\t  \t}<br \/>\n        \t$(&#8216;#inline-appeal&#8217;).children(&#8216;form&#8217;).children(&#8216;.more-options&#8217;).children(&#8216;a&#8217;).click(function() {<br \/>\n  \t\t\t\t$(&#8216;#inline-appeal&#8217;).children(&#8216;.initially-hidden&#8217;).show();<br \/>\n  \t\t\t\t$(this).parent().hide();<br \/>\n  \t\t\t\treturn false;<br \/>\n  \t\t\t});<br \/>\n  \t\t}<br \/>\n  \t}<br \/>\n$(document).ready(function(){<br \/>\n        appendInlineAppeal();<br \/>\n        appendBottomAppeal();<br \/>\n});<\/p>\n<p>Republished from: <a href=\"http:\/\/www.wsws.org\/en\/articles\/2013\/08\/guar-a01.html\" target=\"_blank\" title=\"Guardian newspaper reveals wider Internet surveillance\">World Socialist Web Site<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 By Andre Damon 1 August 2013 The British Guardian newspaper, which first carried National Security Agency whistle-blower Edward Snowden\u2019s revelations of massive and illegal government spying, on Wednesday published a report by journalist Glenn Greenwald detailing the NSA\u2019s \u201cwidest-reaching\u201d program for internet spying. The program, called XKeyscore, allows the intelligence agency to carry out [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[487],"tags":[],"class_list":{"0":"post-54900","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-breaking-news"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/54900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=54900"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/54900\/revisions"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=54900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=54900"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=54900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}