{"id":207999,"date":"2017-07-26T15:53:54","date_gmt":"2017-07-26T19:53:54","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/new-docs-show-obama-era-nsa-spied-on-americans-without-warrants-the-daily-caller\/"},"modified":"2017-07-26T15:53:54","modified_gmt":"2017-07-26T19:53:54","slug":"new-docs-show-obama-era-nsa-spied-on-americans-without-warrants-the-daily-caller","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/new-docs-show-obama-era-nsa-spied-on-americans-without-warrants-the-daily-caller\/","title":{"rendered":"New Docs Show Obama-Era NSA Spied On Americans Without Warrants &#8211; The Daily Caller"},"content":{"rendered":"<p><p>    TheNSA and the FBI under the Obama administration    infringed upon foundational civil liberties manytimes    over several years, according to recently declassified    documents reviewed by The Daily Caller News Foundation.  <\/p>\n<p>    The memos  which were originally obtained by the American    Civil Liberties Union (ACLU) through Freedom of Information Act    litigation  detail the improprieties, specifically the    massive, indiscriminate surveillance of peoples    communications. They were first reported on by    The Hill.  <\/p>\n<p>    The NSA intercepted hundreds of thousands of peoples personal    information, including email addresses and phone numbers,    throughout then-President Barack Obamas tenure. It was    ostensibly empowered by Section 702 of the Foreign Intelligence    Surveillance Act (FISA), which allows federal intelligence    agencies to collect data on foreigners without a warrant. Due    to the broad powers enumerated in the law and the inherent    makeup of surveillance, the electronic communications of law    abiding Americans are often picked up as well. Operators of the    surveillance are required to immediately destroy any    information that isnot part of the intended target, but    often fail to do so. They are also officiallyobligated to    keep the scope of the interception to a fewpieces of    data, not a haphazardamount, and to ensure that a person    who is inappropriatelyswept up in a warrant isnt    identified.  <\/p>\n<p>    According to section 3(b)(5) of NSAs Section 702 minimization    procedures, computer selection terms used for scanning, such    as telephone numbers, key words or phrases, or other    discriminators, will be limited to those selection terms    reasonably likely to return foreign intelligence information,'    reads a formerly top secret NSA quarterly FISA compliance    report from March 2015.  <\/p>\n<p>    NSA reported that on [redacted] 2014, an analyst conducted an    overly broad search against data acquired from multiple    authorities including Section 702. NSA advises that the analyst    realized his error immediately, canceled the query, and deleted    the corresponding results, the memo reads, adding that the    analyst was once again reminded of the FISA requirements. This    specific outlined incident wasjust one of many    listedin just one of the many quarterly reports issued by    the NSA, signifying the extent of violations.  <\/p>\n<p>    Several consequential improper disclosures have occurred in    recent months, including the unmasking of elected officials    like former national security adviser Mike Flynn, subsequently    causing morelawmakers to question its validity than    before.(RELATED: Will The    GOP Remake Surveillance Laws After Trump Leaks?)  <\/p>\n<p>    Our countrys founders required the government to get a    warrant before searching Americans private papers, ACLU Staff    Attorney Patrick Toomey told TheDCNF. The same holds true for    Americans phone calls, emails, and internet browsing today,    whether a person is communicating with a friend around the    corner or a family member around the world. The NSA should not    be spying on us.  <\/p>\n<p>    The agency claims that of course some incidental surveillance    will occur, and errors only happenless than 1 percent of    the time.  <\/p>\n<p>    Quite simply, a compliance program that never finds an    incident is not a robust compliance program, said Michael T.    Halbig, the NSAs chief spokesman, according to The Hill. The    National Security Agency has in place a strong compliance    program that identifies incidents, reports them to external    overseers, and then develops appropriate solutions to remedy    any incidents.  <\/p>\n<p>    Stewart Baker, the first assistant secretary for policy at the    U.S. Department of Homeland Security under President George W.    Bush, told TheDCNF that its difficultto authorize    Section 702 without enablingthe collection of Americans    communications. He provides a telling example of a    hypotheticalemail address like [emailprotected]    in whichit doesnt explicitly show if Mahmoud, who may be    conversing with nefarious Yemeni nationals, is an American or    not.  <\/p>\n<p>    Baker asserts that if the NSA knew that Mahmoud was an    American, it would usually mask' his email address with some    label like USPerson No. 1 email address.  <\/p>\n<p>    Section 702 is an effective program that cant really work if    we try to exclude Americans communications, Baker continued,    adding that the unmasking provisions could be tightened up    and they were effectively loosened as part of the sharing    imperative arising from 9\/11.  <\/p>\n<p>    OneNSA analyst, for example, conducted the same search    query about a particular American every work day for months.  <\/p>\n<p>    The NSA announced in April that it stopped the practice    of scooping communications American citizens have with    foreign surveillance targets. But it is not clear how it will    do so if it continues implementing surveillance under Section    702 of FISA, which is set to expire at the end of the year.  <\/p>\n<p>    The content of our emails and texts contains incredibly    personal information about our work, our families, and our most    intimate thoughts, Michelle Richardson of the Center for    Democracy Technology, a nonprofit, said in a statement provided    toTheDCNF. The NSA should never have been vacuuming up    all of these communications, many of which involved Americans,    without a warrant. While we welcome the voluntary stopping of    this practice, its clear that Section 702 must be reformed so    that the government cannot collect this information in the    future.  <\/p>\n<p>    Not everyone is interested in reforming the surveillance    measure, though. Spearheaded by Sen. Tom Cotton of Arkansas, a    large group of    Republican senators introduced legislation in Juneto    indefinitely extend the statute for national security purposes.  <\/p>\n<p>    Follow Eric on    Twitter  <\/p>\n<p>    Send tips to     [emailprotected].  <\/p>\n<p>    Content created by The Daily Caller News Foundation is    available without charge to any eligible news publisher that    can provide a large audience. For licensing opportunities of    our original content, please contact     [emailprotected].  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/dailycaller.com\/2017\/07\/26\/new-docs-show-obama-era-nsa-spied-on-americans-without-warrants\/\" title=\"New Docs Show Obama-Era NSA Spied On Americans Without Warrants - The Daily Caller\">New Docs Show Obama-Era NSA Spied On Americans Without Warrants - The Daily Caller<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> TheNSA and the FBI under the Obama administration infringed upon foundational civil liberties manytimes over several years, according to recently declassified documents reviewed by The Daily Caller News Foundation. The memos which were originally obtained by the American Civil Liberties Union (ACLU) through Freedom of Information Act litigation detail the improprieties, specifically the massive, indiscriminate surveillance of peoples communications.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/new-docs-show-obama-era-nsa-spied-on-americans-without-warrants-the-daily-caller\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-207999","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/207999"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=207999"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/207999\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=207999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=207999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=207999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}