You are on page 1of 50

"National Surveillance" More than Just a Privacy Issue:

Restoring Oversight & Democracy.


(The Industrial Intelligence-Contractors Complex)

written by No One (idonthavearealnamelol@gmail.com)

Final Release Version (Version 11.5 -- Published 7/1/13)

Contents
Section 1: Overview and History ("Connecting the Dots") Section 2: The Problem -- The Future & Today ("1984") Section 3: Modern Privacy - How To Solve the Problem ("Realist's Perspective") Section 4: The Players & Modern Tech Section 5: The Laws & Legal Issues Section 6: How do we fix all of this? ("Final Notes") Links and Resources X X X X X X X

Pretext

The choice for mankind lies between freedom and happiness and for the great bulk of mankind, happiness is better. George Orwell, 1984

A lot of people are analyzing this recent PRISM surveillance scandal and speculating on what's going on within our government. It's not a mystery and it's not a shocking revelation to folks like me who have followed this for some years before the recent revelations hit the news; in fact, check the dates of publications in the citations to see just how long this has been going on. Edward Snowden only confirmed by name a problem that existed even before 9/11. A lot of people are construing this to be explicitly a privacy issue, or worse yet, blowing things out of proportion and proliferating false or alarmist information. While I agree that privacy is a fundamental part of a democracy, I am inclined to disagree that this is the main issue when talking about the holistic state of our surveillance and intelligence apparatuses. As I will discuss, it is not the just the NSA you should worry about. In fact, for the most part, you need not worry about NSA when it comes to privacy, but rather the FBI. To me, this is an ethics, monetary, and constitutional issue. It's not just a matter of principle or emotion, it's a matter of integrity of state. It is a matter of national security at the highest level; stability of our constitution and the continuity of our modern democracy. I will be analyzing the holistic state of affairs from a rather different perspective than most of the media (e.g. privacy only) and breaking down some of the common problems with how these issues are being portrayed and analyzed today. Thank you all for reading.

FOR A FULL AUDIO READ-ALONG CLICK THE LINK BELOW!


https://soundcloud.com/drumboardist/sets/national-surveillence-more -- Special thanks to /u/Drumboardist for his fantastic contribution. and /u/fourthguard for proof reading and
feed back and the rest of the /r/restorethefourth community who supported this project.

Disclaimer / Note From Author: This document has been released FOR FREE for public awareness and because I think it's important. Feel free to share this! Some of Thank youeducational to everyonepurposes, who has contributed / donated support to this cause so far! you may disagree with what you read, and I understand that. However, do not discredit facts based on opinions you don't adhere to. Not everything you read or see is always going to be agreeable, which is largely the reason I've taken the time to write what some may call 'a counter report'. To read this report in its entirety will take you a bit over 35 minutes (estimated). I recommend you save this as a PDF and take the time to read through every source provided, or at least look at them when you have more time. There is enough information to keep you busy and educated for the foreseeable future. Think of this as a 101 college crash course as to what's going on, how to properly fight back, and how to reframe these problems in a realistic mindset. Be aware each section is totally separate even if they tie together. Think of them as separate papers smashed into one.

Original source to Share: Source: http://idonthaveanamelol.blogspot.com/p/national-security-blog-alpha.html DIRECT PDF: www.scribd.com/doc/149074104


Talking Points: http://idonthaveanamelol.blogspot.com/2013/07/restore-4th-talking-points-july-4th-2013.html

((For embedding in blogs or cross hosting this document, please see disclaimer on last page))
Please email me with any questions or concerns. Or just email me because it'll be fun and you're bored and I have too much time on my hands. Also please consider donating on my blog page to help get future projects off the ground!
<3 Original version released June 10th, but totally rewritten and updated every day until Sunday June 30th - July 1st.

Section 1: Overview & History ("Connecting the Dots")


Old agency jokes say that NSA means No Such Agency or Never Say Anything.

Until

recently, very few people had even heard of the NSA, even though today they are magnitudes larger than the CIA; with a classified budget estimated to be well over 10 billion every year.1 Today, NSA employs about 30,000 Americans and holds hundreds of classified contracts with various different security contractors and private enterprise companies. For all intents and purposes, they (Department of Defense (DoD) & NSA) can play god should they choose to smite you. They have the resources, the technical abilities, the funding and support of the entire United States government (even if many insiders don't like it). Today, NSA has become arguably one of the most powerful collective entities on the planet. But how did we get here?
"Enemies are necessary for the wheels of the U.S. military machine to turn." -- John Stockwell (CIA Whistleblower 1978)

On November 4, 1952, the National Security Agency formed. Their HQ, in Fort Meade, Maryland, is one of the most secretive buildings in the entire country and possibly the world. Directly from Wikipedia, NSA is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S. government communications and information systems, which involves information security and cryptanalysis/cryptography. To put it rather bluntly, NSA is an electronic spy agency. Operation Shamrock (1945)2 is the first time we see the predecessor of the NSA (the Armed Forces Security Agency) doing exactly what they're still doing today under arguably the same project, revamped and re-conceptualized for a digital age; analyzing data of domestic messages by intercepting them without our knowledge or approval. During Shamrock, NSA would read and analyze the outgoing telegraphs of domestic civilians without their knowledge or consent. How did NSA get the telegraphs, you may ask? The same way they gather our information today, through projects like PRISM. They just ask the companies holding them, the post offices and service providers respectively. Project Shamrock continued for 30 years, all the way until 1975. The project was only shut down after public and Congressional scrutiny put an end to it by casting light onto the flagrantly unconstitutional behavior.

So what's the problem if not privacy? While privacy is an issue, the lack of privacy is only a consequence of poor policy and oversight. It's a problem with democracy or the lack thereof. For the longer version read Jewel v. NSA3 filings.

"Shortly after September 11, 2001 terrorist attacks, President George Bush Jr. authorized NSA to conduct a variety of surveillance activities, including the warrantless surveillance of telephone and Internet communications of persons within the United States." -- U.S v Jewel brief.

"The Presidents Surveillance Program (PSP)" See Snowden's Jun 28th leak here.4 [This is an amazing resource] On October 1st, 2001 the President (W. Bush) gave a secret order to conduct electronic surveillance within the United States, without an order from the Foreign Intelligence Surveillance Court (FISC -- Discussed later). The Program would need to be renewed approximately every 45 days. George W. Bush renewed the Program Order at least 30 times. This program "STELLARWIND " is still around today under the Obama administration, renamed Ragtime-P [or possible PRISM]. That same year, USAPATRIOT was freight-trained through Congress, with section 215 intact. The 2002 Trailblazer Project gives us a great insight into the political, economic, and pathological environment of the intelligence community, closely following the 9/11 attacks. Under the guise of "national security" a paradigm shift occurred. The scars of paranoia and rapid power and budget expansion still resonate through the system today. This was no mistake. There was blood in the water, and private security contractors and government agencies pooled around it like sharks. In a FRONTLINE Report interview involving projects like STELLARWIND, many of the people directly involved said the same or similar things. "In those days, Congress would give money to anyone who asked." And they did. This type of mind-set and culture of "F*** IT! WE'LL DO IT LIVE!" is the real problem with the government today, and I don't just mean with NSA.

The NSA is prohibited from spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant. Despite that prohibition, shortly after the Sept. 11 terrorist attacks, President George W. Bush secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans' private conversations. -- Bigstory AP 5 - June 15th, 2013.

What was Trailblazer? 6 Well, in 2002 SAIC,7 a major defense contracting company, completely failed to provide what they were being contracted to deliver for the NSA (Create Trailblazer, a surveillance apparatus project which is arguably a continuation 8 of the scrapped TIA project) Of the $280 million allocated and estimated budget, over $1.8 billion (yes that's over budget...) was wasted on the failed Trailblazer project. Consequently, several senior NSA members blew the whistle through proper internal channels by going to the Department of Defense's Inspector General in regards to their concerns about waste, fraud, abuse, and the fact that a successful operating prototype already existed (Thin Thread 9) but was ignored when the Trailblazer project was launched. These whistleblowers were ignored by the IG and NSA, and even indirectly punished or sidelined. This type of waste is a matter of culture, as discussed by one of the whistle blowers, Thomas Drake. You should take the time to read his full interview 6 with Barbara Koeppel, if you have not done so already. From Wikipedia: The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security, by achieving Total Information Awareness (TIA). Following public criticism that the development and deployment of this technology could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded, and merely run under different names, and outsourced to private contracting firms.
"It is no secret that some parts of TIA lived on behind the veil of the classified intelligence budget.

However, the projects that moved, their new code names, and the agencies that took them over havent previously been disclosed. Sources aware of the transfers declined to speak on the record for this story because, they said, the identities of the specific programs are classified. Two of the most important components of the TIA program were moved to the Advanced Research and Development Activity, housed at NSA headquarters in Fort Meade, Md., documents and sources confirm. One piece was the Information Awareness Prototype System, the core architecture that tied together numerous information extraction, analysis, and dissemination tools developed under TIA. The prototype system included privacy-protection technologies that may have been discontinued or scaled back following the move to ARDA." 8 -- " Shane Harris . TIA Lives On. February 23, 2006 | National Journal

In 2003 the now infamous Room 641A10 was created. This shows us just how deep the rabbit hole between private enterprise and state security's marriage goes. Telecommunication companies are complicit at the highest level with this type of activity. Room 641A is a telecommunication interception facility operated by AT&T for the NSA that commenced operations in 2003 and was exposed in 2006.

In March 2004, the Justice Department under Ashcroft ruled that the STELLARWIND domestic intelligence program was illegal. The day after the ruling, Ashcroft became critically ill with acute pancreatitis. President Bush sent his White House Counsel Alberto Gonzales and Chief of Staff Andrew Card Jr. to Ashcroft's hospital bed. They wanted him to sign a document reversing the Justice Department's ruling. But the semi-conscious Ashcroft refused to sign. Subsequently, Bush reauthorized the operation by executive decision, over formal Justice Department objections. On November 9, 2004, following George W. Bush's re-election, Ashcroft announced his resignation. To learn more: Cheney's Law FRONTLINE 11. On July 20, 2006, a federal judge denied the government's and AT&T's motions to dismiss the case, chiefly on the ground of the State Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government (based on a 2006 amendment to FISA 12 which expanded further in 2008.)

The paradigm shift of 2008

(FISA Amendments) - Blanket retroactive "Immunity" for telecom companies involved - "Streamlines" (From the bill) the process. - Solidifies these programs into law for the foreseeable future. - Law splits provisions US Persons and Non-US Persons
See the section on LAWS for more history and context.

"The secrecy system, and I'm going to be very very clear here, is not to be used to cover government illegality, wrong doing, HIDING administrative efficiency and effectiveness...or where the government is actually threatening public safety...fraud, waste and abuse. In my opinion, the secrecy system has become so corrupted, that is now being used ROUTINELY to do precisely that, under the cover and color of law....and when the color and cover of law is no longer sufficient, then we'll just make up the rules" -Thomas A Drake's Speech at the National Press Club 13 :: March 15, 2013.
With the second election of President George Bush, and to the horror of many folks like me, the lack of change under the Obama administration, the surveillance state expanded at a disturbingly explosive rate. The current budget is not only classified, but is presumed by experts to be one of the biggest government expenditures, and objectively one of the most redundant spending complexes in modern times. In 2006, the development of the super malware Stuxnet was started under George Bush's administration and directive. The Stuxnet maleware/virus, discovered in 2010, is now confirmed 14 to be the work of the U.S to disrupt Iran's nuclear program, created under the code name "Operation Olympic Games 15". This shows us just how serious the growing use of surveillance and offensive kinetic cyber weapons are today, but more importantly it shows us just how highly capable these people are and the extents of secrecy they will go to hide their actions. I will not give my opinion on Stuxnet's deployment here, except to say 'it confirms the real world deployment of the first (known) cyberweapons' and shows us the sophistication that could be used for even more sinister and illicit projects under the current and every subsequent administration to come. In 2012 the codename Ragtime-P 16 was leaked. This was a continuation of the domestic spying program originally STELLARWIND, with various different code names used to compartmentalize both function, and oversight...or rather avoid oversight from Congress From an article on Ragtime-P (Arguably the offspring of TIA) ('Schneier on Security' 16 March 6, 2013) "The fact that NSA keeps applying separate codenames to programs that inevitably are closely intertwined is an important clue to what's really going on. The government wants to pretend they are discrete surveillance programs in order to conceal, especially from Congressional oversight, how monstrous they are in sum. So they'll give a separate briefing on Trailblazer or what have you, and for an hour everybody in the room acts as if the whole thing is carefully circumscribed and under control. And then if somebody ever finds out about another program (say 'Moonraker' or what have you), then they go ahead and offer a similarly reassuring briefing on that. And nobody in Congress has to acknowledge that the Total Information Awareness Program that was exposed and met with howls of protest...actually wasn't shut down at all, just went back under the radar after being renamed (and renamed and renamed)."
Internal CIA Book Review SECRETS: On the Ethics of Concealment and Revelation. By Sissela Bok 1982.

In 2013, a few things happened. A judge in California shot down National Security Letters (which were being abused routinely by the FBI) and in June, a man named Edward Snowden provided the press and public with documents detailing what many already knew and had concluded existed without the hard proof. The presence of an illicit marriage between the U.S DoD and private enterprise. Also in 2013, in no uncertain terms, the court "legally" gagged and DEMANDED / ordered Verzion to hand over ALL the meta-data from phone calls "(i) between the United States and abroad; or "(ii) wholly within the United States, including local telephone calls" to the FBI. As discussed by William Binney (NSA whistleblower) in a recent interview with USA Today 17, this is the 80th Top Secret gagged order sent this year alone. This document, among others, is what helped bring widespread attention to this type of activity. All of this said, one has to ask, to what ends is this all being orchestrated? "Total Informational Awareness" is the first answer. The second is simply "Because they'll cut our budget next year if don't keep spending". It really is that simple. This is not a hypothetical quote according to Thomas Drake. The private enterprise leeches the massive budget, and will continue to do so until the marriage is broken, or more light is cast into this "shadow government". This is not conspirators terminology. For every government intelligence entity, there is at least twice as many "shadow" entities doing the exact same job, for the same or greater cost.

A VERY SMALL PIECE OF THE INTELLEGENCE CONTACTORS COMPLEX


- Budget is estimated to be over $10billion a year. - It is still classified how many contracts NSA holds and with who. - TIA was renamed and refunded through contractors.

Outsource to contractors to diminish costs to contractors to diminish costs

The 2013 Court Order to Verizon Error! Bookmark not defined. leaked
by Edward Snowden.

They (The contractors and agencies like and including NSA and DIA) want a bigger $$ contract (by proxy a cut of the defense department's budget, and ultimately a cut of American citizen's paychecks) They (Agencies like DIA and NSA and to a lesser extent FBI or DHS) want the big picture at all costs - See the history of PSP & Boundless Informant 18
So what is PRISM? PRISM is basically a newly revealed, (but by no means revolutionary) project that seeks to fill informational gaps that NSA simply doesn't have time or legal status to fill themselves; check out what Facebook is doing 19 for some context. This is why NSA might want to meta-data from these companies, but it's doubtful the two are related. The lines between truth and fiction of this program are largely blurred together by misreported 20 facts and a poor understanding of the whole picture by those proliferating the information. This will be discussed in depth under 'Privacy'. The subpoena on the left (that Edward Snowden leaked) is the first time we have been given a clear view of what some call an NSL, or at least something extremely similar to a "national security letter" a pseudo-subpoena with a gag order on them. We can also see just how broken the laws are, if this is what is being demanded, since the policies that allow these demands do in fact conform strictly to those laws. Everything they claim, i.e "we don't gather any meta-data from US Persons" is shattered by this single document leak. They might not look at it, but then why ask for it? Watch this Congressional hearing 21. 1:45:00-1:50:00 (Jun. 18th, 2013) "In regards to the NSA and FISA court orders. The generic blank court order (without listing any PERSON as suspect) allows the "analysts" to determine suspects based on "reasonable articulable suspicion" instead of "probable cause" so they don't have to go back to the courts." -Reddit user /u/Fourthguard It is again important to note that PRISM, but more specifically the state of all these programs holistically are: * Legal and approved by three branches of government. * Limited in scope. * Need to remain secret so they can "function" * Subject to rigorous legal oversight . * Been successful in stopping terrorists (Including their own Stings!)

On an ongoing daily basis thereafter for the duration of this Order, unless otherwise ordered by the Court, an electronic copy of the following tangible things: all call detail records or "telephony metadata" created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls. This Order does not require Verizon to produce telephony metadata for communications wholly originating and terminating in foreign countries. Telephony metadata includes comprehensive communications routing information, including but not limited to session identifying information (e.g., originating and terminating telephone number, International Mobile Subscriber Identity (IMSI) number, International Mobile station Equipment Identity (IMEI) number, etc.), trunk identifier, telephone calling card numbers, and time and duration of call. Telephony metadata does not include the substantive content of any communication, as defined by 18 U.S.C.? 2510(8), or the name, address, or financial information of a subscriber or customer. IT IS FURTHER ORDERED that no person shall disclose to any other person that the FBI or NSA has sought or obtained tangible things under this Order, other than to: (a) those persons to whom disclosure is necessary to comply with such Order; (b) an attorney to obtain legal advice or assistance with respect to the production of things in response to the Order; or (c) other persons as permitted by the Director of the FBI or the Director's designee. A person to whom disclosure is made pursuant to (a), (b), or (c)

* Don't use names. Just phone numbers.


That is... according to US Assistant Deputy Attorney General James Cole, FBI Deputy Director Sean M. Joyce, and Head of NSA General Keith Alexander...

"They want to burn the constitution to save the constitution..." --- Ron Paul June 18th, 2013.

Section 2: The Problem -- Future & Today


The core of the complex today:

"National Security & Necessary Intelligence " These principles have been used as an excuse to pull profit & power to the Federal Government.

Fear and secrecy are being used as tools to promote those ends Today, contrary to common belief and media portrayal, the NSA and other governing
bodies DO have strict POLICIES, and some "extensive oversight" of law. NSA is not a rogue agency, and is not spying directly on every citizen in the United States the way it is being asserted by many lesser informed individuals. The issue becomes, do they follow those policies today, and is there any reasonable oversight? If they are spying directly (targeted or real time), on who and under what secret justification?

These are questions that remain to be answered, although this classified leaked report from 2009 4 gives us amazing insight into the history of the oversight and policies and how these programs came into being. As well, it details in depth as to their methodology and what they did and did not store and how they collected such data. This is an incredibly important resource to putting context to a problem and reframing it with a realistic mindset. I would argue that the NSA does, and always has conformed extremely strictly around these policies (especially at first when these programs were supposed to be provisional). The question becomes, how are the laws they adhere to constitutional? That's the core of the issue. I don't believe the NSA has at anyone point ever turned rogue. I urge you to listen to the C-SPAN Congressional recording of the June 18th, 2013 National Security Agency Data Collection Programs hearings. You will hear both sides of the story. Although you may disagree with some of it, most of it is true.
http://www.c-spanvideo.org/program/313429-1# 21 This top secret leaked PRISM slide shows just how broken the legislation of FAA sec. 702 really is, even if it is "working" The NSA is basing entire operations like PRISM on loopholes in the laws, as opposed to basing them against the integrity of the Constitution's 4th amendment rights of SEARCH and seizure.

"I do want to hit a couple key points...First, with our industry partners. Under the 702 Program [PRISM] The US Government does NOT unilaterally obtain information from the servers of US companies. Rather, the US companies are COMPLELLED to provide these records by US law using methods that are in strict compliance with those laws...." -- General Keith Alexander. June 18th, 2013 [Congress Open Hearing on Data collection programs June 18th, 2013]

If you want to keep a secret, you must also hide it from yourself. George Orwell, 1984

Today, the sky is not falling. Your personal conversations are not being read by some
shady spook type at the NSA, nor will they kick your door in...That's the FBI's job after being given meta-data by "tippers 4(pg. 15)" at the NSA. That's not to say you shouldn't worry about them, or that it couldn't happen, but I think it's important not to let fear control you, especially irrational paranoia. Rather than fearing the unknown abyss, I suggest casting light into the rabbit hole and educating yourself. We live in a world where technology has become more efficient than human analysis, but a world where humans are in charge of oversight...and those humans can make mistakes or simply change the rules. Just writing or reading something like this isn't grounds to put your name on a blacklist or in a database. You have the right to free speech and the right to be heard. You should take steps to protect yourself regardless of whether or not they are spying on you directly (which they're not) especially if you consider yourself a target. If you don't, bringing charges is going to be all the easier when you do break the law, especially with retro-active data-mining abilities. Don't be the low hanging fruit, and don't wait for others to solve your problems after they become personal. So if the sky isn't falling, they're not collecting your content information (which they are but not looking at directly), reading your diary to see if you're on drugs or a terrorist, what's the problem? Well, what people like Edward Snowden and many others are worried about is what could happen if they keep expanding their power, where does it end? Do we fall into tyranny? What happens to democracy when everything is a secret? Does anything still function? Worse still, is the fact that the government is willingly relinquishing control to the private sector, in some cases to expand their power through a proxy. If they relinquish their power and to that end diminish oversight from Congress, what power do they still hold, and why should we trust them? So far, I have seen no reason why we should. From a contractors perspective, what better way is there to turn a profit then to make the NSA (the pay-check suppliers, the tax payers by proxy) and US DoD shoulder your burden and deliver intel. or broken promises in return. As discussed previously with the Trailblazer / SAIC fiasco, this is not uncommon. The issue is that this country doesn't even know what it's doing anymore. The index finger is totally unaware of the middle finger. We've tossed money haphazardly to companies like Booz Allen, SAIC, Raytheon Northrop, and BlueCo. We've allowed (or our elected officials have allowed) the Federal government to expand its budget to a disturbing degree and as a result (or a part and parcel consequence) expand its power and obtain extraordinary electronic and digital capabilities.
"...And being introverts, they go further into themselves and staying isolated. So, thats the primary character of [these] people. And the others, the others are probably part of it and believe that its the correct thing to do. And they dont try to find a reasonable, constitutionally acceptable, legally acceptable way to achieve the objectives that they want. They simply felt that they had to go to the other far side of the spectrum and get as much as they can about everybody they can." "Theres a simple way to do it that would protect peoples privacy and not invade anybodys telephone records or email... And thats to say, if you have a terrorist, and he calls somebody in the United StatesI call this the two-degree principlethats one degree of communication separation....Then you look at that as a target, and you collect that, and then you look also at the person in the United States and who they talk to." -- William Binney interview with Democracy Now! June 10, 2013 22.

The question is why do these people allow it? Do they believe it helps? We asked for, and they've built us a damn near functioning 'Total Awareness Matrix', but at the end of the day, no one is aware of shit. Why? Because those who do hold relevant data cling to it like drug addicts, including and especially the classified budget, or the intel they've gathered on "terrorists". Thomas Drake discusses this in relation to the congressional investigation into 9/11 and the massive troves of information that NSA held and continues to hold onto today. It is his opinion (though not a conspiracy) that NSA could have possibly prevented 9/11, if they had shared that information openly.

Interviewer: But wouldnt NSA want to prevent a 9/11 or track Al Qaeda? Thomas Drake: Thats logical thinking. You have to remember, NSA is an institution, and it preserves its integrity before anything else. Rule number one. Its pathological. -- Full Interview here 6

If we put as much power into anything else as we do to 'intelligence', like solving sex
trafficking, or stopping drug imports (assuming we don't allow it), or stopping cyber criminals, or reforming education, the world would objectively be a better place. However, we live in a world where it's all about the bottom dollar and squeezing the fruit out of the rest of the world (literally in the case of the CIA Coup D'tats in Guatemala of 1954). More importantly, we live in a world where those in power will try to expand or at least maintain that power at all costs. To those ends, we've created a literal second military industrial complex, this time the engine is turned by 'intelligence' & 'national security' apparatuses, and it sucks. If we aren't careful, this complex will continue to grow, and may never stop. This could become a true Orwellian state. This is not a world I want to live in. The Future: The worst case scenario, although unlikely, is that CIA and NSA and all the other alphabet agencies like DHS turn the tyranny key and we become a "secured nation" under secret police where dissidence (thought crime) like this PDF is illegal. If we continue down this path of abolishing the constitution, or replacing amendments with patriot acts, because of 'exigent' times, where does that stop...and when, if ever, will it stop being exigent? What happens if we start killing our own citizens without trial, as was the case with Anwar Al-Awalki 23 (although not domestically in the US) and his 16 year old son in a separate drone strike two weeks later, based on "due process" but not "judicial process" from the courts. I personally don't see this happening, at least not to this extreme anytime soon, but the point remains open that these things do happen, even if we are unaware of them, and if we're unaware of them we can't stop them or speak out about the problems.

Again, even if the sky today isn't falling, I believe it is past time for change. We all know it. George Orwell's 1984 is back on the bestseller list. Big Brother is in fact watching us. I personally do not want to live in a world where everything I say or write can be called into question or taken entirely out of context, or a world where I am barred from flying (secretly) because my name looked similar to an potential "terrorist", or a world where my DNA can be sequenced and taken after a false arrest, or a world where the President can order detainment camps 24 built around neighborhoods and move people in on the grounds of national security, or a world where people are exposed to 'enhanced interrogation in secret prisons, or a world where innocent men 25 are kidnapped and renditioned overseas without the right to trial or lawyer, or a world where flying robots kill more innocent women and children overseas than terrorists at a 50:1 ratio. 26

Today we still have a voice.

Section 3: Privacy & How to Solve the Problem.


Authors Note: I would like to take the time to direct your attention to this article Some History on Privacy (ZDnet) which details what one of the important aspects of this "scandal", media's misinformation and poor reporting. The original articles published by Guardian were altered several times after publication to correct blatant errors and sensationalism. It is important to do your own research before believing what you see or hear.
Privacy is a huge issue, but not because we have something hide. It's a matter of principle and integrity of state. Privacy wouldn't have been part and parcel with the 4th amendment or U.S V Katz if the Supreme Court and the Founding Fathers thought "meh, it doesn't matter..."

So where does that leave us? Well, for one thing, one has to wonder, did NSA really scrap Shamrock, or did they simply burry it even further underground? These are questions that I can't answer and will not speculate on, but I think an important thing to remember is to be realistic and remember history, as it does repeat itself. "We don't need a warrant!" (FISA Court Order circa Aug 2008)27
"We add, moreover, that there is a high degree of probability that requiring a warrant would hinder the government's ability to collect time-sensitive information and, thus, would impede the vital national security interests that are at stake." -- Order Sent to Yahoo for meta-data.

Today, Privacy in our modern era has unfortunately become a thing of the past; this is the sad truth of affairs. There are steps that can be taken to combat surveillance of many kinds, but none of it will preclude what is happening on a wide scale, nor prevent a case from being built against you, or your information from being analyzed should they choose to target you directly. Again, this is probably the FBI that would target you, perhaps from a tip from NSA, should they disregard every law currently in place. I for one am a realist, and as of 2013 I don't see this happening. My fear is the future. If these people continue to expand thier power, make up excuses and add arbitrary oversight to justify spying on more and more people. Those who think that hiding data is the correct way of solving this problem, or who are using it just to feel safe and forget about the issue are only doing themselves and others a disservice. That's not to say you shouldn't take these steps, but you should do so with the understanding that simply hiding your data is not enough if you truly want to 'fight the power'. Hiding is a personal ad hoc pseudo-fix for a much more pervasive and wider issue. It is very easy to fall into this logical think-trap of "shut up! my privacy is the only thing that matters! the nsa cant read your emails if you encrypt! don't tell people not to

encrypt data! That's bad advice" That's not what I'm saying. I have seen countless arguments across the net detailing step by step how to take extraordinary measures to hide, such as removing a hard-drive and using Linux (thumb drive) distros like TAILS or using the TOR Browser for everything and anything. I've even heard of "activists" recently purchasing a second cell phone to "trick the government" for the upcoming rally on July 4th. This is not a step I recommend. This is a massive waste of time and money for the common citizen. The funny part is, NSA isn't even looking at you nor are they allowed to. They're not a crime fighting or law enforcement agency. That's the FBI. Worry about them. They will be there. {sup feds!} Unless you honestly have a reason to believe the government is targeting you, or has valid motives to do so (like Jacob Applebaum for example) than most of this stuff should not concern you. Just downloading this type of outspoken PDF isn't justification to go absolutely wild encrypting everything and deleting your facebook immediately, there are plenty other reasons 28 to do that... Informational and Operational security should be a first-line of defense, but usually kept in the back of your mind, and not as a driving paranoid obsession. Just because there is huge hype going on in the news doesn't mean the state of affairs or the rules of the game have changed. If anything, we're better off now than in May of 2013. For me, I am a realist. I-don't-have-a-real-name. I don't tie my several email addresses together, and I do encrypt the important stuff. I keep TruCrypt partitions on my drive(s) and I do encrypt my cell phone's SDcard. I also have a thumb-drive with TAILS for the super important stuff only, but to be honest I never use it. I generally try to use proxies / TOR for important communications and deep-web searches, or when visiting vulnerable (not illegal) areas of the net, but as far as browsing Reddit or using Skype, I think its extreme overkill to go wild with VPNs and the like. From a technical perspective it isn't even going to help much if they dig hard enough. I need to be clear here; I'm speaking about hiding from the FBI or similar law enforcement entities. Compared to the NSA, they've been given mere table scraps of powers. The difference is they can and will use them against you if you give them cause. For the type of surveillance I'm seeing being talked about (NSA programs), hiding does next to nothing to restore democracy and oversight or change the culture that breeds these types of programs and projects. It doesn't even hide you that well from the types of data they're collecting. It's like hiding from a nuclear bomb that hasn't been dropped.

The issue is, will they use it? Should we want to trust them with such power? The incompetent NYPD might have a harder time getting dirt on me, or rogue journalists, bloggers, and hackers, but the NSA and FBI (assuming they start to care, and I doubt that they ever will) it would be as easy as 1.2.3: Googling my email, finding my blog, finding my donation button (wink-wink) and filing a subpoena for my PayPal account info. From there, they could learn everything you would ever need to know about me, my family, and my friends. This is a huge problem.
{You're welcome Feds! I'm sure you'd never have thought of that!}

But am I worried? No. I'm not. Not because I have nothing to hide or because I don't think they'll do it. It's because I believe in the law and I believe strongly in the constitution and democracy, even when it's pressured and stretched. I believe democracy will prevail over tyranny if people like me continue to speak out and pressure for reform and advocate for change through proper channels without blowing things out of proportion or banging pots and pans pointing at ghosts. I'm not worried, but I am disgusted, which is why I'm speaking out rather than hiding. After you've taken the steps to understand the system, you can go about avoiding it. Choosing how or when or really why to obscure your content data and meta-data is a separate paper written by people far more technologically informed than I am (see Jake Applebau). For now, you should start learn up, so you can pick and choose what is or is not a valid concern, what is a logical step to protect yourself and what the consequences could be for taking those steps (e.g using TOR for everything makes streaming damn near impossible and slows internet to a crawl and using Proxies can make certain sights permanently unavailable). The easiest way I can think to contextualize my point is by further example. Cell phone passwords and encryption: It takes all of 5 seconds to type in a 4 letter code, but that code could slow-down malicious probing by everyone from law enforcement to thieves (see People v Diaz 29 and others), by day or even weeks. Encrypting your messages, on the other hand, is a lot more difficult (because you need to have both parties do so correctly and that often does not happen), and obscuring your meta-data (e.g who/where to who/where) is nearly impossible to hide all together. All of that said, the NSA still doesn't care much. You aren't even a drop in their bucket....Really. Worry about your local authorities or the FBI if you just care about your privacy, especially those that are going to take part in protests and rallies. And remember to always notify the police of a legal peaceful rally ahead of time! #Restorethe4th :)

Here is another example to put in perspective why going through extremist measures to hide or blowing the privacy aspect out of proportion is largely a waste of time. Did you sign a Whitehouse petition yet, as opposed to doing NOTHING? If yes did you use your real information? I did. Did you call your local Congressmen and Senators, instead of just posting about it on social media sites and blogs (i.e DOING NOTHING)? If yes, did you use your real name and address? I sure did. If not, do you really think anyone at the Whitehouse or Congress should take a fake person's voice seriously? Do you really think they frequent your Facebook and check your tweets to get your opinion? Hell no. It's your job to make them aware of your concern. Waiting for Anonymous hacker groups to do it for you is like waiting for the tooth fairy to give you money. If you're going to be an activist and advocate change don't hide! Bang pots and pans if you have to. You have the right to speak and you disserve to be heard!
Just because I don't use a real name on this doesn't mean I'm hiding. I'm a rather open book, but I do compartmentalize things :)

The NSA's pervasive surveillance and Google Search Heurist bots might chew your data up and spit results out, but again, that's automated and isn't going to change our seemingly failing democracy. If your only step is to "go dark" or simply encourage others to arbitrarily "encrypt/hide personal information" and proxy their voice, then congratulations, you've succeeded only in hiding from the problem and treating symptoms, but not the cause. By hiding your real information when and where it matters is counter intuitive. If you sign a petition or email Congressmen with a proxyIP-address from South China, you're not going to be taken very seriously. If the problem isn't privacy directly, as in looking at your texts and listening to phone calls....what are the problems? Well, for one thing, what happens if they turn the flood gates open and they allow U.S Persons to be treated like (probably not) U.S Persons?

"They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -- Benjamin Franklin

The Wrong Way to Look at Things!


Things that are Counter Productive: - Panicking - Hiding everything. - Speaking out of sentiment or with assumed knowledge, but no facts. - Reading three blogs and having the Dunning Kruger effect take hold of your debates. - Assuming Congress checks Twitter. - Giving up hope. - Ignoring the problem (by hiding) - "I have nothing to hide" - Violence - Spamming Congress with chain letters - Using a fake name on real petitions - Accepting these as non-problems, because you feel "safe". By all means, if you can convince people to take steps to hide personal data please do so, but with the understanding that you aren't actually changing anything in terms of the widespread surveillance policy, culture, etc, nor are you doing anything to restore democracy. Using DuckDuckGo over Google is about as cyber in-activist as you can get if that's your only attempt at data protection and your only excuse for 'fighting the power'.

Take these steps out of principle, not out of fear.


If you don't care about 'fighting the power', why the heck are you still reading this long winded stuff? Well, probably because it's important, and we all know it or because you want to learn. Don't worry; I'm not just pointing at the cracks. I'm here to fill them. If it make you feel better, you might not be 'sticking it to the man' just by reading this or using DuckDuckGo, but at least you're not completely apathetic, and that is a small start to solving a very very large problem. To put it extremely bluntly, privacy should be your first concern, but by no means the most important.

THE CORRECT WAY TO SOLVE THIS PROBLEM


Productive steps:

- Calling Congress - Writing Congress


(not a spam email blasting them with chain letters)

- Starting local rallies! (Spreading


awareness outside of just twitter)

- Voting (meh) - Actually learning


rather than taking others word for it

Spreading awareness is in the third layer because it's important to do something yourself rather than just pushing others to do it for you. There is absolutely no point in harassing others to sign a petition or show up at a park or call their Congressmen if you have not already done so yourself. That is not activism, that is not productive, that will not solve the problem. Back to Reality: There are machines like the Narus-STA6400 that are set in place to split and collect nearly every byte of data that travels through the U.S telecommunication (ISP's) lines, collecting domestic and local communications at "the highest allowable aperture" and are sorted by programs like x-keyscore 30 [Now confirmed to be a codename of the project as opposed to the software] into databases. The NSA also gets information from other sources, like friendly foreign intelligence agencies, and several classified satellites that orbit the Earth, as well as countless other methods like huge collection dishes.

For all intents and purposes, we need to assume that if the NSA wanted to know anything about us, they could. But that brings me back to my point. The problem isn't that they (may) want to target us, it's that they could by error. What does that mean? Well, you can cast out the image of the NSA having hundreds of thousands of people (contractors and the like) behind screens laughing at your private emails, or seeing your face on a webcam, desperately trying to learn everything about you and your past because you Googled the word "bomb" or "Ricin" or "Obama is running the biggest terrorist operation ever." -- Noam Chomsky, 2013. Realistically? They don't care about some 21 year old dude on a laptop browsing facebook, blogspot, twitter, Google, Skype, or reddit giving his opinion on stuff (with tons of fun-facts and quotes to back it up!). However, they might care about that 21 year old in 12 years when he becomes a journalist like Michael Hastings 31, who's incredibly suspicious death in a car crash made headline news on June 18th, 2013 after Hastings uncovered a story involving an FBI scandal. This is why the privacy issue of long term storage is a concern, and why you need to be extremely vigilant about what information can be tied back to you if they open up the flood-gates any further. This should be common sense and knowledge, but many refuse to believe it. We need to reconceptualize what is actually happening in this digital era. We are speaking assuming that they (the government and those with the power to do these things) are following the rules. The problem is, these rules are weak and based on policy, which in the words of Edward Snowden "will only ratchet open" which has proven entirely true thus far. Today, at least in theory, there is an extremely strict process by which the NSA can actually look at content data, and almost never including American citizens. Even Meta-data is neigh impossible to be tracked. My fear is the future.

STOP! YOU'RE STILL DOING IT WRONG!

People tend to think about all of this as if they're being spied on RIGHT NOW.

No. You're not. No one is watching YOU DIRECTLY, at least not the way you might imagine. Disabling your phone's GPS, or putting tape over your webcam isn't going to protect you from the types of surveillance they're conducting, unless maybe you own an Xbox One. What you are doing by taking these actions is trying to attacking a cultural issue 32 as a technology & privacy issue; it's apples and oranges, similar but very separate.
[PSP = President's Surveillence Program AKA Stellarwind] From a Top Secret Document Error! Bookmark not defined.Leaked Jun. 2013 detailing the birth of these surveillance projects. (page 15)

Back to Reality: Even if the NSA is passively collecting some obscure meta-data and sorting it, it's not "yours" the way a social-security number is or a way a passport is. They don't link it to your phone (or vice versa), your photo, etc unless they have a really good reason to do so as is their policy. They don't live or get paid to hack you for no good reason when they're bored. Period, the end. The issue is, is there any reasonable excuse to do any type of drag-net surveillance in the first place or keep dossiers on anyone at all? I say yes, since they explicitly do not create dossiers on domestic US persons, unless they can be tied to terrorists...but that's still the FBI's job. These dossiers amount to little more than a number in a database....so they say. I call shenanigans, and I'm sick of playing devil's advocate. There are (probably) no lists with your NAME, face, finger prints, DNA floating around out there that you're unaware of. There are certainly no dossiers tying together all of your anonymous data (header, meta etc) from various sources like reddit, facebook (fully everything), SMS-texting (IMEI, location), Skype (IP address), etc together with said list if it did exist...unless you've been calling or emailing known terrorists, which I really doubt. All of these things are compartmentalized and nearly impossible to tie together without a human analyst spending a great deal of time sorting the information, or really poor informational security on the users part (e.g using Google+ and Facebook never making any attempt to hide information) Well, let me stop myself short. Facebook DOES collects that type of stuff 19, and lies about it, but that's for marketing purposes...the NSA just wants it too, to "counter terrorism" and they don't connect anywhere near the same amount of data. Not even close. Again, this is where the privacy concerns are valid. If Facebook does it to market to me...hypothetically, why would NSA? This could be one reason why they want to STORE EVERYTHING 33. But again, I don't want to get into the future issues that Snowden talks about in his Hong Kong interview, things like possible retro-active false light labels, and other unlikely "what if" hypotheticals.

He who controls the past controls the future. He who controls the present controls the past. George Orwell, 1984

Just because I'm not detailing hypotheticals, doesn't mean they're not possibilities or that they're not a huge issue that we should just disregard. On the contrary, we need to worry about this stuff NOW. The FBI and other agencies, including the NSA according to William Binney, who had his door kicked in by an armed FBI team, are doing them or at least building the capability to do so. Please see the Utah Datacenter for more information. Just look at what a few journalists, without access to everything, pulled up on Edward Snowden's past, dating back over a full decade! This is the type of stuff we need to worry about when it comes to privacy, but not so much in terms of the NSA...Nevertheless, if we look at what they're creating, (a surveillance state the likes of which the Stasi or George Orwell could have only dreamed of) we could be that close from so called "Turnkey Tyranny" if we don't start taking baby steps backwards to rein in these run away issues. We're walking a razors edge if laws must be kept secret because they are "too political4Error! Bookmark not defined." or "questionably ethical" or where classifying legal interpretations is seen as "strange", especially when the information is classified from the very people conducting operations under those interpretations. Another problem with the way the privacy issue is being perceived is that anyone involved in the intelligence world (which is mostly private sector) actually cares about our PERSONAL information, like who we're sleeping with, what we like to drink after work, what you had for breakfast, or what porn you favor...They don't. Get Adblock plus, and Ghostery (cookie blocker) on Chrome or Firefox, and 90% of your concern is solved in regards to the folks who care about that stuff, e.g marketing firms (who you'll deal with, with Google and Facebook, as opposed to the NSA). Unless you're a corrupt Senator under DoJ investigation, or a suspected spy, your girlfriend's naughty pictures aren't their concern, neither is hacking your webcam to spy on you directly. That's where the privacy issues of the FBI come into play. So what does that mean? It means that unless they have a really good reason to start an inquiry into you (like an active network infiltration from your IP address into classified documents), or find a ton of really really "high-value" intelligence spilling out of "you" I doubt anyone even knows, or cares you exist. I understand this does raise concerns about "Total Informational Awareness" and how they're able to data-mine you in the first place, but that's not what I'm here to show. If they really wanted to target you, and dig up the dirt of your past, as opposed to passive surveillance (which are two separately valid issues) They'd just query Stasibook19. But that's not going to be the NSA or CIA or even DIA, they're not law enforcement. They don't kick your door in. That's the popo and the feds, more specifically the FBI. They can, have, and will continue to abuse this power until oversight is restored. As for the NSA, their corruption and lack of oversight strikes much deeper than simply launching CoIntelPro types of inquiries, and has even been referred to as a 'Rouge Agency' although I don't believe this to be the case. {Sup' Feds!}

If you want more on the privacy concerns (they are extremely valid, but I'm looking at this on a bigger scale, not a law enforcement scale or a "what should be private" perspective) check out Jacob Applebaum's 2 hour talk on digital anti-repression34. It gives some entry level details on the technology.

HOW IT Pages from REALLY the Top Secret WORKS "Edwar


Pages from the Top Secret Snowd "Edward Snowden Leaks" en28th, 2013. June This is describing the Leaks" President's June Surveillance Program (PSP) AKA 28th, STELLARWIND

2013.

N.S.A and the F.B.I


`35

It should be noted, of course, that they "delete" any U.S Person's data that accidently got mixed in. So they say...However, quite a few whistleblowers say differently. According to William Binney, up to 500 years worth of EVERYTHING can be stored in the new data center in Utah. Zetabytes...

"Terrorist Plots, Hatched by the F.B.I."

The New York Times.36


Published: April 28, 2012
Oversight should not be at the bottom!! That's like eating food and checking the poop to see if it was poison!

Update: 6/29/13 -- The whole picture.


Acquiring data from a new target
This slide describes what happens when an NSA analyst "tasks" the PRISM system for information about a new surveillance target. The request to add a new target is passed automatically to a supervisor who reviews the "selectors," or search terms. The supervisor must endorse the analyst's "reasonable belief," defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection.

Absolutely view the annoted FULL LEAKS on The Washington Post. (June 29th)

(Washington post June 29th, 2013.)

WHAT THEY'RE REALLY DOING


JUNE 10, 2013 "Inside the NSAs Domestic Surveillance Apparatus:
Whistleblower William Binney Speaks Out"

WILLIAM BINNEY DEMOCRACY NOW INTERIVEW22


AMY GOODMAN: On Friday, President Obama also refuted claims that the intelligence community is listening to telephone conversations. PRESIDENT BARACK OBAMA: ...So, I want to be very clear. Some of the hype that weve been hearing over the last day or sonobody is listening to the content of peoples phone calls. AMY GOODMAN: Is that true, William Binney? You worked at the NSA for almost 40 years. WILLIAM BINNEY: Well, its pretty much true, yes. I think they aremy sense is that they are just looking at a target list. They have a target list that they input to the telephone network and use the switches to detect these phone calls going across the network and then download those to recorders and transcribe that. So thats what theyreI think thats what theyre doing. But what Edward Snowden was talking about was having access to that network. What that meant was he could load and what he was basically saying, he could load the attributes of anyone he wanted to target into the target list, and then that would start doing, executing and collecting all the information about them, including the content, and recording it, too. So they couldand someone would have to transcribe it, but they could, and all of that content for phones, as well as email, would be stored and collected in the base. EDWARD SNOWDEN: You dont have to have done anything wrong. You simply have to eventually fall under suspicion from somebody, even by a wrong call, and then they can use the system to go back in time and scrutinize every decision youve ever made, every friend youve ever discussed something with, and attack you on that basis, to sort of derive suspicion from an innocent life and paint anyone in the context of a wrongdoer. AMY GOODMAN: William Binney, your response to Edward Snowden, the 29-year-old NSA whistleblower? WILLIAM BINNEY: Yeah, thats pretty much correct. I mean, when you pull in the call records at the rate of three billion a day over 12 years and you graph them, what that means is you now have the total communications communities that everyone has in the world, or in the United States, basically. And at that point, that shows you all of your relationships. And thats part of what he was talking about. The other part was the Narus devices that they deployed starting, I think, around 2003 onto the fiber optic networks, were capturing the emails and voice over IP, and that was being stored. And so then thats why they have to build places like Bluffdale in Utah, that big storage facility, because theyre collecting so much data. The content is the realthe content is really the bulk that needs to bethat theyre storing. The call records and just graphing the relationships is a pretty simple thing to do, and it doesnt take that much you could put that in one room of storage capacity. Please read the entire transcript when you have the time. William Binney is probably the best source (along with Thomas Drake) for real whistleblower information. We are hearing two sides of the same story. Read on...
22

IF THAT'S HOW IT WORKS


(This was the situation where people like then AG Ashcroft to threaten to resign - detailed later)

And that is what they're doing...

WHERE IS THE OVERSIGHT?


A few meetings saying it's "legal" isn't the same as it being

Constitutional.

Chairmen Rep. Mike Rogers: "Does the NSA have the ability to listen American's phone calls, or read their emails under these two programs?" General Alexander: No. We don't have that authority. Rogers: Does the technology exist at the NSA for an analyst to flip a switch to listen to American's phone calls or read their emails. Alexander: No. Rogers: So the technology does not exist for any individual or group of individuals at the NSA to flip a switch to listen to American's phone calls or read their emails. Alexander: That is correct. June 18th Congressional Hearing 21 (01:03:00)
Is this the oversight!?

Section 4: The Players & Technology


"Okay, it's important to not to let this stuff paralyze you...it's one thing to know it's happening, and it's one thing, and it's another to pretend that the solution is to become a Luddite" -- Jake Applebaum digital anti-repression workshop 34.

TECHNOLOGY I'm going to try to give a broad overview of different tech. I could fill ten of these booklets detailing all the different types of hacking, from RFID hack, phone phreaking, malware, MD5 collisions, Side Channel, to Social Engineering (hacking human minds). The splitter diagram, room 641a. Yeah...it's like that. A literal clone of ALL traffic.

Don't spy on American's eh? Don't save EVERYTHING eh? Yeah...talk to the diagram...

Everyone reading should take the time to watch this DEFCON talk on The Modern Technology 36 and watch William Binney talk to Democracy Now37 on youtube. Narus-Insight -- Program used to gather data with Narus tech like STA6400. Xkeyscore -- Program NSA is reported to use to sort meta-data under ragtime-p, into databases that have probably been renamed like "PINWALE" or "MAUI" or "HOMEBASE" etc. It's extremely well named if that is the program. Looking through the meta data of your own email you get an X-Spamscore and X-Bigfish score from Gmail. Here is an example38 of what NSA would see if they filed an NSL for the last spam message I received and how to try it yourself. DCS5000 -- FBI point and click surveillance program (classified and probably outdated...and doesn't even compare in the slightest to the NSA). It's basically the continuation of Carnivore.39 Textsecure Android App. -- Encrypt your text messages (only helps if both parties use it and that's not going to stop "big kids" surveillance). Everyone should use this. Redphone Android App. -- Encrypt cell calls. Similar to Textsecure for phone calls. Everyone should use this as well. NSAkey (Windows backdoor) -- Probably nothing more than a conspiracy / coincidence. Really. I'm including this due to a really poorly reported release from RT news recently. I don't want people using this as a fact, because it's not. It's like getting your facts from "whistleblower" Russ Tice (who is more than likely a delusional arch-type). GIG -- The Global Informational Grid (check out NSA's page on this 40) ECHELON 41 -- Global satellite surveillance via satellites. Speaking of (although a different class of satellites, and usually connected to drones now) the NSA is rumored to have powerful enough equipment to read the date off a dime from space. I can't confirm this or deny it. Side channel Attacks 42 -- From Wiki: In cryptography, a side channel attack is any attack based
on information gained from the physical implementation of a cryptosystem, rather thanbrute force or theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing information, power consumption, electromagneticleaks or even sound can provide an extra source of information which can be exploited to break the system :

COINTELPRO 43 (FBI Counter Intel Program) -- This version of the program has been abolished since 1971. It was totally illegal in basically all aspects. This project was set in place to basically ...rule the country? It basically followed around everyone from journalists to people like MLK and even tried to make him kill himself 44. This is all well documented, none of it is conspiracy theory. They also assassinated Fred Hampton (a Black Panther). I wish I was making this up. I'm not going to give conspiracy theories here on whether I believe this still happens.

Mini-class drones 45 (Humming Birds, flies, quads, etc) -- These mostly in prototype phase today, not something you guys should worry about. They don't serve much purpose and are quickly becoming antiquated. Either way, just imagine that this was something from 5 maybe even 10 years back. I think that's awesome. IMSI-catchers 46 (Fake cell tower for easy wiretaps) -- $125 bucks and a bit of tech knowledge anyone can build these. :) But it's illegal to use...if you're not employed as an intelligence contractor or law enforcement....See also GSM spoofing for you tech.ops types. Honeypot attacks -- Basically, a fake webpage or similar entity designed to gather information or get someone stuck. E.G a hacker attacks a vulnerable server leaving behind clues. It turns out the vulnerable server was set up on a Virtual Computer Server and was never really at risk, but instead was there to steal info or trap hackers. TEMPEST 47 (attacks) -- The NSA (or others) can read the electromagnetic waves in your house to figure out what's going on inside to a really really scary accurate degree. They can also tap your electric emissions 48 and the vibration of your keyboard shaking sends electronic signals back through your charger, into your line, and they can figure out if you're on a computer and sometimes even what you're typing. I wish I was making that up. To put this in perspective, this is from the late Coldwar. Check out this memo / news49 article about it circa 1985 Stylometry -- Methodology of differing if someone wrote something. Check into a program called Anonymouth to help with this. For example, even though I don't have a name, it's pretty obvious if I typed this or not. For example; I use ; and -- and :) and the word however, subjective, and often use run on sentences. D-sploit -- Android hacking tool, sorry...penetration testing tool for security auditor's. So easy KIDS DO IT! (Break into poorly secured wifi and stuff -- Not airplanes as news media reported). Your Car -- If you have Onstar, they can hack it. Laser Microphones 50 -- I made one of these in 10th grade. You literally take a laser and a receptor and convert what you get back into Audio. It's super basic. You can use these to hear conversations through most glass windows, like at hotels...if you want to go to jail. Don't let this stuff paralyze you though, someone is much more likely to phone tap you. Leave your phone in the fridge -- Makes it neigh impossible to tap or at least hear anything. Not because of the temperature, but because of the thick walls. Wrapping in tinfoil doesn't do much. Don't be paranoid about this stuff.

Brute Force Attack / Dictionary Attacks -- Basically just guessing random or dictionary (set list) of passwords against a server or algorithm in order to crack it. With the super computers NSA has today and the advanced algorithms they use, unless you have a really really strong password, you're SOL should they choose to target you. Cell Tower Dumps -- This is basically when you dump data from a cell tower as to who was using it, when, what was sent (non-content meta). FBI is notorious for using this. They don't need to track your GPS (a 'search' legally speaking) but they can sure as heck ask for a cell tower dump! They'll get just as much if not more! yay! MQ-R (Drones) -- These are a certain class of drone, like the well known reaper or predator. Also see MQ-4c the surveillance drone (upgraded global hawk). These drones have some seriously powerful surveillance capabilities. Boeing Narus, an Israeli subsidiary of Boeing, was contracted to create a system that could copy almost every packet (tech for bits of data) sent throughout the 'back bone' of the tier-1 internet lines at AT&T (room 641a) and send them to NSA for data-mining operations. The Narus STA 6400 51 or "the splitter" [See tech] was the device used. In 2006 Mark Klein, the AT&T employee who discovered the room blew the whistle on NSA, leading to the class action lawsuit by the EFF against AT&T (Hepting v AT&T). This room was also covered briefly in the PBS Nova episode "The Spy Factory" 52. But mostly this documentary catalogs NSAs massive failure in regards to 9/11. I hope by now you've all watched Edward Snowden talk53. He's talking about Privacy issues, or so it would seem. Really, he's talking about restoring democracy and oversight, not subjective privacy concerns about your silly skype logs. I'm not giving this guy's life story here. Check out /r/Snowden Operation Mockingbird 54 -- From wiki: Operation Mockingbird was a secret Central
Intelligence Agency campaign to influence media beginning in the 1950s. Organized by Cord Meyer and Allen W. Dulles in the 1950s, it was later led by Frank Wisner after Dulles became head of CIA. The organization recruited leading American journalists into a network to help present the CIA's views, and funded some student and cultural organizations, and magazines as fronts. As it developed, it also worked to influence foreign media and political campaigns, in addition to activities by other operating units of the CIA.

"Hush little baby don't say a word...."

One has to ask... If Shamrock continued...TIA continued...and PSP continued...What about projects like CoIntelPro & Mockingbird? But that's another story.

Important Figures William "Bill" Binney 55 If you've not heard the story of Bill Binney, click that link right now. Really. Bill Binney was one of the NSAs top executives, who left the NSA after blowing the whistle on the stuff I'm trying to raise awareness about right now. See also his talk with Jacob Applebaum on Democracy Now. Thomas Andrew Drake NSA whistleblower and one of my heroes. I don't even want to put the wiki paragraph here. Read this for more about TrailBlazer. You really have to read this to understand and contextualize everything I'm talking about. A Spook Speaks, Intelligence Contractors' Complex [important resource]

Michael Klein (AT&T Whistleblower) Wiki: Mark Klein is a former AT&T technician who leaked knowledge of his company's cooperation with
the United States National Security Agency in installing network hardware to monitor, capture and process American telecommunications. The subsequent media coverage became a major story in May 2006. In recognition of his actions, the Electronic Frontier Foundation picked Klein as one of the winners of its [1] 2008 Pioneer Awards. For over 22 years Mark Klein worked for AT&T. Starting with the company as a Communications Technician in New York, where he remained from November 1981 until March 1991, he later continued in that capacity in California until 1998. From January 1998 to October 2003, Klein worked as a Computer Network Associate in San Francisco. From October 2003 to May 2004 he returned to the role of Communications Technician, after which he retired in May 2004

John Ashcroft As discussed previously, he was the Attorney General under Bush for the first term. Read the Wikipedia page regarding his term as AG and watch Cheney's Law The Frontline Documentary11.
FROM WIKI: On March 2004, the Justice Department under Ashcroft ruled that the Stellar Wind domestic intelligence program was illegal. The day after the ruling, Ashcroft became critically ill with acute pancreatitis. President Bush sent his White House Counsel Alberto Gonzales and Chief of Staff Andrew Card Jr. to Ashcroft's hospital bed. They wanted him to sign a document reversing the Justice Department's ruling. But the semi-conscious Ashcroft refused to sign; Acting Attorney General James Comey and Jack Goldsmith, head of the Office of Legal Counsel for DOJ, were there to back him up. Bush reauthorized the operation by executive decision, over formal Justice Department objections

Eric Holder Acting Attorney General under Obama as of today, June 13, 2013. Complacent and in the opinion of many should have been fired after the gun walking 56 he allowed into Mexico in the "fast and furious" scandal. He also signed the approval for

the reasoning of the FISC courts, as was leaked by Edward Snowden and published by The Guardian on June 20th, 2013. Click here to watch blatant perjury to Congress. James Clapper 57 Director of National Intelligence. From wiki: The Director of National Intelligence (DNI) is the United States government official subject to the authority, direction, and control of the President required by the Intelligence Reform and Terrorism Prevention Act of 2004 to:

Serve as principal advisor to the President, the National Security Council, and the Homeland Security Council about intelligence matters related to national security; Serve as head of the sixteen-member Intelligence Community; and Direct and oversee the National Intelligence Program.

James Clapper's Senate testimony Director of National Intelligence James Clapper (pictured above) pretty clearly told a lie in March. In a hearing, Sen. Ron Wyden, asked, "does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Clapper said "No sir." Asked again, Clapper said, "Not wittingly." The documents leaked by Snowden prove that's not true. Clapper's explanation for why he said what he said keeps changing.

June 6: Clapper told National Journal what he said was true: "What I said was, the NSA does not voyeuristically pore through U.S. citizens' e-mails. I stand by that." June 9: Clapper told NBC News' Andrea Mitchell that he thought the question was unfair, so his answer was "too cute by half." Clapper said what he was thinking: "I thought, though in retrospect, I was asked-- "When are you going to start-- stop beating your wife" kind of question, which is meaning not-- answerable necessarily by a simple yes or no. So I responded in what I thought was the most truthful, or least untruthful manner by saying no." June 21: In a letter to the Senate Intelligence Committee, unearthed by The Washington Post's Greg Miller, Clapper said he could no longer remember what he was thinking: "I have thought long and hard to re-create what went through my mind at the time... My response was clearly erroneous for which I apologize." ((SOURCE: http://www.theatlanticwire.com/politics/2013/07/nsa-factcheck/66741/ 58))

Jacob Applebaum 59- Computer Security Researcher and TOR project developer. This guy has worked on more projects than I can count on all my hands and toes and given several amazing speeches. He's one of the leading "activists" against this type of surveillance today.

Sibel Edmons (FBI Whistleblower -- See Kill the Messenger documentary 60 for the full story here) -- From wiki: Sibel Deniz Edmonds is a Turkish-American[1] former Federal Bureau of
Investigation translator and founder of the National Security Whistleblowers Coalition (NSWBC). Edmonds gained public attention following her firing from her position as a language specialist at the FBI's Washington Field Office in March 2002. She had accused a colleague of covering up illicit activity involving foreign nationals, alleged serious security breaches and cover-ups and that intelligence had been deliberately suppressed, endangering national security. Her later claims gained her awards and fame as a whistleblower.:

Bradley Manning -- Wikileaks leaker guy...For the full story follow beat journalist (I'm pretty sure this is about as intimately in depth as a person can get) Alexaobrien on her beat journalism webpage. 61 The Illuminati -- Utter nonsense. A fictionalized portrayal of a group that existed far in American history's past. Conspiracy adherents love to blame these "power elites" for most of the world's problems. Some of them even believe they're lizard people. They'll probably say I'm part of the Illuminati because of this report. If you believe that please donate all of your money to my PayPal so I can rule the world. Michael Hastings 62 (dead journalist as of 18th June 2013) -Suspiciously crashed his car at high speeds after emailing his friends saying the FBI was on to him and he needed to lay low. Check the comments on this page 63 (LATIMES) and make your own decisions if anything is going on. I refuse to speculate for you, but also refuse to get my opinions from major news networks.

Robber Mueller -- FBI Director "Two years ago, FBI Director Robert Mueller told Congress that, "Beginning in late 2009, certain electronic communications service providers no longer honored [national security letters] to obtain" electronic communication transaction records. At the time,NBC News' Michael Isikoff explains, the telecoms were being sued for cooperating with

government surveillance requests. So the government switched to requesting them under Section 215 of the Patriot Act.... Over the weekend [July 28th], The Washington Post released four more slides from the PRISM powerpoint. One slide (pictured above) indicates that the FBI "deploys government equipment on private company property to retrieve matching information from a participating company, such as Microsoft or Yahoo and pass it without further review to the NSA." Making the FBI the middleman, the Times says, "provides the N.S.A. with a defense, however nominal, against claims that it spies on United States soil." -http://www.theatlanticwire.com/politics/2013/07/nsa-fact-check/66741/

The Bush Administration. -- There is no team more dubious than Dick Cheney, David Addington (his lawyer) and Donald Rumsfeld that I can think of offhand. Maybe throw in Hayden...These men helped to lead our country down the road it's on today. I cannot even begin to give an overview of just how much these men have done. Please read the Wikipedia basics on Cheney and Addington Rumsfeld. "Eight retired generals and admirals called for Rumsfeld to resign in early 2006 in what was called the
"Generals Revolt," accusing him of "abysmal" military planning and lack of strategic competence"

-- Excerpt from Donald Rumsfeld memo dated Nov 27 2001

Michael Vincent Hayden (born March 17, 1945) is a retired United States Air Force fourstar general and former Director of the National Security Agency and Director of the Central Intelligence Agency. From April 21, 2005 to May 26, 2006 he was the Principal Deputy Director of National Intelligence, a position which once made him "the highest-ranking military intelligence officer in the armed [1] forces". He was Director of the National Security Agency (NSA) from 1999 to 2005. During his tenure as director, he oversaw the controversial NSA surveillance of technological communications between persons in the United States and alleged foreign terrorist groups, which resulted in the NSA warrantless surveillance controversy. (From Wiki)

General Keith Alexander 64 Director of NSA as of today, June 13, 2013. In the words of Jacob Applebaum, "This man is a fucking liar."
Never before has anyone in Americas intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. -- James Bamford's analysis 65

Personally, I would love to see that (probably redacted) report the NSA talked about during the Congressional hearing on June 12th, 2013. Detailing the so called "dozens" of plots foiled. One of which (The Wall Street plot - Where the FBI was tipped off by the NSA) has already been proven objectively false. FBI deputy director, Sean Joyce, of course, said he "misspoke." Edward Snowden (NSA whistleblower) -- From Wiki: (born June 21, 1983) is a former
technical contractor for the National Security Agency (NSA) and Central Intelligence Agency (CIA) employee who leaked details of top-secret American and British government mass surveillance programs to the press. On June 14, 2013, US federal prosecutors filed a sealed complaint, made public on June 21, charging Snowden with theft of government property, unauthorized communication of national defense information, and willful communication of classified intelligence to an unauthorized person; the latter two allegations are under the Espionage Act .

"The alarms of whistleblowers would be unnecessary were it not for the many threats to the public interest shielded by practices of secrecy in such domains as law, medicine, commerce, industry, science, and government. ... The most important task is to reduce the various practices of collective secrecy in order to permit the normal channels of public inquiry to take the place of whistleblowing and of leaking. (p. 228)" -- Sissela Bok 'secrets.66

John F. Kennedy -- The very word "secrecy" is repugnant in a free and open society. April 27, 1961
"...There is a very grave danger than an announced need for an increased need for security, will be seized upon by those anxious to expand its meaning to the very limits of censorship and concealment. That I do not tend to permit, so long as its in my control."

Eisenhower's farewell address -- January 17, 1961


" In the councils of government, we must guard against the acquisition of unwarranted influence, whether
sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist. We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted. Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together.

Section 5: The Laws & Legal Issues (An Overview)

[This link 29.PDF is one of the best resources out there for the REAL WORLD stuff (Cell phone + computer searches) you may encounter as a private citizen on a local or state, or even federal level.] The Espionage Act (1917) The Obama Administration has brandished the Espionage Act in six make that SEVEN 67 cases to prosecute those alleged of releasing classified information to the media, compared to just three such cases in all previous administrations. Here is a list 68 of those charged under this act recently. As of June 21st, Edward Snowden has en charged, but [not formally indicted yet] under the espionage act. Protect America Act (2007) This bill allows the monitoring of all electronic communications of, "Americans communicating with foreigners who are the targets of a U.S. terrorism investigation", without a court order or oversight, so long as it is not targeted at one particular person 'reasonably believed to be' inside the country. US v Duffey This 2012 case set precedent for 'cell tower dumps' being used (mostly by FBI) to gather lots of aggregate data to plot the position of a cell phone user. Again, this is 'legal' because of the 'Third Party Doctrine' discussed above. What the FBI didn't tell the courts was how many innocent people are also tracked based on these 'cell dumps' which is more or less pseudo-GPS tracking, ruled as a search under US V Jones.

Hepting V AT&T Discussed previously, the 641a room lawsuit filed by the EFF. Jewel V NSA Basically part 2 of Hepting after the Hepting case was dismissed. People V Diaz Cell phones don't need warrants after an arrest. Not related to the NSA, but people should still be aware of this fact and always encrypt their stuff! Check out /r/Assert_Your_Rights and /r/Privacy for more information, or the XDA android forums to ask the experts. CALEA69 The Communications Assistance for Law Enforcement Act was passed in 1994 to make it easier for law enforcement to wiretap digital telephone networks. CALEA forced telephone companies to redesign their network architectures to make wiretapping easier. It expressly did not regulate data traveling over the Internet. FISC - Foreign Intelligence Surveillance Court 70 (Created under FISA) This is basically the "court" designed to oversee foreign communications surveillance and one of the several bodies that need to give approval before the NSA can (with a person) look into data legally. Remember, the NSA can 'legally' store your information, as long as they don't read it or analyze it (that scares me and many people assert it to be illegal). It should be noted that the FISA judges do not have a rubber stamp. I feel it vital to burn the buzzword "rubber stamp" now. It is fundamentally not the case, and most of those asserting the "rubber stamp" theory do not actually understand what the FISC process is. I suggest you read the FBI training manual mentioned later. THE BELLY OF THE BEAST USAPATRIOT Sec. 215 71 Please refer to this resource from the ALCU as well as The Reid Report blog analysis 72. The list of what is wrong with this bill could fill an entire page. Bullet points from Reid Analysis.
"What is Section 215?
Section 215 allows the FBI to order any person or entity to turn over any tangible things, so long as the FBI specifies that the order is for an authorized investigation . . . to protect against international terrorism or clandestine intelligence activities. Section 215 vastly expands the FBIs power to spy on ordinary people living in the United States, including United States citizens and permanent residents. The FBI need not show probable cause, nor even reasonable grounds to believe, that the person whose records it seeks is engaged in criminal activity. The FBI need not have any suspicion that the subject of the investigation is a foreign power or agent of a foreign power. The FBI can investigate United States persons based in part on their exercise of First Amendment rights, and it can investigate non-United States persons based solely on their exercise of First Amendment rights.

For example, the FBI could spy on a person because they dont like the books she reads, or because they dont like the web sites she visits. They could spy on her because she wrote a letter to the editor that criticized government policy.

Those served with Section 215 orders are prohibited from disclosing the fact to anyone else. Those who are the subjects of the surveillance are never notified that their privacy has been compromised. If the government had been keeping track of what books a person had been reading, or what web sites she had been visiting, the person would never know.

National Security Letters (NSLs) As mentioned previously, these are basically, or soon will be, in the past, since a judge in California ruled them unconstitutional on account of their 'gag orders' in early 2013. Under The USA PATRIOT ACT, these administrative subpoenas 73 were given vastly expanded access to things like databases as opposed to the limited scope non-content data previously. Although they still explicitly stipulate non-content data, data in aggregate (like a database) should be considered content. NSLs or sec. 215 notices, were used in record number (aprx 50,000) in 2006, to gather data like who called who and where emails went or came from (this is referred to as 'meta-data' [CLICK HERE FOR NSA'S DEFINITION 74 as leaked from a 2013 secret document from 2007 to the Office of Legal Council]. These NSL demands allowed the government (mostly the FBI after being tipped off by NSA) to completely subvert the process of obtaining a warrant, even though they are similar. However, that's a whole other scandal with AT&T employees being placed inside FBI HQ's 75 that you can read about on your own. Basically, NSLs came with a gag order. This meant that the recipient couldn't tell anyone about it, not even that you had received it, nor consult a lawyer. Worse yet, there was no way to know if an NSL had been served (for example, to your ISP) to gain data on you. The FBI sent out as many as 50,000 of these per years 76 to various different persons and companies. SCA and the 'Third Party Doctrine' 77 -- The Stored Communications Act opens a loophole called the Third Party Doctrine. If you share information with a third party, with very little exception (besides where protected by laws, like HIPAA) they can share it, because you don't have a reasonable expectation of privacy, as defined by US V Katz. This matters! This is one of many reasons why PRISM (for example) is technically 'legal'. Anything that is stored on a database is the property of the database owner. Your emails? Theirs. Pictures? Theirs. Now, that doesn't give them the right to reproduce it, but they can snoop (usually there are policies in place so this doesn't happen). They can simply hand over your data to intelligence agencies at their leisure and what we're finding out recently is that they're doing just that. However, SCA is far from the only problem or loophole.

History of FAA 2008 sec. 702


(This leakError! Bookmark not defined. page 39) is referring to the document (or a very similar) documents bellow)

Classified leaked Document from November of 2007 requesting changes to the law. [leaked June 27th 2013]

"To Recommend Attorney General Approval Pursuant to Executive Order 12333


of a Proposed Amendment to Procedures Governing the National Security Ageney's Signals Intelligence Activities"

Please read the first two pages here 80 to understand how they justified this paradigm shift occurring.

{Left in final release for future update & Formatting}

2008 FISA Amendment Act (FAA) - Section 702.81

BACK TO REALITY: By order of the FISC, the Government is prohibited from indiscriminately sifting through the telephony meta-data acquired under the program. All information that is acquired under this program is subject to strict, court-imposed restrictions on review and handling. The court only allows the data to be queried when there is a reasonable suspicion, specific facts, that the particular basis for the query is associated with a foreign terrorist organization. Only specially cleared counter-terrorism personnel specifically trained in the Court-approved procedures may even access the records. The FISA Court Order Flap: Take a Deep Breath 78
The gathering of information however is "left open to the widest possible aperture" according to Edward Snowden in his internet Q&A on The Guardian 79 on June 18th, 2013.

IMMUNITY:
To see the immunity provisions check out the Congressional Research Service's report on the Retroactive Immunity provided under FAA 2008. Download the PDF
(CRS Report PDF82)

[Direct from the bill]

As well check out full PDF (15 min) from the text above. [This is basically an FBI 101 .PDF from 2003 explaining FISA info gathering] 83

PRISM the modern sister of (PSP aka) STELLARWIND.

PRISM: HOW HOW WE WE GOT GOT HERE HERE

"THE 702 PROGRAM"

This top secret leaked PRISM slide shows just how broken the legislation of FAA sec. 702 really is, even if it is "working" The NSA is basing entire operations like PRISM on loopholes in the laws, as opposed to basing them against the integrity of the Constitution's 4th amendment rights of SEARCH and seizure.
Law > Objectively Questionable Behavior
is the new paradigm since 2001.

Section 6: How do we fix all of this? Final Notes.


"The history of human growth and development is at the same time the history of the terrible struggle of every new idea heralding the approach of a brighter dawn. In its tenacious hold on tradition, the Old has never hesitated to make use of the foulest and cruelest means to stay the advent of the New, in whatever form

or period the latter may have asserted itself." -- Emma Goldman (Opening Line of Anarchy & Other Essays - 1910 84)
"If voting made a difference, they wouldn't let us do it." -- Mark Twain.

The question again becomes, how did we get here?

How can we understand the justifications and fundamental principles behind this global complex, and those involved? Again, this is an ethics and constitutional issue, a monetary issue, a matter of principle, and above all a matter of integrity of state. Speaking in terms of holmic state architecture, we see a set of commonalities and themes, all tying back to the same principles of the industrial military complex. Today, in our increasingly digital age, this complex has transgressed and metamorphosed into something similar, yet a new type of complex in its own rite. In 1947, while the Truman administration was considering how to sell to the American public a policy of a permanent wartime economy coupled with aggressive interventions abroad, Senator Authur Vandenberg told the President "scare hell out of the American people." This statement, in a nutshell 85, describes the general strategy that the government has used to justify U.S. militarism and imperialism over the last sixty years. Today, we see the same exact principle being applied under the guise of national security domestically, to excuse and explain the actions of the NSA and similar entities. This is unacceptable. By now, I hope you've all watched the interview with Edward Snowden that made this post possible by giving people like me an audience. In his interview he makes some really fantastic arguments. He says that, all they care about is policy... and that the only way to change things is through policy. Although this is not a problem that we can solve overnight, we can at the very least take steps to solving these issues today. Here 86 is a list of pragmatic things you can do personally to help bring about change, written by redditor, missedit22. Small steps, like Judges ruling NSLs unconstitutional 76 are the way to stop things from spiraling any further out of control in the immediate sense. In their world, if it's not legal, they make it legal. This is a cultural and pathological complex that needs to change. It is our job to help pressure those in power into functioning in a constitutional capacity again. If our votes are ignored, then we need to be damn sure our voices are heard. If our voices are ignored, we need to be damn sure our votes aren't thrown away. Changing laws like the FAA 2008 Sec. 702 (called the "The Barn Door" by Thomas Drake) is really the best way to stop this type of unchecked power and activity, and to that end balance oversight and restore democracy.

The issue isn't that they, our government, is directly spying on everything we do or say in a personal capacity; it's that we allow it, or that they have hidden themselves away so well we don't even know it's happening. It's also a huge problem that someday, someone could retroactively go back in time and make you into a criminal, even in a false-light, based on something you did or said in the past. Jacob Applebaum, and Snowden both touch on this explicitly in their interviews and speeches respectively. The best chance we have for starting a true cultural power-shift is to stay vigilant and not give up. We cannot allow ourselves to accept blatantly unconstitutional activity in any capacity, nor can we simply forget about these events in a few weeks when the new episodes of Breaking Bad start. It is long past due that we, the American People, pressure our Congress into doing their jobs; that means holding more hearings, digging deeper, becoming involved, and to START WORKING AGAIN FOR THE PEOPLE THAT ELECTED THEM. By pressuring, and I mean REALLY PRESSURING Congress, we can hopefully change their mind on issues like for funding and policy. If you've seen any of the interviews with the NSA and FBI speaking to Congress, you've heard them lie through their teeth or dance around answers with stock question-dodger quotes like "Not under this program" when asked directly if the NSA spies on Americans under programs like STELLARWIND & PRISM. We need to keep them (our government and those with power) under the public microscope at all times. That is how democracy works. Not through secret orders and secret interpretations of classified laws. That is not democracy. Without oversight, they (the government collective and those in power) are free to do what they want, unchecked. We especially need to worry if the FISA Court isn't going to do so, and Congress is either too apathetic, powerless, or complicit to do it themselves. I urge you all to watch Thomas Drake's speech at the National Press Club on Youtube from March of 2013. There are today a quite a few individuals involved with the EFF (The Electronic Frontier Foundation) is the group behind lawsuits like Hepting V AT&T and Jewel V NSA (which still active today as of 7/1/2013) The EFF, similar to the ACLU, will also target the people who directly allow or approve these illegal programs. Through use of litigation against citizens "on a personal capacity" such as such as David Addington (Cheney's Lawyer) and George W. Bush himself, the EFF hopes to accomplish their goal of restoring order. This is probably not the best way to stop the problem holistically, but giving negative media attention to the questioned parties sure helps! And, if groups like the EFF do happen to pull off a victory, like Google did with the NSL's being ruled unconstitutional, I think we should show them our support.

Looking forward, I see a bright future, one where the light of democracy cuts through shadows of secrecy' where voices like Edward Snowden's speak loud enough to break through the fog of apathy. A world where We The People reclaim democracy. So get out there, learn what you can, understand the problem(s), speak with facts to assert your notions, protect yourself however you see fit, and make sure what you're doing is productive, proactive, and nonviolent. This is an uphill battle, but this is not a war we've yet lost. "When power is joined to secrecy, therefore, and when the practices are of long duration, the danger of spread and abuse and deterioration increases. The power may be in the hands of individuals, either because of the authority they are known to wield or the unscrupulous means they are prepared to adopt. Or it may be collective power. (p. 110)" -- SECRETS: On the Ethics of Concealment and Revelation. By Sissela Bok.

To sum it up we've created, or allowed those with the power to create the Industrial Military Complex 2.0 The "Intelligence Private-Contractor Complex 99" Privacy should be on your mind, But this problem goes deeper.

It's time for change. It is time to restore democracy. #Restorethe4th July 4th, 2013.

Thank you all for reading! God Bless the United Surveillance State of America!
If you've learned something or would like to show support, please consider donating to the cause on this page. I've spent a good 100+ hours just on this report, not counting the research :-3 I don't use ads or get paid by anyone directly for this research or writing. I'm working hard to make a difference, and I hope that by sharing what I know and believe, others can make decisions for themselves and hopefully make this world a better place with that knowledge!

Thanks! -- idonthaveaname

(About the author): I'm just some 21 year old kid from New York who dropped out of high school and decided to educate himself. I've been studying this stuff since I was like 17 when I first saw a picture of Menwith hill and was like wtf is this nonsense? I'm trying to get my way through college and hopefully get a law degree or something, right now I'm a Poli.sci / Sociology double major. I climb rocks. I write lyrics. I do stuff like this....I need a new job. Check out my blog if you actually care to learn more about me. If you find any mistakes, or have suggestions, or are interested in ....anything really, please feel free to contact me :-3 with the revision number at the top so I know you're reading the current version. I also love hate mail, death threats and long walks on the beach<3 Please help spread awareness by either sharing what you've learned, or sharing this document :)

DISCLAIMER / COPYRIGHT INFO: This report is officially copyrighted to No One Special (T.I.A.D idonthaveaname) on Jun. 18th, 2013. This post is still in final release form but is subject to change. As a consequence, I ask kindly that you don't directly copy from the document or host it, but instead EMBED the document through Scribd, or put a huge red disclaimer that says "PLEASE READ THE UPDATED VERSION ON: www.scribd.com/doc/149074104" (or link to my blog either way) You are free to quote (with attribution), but please don't pass this off as yours...already had one jerk steal a bunch of it and had to complain to the host of the site in question...I don't have time for that. Please don't be "that guy"

Links and resources (Bold for important / great resources)


1 2

CNN. "What the NSA Costs Taxpayers." (June 7th 2013) Wikipedia "Operation Shamrock" 3 The Electronic Frontier Foundation: (EFF) "Jewel v. NSA. Summary of Evidence." (2012) 4 [LEAKED] The Guardian. ST-09-002 "NSA inspector general report on email and internet data collection under Stellar Wind -- Full Document" (June 27, 2013) 5 The Big Story.ap.org. June 15th 2013. Secret to Prism Program: Even Bigger Data Seizure. 6 Barbara Koeppel. "A Spook Speaks: Intelligence Contractors' Complex" The Washington Spectator. (June 15, 2012.) 7 Wikipedia. SAIC. 8 Shane Harris. "TIA Lives On." National Journal. (February 23, 2006.) 9 Wikipedia. ThinThread 10 Wikipedia. "Room 641a" 11 FRONTLINE."Cheney's Law" PBS Documentary (October 16, 2007) [History of PSP] 12 The Washington Post "Specter Offers Compromise on NSA Surveillance" (June 9, 2006) 13 NSA Whistleblower Thomas Drake Speaks at National Press Club, March 15, 2013. 14 NBCNews. "Ex-Pentagon general target of leak investigation, sources say" (June, 28 2013) 15 Wikipedia "Olympic Games" 16 Schneier on Security. "The NSA's Ragtime Surveillance Program and the Need for Leaks". (March 6, 2013) 17 USATODAY. "3 NSA Veterans Speak Out on Whistle-Blower: We Told You So." (June 16, 2013) 18 Wikipedia "Boundless Informant" 19 ZDNET. "Firm: Facebook's shadow profiles are 'frightening' dossiers on everyone" (June 24, 2013) 20 ZDNET "How did mainstream media get the NSA PRISM story so hopelessly wrong?" (June 14, 2013) 21 C-SPAN. [Congressional Hearing] National Security Agency Data Collection Programs. (June 18, 2013) 22 Democracy Now!. "Inside The NSA'S Domestic Surveillance ApparatusA: Whistleblower William Binney Speaks Out". (June 10, 2013) 23 Slate. "Drones Are Death Warrants: Can the U.S. Send Drones to Execute American citizens like Anwar Al-Awlaki without trial? You bet.". (October 3rd, 2011) 24 Wikipedia. "Korematsu v. United States" 25 Wikipedia "Sami Abdul Aziz Salim Allaithy" 26 Policymic. "Predator Drone Strikes: 50 Civilians Are Killed for Every 1 Terrorist, and the CIA Only Wants to Up Drone Warfare." (November, 2012) 27 United States Foreign Intelligence Surveillance Court of Review: No. 08-01. [PDF] (August 22, 2008). 28 Raj Goel CISSP. "What to Teach Your Kids, Employees and Interns about Social Media" (Feb 9, 2012) 29 First District Appellate Project Training Seminar. "Fourth Amendment Issues in the Digital Cell Phone and Computer Searches" [PDF] (January 20, 2012) 30 Washingtonian. "Ragtime: Code Name of NSA's Secret Domestic Intelligence Program Revealed in New Book" (February 27, 2013) 31 Huffington Post. "Michael Hastings Sent Email About FBI Probe Hours Before Death. Update." (June 22nd, 2013) 32 The IP Commission Report 2013. The Report of the Commission on the Theft American Intellectual Property. [PDF] 33 Wikipedia. "Utah Data Center" 34 Jacob Appelbaum's "Digital Anti-Repression Workshop" (April 27, 2012). 35 The New York Times. "Terrorist Plots, Hatched by the FBI" (April 28, 2012) 36 DEFCON 20: "Can You Track Me Now? Government Surveillance of Mobile Geo-Location Data" (November 22, 2012)

37

Democracy Now! "National Security Agency Whistleblower William Binney on Growing Surveillance" (April 20th, 2012) 38 Idonthaveaname.blogspot.com "What NSA Would See if they filed an NSL for my spam messages meta-data" (June 28, 2013) 39 Wikipedia. "Carnivore (software)" 40 National Security Agency / Central Security Service. Global Information Grid [GIG]. /!\ Actual NSA site 41 Wikipedia. "Echelon" 42 Wikipedia "Side Channel Attack" 43 Wikipedia. "CoIntelPro" 44 Upworthy. "Remember that time the FBI told Martin Luther King Jr to Kill Himself?" 45 Arbroath.blogspot: "US Firm Unveils Hummingbird Mini-spy Drone" (Feb 20, 2011) 46 Wikipedia "IMSI-Catcher" 47 Wikipedia "Tempest (Codename)" 48 Wikipedia "Van Eck Phreaking" 49 Cryptome. American Banker, March 26, 1985, pp. 1, 22. Emissions from Bank Computer Systems Make Eavesdropping Easy, Expert Says by DAVID O. TYSON. 50 Wikipedia "Laser Microphone" 51 PRIVACYSOS.org. "NARUS, Deep Packet Inspection and the NSA" (June, 2013) 52 NOVA. PBS Documentary "The Spy Factory" (February 03, 2009) 53 Edward Snowden's Hong Kong Interview. June 2013. 54 Idonthaveaname."Hush Little Baby...Don't Say a Word..Big Brother's going to buy you OPERATION MOCKINGBIRD" (June 27, 2013). 55 Wikipedia. "William Binney (U.S Intelligence Official)" 56 Wikipedia "ATF Gunwalking scandal" 2011. 57 ABCNEWS. "Did Intel Dr. James Clapper Lie to Congress? It's Complicated" (June 13, 2013) 58 The Atlantic Wire. "NSA The Mini-Coverups Are Out There" (July 1, 2013) 59 @ioerror -- Please also see wikipedia 60 Sibel Edmonds Documentary - Kill The Messenger (2011) 61 Www.Alexaobrien.com 62 Wikipedia. "Michael Hastings (Journalist)" 63 LATIMES. "Michael Hastings researching Jill Kelley Car Crash Before Death" (June 20, 2013) 64 Wikipedia. "Keith B. Alexander" 65 WIRED. "The Secret War: Infiltration. Sabotage. Mayhem. For Years, Four-Star General Alexander has Been Building a Secret Army Capable of Devastating Cyberattacks. Now it's Ready to Unleash Hell." (June 12, 2013) 66 Internal CIA Memo: DECLASSIFIED Authority NND 947003 Bjk Reviews SECRETS: On the Ethics of Concealment and Revelation. By Sissela Bok. Pantheon Books, New York; 1982; 332 pp. 67 The Washington Post. National Security. "U.S. Charges Snowden With Espionage Act" (June 21, 2013) 68 The Project on Government Oversight (POGO) Blog. "Six Americans Obama and Holder Charged Under the Espionage Act" (January 27, 2012) 69 The Electronic Frontier Foundation (EFF). "CALEA: The Perils of Wiretapping the Internet" 70 Wikipedia "United States Foreign Intelligence Surveillance Court" 71 The American's Civil Liberties Union. "Reform the Patriot Act | Section 215" 72 The Reid Report (blog). "FISA 702 or PATRIOT Act 215? Questions on the Guardian/Wapo Surveillance Scoops" (June 7, 2013) 73 Wikipedia "Subpoena" 74 idonthaveaname.blogspot ST09-002 document image. 75 DSLReports. "AT&T Repeatedly Helped FBI Break Communications Law. As the President Decides to Change Privacy Laws he Doesn't Like..." (January 22, 2010) 76 WIRED. "Federal Judge Finds National Security Letters Unconstitutional, Bans Them" (March 15, 2013) 77 Wikipedia "Stored Communications Act"

78

The Volokh Conspiracy. [Not a Conspiracy Webpage just poorly named...if anything it's pro-NSA] "The FISA Court Order Flap: Take a Deep Breath" (June 6, 2013) 79 The Guardian. "Edward Snowden's Live Q&A: Eight Things We Learned" (June 18, 2013) 80 [LEAKED] U.S Department of Justice. National Securiry Division. "Memorandum for the Attorney General [PDF]" (November 20, 2007) 81 FISA Section 702 [PDF] From ALCU. 82 Congressional Research Service (CRS). "Retroactive Immunity Provided by the FISA Amendments Act of 2008" [PDF] (July 25, 2008) 83 FBI Memo. [PDF] "National Security Law: How to get a FISA" (2003) 84 Emma Goldman "Anarchy and Other Essays" [PDF] (1907) 85 MediaMouse. "Scare the hell out of the American People: A Tribute to Author Vandenberg" (April, 2005) 86 Reddit. /u/Missedit22 - How to be proactive.

See also: The Power Principle II: Propaganda

You might also like