Politico: NSA Chief Attributes Calls For Restriction of Government Surveillance on “Sensationalized” Reporting and “Media Leaks”

Gen. Keith Alexander is pictured. | John Shinkle/POLITICO

The leader of the embattled National Security Agency doubled down Wednesday  against calls from Capitol Hill to restrict U.S. government surveillance programs — a campaign  he attributed to “sensationalized” reporting and “media leaks.”

On the same day that key Senate lawmakers pledged to bring new oversight to  the NSA, Gen. Keith Alexander mounted a public defense of his agency: He  stressed the intelligence community isn’t “listening to Americans’ phone calls  and reading their emails,” and he urged technology and government leaders to  help “get the facts out” and “get our nation to understand why we need these  tools” in the wake of Edward Snowden’s disclosures.

Speaking at a cybersecurity  conference in Washington, Alexander also commended companies for cooperating  with the federal government, and he made a plea for more power — particularly to  thwart terrorists who have elevated their activities to cyberspace.

“Over 950 people were killed in Kenya, Syria, Iraq, Yemen and Afghanistan,” Alexander said at the Billington CyberSecurity Summit, referencing recent  violence in the region, “and we’re discussing more esoteric things here. Why?  Because we’ve stopped the terrorist attacks here.”

“We’ve been fortunate, and it’s not been luck,” the general continued. “It’s  our military that’s out [front], and it’s our intelligence community back here.  They can’t do it without tools. So we’re going to have a debate in this country:  Do we give up those tools? I’m concerned we’ll make the wrong decision.”

Alexander gave the speech before attending a classified meeting with  lawmakers on the Senate Judiciary Committee — whose chairman, Sen. Patrick Leahy  (D-Vt.), just this Tuesday called for sweeping changes to the NSA’s surveillance  powers.

Sens. Ron Wyden (D-Ore.), Rand Paul (R-Ky.) and other lawmakers later  unveiled their own blueprint for surveillance reform. The package would reform  the secret court that authorizes government surveillance requests while limiting  the NSA’s ability to collect U.S. phone call logs in bulk.

“It is designed to set a high bar and serve as a measure for true  intelligence reform,” Wyden said at a news conference, emphasizing the proposed  legislation is “not cosmetic.”

Alexander heads back to the Hill on Thursday to testify before the Senate  Intelligence Committee, which is exploring the NSA’s data collection and  retention practices under the Foreign Intelligence Surveillance Act, or FISA.  He’ll return again next week for an open session with Leahy’s panel.

Even against those strong political currents, however, Alexander fiercely  defended the NSA’s existing authorities.

The general repeatedly referenced Sept. 11, 2001, saying the intelligence  community had learned from those attacks that it “had to connect the dots.” Alexander pointed to the Boston tragedy and “the threats this summer” as he made  the case for “speed and agility” in intelligence gathering. The NSA leader also  rebuffed charges that his agency had siphoned up mounds of Americans’ personal  data. Pointing to Section 215, the provision in the PATRIOT Act under which the  NSA has sought telephone  call logs in bulk, Alexander emphasized: “There is no content, there  [are] no names, just the numbers. That’s it. That’s all we asked for.”

Alexander also appeared to defend tech companies like Google and Microsoft,  both of which are actively are fighting the federal government to release more  data about government surveillance requests. Speaking only generally about “industry,” Alexander said companies aren’t “driving up to the NSA” and “dumping” data. They’re doing “what the courts are directing them to provide,” Alexander said. “Our industry have taken a beating on this, and it’s wrong.”

———

Click below for the full article:

http://www.politico.com/story/2013/09/nsa-chief-slams-sensationalized-reporting-97337.html

AP: Lingering doubts over Syria gas attack evidence

The U.S. government insists it has the intelligence to prove it, but the public has yet to see a single piece of concrete evidence produced by U.S. intelligence — no satellite imagery, no transcripts of Syrian military communications — connecting the government of President Bashar Assad to the alleged chemical weapons attack last month that killed hundreds of people.

In its absence, Damascus and its ally Russia have aggressively pushed another scenario: that rebels carried out the Aug. 21 chemical attack. Neither has produced evidence for that case, either. That’s left more questions than answers as the U.S. threatens a possible military strike.

The early morning assault in a rebel-held Damascus suburb known as Ghouta was said to be the deadliest chemical weapons attack in Syria’s 2½-year civil war. Survivors’ accounts, photographs of many of the dead wrapped peacefully in white sheets and dozens of videos showing victims in spasms and gasping for breath shocked the world and moved President Barack Obama to call for action because the use of chemical weapons crossed the red line he had drawn a year earlier.

Yet one week after Secretary of State John Kerry outlined the case against Assad, Americans — at least those without access to classified reports — haven’t seen a shred of his proof.

There is open-source evidence that provides clues about the attack, including videos of fragments from the rockets that analysts believe were likely used. U.S. officials on Saturday released a compilation of videos showing victims, including children, exhibiting what appear to be symptoms of nerve gas poisoning. Some experts think the size of the strike, and the amount of toxic chemicals that appear to have been delivered, make it doubtful that the rebels could have carried it out.

What’s missing from the public record is direct proof, rather than circumstantial evidence, tying this to the regime.

The Obama administration, searching for support from a divided Congress and skeptical world leaders, says its own assessment is based mainly on satellite and signals intelligence, including intercepted communications and satellite images indicating that in the three days prior to the attack that the regime was preparing to use poisonous gas.

But multiple requests to view that satellite imagery have been denied, though the administration produced copious amounts of satellite imagery earlier in the war to show the results of the Syrian regime’s military onslaught. When asked Friday whether such imagery would be made available showing the Aug. 21 incident, a spokesman referred The Associated Press to a map produced by the White House last week that shows what officials say are the unconfirmed areas that were attacked.

The Obama administration maintains it intercepted communications from a senior Syrian official on the use of chemical weapons, but requests to see that transcript have been denied. So has a request by the AP to see a transcript of communications allegedly ordering Syrian military personnel to prepare for a chemical weapons attack by readying gas masks.

The U.S. administration says its evidence is classified and is only sharing details in closed-door briefings with members of Congress and key allies.

Yet the assessment, also based on accounts by Syrian activists and hundreds of YouTube videos of the attack’s aftermath, has confounded many experts who cannot fathom what might have motivated Assad to unleash weapons of mass destruction on his own people — especially while U.N. experts were nearby and at a time when his troops had the upper hand on the ground.

Rebels who accuse Assad of the attack have suggested he had learned of fighters’ plans to advance on Damascus, his seat of power, and ordered the gassing to prevent that.

‘‘We can’t get our heads around this — why would any commander agree to rocketing a suburb of Damascus with chemical weapons for only a very short-term tactical gain for what is a long-term disaster,’’ said Charles Heyman, a former British military officer who edits The Armed Forces of the U.K., an authoritative bi-annual review of British forces.

Inconsistencies over the death toll and other details related to the attack also have fueled doubts among skeptics.

The Obama administration says 1,429 people died in 12 locations mostly east of the capital, an estimate close to the one put out by the Western-backed Syrian National Coalition. When asked for victims’ names, however, the group provided a list of 395.  On that list, some of the victims were identified by a first name only or said to be members of a certain family. There was no explanation for the hundreds of missing names.

——-

Click here for the full article.

http://www.boston.com/news/world/middle-east/2013/09/08/lingering-doubts-over-syria-gas-attack-evidence/miUpIDnRiga99r5PCERY1K/story.html

Yahoo News: Then and now: Obama on use of US military might

In this Aug. 31, 2013, photo, President Barack Obama arrives to make a statement about Syria in the Rose Garden at the White House in Washington. As a candidate Obama championed restraint and global cooperation when faced with security threats but noww, as commander in chief of a world superpower, his rhetoric of the past is being tested by the reality of today as he presses Congress to allow the United States to launch a military strike against the regime of Syrian President Bashar Assad over the objections of most major U.S. allies. (AP Photo/Charles Dharapak)
As a candidate focused on his own election, Barack Obama championed restraint and global cooperation when faced with security threats.Now, as commander in chief of a world superpower, his rhetoric of the past is being tested by the reality of today as he presses Congress to allow the United States to launch a military strike against the regime of Syrian President Bashar Assad, over the objections of most major U.S. allies.

It’s a posture that conflicts with positions he took as a young senator, a 2008 presidential candidate and even a first-term president as he cast himself as a counterweight to the more aggressive approach to national security embodied by his Republican predecessor, President George W. Bush.

The Democratic president long has advocated a U.S. foreign policy that prioritizes negotiation over confrontation, humility over diplomatic bravado and communal action over unilateralism.

Those positions are under question as Obama seeks the approval of Congress back home and as he meets with skeptical world leaders abroad while at the G-20 summit in Russia this week.

A look at some of Obama’s historical and recent comments on the use of America’s military might:

ON CONGRESS

THEN: “In instances of self-defense, the president would be within his constitutional authority to act before advising Congress or seeking its consent. History has shown us time and again, however, that military action is most successful when it is authorized and supported by the legislative branch.” — Response to candidate questionnaire from The Boston Globe, December 2007.

NOW: “As commander in chief, I always preserve the right and the responsibility to act on behalf of America’s national security. I do not believe that I was required to take this to Congress. But I did not take this to Congress just because it’s an empty exercise. I think it’s important to have Congress’ support on it.” — News conference in Stockholm, Sept. 4, 2013.

ON ACTING ALONE

THEN: “In a world in which threats are more diffuse and missions more complex, America cannot act alone. America alone cannot secure the peace.” — Speech accepting Nobel Peace Prize, December 2009.

NOW: “I’m comfortable going forward without the approval of a United Nations Security Council that, so far, has been completely paralyzed and unwilling to hold Assad accountable.” — Remarks in the White House Rose Garden, Aug. 31, 2013.

ON APPETITE FOR WAR

THEN: “It is easier to start wars than to end them. It is easier to blame others than to look inward, to see what is different about someone than to find the things we share. But we should choose the right path, not just the easy path.” — Speech in Cairo, June 2009.

NOW: “The American people, understandably, want us to be focused on the business of rebuilding our economy here and putting people back to work. And I assure you, nobody ends up being more war-weary than me. But what I also believe is that part of our obligation as a leader in the world is making sure that when you have a regime that is willing to use weapons that are prohibited by international norms on their own people, including children, that they are held to account.” — Remarks at meeting with Baltic leaders, Aug. 30, 2013.

ON JUSTIFICATION

THEN: “We may not always have national security issues at stake, but we have moral issues at stake. If we could have intervened effectively in the Holocaust, who among us would say that we had a moral obligation not to go in? … And so I do believe that we have to consider it as part of our interests, our national interests, in intervening where possible.” — Presidential debate, October 2008.

NOW: “This kind of attack is a challenge to the world. We cannot accept a world where women and children and innocent civilians are gassed on a terrible scale. This kind of attack threatens our national security interests by violating well-established international norms against the use of chemical weapons. … If we are saying in a clear and decisive but very limited way, we send a shot across the bow saying, ‘Stop doing this,’ that can have a positive impact on our national security over the long term.” — Remarks at meeting with Baltic leaders, Aug. 30, 2013.

——————-

Click below for the full article.

http://news.yahoo.com/then-now-obama-us-military-might-112844522–politics.html

The Christian Science Monitor: Guess who’s (not) coming to state dinner: Brazil could cancel over NSA

Brazilian President Dilma Rousseff suspended preliminary steps for her October state visit to Washington, signaling allegations of US spying on her personal communications could reverse what would have been a crescendo of positive US-Brazil relations.

President Rousseff called off her advance logistics team that would have laid the ground for the only state visit the Obama administration has scheduled this year. It’s an honor reserved for Washington’s closest partners – including a black-tie dinner and military reception ­– and the invitation last May was viewed as an upgrade for Brazil in terms of bilateral relations.

But the US-Brazil relationship, already tense after leaks in July of alleged US eavesdropping on millions of phone calls and emails sent by citizens across Brazil, was further strained this week. After the widely viewed Sunday night TV program Fantástico alleged that the US also spied on the personal communications of President Rousseff and her aides, her administration hardened its tone, sending strong signals that the October visit could be cancelled.

Rousseff’s outrage goes beyond posturing to gain bargaining power with the US, says David Fleischer, a political scientist at the University of Brasília. “It was pretty genuine. She is a pretty short tempered person,” Mr. Fleischer says.

A state dinner is such a high-level commitment that to cancel it would be a blow to Obama; the Monitor found no examples that a state visit, once announced, has ever been cancelled before.

————

Click below for the full article.

http://www.csmonitor.com/World/Americas/2013/0906/Guess-who-s-not-coming-to-state-dinner-Brazil-could-cancel-over-NSA

 

Reuters: Documents show NSA may have collected tens of thousands of emails of Americans

U.S. intelligence officials released new documents on Wednesday showing that the National Security Agency may have unintentionally collected as many as 56,000 emailed communications of Americans per year between 2008 and 2011.

The officials revealed the documents as part of an effort to explain how the NSA spotted, and then fixed, technical problems which led to the inadvertent collection of emails of American citizens without warrants.

The move is the Obama administration’s latest response to continuing controversy over alleged electronic eavesdropping excesses by the NSA.

The documents included a formerly “top-secret,” but newly-declassified ruling by the ultra-secretive Foreign Intelligence Surveillance Court in which the court itself, in an obscure footnote, estimates, based on data supplied by NSA, that between 2008 and 2011, the agency might have unintentionally collected as many as 56,000 emailed communications of Americans in each of those three years.

U.S. intelligence officials who agreed to answer questions about the documents’ contents told reporters the domestic emails were collected in the execution of a program designed to target the emails of foreign terrorism suspects.

According to the officials and a court document which the administration released, the NSA decided to “purge” the material after discovering it was inadvertently collected.

Details about the secretive surveillance programs have been brought to light in recent months by fugitive U.S. intelligence contractor Edward Snowden, who leaked classified documents to media outlets.

—–

Click below for the full article, as well as a few updates from Reuters.

http://www.reuters.com/article/2013/08/21/us-usa-security-nsa-idUSBRE97K14Y20130821

Reason.com: TSA: Bringing Its Watchful, Officious and Useless, Eyes Everywhere in America

Amarand Agasi / Foter / CC BY-NC-SA

The New York Times notes an annoying trendtoward total police state in America, with “the Transportation Security Administration’s Visible Intermodal Prevention and Response squads — VIPR teams for short — assigned to perform random security sweeps.”

Yes, what sounds like a second-rate terror-crime cartel that a minor Marvel superhero might be punching out is roaming the land:

With little fanfare, the agency best known for airport screenings has vastly expanded its reach to sporting events, music festivals, rodeos, highway weigh stations and train terminals. Not everyone is happy.

T.S.A. and local law enforcement officials say the teams are a critical component of the nation’s counterterrorism efforts, but some members of Congress, auditors at the Department of Homeland Security and civil liberties groups are sounding alarms. The teams are also raising hackles among passengers who call them unnecessary and intrusive….

Civil liberties groups say that the VIPR teams have little to do with the agency’s original mission to provide security screenings at airports and that in some cases their actions amount to warrantless searches in violation of constitutional protections.

Ha, how naive, says TSA—what constitutional protections? Was that a common phrase back in a bygone century? We are living POST 9/11 now, suckers!

T.S.A. officials respond that the random searches are “special needs” or “administrative searches” that are exempt from probable cause because they further the government’s need to prevent terrorist attacks.

Created in the aftermath of the Sept. 11, 2001, attacks, the T.S.A. has grown to an agency of 56,000 people at 450 American airports. The VIPR teams were started in 2005, in part as a reaction to the Madrid train bombing in 2004 that killed 191 people.

The program now has a $100 million annual budget and is growing rapidly, increasing to several hundred people and 37 teams last year, up from 10 teams in 2008. T.S.A. records show that the teams ran more than 8,800 unannounced checkpoints and search operations with local law enforcement outside of airports last year, including those at the Indianapolis 500 and the Democratic and Republican national political conventions.

The teams, which are typically composed of federal air marshals, explosives experts and baggage inspectors, move through crowds with bomb-sniffing dogs, randomly stop passengers and ask security questions. There is usually a specially trained undercover plainclothes member who monitors crowds for suspicious behavior, said Kimberly F. Thompson, a T.S.A. spokeswoman. Some team members are former members of the military and police forces.

God knows what level of totally normal appalled alarm at these gestapo tactics would seem “suspicious.” But don’t worry. The magic rock is working–no bears!

 

NY Times: N.S.A. Said to Search Content of Messages to and From U.S.

The National Security Agency is searching the contents of vast amounts of Americans’ e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance, according to intelligence officials.

The N.S.A. is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, a practice that government officials have openly acknowledged. It is also casting a far wider net for people who cite information linked to those foreigners, like a little used e-mail address, according to a senior intelligence official.

While it has long been known that the agency conducts extensive computer searches of data it vacuums up overseas, that it is systematically searching — without warrants — through the contents of Americans’ communications that cross the border reveals more about the scale of its secret operations.

It also adds another element to the unfolding debate, provoked by the disclosures of Edward J. Snowden, the former N.S.A. contractor, about whether the agency has infringed on Americans’ privacy as it scoops up e-mails and phone data in its quest to ferret out foreign intelligence.

Government officials say the cross-border surveillance was authorized by a 2008 law, the FISA Amendments Act, in which Congress approved eavesdropping on domestic soil without warrants as long as the “target” was a noncitizen abroad. Voice communications are not included in that surveillance, the senior official said.

Asked to comment, Judith A. Emmel, an N.S.A. spokeswoman, did not directly address surveillance of cross-border communications. But she said the agency’s activities were lawful and intended to gather intelligence not about Americans but about “foreign powers and their agents, foreign organizations, foreign persons or international terrorists.”

“In carrying out its signals intelligence mission, N.S.A. collects only what it is explicitly authorized to collect,” she said. “Moreover, the agency’s activities are deployed only in response to requirements for information to protect the country and its interests.”

Hints of the surveillance appeared in a set of rules, leaked by Mr. Snowden, for how the N.S.A. may carry out the 2008 FISA law. One paragraph mentions that the agency “seeks to acquire communications about the target that are not to or from the target.” The pages were posted online by the newspaper The Guardian on June 20, but the telltale paragraph, the only rule marked “Top Secret” amid 18 pages of restrictions, went largely overlooked amid other disclosures.

To conduct the surveillance, the N.S.A. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border. The senior intelligence official, who, like other former and current government officials, spoke on condition of anonymity because of the sensitivity of the topic, said the N.S.A. makes a “clone of selected communication links” to gather the communications, but declined to specify details, like the volume of the data that passes through them.

Computer scientists said that it would be difficult to systematically search the contents of the communications without first gathering nearly all cross-border text-based data; fiber-optic networks work by breaking messages into tiny packets that flow at the speed of light over different pathways to their shared destination, so they would need to be captured and reassembled.

The official said that a computer searches the data for the identifying keywords or other “selectors” and stores those that match so that human analysts could later examine them. The remaining communications, the official said, are deleted; the entire process takes “a small number of seconds,” and the system has no ability to perform “retrospective searching.”

The official said the keyword and other terms were “very precise” to minimize the number of innocent American communications that were flagged by the program. At the same time, the official acknowledged that there had been times when changes by telecommunications providers or in the technology had led to inadvertent overcollection. The N.S.A. monitors for these problems, fixes them and reports such incidents to its overseers in the government, the official said.

The disclosure sheds additional light on statements intelligence officials have made recently, reassuring the public that they do not “target” Americans for surveillance without warrants.

At a House Intelligence Committee oversight hearing in June, for example, a lawmaker pressed the deputy director of the N.S.A., John Inglis, to say whether the agency listened to the phone calls or read the e-mails and text messages of American citizens. Mr. Inglis replied, “We do not target the content of U.S. person communications without a specific warrant anywhere on the earth.”

Timothy Edgar, a former intelligence official in the Bush and Obama administrations, said that the rule concerning collection “about” a person targeted for surveillance rather than directed at that person had provoked significant internal discussion.

“There is an ambiguity in the law about what it means to ‘target’ someone,” Mr. Edgar, now a visiting professor at Brown, said. “You can never intentionally target someone inside the United States. Those are the words we were looking at. We were most concerned about making sure the procedures only target communications that have one party outside the United States.”

The rule they ended up writing, which was secretly approved by the Foreign Intelligence Surveillance Court, says that the N.S.A. must ensure that one of the participants in any conversation that is acquired when it is searching for conversations about a targeted foreigner must be outside the United States, so that the surveillance is technically directed at the foreign end.

Americans’ communications singled out for further analysis are handled in accordance with “minimization” rules to protect privacy approved by the surveillance court. If private information is not relevant to understanding foreign intelligence, it is deleted; if it is relevant, the agency can retain it and disseminate it to other agencies, the rules show.

While the paragraph hinting at the surveillance has attracted little attention, the American Civil Liberties Union did take note of the “about the target” language in a June 21 post analyzing the larger set of rules, arguing that the language could be interpreted as allowing “bulk” collection of international communications, including of those of Americans.

Jameel Jaffer, a senior lawyer at the A.C.L.U., said Wednesday that such “dragnet surveillance will be poisonous to the freedoms of inquiry and association” because people who know that their communications will be searched will change their behavior.

“They’ll hesitate before visiting controversial Web sites, discussing controversial topics or investigating politically sensitive questions,” Mr. Jaffer said. “Individually, these hesitations might appear to be inconsequential, but the accumulation of them over time will change citizens’ relationship to one another and to the government.”

The senior intelligence official argued, however, that it would be inaccurate to portray the N.S.A. as engaging in “bulk collection” of the contents of communications. “ ‘Bulk collection’ is when we collect and retain for some period of time that lets us do retrospective analysis,” the official said. “In this case, we do not do that, so we do not consider this ‘bulk collection.’ ”

Stewart Baker, a former general counsel for the N.S.A., said that such surveillance could be valuable in identifying previously unknown terrorists or spies inside the United States who unwittingly reveal themselves to the agency by discussing a foreign-intelligence “indicator.” He cited a situation in which officials learn that Al Qaeda was planning to use a particular phone number on the day of an attack.

“If someone is sending that number out, chances are they are on the inside of the plot, and I want to find the people who are on the inside of the plot,” he said.

The senior intelligence official said that the “about the target” surveillance had been valuable, but said it was difficult to point to any particular terrorist plot that would have been carried out if the surveillance had not taken place. He said it was one tool among many used to assemble a “mosaic” of information in such investigations. The surveillance was used for other types of foreign-intelligence collection, not just terrorism investigations, the official said.

There has been no public disclosure of any ruling by the Foreign Intelligence Surveillance Court explaining its legal analysis of the 2008 FISA law and the Fourth Amendment as allowing “about the target” searches of Americans’ cross-border communications. But in 2009, the Justice Department’s Office of Legal Counsel signed off on a similar process for searching federal employees’ communications without a warrant to make sure none contain malicious computer code.

——

Click below for the full article.

http://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html?pagewanted=all&_r=0

Schneier on Security: Restoring Trust in Government and the Internet

In July 2012, responding to allegations that the video-chat service Skype — owned by Microsoft — was changing its protocols to make it possible for the government to eavesdrop on users, Corporate Vice President Mark Gillett took to the company’s blog to deny it.

Turns out that wasn’t quite true.

Or at least he — or the company’s lawyers — carefully crafted a statement that could be defended as true while completely deceiving the reader. You see, Skype wasn’t changing its protocols to make it possible for the government to eavesdrop on users, because the government was already able to eavesdrop on users.

At a Senate hearing in March, Director of National Intelligence James Clapper assured the committee that his agency didn’t collect data on hundreds of millions of Americans. He was lying, too. He later defended his lie by inventing a new definition of the word “collect,” an excuse that didn’t even pass the laugh test.

As Edward Snowden’s documents reveal more about the NSA’s activities, it’s becoming clear that we can’t trust anything anyone official says about these programs.

Google and Facebook insist that the NSA has no “direct access” to their servers. Of course not; the smart way for the NSA to get all the data is through sniffers.

Apple says it’s never heard of PRISM. Of course not; that’s the internal name of the NSA database. Companies are publishing reports purporting to show how few requests for customer-data access they’ve received, a meaningless number when a single Verizon request can cover all of their customers. The Guardian reported that Microsoft secretly worked with the NSA to subvert the security of Outlook, something it carefully denies. Even President Obama’s justifications and denials are phrased with the intent that the listener will take his words very literally and not wonder what they really mean.

NSA Director Gen. Keith Alexander has claimed that the NSA’s massive surveillance and data mining programs have helped stop more than 50 terrorist plots, 10 inside the U.S. Do you believe him? I think it depends on your definition of “helped.” We’re not told whether these programs were instrumental in foiling the plots or whether they just happened to be of minor help because the data was there. It also depends on your definition of “terrorist plots.” An examination of plots that that FBI claims to have foiled since 9/11 reveals that would-be terrorists have commonly been delusional, and most have been egged on by FBI undercover agents or informants.

Left alone, few were likely to have accomplished much of anything.

Both government agencies and corporations have cloaked themselves in so much secrecy that it’s impossible to verify anything they say; revelation after revelation demonstrates that they’ve been lying to us regularly and tell the truth only when there’s no alternative.

There’s much more to come. Right now, the press has published only a tiny percentage of the documents Snowden took with him. And Snowden’s files are only a tiny percentage of the number of secrets our government is keeping, awaiting the next whistle-blower.

Ronald Reagan once said “trust but verify.” That works only if we can verify. In a world where everyone lies to us all the time, we have no choice but to trust blindly, and we have no reason to believe that anyone is worthy of blind trust. It’s no wonder that most people are ignoring the story; it’s just too much cognitive dissonance to try to cope with it.

This sort of thing can destroy our country. Trust is essential in our society. And if we can’t trust either our government or the corporations that have intimate access into so much of our lives, society suffers. Study after study demonstrates the value of living in a high-trust society and the costs of living in a low-trust one.

Rebuilding trust is not easy, as anyone who has betrayed or been betrayed by a friend or lover knows, but the path involves transparency, oversight and accountability. Transparency first involves coming clean. Not a little bit at a time, not only when you have to, but complete disclosure about everything. Then it involves continuing disclosure. No more secret rulings by secret courts about secret laws. No more secret programs whose costs and benefits remain hidden.

———

Click below for the full article.

http://www.schneier.com/blog/archives/2013/08/restoring_trust.html

Reason.com: States Push for Domestic Drone Regulation

At least 40 states are pushing for regulations that would enact stricter requirements for law enforcement to use drones inside the United States. One example is in Ohio, where Ohio Rep. Rex Damschroder (R-District 88) has proposed legislation that would require law enforcement agencies to obtain search warrants before using drones to surveil on citizens.

From the Associated Press:

“Right now police can’t come into your house without a search warrant,” said Ohio Rep. Rex Damschroder, who has proposed drone regulations. “But with drones, they can come right over your backyard and take pictures.”

Damschroder’s proposed bill would prohibit law enforcement agencies from using drones to get evidence or other information without a search warrant. Exceptions would include credible risks of terrorist attacks or the need for swift action to prevent imminent harm to life or property or to prevent suspects from escaping or destroying evidence.

The Republican said he isn’t against drones but worries they could threaten constitutional protections against unreasonable searches and seizures.

“I don’t want the government just going up and down every street snooping,” Damschroder said.

Rep. Damschroder’s bill would restrict law enforcement’s ability to use drones with a few exceptions:

  • The U.S. Secretary of Homeland Security has determined it could prevent a terrorist attack;
  • The police agency has gotten a search warrant from a judge;
  • If there’s a “reasonable suspicion” the drone’s use will prevent “imminent harm.”

The bill’s fate is still uncertain–the Ohio House Speaker declined comment on whether it might pass. But drone limits are not unique to Ohio. The AP notes that Florida, Idaho, Montana, Tennessee, Texas, and Virginia have all enacted drone legislation. (The ACLU has a comprehensive breakdown of domestic drone policy details here.)

Several other states are considering similar legislation as the drone technology becomes more populized among law enforcement agencies. This February, the Federal Aviation Administration reported that it had approved more than 1,400 requests for drone use since 2006 to over 80 law enforcement agencies.

The efforts to limit drone use have opposition from law enforcement hardliners and–the people who make the drones.

[The Association for Unmanned Vehicle Systems International] wants guidelines covering manned aircraft applied to unmanned aircraft.

“We don’t support rewriting existing search warrant requirements under the guise of privacy,” said Mario Mairena, government relations manager for the Arlington, Va.-based Association for Unmanned Vehicle Systems International.

The association predicts unmanned aircraft systems will generate billions of dollars in economic impact in the next few years and says privacy concerns are unwarranted.

But the movement against drones won’t go down without a fight. The town of Deer Trail, Colorado plans to vote on an ordinance that would issue “drone hunting licenses” at $25 a pop, according to CBS News. Phillip Steel, a Deer Trail resident who proposed the ordinance, says, “if you don’t want your drone to go down, don’t fly in town. That’s our motto.”

—–

Click below for the full article.

http://reason.com/blog/2013/08/06/states-begin-push-for-drone-regulation