17
   

We Have No Privacy, We Are Always Being Watched.

 
 
firefly
 
  1  
Reply Thu 13 Jun, 2013 05:09 pm
@spendius,
Quote:
Look Bill--ff is up to her usual trick of being a wonderful person

It's no trick, I am a wonderful person. Smile
spendius
 
  1  
Reply Thu 13 Jun, 2013 05:17 pm
@firefly,
We know that ff. There's no need to keep harping on about it.
firefly
 
  1  
Reply Thu 13 Jun, 2013 05:20 pm
@spendius,
You're the one who brought it up. Smile
0 Replies
 
hawkeye10
 
  1  
Reply Thu 13 Jun, 2013 05:30 pm
Quote:
The National Security Agency has been compiling a database of everyone’s phone records. But don’t worry. According to the Obama administration, it’s just “metadata.” “The information acquired does not include the content of any communications,” says White House spokesman Josh Earnest. Analysts can only search “phone numbers and durations of calls,” says President Obama. “They're not looking at content.” James Clapper, the director of national intelligence, likens it to reading the Dewey Decimal number on the cover of a library book. You’re not seeing what’s inside the book.
In this context, meta means that the thing you’re talking about is really about something else. Metadata is “data that provides information about other data.” When Obama, Clapper, and other officials say they’re just collecting metadata, they’re basically saying it’s empty. It tells you that a call happened, but it doesn’t tell you what was said. It’s referential, derivative, hollow.
Unfortunately, that’s also true of the administration’s statements about the NSA surveillance programs. Many Americans, upset about these programs, are asking how they work and what they reveal. Obama and his aides purport to answer these questions, but their replies are really just meta-answers. They don’t tell us what the programs do or where they stop. All they tell us, vaguely, is how the boundaries—whatever they are—are drawn.
The administration says the programs are governed by a “robust legal regime,” “strict controls,” “strict restrictions,” and “very careful procedures and processes to ensure particularly that the privacy and civil liberties of Americans are protected.” The programs have “a whole range of safeguards,” says Obama. They’re “consistently subject to safeguards,” says Clapper. The NSA’s Internet monitoring program, for instance, follows “legislatively mandated procedures” that “are very precise.” But the law doesn’t specify these safeguards or procedures, and the administration doesn’t explain them. We’re told they’re precise, but we aren’t told precisely what they are.
The procedures Obama and Clapper talk about aren’t procedures for using the data. They’re procedures for approving procedures for using the data. They’re metaprocedures. White House press secretary Jay Carney assures us that “there are procedures for both requirements for judicial consent and review and for congressional review,” as well as executive branch “procedures … for monitoring these programs.” Clapper says his office and the Justice Department give Congress “exhaustive semiannual reports assessing compliance with the targeting and minimization procedures.” The reports may be exhaustive, but the standards are completely unexplained. What exactly are the “targeting and minimization procedures”?
Obama says there’s an “audit process.” That sounds great. What does the audit examine? According to the president, it ascertains whether “all the safeguards are being properly observed.” What are the safeguards? He doesn’t say. Clapper says the administration performs “regular on-site reviews of how Section 702 authorities are being implemented.” Cool. So how are those authorities being implemented? Again, no answer.
.
.
.
What we need is more clarity. Clapper says the FISA court “only allows the data to be queried when there is a reasonable suspicion, based on specific facts, that the particular basis for the query is associated with a foreign terrorist organization.” What does that mean? What’s reasonable suspicion? What level of facts? What degree of association?
What we don’t need is more linguistic trickery. We can’t have a director of national intelligence who deceives himself and others about the meaning of “collect.” And we can’t have a president who substitutes procedural for substantive answers. When reporters ask whether the NSA is operating under an unduly flexible interpretation of the law, the reply from the White House—“It’s the view of the president that there is in place a very strict oversight regime”—isn’t an answer. It’s a meta-answer. Give us the real thing.

http://www.slate.com/articles/news_and_politics/frame_game/2013/06/nsa_metadata_obama_s_non_answers_to_questions_about_government_surveillance.2.html

thankfully we at A2K have been well schooled in this form of diversion and trickery by Firefly!
JTT
 
  1  
Reply Thu 13 Jun, 2013 05:36 pm
@firefly,
Quote:
It's no trick, I am a wonderful person.


Why would a wonderful person provide cover for war criminals, rapists, torturers, terrorists, thieves, FF?
0 Replies
 
firefly
 
  1  
Reply Thu 13 Jun, 2013 05:40 pm
Quote:
The New York Times
June 13, 2013
N.S.A. Chief to Release More Details on Surveillance Programs

By JEREMY W. PETERS

WASHINGTON — The director of the National Security Agency said on Thursday that he would release more information about the top secret programs that sweep up vast quantities of communications data on people here and abroad, and vowed to clear up what he said were inaccuracies and misperceptions about how the programs work.

But the disclosure of any further details, said the director, Gen. Keith B. Alexander, would have to balance the public’s right to know with the risks of divulging material that could tip off enemies.

“We have pledged to be as transparent as possible,” he said after emerging from a classified briefing with House members. “I think it’s important that you have that information. But we don’t want to risk American lives in doing that. So what we’re being is very deliberate in this process so that we don’t end up causing a terrorist attack by giving out too much information.”

General Alexander did not elaborate on what kinds of information the N.S.A. would disclose, beyond saying that it would involve statistics about the programs in question.

“And I think when the American people hear that,” he added, “they’re going to stop and say: ‘Wait. The information we’re getting is incorrect.'”

Among the inaccuracies he said he wanted to clear up was that the N.S.A. is listening to Americans’ phone calls.

General Alexander appeared before reporters in the Capitol flanked by the Republican chairman of the House Intelligence Committee, Mike Rogers of Michigan, and the committee’s senior Democrat, C. A. Dutch Ruppersberger, a bipartisan show of unity reflecting the general agreement among leaders on Capitol Hill that the surveillance programs are worthwhile and legal.

General Alexander took no questions from reporters.

Mr. Rogers stressed that grave damage was done by the disclosure of the programs, which involve a huge database of the logs of nearly every domestic phone call made by Americans, and the collection of information from American Internet companies like Google without individual court orders if the request is targeted at noncitizens abroad.

“The more we know, the more dangerous this situation becomes,” he said, adding that people believed to be intent on doing Americans harm had already altered their activities since the existence of the programs became public.

Mr. Rogers shed some light on what information the N.S.A. might soon release, saying that he was hopeful it would involve more details about specific attacks that were disrupted because of the programs.

He also said that a “damage assessment” was under way within the N.S.A. to assess what other kinds of secrets that the leaker, Edward J. Snowden, a former N.S.A. contractor, might have tried to obtain.

“It’s clear that he attempted to go places that he was not authorized to go, which raised questions for everyone,” Mr. Rogers said, adding that it was impossible to say what else Mr. Snowden might have obtained.

“Candidly,” he added, “nobody really knows the answer to that today. I think we will know the answer to that shortly.”

The disclosure of the N.S.A.'s surveillance efforts has brought together Democrats and Republicans on Capitol Hill in a way that is unusual in today’s deeply fractured and partisan culture.

But in a sign that the comity may not last, Speaker John A. Boehner on Thursday needled President Obama, even as he praised the N.S.A.'s surveillance under this administration.

“I’ve made it very clear this program does not target innocent Americans in any way, shape or form,” Mr. Boehner said. “These programs have helped keep Americans safe.”

“Frankly,” he continued, “I’m a little surprised that the White House hasn’t stood up and made clear, on an ongoing basis over this last week, just how important these programs are.”

While Obama administration officials have generally been reserved in their references to Mr. Snowden, who has been labeled a traitor by some and maligned as a misguided high school dropout by others, members of Congress have shown no such reticence.

“He’s broken the law,” Mr. Ruppersberger said. “We have laws in the United States for whistle-blowers, for people who think injustice is being done. Yet he chose to go to China.”

Mr. Rogers went as far as to question whether there was something deeper to uncover about Mr. Snowden’s ties to China, where he fled after making the N.S.A. programs public.

“We need to ask a lot more questions about his motives, his connections, where he ended up, why he is there,” Mr. Rogers said. “How is he sustaining himself while he is there? And is the Chinese government fully cooperating?”

http://www.nytimes.com/2013/06/14/us/nsa-chief-to-release-more-details-on-surveillance-programs.html?hp
JTT
 
  1  
Reply Thu 13 Jun, 2013 05:44 pm
@firefly,
"We Americans are the ultimate innocents. We are forever desperate to believe that this time the government is telling us the truth."

Sydney Schanberg

===============

Only you are no longer an innocent, FF. You know, yet you still try to provide cover for these criminals.
0 Replies
 
hawkeye10
 
  1  
Reply Thu 13 Jun, 2013 05:48 pm
@firefly,
Quote:
Gen. Keith B. Alexander, would have to balance the public’s right to know with the risks of divulging material that could tip off enemies.

“We have pledged to be as transparent as possible,” he said after emerging from a classified briefing with House members.
.
.
General Alexander did not elaborate .
.
.
.
General Alexander took no questions from reporters.
hawkeye10
 
  2  
Reply Thu 13 Jun, 2013 05:56 pm
@hawkeye10,
hold on to your fannies....we are about to get the shock and awe treatment over how much mileage the state has gained towards SAFETY! by running us over. It will be all assertion and no documentation nat.
0 Replies
 
JTT
 
  1  
Reply Thu 13 Jun, 2013 06:01 pm
@firefly,
Quote:
“We have pledged to be as transparent as possible,” he [Gen. Keith B. Alexander,] said after emerging from a classified briefing with House members. “I think it’s important that you have that information. But we don’t want to risk American lives in doing that. So what we’re being is very deliberate in this process so that we don’t end up causing a terrorist attack by giving out too much information.”


And nobody gagged or choked?!

Would this be the same Gen. Keith B. Alexander as this Gen. Keith B. Alexander,

Quote:

Keith B. Alexander

...

9/11[edit]

As a one-star general, Alexander headed the Army Intelligence and Security Command, where in 2001 he was in charge of 10,700 spies and eavesdroppers worldwide. In the words of James Bamford who wrote his biography for Wired, "Alexander and the rest of the American intelligence community suffered a devastating defeat when they were surprised by the attacks on 9/11." Alexander's reaction was to order his intercept operators to begin to illegally monitor the email and phone calls of American citizens who were unrelated to terrorist threats, including the personal calls of journalists.[3]
Abu Ghraib[edit]

In 2003, he was named deputy chief of staff for intelligence for the U.S. Army. Under his command were the units responsible for Abu Ghraib torture and prisoner abuse in Baghdad, Iraq. Testifying to the Senate Armed Services Committee, Alexander called the abuse "totally reprehensible" and described the perpetrators as a "group of undisciplined MP soldiers".[6] Mary Louise Kelly, who interviewed him later for NPR, said that because he was "outside the chain of command that oversaw interrogations in Iraq", Alexander was able to survive with his "reputation intact".[4]

NSA appointment[edit]

Alexander became a three-star general. In 2005, Donald Rumsfeld, secretary of defense, named him Director of the National Security Agency. There, according to Bamford, Alexander deceived the House Intelligence Committee when his agency was involved in NSA warrantless wiretapping.[3]

http://en.wikipedia.org/wiki/Keith_B._Alexander
0 Replies
 
firefly
 
  2  
Reply Thu 13 Jun, 2013 07:54 pm
Quote:
The New York Times
June 13, 2013
A Promise of Changes for Access to Secrets

By DAVID E. SANGER and JEREMY W. PETERS

WASHINGTON — The chairwoman of the Senate Intelligence Committee emerged from a classified briefing on Thursday about the leak of top secret surveillance programs and declared that Congress would soon consider legislation to sharply limit the access that private contractors — who operate much of the national security infrastructure — have to the nation’s most sensitive intelligence programs.

“We will certainly have legislation which will limit or prevent contractors from handling highly classified and technical data, and we will do some other things,” the chairwoman, Senator Dianne Feinstein, said after a review of the episodes attended by almost half of the members of the Senate.

Ms. Feinstein, a California Democrat, said that on Monday the National Security Agency would release more information about the potential terrorist attacks that had been thwarted by its surveillance programs. “There are more than you think,” she said a bit cryptically. The senator has been among the most vocal defenders of the program.

Earlier in the day, the security agency director, Gen. Keith B. Alexander, vowed to clear up what he said were inaccuracies and misperceptions about what kind of data the agency collects, and how it uses it. But the disclosure of any further detail, he said, would have to navigate a delicate line between the public’s right to know and divulging material that could tip off enemies.

Edward J. Snowden, the 29-year old computer systems administrator who says he gave the documents about the telephone monitoring program and an Internet search program called Prism to The Washington Post and The Guardian of London, was an employee of Booz Allen Hamilton, a private company that administers some of the most sensitive programs for the N.S.A., the Defense Intelligence Agency and the Central Intelligence Agency.

If Congress enacted such limits it would force a widespread change in the way many of the country’s most delicate intelligence operations are run, and would most likely require the intelligence agencies to hire more staff members of their own to do work that in recent years has increasingly been outsourced.

It is unclear how broadly Congress would endorse such changes.

“We have a real double standard,” said Senator John McCain, the Arizona Republican, as he emerged from the meeting. “A few weeks ago we were all complaining that we didn’t have enough information about those kids in Boston and we needed broader intelligence sharing,” he said, referring to the two chief suspects in the marathon bombings. “Now we say we want to clamp down on how the information moves.”

Intelligence officials said that limiting the role of companies like Booz Allen would probably prove far more complex than it appears on the surface.

“These are not just operators sitting at some computer console,” one senior official said. “Oftentimes, the contractors develop the systems that they are running — they are frequently the innovative force. You want to think twice before you terminate that.”

A report published early this year by the office of the director of national intelligence underscored just how difficult it would be to limit the access of contractors. It showed that as of last Oct. 1, 483,263 contractors held Top Secret clearances, compared with 791,200 government employees. A half-million other contractors held lower-level secret and confidential clearances.

In a separate meeting Thursday on Capitol Hill the director of the Federal Bureau of Investigation, Robert S. Mueller III, testified to the surveillance programs’ ability to detect terrorist activity, saying that they could have helped prevent the Sept. 11 attacks had they been in place before then. Mr. Mueller also said that one of the programs recently helped the authorities find a friend of the Boston Marathon bombing suspects in Florida.

General Alexander did not elaborate on what kinds of information the National Security Agency would disclose next week, beyond saying that it would involve statistics about the programs in question and give the public a better understanding of how valuable they are.

“We have pledged to be as transparent as possible,” he said after emerging from a classified briefing with members of the House. “I think it’s important that you have that information. But we don’t want to risk American lives in doing that. So what we’re being is very deliberate in this process so that we don’t end up causing a terrorist attack by giving out too much information.”

General Alexander appeared before reporters in the Capitol flanked by the Republican chairman of the House Intelligence Committee, Representative Mike Rogers of Michigan, and the committee’s senior Democrat, C.A. Dutch Ruppersberger, a bipartisan show of unity reflecting the general agreement among Congressinal leaders that the surveillance programs are worthwhile and legal.

General Alexander took no questions from the news media.

Mr. Rogers said that grave damage had been done by the disclosure of the programs, which involve a huge database of the logs of nearly every domestic phone call made by Americans and the collection of information from American Internet companies like Google without individual court orders if the request is aimed at noncitizens abroad.

“The more we know, the more dangerous this situation becomes,” he said, adding that people believed to be intent on doing harm to Americans were already altering their activities since the existence of the programs became public.

Mr. Mueller said in his testimony that the N.S.A.’s surveillance programs, if in place in 2001, could have made a difference in halting the largest terrorist attacks in American history.

Before those attacks, he said, intelligence agencies were tracking one of the hijackers who lived in San Diego and were also looking closely at a Yemen-based safe house for Al Qaeda.

“They understood that that Al Qaeda safe house had a telephone number, but they could not know who was calling in to that particular — that particular safe house,” he said.

“We came to find out afterwards that the person who had called in to that safe house was al-Mihdhar, who was in the United States, in San Diego,” he said, referring to one of the 9/11 hijackers, Khalid al-Mihdhar. “If we had had this program in place at the time, we would have been able to identify that particular telephone number in San Diego.”

The intelligence community’s failure to make that connection was a subject of extensive analysis in the independent 9/11 Commission report. It argued for far wider intelligence sharing. But it was that kind of sharing — placing information that was gathered by many different intelligence agencies into communal computer systems — that put a slide show of the Prism program, a ruling by the Foreign Intelligence Surveillance Court and a presidential directive on cyber offense and defense into Mr. Snowden’s hands.

http://www.nytimes.com/2013/06/14/us/nsa-chief-to-release-more-details-on-surveillance-programs.html?hp

JTT
 
  1  
Reply Thu 13 Jun, 2013 08:15 pm
@firefly,
Quote:
“We have a real double standard,” said Senator John McCain, the Arizona Republican,


Ya sure do, John. Y'all take war criminals like you and put them in positions of power.
0 Replies
 
BillRM
 
  1  
Reply Fri 14 Jun, 2013 05:03 am
@Frank Apisa,
Quote:
That is my name you see alongside my post...that is my picture. The town I live in is in my bio. I don't hide behind an alias...and put a picture of a bird as an avatar.


You mean hiding as any number of the US founding fathers did when addressing matters of public interest both before and long after our revolution?

Commonly using the names of heroes of the old Roman Republic when doing so.
ionamartin123
 
  1  
Reply Fri 14 Jun, 2013 05:07 am
@Region Philbis,
oh yes, Google and Microsoft seems to be the top personal data stealing company. Know what Google Glass does? They store every picture you take in there private server and also know where you travel what you see, everything. Let's say you are watching porn in a room none enters. Google is there when you wear their Glass. And what microsoft is doing? They are taking every character that you are using in skype. It's 100% open for them to read and use your data for advertisement and other purpose(god knows what those are)?
BillRM
 
  1  
Reply Fri 14 Jun, 2013 05:09 am
@hawkeye10,
Quote:
thankfully we at A2K have been well schooled in this form of diversion and trickery by Firefly!


LOL your comment might have uncover the secrets she been hiding from all of us over her tens of thousands postings Drunk she is an employee of the NSA.... Drunk
0 Replies
 
spendius
 
  1  
Reply Fri 14 Jun, 2013 05:09 am
@firefly,
Quote:
If Congress enacted such limits it would force a widespread change in the way many of the country’s most delicate intelligence operations are run, and would most likely require the intelligence agencies to hire more staff members of their own to do work that in recent years has increasingly been outsourced.


That sounds like Big Government engaging in empire building.

A conspiracy theorist might allow himself to fleetingly entertain the notion that Mr Snowden is an agent provocateur put into play by socialists in order to achieve that objective.
spendius
 
  1  
Reply Fri 14 Jun, 2013 05:15 am
@ionamartin123,
Quote:
It's 100% open for them to read and use your data for advertisement and other purpose(god knows what those are)?


How about the psychological profiling of the population? The new confessional.
0 Replies
 
BillRM
 
  1  
Reply Fri 14 Jun, 2013 05:16 am
@ionamartin123,
Quote:
oh yes, Google and Microsoft seems to be the top personal data stealing company. Know what Google Glass does?


Do not worry as it is highly likely that all that data on it way to google and Microsoft is also being tap off at internet backbones and send to the government for storage and inspection by a bank of government super computers.
0 Replies
 
Frank Apisa
 
  1  
Reply Fri 14 Jun, 2013 05:20 am
@BillRM,
BillRM wrote:

Quote:
That is my name you see alongside my post...that is my picture. The town I live in is in my bio. I don't hide behind an alias...and put a picture of a bird as an avatar.


You mean hiding as any number of the US founding fathers did when addressing matters of public interest both before and long after our revolution?

Commonly using the names of heroes of the old Roman Republic when doing so.


No...I mean like the ones who didn't hide...and who stood up like men using their own names. But I suspect you wouldn't understand about that.
BillRM
 
  1  
Reply Fri 14 Jun, 2013 05:31 am
@Frank Apisa,
Quote:
No...I mean like the ones who didn't hide...and who stood up like men using their own names. But I suspect you wouldn't understand about that.


LOL if you have any understanding of American history you would have known that the two groups overlap over time.

For example a large percent of Hamilton writings was done before and after the revolution under a pseudo name but he also lead an important attack at Yorktown in fact he begged Washington for the right to do so.

You would need to be very simple minded to assume that anyone who write under a pseudo name is a coward of some type.
 

Related Topics

 
Copyright © 2024 MadLab, LLC :: Terms of Service :: Privacy Policy :: Page generated in 4.44 seconds on 11/24/2024 at 04:45:07