The Christian Science Monitor: Guess who’s (not) coming to state dinner: Brazil could cancel over NSA

Brazilian President Dilma Rousseff suspended preliminary steps for her October state visit to Washington, signaling allegations of US spying on her personal communications could reverse what would have been a crescendo of positive US-Brazil relations.

President Rousseff called off her advance logistics team that would have laid the ground for the only state visit the Obama administration has scheduled this year. It’s an honor reserved for Washington’s closest partners – including a black-tie dinner and military reception ­– and the invitation last May was viewed as an upgrade for Brazil in terms of bilateral relations.

But the US-Brazil relationship, already tense after leaks in July of alleged US eavesdropping on millions of phone calls and emails sent by citizens across Brazil, was further strained this week. After the widely viewed Sunday night TV program Fantástico alleged that the US also spied on the personal communications of President Rousseff and her aides, her administration hardened its tone, sending strong signals that the October visit could be cancelled.

Rousseff’s outrage goes beyond posturing to gain bargaining power with the US, says David Fleischer, a political scientist at the University of Brasília. “It was pretty genuine. She is a pretty short tempered person,” Mr. Fleischer says.

A state dinner is such a high-level commitment that to cancel it would be a blow to Obama; the Monitor found no examples that a state visit, once announced, has ever been cancelled before.

————

Click below for the full article.

http://www.csmonitor.com/World/Americas/2013/0906/Guess-who-s-not-coming-to-state-dinner-Brazil-could-cancel-over-NSA

 

The Christian Science Monitor: What will your Obamacare premium be? Numbers are in for 17 states

If you live in California, Ohio, or Connecticut, you can now look up what health insurance will cost on the new Obamacare exchanges.

If you live in Florida, Illinois, or Texas, you don’t know yet, even though President Obama’s Affordable Care Act calls for the exchanges to be up and running in less than a month.

That’s one reason the debate over Obamacare’s impact on health insurance costs is still unsettled. Not all the data are in.

But the Kaiser Family Foundation weighed in Thursday with a report on some 17 states, plus the District of Columbia, that have unveiled their pricing.

————–

Click below for the full article.

http://www.csmonitor.com/USA/Politics/2013/0905/What-will-your-Obamacare-premium-be-Numbers-are-in-for-17-states.-video

CATO Institute: Another False Arrest for Filming Police

An officer with the Leland Police Department has been suspended without pay for 28 days after a teenager recorded video of an arrest on his cell phone.

According to police reports, 19-year-old Gabriel Self tried approaching Leland Police Sergeant John Keel as he was arresting another man on drug charges. Sgt. Keel told Self to leave the area….

The charge was resisting, obstructing, or delaying a law enforcement officer. Self was interfering with an investigation, according to the arrest report….

Self said Keel was simply standing in the parking lot, so he did not see how he could be interfering with anything.

—-

Click below for the full article.

http://www.policemisconduct.net/another-false-arrest-filming-police/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Policemisconductnet+%28PoliceMisconduct.net%29

Reason.com: Delete the Fed

Who should run the Federal Reserve System when chairman Ben Bernanke’s term expires next year: Vice Chair Janet Yellen or former Obama adviser Lawrence Summers?

Neither.

Who then?

No one.

The fact is, we need the Federal Reserve like we need a hole in the head. Contrary to folklore, the Fed is not needed to stabilize the economy or to prevent unemployment. As the Fed heads into its second century, we ought to realize that its record is terrible. Even if we don’t count the interwar period (which some economists call the new Fed’s practice round), America’s central bank is a flop. Monetary economists George A. Selgin, William D. Lastrapes, and Lawrence H. White wrote in “Has the Fed Been a Failure?”:

Drawing on a wide range of recent empirical research, we find the following: (1) The Fed’s full history (1914 to present) has been characterized by more rather than fewer symptoms of monetary and macroeconomic instability than the decades leading to the Fed’s establishment. (2) While the Fed’s performance has undoubtedly improved since World War II, even its postwar performance has not clearly surpassed that of its undoubtedly flawed predecessor, the National Banking system, before World War I.

The authors support that generalization with details. On inflation: “Far from achieving long-run price stability, [the Fed] has allowed the purchasing power of the U.S. dollar, which was hardly different on the eve of the Fed‘s creation from what it had been at the time of the dollar’s establishment as the official U.S. monetary unit, to fall dramatically” — by 95 percent.

Selgin, Lastrapes, and White also show that the central bank has given us longer recessions and slower recoveries.

But without the Fed, who would set interest rates to guide the economy? The first answer is that government policy and Fed manipulations can create the very recessions that the Fed then tries to reverse. If the politicians and their court economists would get over their hubristic belief that they are stewards of the economy, macroeconomic crises would disappear.

Besides, the Fed cannot set interest rates, not even its narrow federal-funds rate for overnight interbank loans. At most, it targets that rate by buying and selling government securities, but it doesn’t always hit its target. The idea that the Fed can even heavily influence mortgage and other interest rates ignores important facts.

First, the Fed’s operations are small compared to the complex U.S. and world economies. Writes monetary economist Richard Timberlake,

Traditional economics properly teaches that many complex market forces — countless investment and savings decisions not dependent on monetary factors — are essential in determining interest rates. The Fed funds rate that Fed policy can influence through its monopoly over the quantity of money is inconsequential in shaping most short-term and long-term rates in capital markets, unless that moneymaking power subsequently promotes a pervasive price inflation. [Emphasis added.]

Second, the Fed can’t lower rates through monetary inflation beyond the very short run. Why not? Because lenders will respond by raising their rates to avoid being screwed by price inflation –unless the Fed prevents the inflation, as it’s been doing, by effectively borrowing back the new money from the banks at interest.

Moreover, as monetary economist Jeffrey Rogers Hummel points out,

Globalization, with the corresponding relaxation of exchange controls in all major countries, allows [investors] easily to flee to foreign currencies, with the result that changes in central-bank policy are almost immediately priced by exchange rates and interest rates. Add to this the ability to purchase from many governments securities that are indexed to inflation, and it becomes highly unlikely investors will be caught off guard by anything less than sudden, catastrophic hyperinflation (defined as more than 50% per month) — and maybe even not then.

While inflation is not the threat it once was, the Fed is not harmless. “Bernanke has so expanded the Fed’s discretionary actions beyond merely controlling the money stock that it has become a gigantic, financial central planner,” Hummel writes.

No one should have such power.

—–

Click below for the full article.

http://reason.com/archives/2013/08/25/delete-the-fed

 

Reuters: Documents show NSA may have collected tens of thousands of emails of Americans

U.S. intelligence officials released new documents on Wednesday showing that the National Security Agency may have unintentionally collected as many as 56,000 emailed communications of Americans per year between 2008 and 2011.

The officials revealed the documents as part of an effort to explain how the NSA spotted, and then fixed, technical problems which led to the inadvertent collection of emails of American citizens without warrants.

The move is the Obama administration’s latest response to continuing controversy over alleged electronic eavesdropping excesses by the NSA.

The documents included a formerly “top-secret,” but newly-declassified ruling by the ultra-secretive Foreign Intelligence Surveillance Court in which the court itself, in an obscure footnote, estimates, based on data supplied by NSA, that between 2008 and 2011, the agency might have unintentionally collected as many as 56,000 emailed communications of Americans in each of those three years.

U.S. intelligence officials who agreed to answer questions about the documents’ contents told reporters the domestic emails were collected in the execution of a program designed to target the emails of foreign terrorism suspects.

According to the officials and a court document which the administration released, the NSA decided to “purge” the material after discovering it was inadvertently collected.

Details about the secretive surveillance programs have been brought to light in recent months by fugitive U.S. intelligence contractor Edward Snowden, who leaked classified documents to media outlets.

—–

Click below for the full article, as well as a few updates from Reuters.

http://www.reuters.com/article/2013/08/21/us-usa-security-nsa-idUSBRE97K14Y20130821

The Washington Post: Here’s how Iran censors the Internet

Discussion of Internet censorship usually focuses on China and its “Great Firewall.” But the Chinese Communist Party isn’t the only regime that censors its Internet. Iran does too.

Little is known about Iran’s censorship system because Iranian citizens who probe the network from inside the country risk reprisals from the government. But earlier this year, two anonymous Iranians teamed up with Alex Halderman, a computer science professor at the University of Michigan, to conduct one of the first systematic studies of Iranian Internet censorship to be published outside Iran. Halderman presented his findings at a Tuesday talk at the Usenix Security conference in Washington, D.C.

Iran has an extensive list of blacklisted sites. Users who attempt to visit a banned site see a notice that looks something like this:

Screen Shot 2013-08-15 at 9.55.18 AM

What gets censored? To find out, the researchers attempted to visit the sites on Alexa’s top 500 lists in various categories. Almost half of the 500 most popular sites on the Internet are censored. Unsurprisingly, the theocratic Iranian regime censors pornographic Web sites most heavily. But a high percentage of sites in the “art,” “society,” and “news” categories are also blocked:

iran_censorship

In addition to banning particular sites, the Iranian network also filters traffic based on its content. In one test, the researchers created a file called sex.htm that was hosted outside the United States. Access to this page from inside Iran was blocked.

The Iranian Internet is also configured to discourage the use of certain encrypted protocols. Web traffic is allowed through at full speed. Traffic that uses the encrypted SSH protocol, which can be used to “tunnel” other types of traffic out of the country, run at less than 20 percent of the network’s full speed. Traffic the Iranian firewall doesn’t recognize is throttled even more dramatically, and gets cut off altogether after about 60 seconds.

——

Click below for the full article.

http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/15/heres-how-iran-censors-the-internet/

NY Times: N.S.A. Said to Search Content of Messages to and From U.S.

The National Security Agency is searching the contents of vast amounts of Americans’ e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance, according to intelligence officials.

The N.S.A. is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, a practice that government officials have openly acknowledged. It is also casting a far wider net for people who cite information linked to those foreigners, like a little used e-mail address, according to a senior intelligence official.

While it has long been known that the agency conducts extensive computer searches of data it vacuums up overseas, that it is systematically searching — without warrants — through the contents of Americans’ communications that cross the border reveals more about the scale of its secret operations.

It also adds another element to the unfolding debate, provoked by the disclosures of Edward J. Snowden, the former N.S.A. contractor, about whether the agency has infringed on Americans’ privacy as it scoops up e-mails and phone data in its quest to ferret out foreign intelligence.

Government officials say the cross-border surveillance was authorized by a 2008 law, the FISA Amendments Act, in which Congress approved eavesdropping on domestic soil without warrants as long as the “target” was a noncitizen abroad. Voice communications are not included in that surveillance, the senior official said.

Asked to comment, Judith A. Emmel, an N.S.A. spokeswoman, did not directly address surveillance of cross-border communications. But she said the agency’s activities were lawful and intended to gather intelligence not about Americans but about “foreign powers and their agents, foreign organizations, foreign persons or international terrorists.”

“In carrying out its signals intelligence mission, N.S.A. collects only what it is explicitly authorized to collect,” she said. “Moreover, the agency’s activities are deployed only in response to requirements for information to protect the country and its interests.”

Hints of the surveillance appeared in a set of rules, leaked by Mr. Snowden, for how the N.S.A. may carry out the 2008 FISA law. One paragraph mentions that the agency “seeks to acquire communications about the target that are not to or from the target.” The pages were posted online by the newspaper The Guardian on June 20, but the telltale paragraph, the only rule marked “Top Secret” amid 18 pages of restrictions, went largely overlooked amid other disclosures.

To conduct the surveillance, the N.S.A. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border. The senior intelligence official, who, like other former and current government officials, spoke on condition of anonymity because of the sensitivity of the topic, said the N.S.A. makes a “clone of selected communication links” to gather the communications, but declined to specify details, like the volume of the data that passes through them.

Computer scientists said that it would be difficult to systematically search the contents of the communications without first gathering nearly all cross-border text-based data; fiber-optic networks work by breaking messages into tiny packets that flow at the speed of light over different pathways to their shared destination, so they would need to be captured and reassembled.

The official said that a computer searches the data for the identifying keywords or other “selectors” and stores those that match so that human analysts could later examine them. The remaining communications, the official said, are deleted; the entire process takes “a small number of seconds,” and the system has no ability to perform “retrospective searching.”

The official said the keyword and other terms were “very precise” to minimize the number of innocent American communications that were flagged by the program. At the same time, the official acknowledged that there had been times when changes by telecommunications providers or in the technology had led to inadvertent overcollection. The N.S.A. monitors for these problems, fixes them and reports such incidents to its overseers in the government, the official said.

The disclosure sheds additional light on statements intelligence officials have made recently, reassuring the public that they do not “target” Americans for surveillance without warrants.

At a House Intelligence Committee oversight hearing in June, for example, a lawmaker pressed the deputy director of the N.S.A., John Inglis, to say whether the agency listened to the phone calls or read the e-mails and text messages of American citizens. Mr. Inglis replied, “We do not target the content of U.S. person communications without a specific warrant anywhere on the earth.”

Timothy Edgar, a former intelligence official in the Bush and Obama administrations, said that the rule concerning collection “about” a person targeted for surveillance rather than directed at that person had provoked significant internal discussion.

“There is an ambiguity in the law about what it means to ‘target’ someone,” Mr. Edgar, now a visiting professor at Brown, said. “You can never intentionally target someone inside the United States. Those are the words we were looking at. We were most concerned about making sure the procedures only target communications that have one party outside the United States.”

The rule they ended up writing, which was secretly approved by the Foreign Intelligence Surveillance Court, says that the N.S.A. must ensure that one of the participants in any conversation that is acquired when it is searching for conversations about a targeted foreigner must be outside the United States, so that the surveillance is technically directed at the foreign end.

Americans’ communications singled out for further analysis are handled in accordance with “minimization” rules to protect privacy approved by the surveillance court. If private information is not relevant to understanding foreign intelligence, it is deleted; if it is relevant, the agency can retain it and disseminate it to other agencies, the rules show.

While the paragraph hinting at the surveillance has attracted little attention, the American Civil Liberties Union did take note of the “about the target” language in a June 21 post analyzing the larger set of rules, arguing that the language could be interpreted as allowing “bulk” collection of international communications, including of those of Americans.

Jameel Jaffer, a senior lawyer at the A.C.L.U., said Wednesday that such “dragnet surveillance will be poisonous to the freedoms of inquiry and association” because people who know that their communications will be searched will change their behavior.

“They’ll hesitate before visiting controversial Web sites, discussing controversial topics or investigating politically sensitive questions,” Mr. Jaffer said. “Individually, these hesitations might appear to be inconsequential, but the accumulation of them over time will change citizens’ relationship to one another and to the government.”

The senior intelligence official argued, however, that it would be inaccurate to portray the N.S.A. as engaging in “bulk collection” of the contents of communications. “ ‘Bulk collection’ is when we collect and retain for some period of time that lets us do retrospective analysis,” the official said. “In this case, we do not do that, so we do not consider this ‘bulk collection.’ ”

Stewart Baker, a former general counsel for the N.S.A., said that such surveillance could be valuable in identifying previously unknown terrorists or spies inside the United States who unwittingly reveal themselves to the agency by discussing a foreign-intelligence “indicator.” He cited a situation in which officials learn that Al Qaeda was planning to use a particular phone number on the day of an attack.

“If someone is sending that number out, chances are they are on the inside of the plot, and I want to find the people who are on the inside of the plot,” he said.

The senior intelligence official said that the “about the target” surveillance had been valuable, but said it was difficult to point to any particular terrorist plot that would have been carried out if the surveillance had not taken place. He said it was one tool among many used to assemble a “mosaic” of information in such investigations. The surveillance was used for other types of foreign-intelligence collection, not just terrorism investigations, the official said.

There has been no public disclosure of any ruling by the Foreign Intelligence Surveillance Court explaining its legal analysis of the 2008 FISA law and the Fourth Amendment as allowing “about the target” searches of Americans’ cross-border communications. But in 2009, the Justice Department’s Office of Legal Counsel signed off on a similar process for searching federal employees’ communications without a warrant to make sure none contain malicious computer code.

——

Click below for the full article.

http://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html?pagewanted=all&_r=0

Schneier on Security: Restoring Trust in Government and the Internet

In July 2012, responding to allegations that the video-chat service Skype — owned by Microsoft — was changing its protocols to make it possible for the government to eavesdrop on users, Corporate Vice President Mark Gillett took to the company’s blog to deny it.

Turns out that wasn’t quite true.

Or at least he — or the company’s lawyers — carefully crafted a statement that could be defended as true while completely deceiving the reader. You see, Skype wasn’t changing its protocols to make it possible for the government to eavesdrop on users, because the government was already able to eavesdrop on users.

At a Senate hearing in March, Director of National Intelligence James Clapper assured the committee that his agency didn’t collect data on hundreds of millions of Americans. He was lying, too. He later defended his lie by inventing a new definition of the word “collect,” an excuse that didn’t even pass the laugh test.

As Edward Snowden’s documents reveal more about the NSA’s activities, it’s becoming clear that we can’t trust anything anyone official says about these programs.

Google and Facebook insist that the NSA has no “direct access” to their servers. Of course not; the smart way for the NSA to get all the data is through sniffers.

Apple says it’s never heard of PRISM. Of course not; that’s the internal name of the NSA database. Companies are publishing reports purporting to show how few requests for customer-data access they’ve received, a meaningless number when a single Verizon request can cover all of their customers. The Guardian reported that Microsoft secretly worked with the NSA to subvert the security of Outlook, something it carefully denies. Even President Obama’s justifications and denials are phrased with the intent that the listener will take his words very literally and not wonder what they really mean.

NSA Director Gen. Keith Alexander has claimed that the NSA’s massive surveillance and data mining programs have helped stop more than 50 terrorist plots, 10 inside the U.S. Do you believe him? I think it depends on your definition of “helped.” We’re not told whether these programs were instrumental in foiling the plots or whether they just happened to be of minor help because the data was there. It also depends on your definition of “terrorist plots.” An examination of plots that that FBI claims to have foiled since 9/11 reveals that would-be terrorists have commonly been delusional, and most have been egged on by FBI undercover agents or informants.

Left alone, few were likely to have accomplished much of anything.

Both government agencies and corporations have cloaked themselves in so much secrecy that it’s impossible to verify anything they say; revelation after revelation demonstrates that they’ve been lying to us regularly and tell the truth only when there’s no alternative.

There’s much more to come. Right now, the press has published only a tiny percentage of the documents Snowden took with him. And Snowden’s files are only a tiny percentage of the number of secrets our government is keeping, awaiting the next whistle-blower.

Ronald Reagan once said “trust but verify.” That works only if we can verify. In a world where everyone lies to us all the time, we have no choice but to trust blindly, and we have no reason to believe that anyone is worthy of blind trust. It’s no wonder that most people are ignoring the story; it’s just too much cognitive dissonance to try to cope with it.

This sort of thing can destroy our country. Trust is essential in our society. And if we can’t trust either our government or the corporations that have intimate access into so much of our lives, society suffers. Study after study demonstrates the value of living in a high-trust society and the costs of living in a low-trust one.

Rebuilding trust is not easy, as anyone who has betrayed or been betrayed by a friend or lover knows, but the path involves transparency, oversight and accountability. Transparency first involves coming clean. Not a little bit at a time, not only when you have to, but complete disclosure about everything. Then it involves continuing disclosure. No more secret rulings by secret courts about secret laws. No more secret programs whose costs and benefits remain hidden.

———

Click below for the full article.

http://www.schneier.com/blog/archives/2013/08/restoring_trust.html