{"id":204530,"date":"2017-07-09T11:55:25","date_gmt":"2017-07-09T15:55:25","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/whistleblower-the-nsa-is-still-collecting-the-full-content-of-us-domestic-e-mail-without-a-warrant-center-for-research-on-globalization\/"},"modified":"2017-07-09T11:55:25","modified_gmt":"2017-07-09T15:55:25","slug":"whistleblower-the-nsa-is-still-collecting-the-full-content-of-us-domestic-e-mail-without-a-warrant-center-for-research-on-globalization","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/whistleblower-the-nsa-is-still-collecting-the-full-content-of-us-domestic-e-mail-without-a-warrant-center-for-research-on-globalization\/","title":{"rendered":"Whistleblower: The NSA Is Still Collecting the Full Content Of US Domestic E-Mail, Without a Warrant  &#8211; Center for Research on Globalization"},"content":{"rendered":"<p><p>    The man whodesignedthe NSAs electronic    intelligence gathering system (Bill Binney)    sent usan    affidavitwhich he signed on the Fourth of July    explaining that the NSA is still spying on normal, every day    Americans  and not focused on stopping terror attacks (Ive    added links to provide some background):  <\/p>\n<p>      The attacks on September 11, 2001 completely changed how the      NSA conducted surveillance . the individual liberties      preserved in the U.S. Constitution were no longer a      consideration. In October 2001, the NSA began to implement a      group of intelligence activities now known as the      Presidents Surveillance Program.    <\/p>\n<p>      The Presidents Surveillance Programinvolved      the collection of the full content of domestic e-mail      trafficwithout any of the privacy      protections built into [theprogram      that Binney had designed]. This was done under the      authorization ofExecutive Order 12333. This meant that      the nations e-mail could be read by NSA staff members      without the approval of any court or judge.    <\/p>\n<p>      ***    <\/p>\n<p>      The NSA isstill      collecting thefull      contentof      U.S.domestice-mail,      without a warrant. We know this because of the      highly-detailed information contained in the documents leaked      by former NSA-contractor, Edward Snowden. I have personally      reviewed many of these documents.    <\/p>\n<p>      I can authenticate these documents because they relate to      programs that I created and supervised during my years at the      NSA.    <\/p>\n<p>      [U.S. government officials] have also admitted the      authenticity of these documents.    <\/p>\n<p>      ***    <\/p>\n<p>      The documents provided by Mr. Snowden are      the type of data that experts in the intelligence community      would typically and reasonably rely upon to form an opinion      as to the conduct of the intelligence community.    <\/p>\n<p>      [The Snowden documents prove that the NSA isstill      spyingonmost      Americans.]    <\/p>\n<p>      When Mr. Snowden said that he could read the e-mail of a      federal judge if he had that judges email address, he was      not exaggerating.    <\/p>\n<p>      ***    <\/p>\n<p>      The NSA is creating a program that shows the real-time      location of all cell phones, tablets and computers in the      world, at any time. To have a state-actor engaging in this      sort of behavior, without any court supervision, is      troubling.    <\/p>\n<p>      ***    <\/p>\n<p>      In their public statements, [government officials] claim that      collection of information is limited, and is being done      pursuant to Section 702 of the Foreign Intelligence      Surveillance Act (FISA). FBI Director James      Comey recently described Section 702 of FISA as the      crown jewel of the intelligence community.    <\/p>\n<p>      Defendants, however, are not being candid with the Court.      Collection is actually being done pursuant to Executive Order      12333(2)(3)(c), which  to my knowledge  has never been      subject to judicial review. This order allows the      intelligence community to      collectincidentallyobtained      information thatmay      indicateinvolvement in activities      thatmay      violatefederal, state, local or      foreign laws. Any lawyer can appreciate the scope of this      broad language. [Background.]    <\/p>\n<p>      ***    <\/p>\n<p>      According to media reports, President      Obamas former National Security Advisor,      Susan Rice, requested email and phone      records on President Trump and various      members of his political campaignduring and      after the 2016 election.    <\/p>\n<p>      According to these reports, the National Security Council      (NSC) has computer logs showing when Rice requested and      viewed such records. The requests were made from July 2016      through January 2017, and included President Trump and      various members of his campaign staff According to an      internal NSC report, the accessed information contained      valuable political information on the Trump transition.      Rices requests into Trump-related conversations increased      following the presidential election last November. None of      the requests were reviewed by any independent court.    <\/p>\n<p>      ***    <\/p>\n<p>      We also know that certain NSA staffers have used their access      to e-mail and phone calls to conduct surveillance on current      and former significant others. The NSA has referred to this      sort of action as LOVEINT, a phrase taken from other      internal-NSA terms of art, such as SIGINT for signals      intelligence.    <\/p>\n<p>      ***    <\/p>\n<p>      Bulk collection makes it impossible for the NSA to actually      do its job.    <\/p>\n<p>      For example, consider the Pinwale program, discussed above,      in which the NSA searches the collected data based on certain      pre-defined keywords, known as the dictionary. The results      from the dictionary search are known as the daily pull.    <\/p>\n<p>      Eighty percent of the NSAs resources go towards review of      the daily pull. The problem is that the daily pull is      enormous. It is simply not possible for one analyst to review      all questionable communications made by millions of people      generating e-mail, text messages, web search queries, and      visits to websites. Every person making a joke about a gun,      bomb or a terrorist incident theoretically gets reviewed by a      live person. This is not possible. When I was at the NSA,      each analyst was theoretically required to review 40,000 to      50,000 questionable records each day. The analyst gets      overwhelmed, and the actual known targets  from the metadata      analysis  get ignored.    <\/p>\n<p>      This is clear from some of the internal NSA memos released by      Edward Snowden and published by the Intercept. In these      memos, NSA analysts say:    <\/p>\n<p>      NSA is gathering too much data. . . . Its making it      impossible to focus.    <\/p>\n<p>      Analysis Paralysis.    <\/p>\n<p>      Data Is Not Intelligence.      Overcome by Overload.    <\/p>\n<p>      Bulk collection is making it difficult for the NSA to find      the real threats. [Indeed.]      The net effect from the current approach is that people die      first. The NSA has missed repeated terrorist incidents over      the last few years, despite its mass monitoring efforts. The      NSAcannot identifyfuture      terrorism because 99.9999% of what it collects and analyzes      isforeseeably      irrelevant.This is swamping the      intelligence community, while creating the moral hazards and      risks to the republic .    <\/p>\n<p>      After a terrorist incident occurs, only then do analysts and      law enforcement go into their vast data, and focus on the      perpetrators of the crime.This is exactly      the reverse of what they should be      doing.If the NSA wants to      predict intentions and capabilitiespriorto      the crime, then it must focus      onknownsubversive relationships, giving      decision-makers time to react and influence events.    <\/p>\n<p>      There is a second reason why data mining bulk collected data      is a waste of time and resources: the professional terrorists      know that we are looking at their e-mail and telephonic      communications. As a result, they use code words that      arenotin the dictionary, and will not      come up in the daily pull.    <\/p>\n<p>      ***    <\/p>\n<p>      Thus, collecting mass amounts of data and searching it to      find the proverbial needle in a haystack doesnt work. It is      fishing in the empty ocean, where the fish are scientifically      and foreseeably not present.    <\/p>\n<p>    Binney explains what we should do instead:  <\/p>\n<p>      The truth is that there has always been a safe,      alternate path to      take.Thats a focused,      professional, disciplined selection of data off the fiber      lines.    <\/p>\n<p>      ***    <\/p>\n<p>      I serve as a consultant to many foreign governments on the      issues described in this affidavit. As such, I have testified      before the German Parliament, the British House of Lords, and      the EU Libe Committee on Civil Liberties on these issues. I      also consult regularly with members of the European Union on      intelligence issues.    <\/p>\n<p>      ***    <\/p>\n<p>      it is my understanding that the European Union intends to      adopt legislation requiring its intelligence community to get      out of the business of bulk collection, and implement smart      selection.    <\/p>\n<p>      ***    <\/p>\n<p>      Smart selection is not enough. Governments, courts and the      public need to have an absolute means of verifying what      intelligence agencies are doing. This should be done within      government by having a cleared technical team responsible to      the whole of government and the courts with the authority and      clearances to go into any intelligence agency and look      directly into databases and tools in use. This would insure      that government as a whole could get to the bottom line truth      of what the intelligence agencies were really doing    <\/p>\n<p>      I would also suggest that agencies be required to implement      software that audits their analytic processes to insure      compliance with law and to automatically detect and report      any violations to the courts and others.    <\/p>\n<p>    Indeed, Binney has patiently explained for many years    thatwe    know howto help prevent terrorism     andcorruption    is whatspreventing us from doing it.  <\/p>\n<p>    Binney thinks we shouldget    seriousabout motivating the intelligence agencies to    do their job.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.globalresearch.ca\/whistleblower-the-nsa-is-still-collecting-the-full-content-of-u-s-domestic-e-mail-without-a-warrant\/5598205\" title=\"Whistleblower: The NSA Is Still Collecting the Full Content Of US Domestic E-Mail, Without a Warrant  - Center for Research on Globalization\">Whistleblower: The NSA Is Still Collecting the Full Content Of US Domestic E-Mail, Without a Warrant  - Center for Research on Globalization<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The man whodesignedthe NSAs electronic intelligence gathering system (Bill Binney) sent usan affidavitwhich he signed on the Fourth of July explaining that the NSA is still spying on normal, every day Americans and not focused on stopping terror attacks (Ive added links to provide some background): The attacks on September 11, 2001 completely changed how the NSA conducted surveillance . the individual liberties preserved in the U.S <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/whistleblower-the-nsa-is-still-collecting-the-full-content-of-us-domestic-e-mail-without-a-warrant-center-for-research-on-globalization\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-204530","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/204530"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=204530"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/204530\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=204530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=204530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=204530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}