Now, whatever you consider yourself, friends, you should be afraid. You should be very afraid. With over 200 million Americans targeted, this domestic spying program is so widespread, it is so random, it is so far removed from focusing on al Qaeda suspects that the president was talking about today, that it?'s hard to imagine any intelligence program in U.S. history being so susceptible to abuse.
You know, I served on the Judiciary Committee and the Armed Service Committee in Congress for four years, and no program I studied while using security clearances ever came close to the scope of this massive spy program. It is dangerous, it breaks FCC laws, and it endangers all Americans?' right to privacy.
But you know what? The villains in this spy program are pretty easy to target, almost as easy as your phone records. First you have the president, who?'s shown that he will break laws if they get in his way of spying. Second, Democratic leaders?-they complain now, but where were they? They reviewed the program. Why no protest? Don?'t hold your press conferences now, Nancy Pelosi. Tell us about it when you learn about it!
And finally, the phone companies, who actually profited from the government reading all of your phone bills. They should be sued and their CEOs fired.
Hey, memo to the president and congressional leaders who signed up on this lousy program; We don?'t trust you anymore. We don?'t trust you with our phone bills. We don?'t trust you with our bank records. We don?'t trust you with our medical histories. From now on, if you want to look at Americans?' private records, get a damn search warrant!
May 27, 1999
Lawmakers Raise Questions About International Spy Network
By NIALL McKAY
An international surveillance network established by the National Security Agency and British intelligence services has come under scrutiny in recent weeks, as lawmakers in the United States question whether the network, known as Echelon, could be used to monitor American citizens.
Last week, the House Committee on Intelligence requested that the National Security Agency and the Central Intelligence Agency provide a detailed report to Congress explaining what legal standards they use to monitor the conversations, transmissions and activities of American citizens.
The request is part of an amendment to the annual intelligence budget bill, the Intelligence Reauthorization Act. It was proposed by Bob Barr, a Georgia Republican and was supported by the chairman of the House Intelligence Committee, Porter Goss, a Florida Republican. The amendment was passed by the House on May 13 and will now go before the Senate.
Barr, a former CIA analyst, is part of a growing contingent in the United States, Europe and Australia alarmed by the existence of Echelon, a computer system that monitors millions of e-mail, fax, telex and phone messages sent over satellite-based communications systems as well as terrestrial-based data communications. The system was established under what is known as the "UKUSA Agreement" after World War II and includes the security agencies of the United States, Britain, Canada, Australia and New Zealand.
Although Echelon was originally set up as an international spy network, lawmakers are concerned that it could be used to eavesdrop on American citizens.
"I am concerned there are not sufficient legal mechanisms in place to protect our private information from unauthorized government eavesdropping through such mechanisms as Project Echelon," Barr said in an interview on Tuesday.
The finished report will outline the legal bases and other criteria used by United States intelligence agencies when assessing potential wiretap targets. It will be submitted to the House and made available to the public.
"If the agencies feel unable to provide a full account to the public, then a second classified report will be provided to the House Committee on Intelligence," Barr said. "This is to stop the agencies hiding behind a cloak of secrecy."
Judith Emmel, chief of public affairs for the NSA, declined to comment about the UKUSA Agreement but said the agency was committed to responding to all information requests covered by Barr's amendment. "The NSA's Office of General Counsel works hard to ensure that all Agency activities are conducted in accordance with the highest constitutional, legal and ethical standards," she said.
Until last Sunday, no government or intelligence agency from the member states had openly admitted to the existence of the UKUSA Agreement or Echelon. However, on a television program broadcast on Sunday in Australia, the director of Australia's Defence Signals Directorate acknowledged the existence of the agreement. The official, Martin Brady, declined to be interviewed for the "Sunday Program," but provided a statement for its special on Echelon. "DSD does cooperate with counterpart signals intelligence organizations overseas under the UKUSA relationship," the statement said.
Related Articles
European Parliament Debates Wiretap Proposal
(May 7, 1999)
Dutch Law Goes Beyond Enabling Wiretapping to Make It a Requirement
(April 14, 1998)
European Study Paints a Chilling Portrait of Technology's Uses
(February 24, 1998)
Meanwhile, European Parliament officials have also expressed concern about the use of Echelon to gather economic intelligence for participating nations. Last October, the spying system came to the attention of the Parliament during a debate on Europe's intelligence relationship with the United States. At that time, the Parliament decided it needed more information about Echelon and asked its Science and Technology Options Assessment Panel to commission a report.
The report, entitled "Development of Surveillance Technology and Risk of Abuse of Economic Information", was published on May 10 and provides a detailed account of Echelon and other intelligence monitoring systems.
According to the report, Echelon is just one of the many code names for the monitoring system, which consists of satellite interception stations in participating countries. The stations collectively monitor millions of voice and data messages each day. These messages are then scanned and checked against certain key criteria held in a computer system called the "Dictionary." In the case of voice communications, the criteria could include a suspected criminal's telephone number; with respect to data communications, the messages might be scanned for certain keywords, like "bomb" or "drugs." The report also alleges that Echelon is capable of monitoring terrestrial Internet traffic through interception nodes placed on deep-sea communications cables.
While few dispute the necessity of a system like Echelon to apprehend foreign spies, drug traffickers and terrorists, many are concerned that the system could be abused to collect economic and political information.
"The recent revelations about China's spying activities in the U.S. demonstrates that there is a clear need for electronic monitoring capabilities," said Patrick Poole, a lecturer in government and economics at Bannock Burn College in Franklin, Tenn., who compiled a report on Echelon for the Free Congress Foundation. "But those capabilities can be abused for political or economic purposes so we need to ensure that there is some sort of legislative control over these systems."
On the "Sunday Program" special on Echelon, Mike Frost, a former employee of Canada's Communications Security Establishment, said that Britain's intelligence agency requested that the CSE monitor the communications of British government officials in the late 1980s. Under British law, the intelligence agency is prohibited from monitoring its own government. Frost also said that since the cold war is over, the "the focus now is towards economic intelligence."
Still, Echelon has been shrouded in such secrecy that its very existence has been difficult to prove. Barr's amendment aims to change that.
"If this report reveals that information about American citizens is being collected without legal authorization, the intelligence community will have some serious explaining to do," Barr said.
Related Sites
These sites are not part of The New York Times on the Web, and The Times has no control over their content or availability.
Copyright 1999 The New York Times Company
By Robert Parry
May 12, 2006
Given George W. Bush's history of outright lying, especially on national security matters, it may seem silly to dissect his words about the new disclosure that his administration has collected phone records of some 200 million Americans.
But Bush made two parse-able points in reacting to USA Today's story about the National Security Agency building a vast database of domestic phone calls. "We're not mining or trolling through the personal lives of millions of innocent Americans," Bush said, adding "the privacy of ordinary Americans is fiercely protected in all our activities."
In his brief remarks, however, Bush didn't define what he meant by "ordinary Americans" nor whether the data-mining might cover, say, thousands or even hundreds of thousands of people, just not "millions."
For instance, would a journalist covering national security be regarded as an "ordinary American"? What about a political opponent or an anti-war activist who has criticized administration policies in the Middle East? Such "unordinary" people might number in the tens of thousands, but perhaps not into the millions.
Also, isn't it reasonable to suspect that the Bush administration would be tempted to tap into its huge database to, say, check on who might have been calling reporters at the New York Times, the Washington Post, the New Yorker - or now USA Today - where significant national security stories have been published?
Or during Campaign 2004, wouldn't the White House political apparatchiks have been eager to know whether, say, Sen. John Kerry had been in touch with foreign officials who might have confided that they were worried about Bush gaining a second term?
Or what about calls to and from special prosecutor Patrick Fitzgerald while he investigates a White House leak of the identity of Valerie Plame, the CIA officer married to former Ambassador Joseph Wilson, an Iraq War critic?
What if one of these "unordinary" Americans had placed a lot of calls to an illicit lover or a psychiatrist? Wouldn't Bush's aggressive political operatives know just how to make the most of such information?
Paranoia?
While such concerns might seem paranoid to some observers, Bush has blurred his political fortunes with the national interest before, such as his authorization to Vice President Dick Cheney's staff in mid-2003 to put out classified material on Iraq's weapons of mass destruction to undercut Ambassador Wilson.
Though Plame was an undercover CIA .....
Poll: Most Americans Support NSA's Efforts
By Richard Morin
Washington Post Staff Writer
Friday, May 12, 2006; 7:00 AM
A majority of Americans initially support a controversial National Security Agency program to collect information on telephone calls made in the United States in an effort to identify and investigate potential terrorist threats, according to a Washington Post-ABC News poll.
The new survey found that 63 percent of Americans said they found the NSA program to be an acceptable way to investigate terrorism, including 44 percent who strongly endorsed the effort. Another 35 percent said the program was unacceptable, which included 24 percent who strongly objected to it.
A slightly larger majority--66 percent--said they would not be bothered if NSA collected records of personal calls they had made, the poll found.
Underlying those views is the belief that the need to investigate terrorism outweighs privacy concerns. According to the poll, 65 percent of those interviewed said it was more important to investigate potential terrorist threats "even if it intrudes on privacy." Three in 10--31 percent--said it was more important for the federal government not to intrude on personal privacy, even if that limits its ability to investigate possible terrorist threats.
Half--51 percent--approved of the way President Bush was handling privacy matters.
The survey results reflect initial public reaction to the NSA program. Those views that could change or deepen as more details about the effort become known over the next few days.
USA Today disclosed in its Thursday editions the existence of the massive domestic intelligence-gathering program. The effort began soon after the Sept. 11 terrorist attacks. Since then, the agency began collecting call records on tens of millions of personal and business telephone calls made in the United States. Agency personnel reportedly analyze those records to identify suspicious calling patterns but do not listen in on or record individual telephone conversations.
Word of the program sparked immediate criticism on Capitol Hill, where Democrats and Republicans criticized the effort as a threat to privacy and called for congressional inquiries to learn more about the operation. In the survey, big majorities of Republicans and political independents said they found the program to be acceptable while Democrats were split.
President Bush made an unscheduled appearance yesterday before White House reporters to defend his administration's efforts to investigate terrorism and criticize public disclosure of secret intelligence operations. But he did not directly acknowledge the existence of the NSA records-gathering program or answer reporters' questions about it.
By a 56 percent to 42 percent margin, Americans said it was appropriate for the news media to have disclosed the existence of this secret government program.
A total of 502 randomly selected adults were interviewed Thursday night for this survey. Margin of sampling error is five percentage points for the overall results. The practical difficulties of doing a survey in a single night represents another potential source of error.
© 2006 The Washington Post Company
NEWSWEEK Poll: Americans Wary of NSA Spying
According to the NEWSWEEK poll, 73 percent of Democrats and 26 percent of Republicans think the NSA's program is overly intrusive. Details of the surveillance efforts were first reported on Wednesday by USA Today. The newspaper said the NSA has collected tens of millions of customer phone records from AT&T Inc., Verizon Communications Inc. and Bell-South Corp., in an effort to assemble a database of every call made within the United States. While the records include detailed information about when and where phone calls were made, the government isn't listening in to the actual conversations, a U.S. intelligence official familiar with the program told the newspaper. The only big telecommunications company that has refused to participate is Denver-based Qwest, which says it was concerned about the legal implications of turning over customer information to the government without warrants.
Story continues
502 adults is a pretty pathetic sample size to extrapolate the entirety of America from, wouldn't you agree, Tico?
I could cite some other polls which disagree with those numbers, but I won't bother. It won't make a difference in the end.
Cycloptichorn
Congress to Scrap NSA, Create ?'Transparent' Spy Agency
by Scott Ott
(2006-05-12) ?- Concerned that the National Security Agency (NSA) may have violated the civil liberties of Americans by analyzing records of millions of phone calls to detect patterns that might indicate terrorist activity, a bipartisan coalition in Congress today will unveil legislation to scrap the NSA and replace it with a more ?'transparent' spy agency.
According to language in the measure, the new intelligence unit, dubbed Open-Source Intelligence (OSI), will "harness the power of the internet to protect the right of the American people to know how their spy dollar is spent."
"There's nothing like sunshine to ensure accountability," said an unnamed Congressional aide who spoke in exchange for a lobster dinner, a fine chianti and a $12 Macanudo cigar. "Just because the enemy is among us, using our telecommunications infrastructure to plot the next major attack, doesn't mean the government can sneak around doing secret stuff simply to save a few thousand, or million, lives. We have rights."
Under the terms of the bill, the OSI website will include a list of all covert agents, with photos, home addresses, email links and IM screennames. As the OSI gathers data, it will be accessible in real-time through the website to "premium subscribers," but even non-members will be able to view the aggregated data, and listen to brief, sample clips of legally intercepted phone calls."
Friday, May 12, 2006
E-Mail Article
Printer Friendly Version
by Greg Palast
I know you're shocked -- SHOCKED! -- that George Bush is listening in on all your phone calls. Without a warrant. That's nothing. And it's not news.
This is: the snooping into your phone bill is just the snout of the pig of a strange, lucrative link-up between the Administration's Homeland Security spy network and private companies operating beyond the reach of the laws meant to protect us from our government. You can call it the privatization of the FBI -- though it is better described as the creation of a private KGB.
The leader in the field of what is called "data mining," is a company called, "ChoicePoint, Inc," which has sucked up over a billion dollars in national security contracts.
Worried about Dick Cheney listening in Sunday on your call to Mom? That ain't nothing. You should be more concerned that they are linking this info to your medical records, your bill purchases and your entire personal profile including, not incidentally, your voting registration. Five years ago, I discovered that ChoicePoint had already gathered 16 billion data files on Americans -- and I know they've expanded their ops at an explosive rate.
They are paid to keep an eye on you -- because the FBI can't. For the government to collect this stuff is against the law unless you're suspected of a crime. (The law in question is the Constitution.) But ChoicePoint can collect it for "commercial" purchases -- and under the Bush Administration's suspect reading of the Patriot Act -- our domestic spying apparatchiks can then BUY the info from ChoicePoint.
Who ARE these guys selling George Bush a piece of you?
ChoicePoint's board has more Republicans than a Palm Beach country club. It was funded, and its board stocked, by such Republican sugar daddies as billionaires Bernie Marcus and Ken Langone -- even after Langone was charged by the Securities Exchange Commission with abuse of inside information.
I first ran across these guys in 2000 in Florida when our Guardian/BBC team discovered the list of 94,000 "felons" that Katherine Harris had ordered removed from Florida's voter rolls before the election. Virtually every voter purged was innocent of any crime except, in most cases, Voting While Black. Who came up with this electoral hit list that gave Bush the White House? ChoicePoint, Inc.
And worse, they KNEW the racially-tainted list of felons was bogus. And when we caught them, they lied about it. While they've since apologized to the NAACP, ChoicePoint's ethnic cleansing of voter rolls has been amply rewarded by the man the company elected.
And now ChoicePoint and George Bush want your blood. Forget your phone bill. ChoicePoint, a sickened executive of the company told us in confidence, "hope[s] to build a database of DNA samples from every person in the United States ...linked to all the other information held by CP [ChoicePoint]" from medical to voting records.
And ChoicePoint lied about that too. The company publicly denied they gave DNA to the Feds -- but then told our investigator, pretending to seek work, that ChoicePoint was "the number one" provider of DNA info to the FBI.
"And that scares the hell out of me," said the executive (who has since left the company), because ChoicePoint gets it WRONG so often. We are not contracting out our Homeland Security to James Bond here. It's more like Austin Powers, Inc. Besides the 97% error rate in finding Florida "felons," Illinois State Police fired the company after discovering ChoicePoint had produced test "results" on rape case evidence ... that didn't exist. And ChoicePoint just got hit with the largest fine in Federal Trade Commission history for letting identity thieves purchase 145,000 credit card records.
But it won't stop, despite Republican senators shedding big crocodile tears about "surveillance" of innocent Americans. That's because FEAR is a lucrative business -- not just for ChoicePoint, but for firms such as Syntech, Sybase and Lockheed-Martin -- each of which has provided lucrative posts or profits to connected Republicans including former Total Information Awareness chief John Poindexter (Syntech), Marvin Bush (Sybase) and Lynn Cheney (Lockheed-Martin).
But how can they get Americans to give up our personal files, our phone logs, our DNA and our rights? Easy. Fear sells better than sex -- and they want you to be afraid. Back to today's New York Times, page 28: "Wider Use of DNA Lists is Urged in Fighting Crime." And who is providing the technology? It comes, says the Times, from the work done on using DNA fragments to identity victims of the September 11 attack. And who did that job (for $12 million, no bid)? ChoicePoint, Inc. Which is NOT mentioned by the Times.
"Genetic surveillance would thus shift from the individual [the alleged criminal] to the family," says the Times -- which will require, of course, a national DNA database of NON-criminals.
It doesn't end there. Turn to the same newspaper, page 23, with a story about a weird new law passed by the state of Georgia to fight illegal immigration. Every single employer and government agency will be required to match citizen or worker data against national databases to affirm citizenship. It won't stop illegal border crossing, but hey, someone's going to make big bucks on selling data. And guess what local boy owns the data mine? ChoicePoint, Inc., of Alpharetta, Georgia.
The knuckleheads at the Times don't put the three stories together because the real players aren't in the press releases their reporters re-write.
But that's the Fear Industry for you. You aren't safer from terrorists or criminals or "felon" voters. But the national wallet is several billion dollars lighter and the Bill of Rights is a couple amendments shorter.
And that's their program. They get the data mine -- and we get the shaft.
