EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

08.24.13

The NSA ‘Violates’ Society Worldwide, But We Need to Fight It, Not Surrender to It

Posted in Database, Deception at 11:58 pm by Dr. Roy Schestowitz

“The only thing necessary for the triumph [of evil] is for good men to do nothing.”

Edmund Burke

Edmund Burke

Summary: A roundup of the latest NSA violations and what they mean to us

GROKLAW wrote a heart-breaking post, but I do not share Pamela’s views when it comes to the response. When anonymous E-mail services decided to shut down it was supposed to protect the services legally and also protect the users’ privacy. With Groklaw it is an inherently different problem, so comparing the shutdowns is impossible. As early as 2006 or 2007 myself and others in Techrights advised Pamela to encrypt her mails (I sent her around 1,000 messages), but she declined. When it comes to setting things up to receive encrypted mail on her Apple Mac, that too was not embraced. So in a way, E-mail privacy cannot be truly blamed; not when you’re refusing to embrace privacy-preserving hooks which are fully facilitated. My wife and I donated to Groklaw some months ago, but this wasn’t enough to keep the site going.

In any event, several months ago (before the NSA leaks) we asked readers if we should increase focus on privacy. Techrights helped defeat Novell, Microsoft is now rather feeble (poor prospects), software patents are not quite spreading as quickly as we feared, and Linux is a victor through Android, with GNU and Free software becoming so commonplace that they are taken for granted and hardly even named anymore (they are definitely more widely used than ever before).

Once in a day or two we will try to summarise the latest NSA abuses, highlighting everything which readers ought to know about the Espionage Department which has bases all around the world, protecting the empire and surveying populations in secrecy (it has to remain secret because it’s illegal, alas with no accountability).

Today’s most troubling story shows that the war on Tor is advancing [1], banning IP masking under some circumstances. The NSA would absolutely love that, criminalising Web use that subverts surveillance.

The second bunch of articles proved that the NSA deliberately broke the law, with impunity of course [2-8]. Obama tried to hide it on their behalf [9-10]. Some “Hope”, eh?

FAIR TV covered some of the latest [11] and we also found the CIA approaching the NSA’s territories [12-13] (remember when IBM helped the Nazis put ‘barcodes’ on people after surveying them?).

The latest revelations are likely to change legal cases [14-15] and some fake “investigations” are being used by government in an attempt to suppress scrutiny from the outside [16-19]. Some ‘investigators’ are from the CIA. That sure inspires confidence. Interestingly enough, the New York Times predicted 3 decades ago that this would happen [20-23]. NSA employees correctly feel like they are above the law [24].

According to Snowden, the ‘Independent‘ is now ‘leaking’ on behalf of Britain’s (NSA’s) GCHQ and the United States, trying to subvert publication by The Guardian [25-29].

Politicians and plutocrats still try to evoke “9/11″ to justify the NSA’s abusive acts [30-31] while Julian Assange deals a blow to the Chairman of Google, Mr. Schmidt [32]. There are a couple more posts that deal with general issues (not news) [33-34] and pro-FOSS sites cover these matters, also addressing no news in particular [35-37].

Related/contextual items from the news:

  1. US court rules masking IP address to access blocked Website violates law

    But the verdict is probably far narrower in its implications that some believe. Still, it’s a troubling decision about a controversial law.

  2. The Trickle of NSA Revelations Now Includes Intentional Privacy Violations

    The giant jigsaw puzzle that is the NSA-led surveillance state had a few more pieces added on Friday, including the revelation that NSA analysts have intentionally violated privacy protections on multiple occasions.

    Despite repeated and adamant claims from the security agencies and members of Congress that any such violations have been accidental or technical, Bloomberg reports that’s not always the case.

  3. NSA analysts deliberately broke rules to spy on Americans, agency reveals

    US intelligence analysts have deliberately broken rules designed to prevent them from spying on Americans, according to an admission by the National Security Agency that undermines fresh insistences from Barack Obama on Friday that all breaches were inadvertent.

    A report by the NSA’s inspector general is understood to have uncovered a number of examples of analysts choosing to ignore so-called “minimisation procedures” aimed at protecting privacy, according to officials speaking to Bloomberg.

  4. NSA employees spied on their lovers using eavesdropping programme
  5. NSA officers ‘spy on love interests’

    NSA officers have been using agency tools to keep tabs on their partner or spouse for at least the past decade, according to a Wall Street Journal report Friday. The spying isn’t often, but is has been given its own code name, according to the Journal, ‘LOVEINT.’

  6. NSA admits rare willful surveillance violations
  7. NSA analysts ‘wilfully’ skirted policy to spy on Americans, agency admits
  8. NSA Admits: Okay, Okay, There Have Been A Bunch Of Intentional Abuses, Including Spying On Love Interests

    So, this week, we wrote about the NSA quietly admitting that there had been intentional abuses of its surveillance infrastructure, despite earlier claims by NSA boss Keith Alexander and various folks in Congress that there had been absolutely no “intentional” abuses. Late on Friday (of course) the NSA finally put out an official statement admitting to an average of one intentional abuser per year over the past ten years. The AP is reporting that at least one of the abuses involved an NSA employee spying on a former spouse.

  9. NSA report reveals some agents abused power, while Obama says improvements needed
  10. NSA Admits Abusing Spy Powers, Contradicts Obama, NSA Head, Members of Congress

    The National Security Agency (NSA) admitted today that some NSA employees have abused their power to spy on the American people.

    This statement contradicts President Obama, Sen. Dianne Feinstein (D-Calif.), Rep. Mike Rogers (R-Mich.) and National Security Agency head Army General Keith Alexander, who have all denied the NSA has abused its spying powers on Americans.

  11. FAIR TV: Snowden the ‘Spy,’ Stop-and-Frisk Factcheck, Student Loan Rates
  12. CIA Wrestles With Analytics Challenges

    While there is a lot of controversy these days about the amount of data that the National Security Agency and other intelligence groups are collecting, analyzing all that data in ways that make it actionable is still a major challenge, regardless of how omnipotent an organization is perceived to be.

  13. Amazon legal filing flames IBM’s ‘materially deficient’ CIA cloud

    Redacted document reveals seething hatred in spook cloud battle

  14. Ruling Reveals NSA Lies to Courts, Congress About Scope of Surveillance

    In an 85-page ruling handed down by Foreign Intelligence Surveillance Court (commonly known as the FISA court) judge John D. Bates, the NSA was called out “for repeatedly misleading the court that oversees its surveillance on domestic soil, including a program that is collecting tens of thousands of domestic e-mails and other Internet communications of Americans each year,” the New York Times reported on Thursday.

  15. Latest NSA revelations could help pending lawsuits

    On Wednesday, the Obama administration released three opinions issued by the Foreign Intelligence Surveillance Court

  16. NSA Abuses of Spying Power Probed by U.S. Lawmakers

    The leaders of U.S. congressional intelligence committees said they want to probe the intentional abuses of surveillance authority committed by some National Security Agency analysts in the past decade.

    [...]

    Most of the cases didn’t involve the communications of Americans, Feinstein said.

  17. Three Illusory “Investigations” of the NSA Spying Are Unable to Succeed

    Since the revelations of confirmed National Security Agency spying in June, three different “investigations” have been announced. One by the Privacy and Civil Liberties Oversight Board (PCLOB), another by the Director of National Intelligence, Gen. James Clapper, and the third by the Senate Intelligence Committee, formally called the Senate Select Committee on Intelligence (SSCI).

  18. White House picks names for NSA review panel, led by former CIA chief

    The White House has named its choices for the NSA review panel, charged with investigating data collection practices in the wake of the Snowden leaks. According to an ABC News report, the panel will be lead by Michael Morell, who served as acting director of the CIA until March of this year. Morell will be joined on the panel by legal scholar Cass Sunstein, State Department veteran Richard Clarke, and privacy advocate Peter Swire. The group plans to file an interim report to Director of National Intelligence James Clapper in 60 days, followed by a full report to be filed by the end of the year. As per earlier White House statements, the panel will not officially report to Clapper, but file its findings directly to the president.

  19. Obama Appoints Four White House Insiders To NSA Review Panel

    Two weeks ago today, President Obama proposed a number of reforms to the NSA and FISA court in response to the Snowden leak. The reforms were largely cosmetic changes meant to give the illusion of real change, but there was one proposal that could actually do some good. He proposed the creation of an independent review board that would determine if the NSA ever overstepped its boundaries.

  20. The New York Times Predicted the NSA Scandal 30 Years Ago
  21. This Incredible Last Paragraph From A 1983 New York Times Article Predicted The NSA Scandal
  22. No laws define the limits of NSA’s power – David Burnham, 1983
  23. The silent power of the NSA, circa 1983
  24. NSA admits to some deliberate privacy violations

    Despite characterizations of domestic data-gathering as accidental, the agency says some of its analysts engaged in “willful violations” of legal restrictions.

  25. Exclusive: UK’s secret Mid-East internet surveillance base is revealed in Edward Snowden leaks

    Data-gathering operation is part of a £1bn web project still being assembled by GCHQ

  26. Four ways the Guardian could have protected Snowden – by THE NSA
  27. Edward Snowden: Guardian and Independent Row over NSA and GCHQ Middle East Leaks

    The Guardian and the Independent newspapers are embroiled in a row over the latter’s exclusive story which claims the UK runs a secret internet monitoring station in the Middle East to intercept data on behalf of Britain’s GCHQ and America’s National Security Agency (NSA).

  28. Snowden accuses UK government of leaking documents about itself in smear campaign

    This morning, Glenn Greenwald and Edward Snowden responded, bluntly denying that Snowden had worked with The Independent and suggesting that the UK government intentionally leaked information in a smear campaign. “I have never spoken with, worked with, or provided any journalistic materials to the Independent. The journalists I have worked with have, at my request, been judicious and careful in ensuring that the only things disclosed are what the public should know but that does not place any person in danger,” said Snowden in a statement. While Snowden has revealed details of several surveillance programs, he has stopped short of describing anything as concrete as a base location.

  29. NSA leaks reveal UK passes ‘snoop-data’ through secret Middle East station

    London: The leaked NSA documents have brought forth another key element to the US’ mega ‘snoop-op’ suggesting that UK’s spy agency runs a secret internet monitoring station in the Middle East and passes the surveillance data through its channel and shares it with the US.

  30. The Defense of NSA Spying that Wasn’t

    Mueller vaguely cited “various programs,” giving them a retroactive chance of preventing “a part of 9/11.” But even this defense of post-9/11 powers is insufficient.

    [...]

    That absence of foresight is a twin with retrospective assessments like Mueller’s, which fail to account for the fact that nobody knew ahead of 9/11 what devastation might occur. Immediately after the 9/11 attacks, everybody knew what such an attack could cause, and everybody began responding to the problem of terrorism.

    Would Patriot Act programs have prevented at least a part of 9/11? Almost certainly not, given pre-9/11 perceptions that terrorism was at the low end of threats to safety and security. A dozen years since 9/11, terrorism is again at the low end of threats to safety and security because of multiplicitous efforts worldwide and among all segments of society. It is not Patriot Act programs and certainly not mass domestic surveillance that make us safe. Even Mueller didn’t defend NSA spying.

  31. NSA spied on Americans to prevent another 9/11 attack, Bloomberg reports

    About 10 times in the past decade, National Security Agency employees intentionally abused access to the organization’s surveillance systems to spy on Americans, Bloomberg News reported on Friday.

  32. Google and the NSA: Who’s holding the ‘shit-bag’ now?

    So just how close is Google to the US securitocracy? Back in 2011 I had a meeting with Eric Schmidt, the then Chairman of Google, who came out to see me with three other people while I was under house arrest. You might suppose that coming to see me was gesture that he and the other big boys at Google were secretly on our side: that they support what we at WikiLeaks are struggling for: justice, government transparency, and privacy for individuals. But that would be a false supposition. Their agenda was much more complex, and as we found out, was inextricable from that of the US State Department. The full transcript of our meeting is available online through the WikiLeaks website.

    The pretext for their visit was that Schmidt was then researching a new book, a banal tome which has since come out as The New Digital Age. My less than enthusiastic review of this book was published in the New York Times in late May of this year. On the back of that book are a series of pre-publication endorsements: Henry Kissinger, Bill Clinton, Madeleine Albright, Michael Hayden (former head of the CIA and NSA) and Tony Blair. Inside the book Henry Kissinger appears once again, this time given pride of place in the acknowledgements.

  33. US publishes revealing review on NSA surveillance

    Surveillance conducted by the NSA under the Foreign Intelligence Surveillance Act (FISA) Amendments Act was unconstitutional and violated ‘the spirit’ of federal law, the ruling found.

  34. This NSA Twitter Parody Account Is Both Hilarious And Upsetting

    When the U.S. Office of the Director of National Intelligence launched its Tumblr account and accompanying Twitter feed two days ago, it was a little hard to believe that transparency initiative would truly shed light on the inner workings of the country’s spy programs. As with many of the recent National Security Agency developments, an online parody was born. And it’s pretty good, if not a bit unsettling.

  35. The End of the Internet…
  36. Paranoia Optimization for Our Modern Times
  37. Groklaw, Domestic Surveillance and the True Measure of Risk
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 29/1/2015: Android Shipments in 2014 Exceed 1,000,000,000, LibreOffice 4.4 is Out

    Links for the day



  2. Corporate Media, Led Astray by Patent Lawyers, Continues to Distort the Reality of Software Patents Post-Alice

    The press of the rich and the powerful continues its attempt to preserve software patents, despite the US Supreme Court's decision to abolish a lot of them on the basis of abstraction



  3. An Estimated 1,000 EPO Employees-Strong Legion Engulfs Danish Consulate to Protest Jesper Kongstad's (of Administrative Council) Protection of Benoît Battistelli

    A large protest waged by staff of the EPO targets one of the key facilitators of Battistelli's terrifying tyranny



  4. Links 28/1/2015: Ubuntu Touch Windowed Mode, NVIDIA Linux Legacy Drivers Updated

    Links for the day



  5. Breaking: EPO Vice-President Željko Topić Loses Defamation Case in Croatia

    The EPO's notorious Vice-President, whose appointment at the EPO is still raising some alarming questions, has just lost his case in Croatia (one of many cases), motivating us to accelerate coverage about the persona known as Željko Topić



  6. Qualys Starts Self-Promotional FUD Campaign, Naming a Bug That Was Already Fixed 2 Years Ago and Distros Have Covered With Patches

    Responding to the media blitz which paints GNU/Linux as insecure despite the fact that bugs were evidently found and fixed



  7. The Openwashing of Microsoft is Now Threatening to Eliminate the Identity of Free Software

    More openwashing of Microsoft, including in the corporate media, shows just to what great an extent and how quickly the old "Microsoft Open Source" Big Lie grows feet



  8. Links 27/1/2015: Plasma 5.2, Dell Precision With GNU/Linux

    Links for the day



  9. Microsoft's Media Attack on Free Software and GNU/Linux

    Brainwash war is still being waged by Microsoft and its friends to convince people that Windows is universally dominant and that Microsoft is now part of the Free software world



  10. Microsoft Accounting Practices After Fire Again, After Previous Abuses and Book-Cooking

    After the infamous IRS brawl comes another confrontation between Microsoft and the SEC, which is unhappy with Microsoft for seemingly cooking the books again



  11. Links 26/1/2015: Debian 8.0 “Jessie” RC1, Linux Kernel 3.19 RC6

    Links for the day



  12. Links 25/1/2015: Android Wear 5.0, Tizen in Bangladesh

    Links for the day



  13. IRC Proceedings: January 11th, 2015 – January 24th, 2015

    Many IRC logs



  14. Links 24/1/2015: Zenwalk Linux Reviewed, Netrunner 14.1 Released

    Links for the day



  15. The Latest 'Microsoft is Open Source' Propaganda a Parade of Lies

    Microsoft myth makers continue their assault on what is objectively true and try to tell the public that Microsoft is a friend of "Open Source"



  16. Apple -- Like Microsoft -- Not Interested in the Security of Its Operating Systems

    Apple neglected to patch known security flaws in Mac OS X for no less than three months and only did something about that vector of intrusion when the public found out about it



  17. As Battistelli Breaks the Rules and Topić Silences Staff, New European Parliament Petition for Tackling the EPO's Abuses is Needed

    The neglected (by EPO) Article 4a of the European Patent Convention (EPC) and the European Parliament petition/complaint against the EPO's crooked management



  18. Links 23/1/2015: Red Hat on IBM Power, Meizu Leaks With Ubuntu

    Links for the day



  19. Links 23/1/2015: Plasma 5.2, Manjaro 0.9-pre1

    Links for the day



  20. Microsoft is Dying Due to Free Software, Tries to Infect GNU/Linux With .NET and to Infect Moodle in Schools With Microsoft Office and OOXML Lock-in

    'Free' drugs (a proprietary software analogy) the new strategy of Microsoft in its latest battle against Free software, especially in schools where choice is a rarity (if not an impossibility), with the premeditated intention of forming dependency/addiction among young people



  21. Microsoft Symptoms of a Dying Company: More Boosters Depart, Back Doors Revealed, Microsoft's Outlook Cracked

    Bad news for Microsoft shortly before the marketing extravaganza served to cover much of it up



  22. The Collapse of European Patent Office Management Culminates With Resignations

    No blood is spilled, but even the management of the EPO is falling apart as the Director of Internal Communication is said to have just resigned



  23. New LCA Talk: Open Invention Network's Deb Nicholson on Software Patents and Patent Trolls

    Deb Nicholson's LCA talk is now publicly accessible



  24. Links 22/1/2015: GNU/Linux Sysadmin Opportunities, TraceFS Introduced

    Links for the day



  25. Links 21/1/2015: Andrew Tridgell, Torvalds Being Baited

    Links for the day



  26. Vesna Stilin Renews Her Fight for Justice in Željko Topić Case (EPO VP)

    Željko Topić's abuses continue to cloud the legitimacy of the European Patent Office, in which he is a Vice-President



  27. Failure of the EPO Can Derail the Trojan Horse of Software Patents and Patent Trolls

    Dazzled by his endless pursuit of infinite money and power, Battistelli pushes for expansion of patent scope (geographically too), but he won't have it without a challenge



  28. Links 20/1/2015: Linux 3.19 RC5, 30 Years of FSF

    Links for the day



  29. Translations of Member of the European Parliament Complaining About European Patent Office (EPO)

    French, German, Dutch, and English translations of the article from Dennis De Jong



  30. Microsoft, the Back Doors Company, is Gradually Dying and Trying to Embrace the Competition

    The world is leaving Microsoft's common carrier (Windows) behind, so Microsoft, which is shrinking, tries to conquer Free software and GNU/Linux


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts