The Fact that Mass Surveillance Doesn’t Keep Us Safe Goes Mainstream

Top Terrorism Experts Say that Mass Spying Doesn’t Work to Prevent Terrorism

The fact that mass spying on Americans isn’t necessary to keep us safe is finally going mainstream.

The top counter-terrorism czar under Presidents Clinton and Bush – Richard Clarke – says:

The argument that this sweeping search must be kept secret from the terrorists is laughable. Terrorists already assume this sort of thing is being done. Only law-abiding American citizens were blissfully ignorant of what their government was doing.

***

If the government wanted a particular set of records, it could tell the Foreign Intelligence Surveillance Court why — and then be granted permission to access those records directly from specially maintained company servers. The telephone companies would not have to know what data were being accessed. There are no technical disadvantages to doing it that way, although it might be more expensive.

Would we, as a nation, be willing to pay a little more for a program designed this way, to avoid a situation in which the government keeps on its own computers a record of every time anyone picks up a telephone? That is a question that should have been openly asked and answered in Congress.

William Binney – the head of NSA’s digital communications program – says that he set up the NSA’s system so that all of the information would automatically be encrypted, so that the government had to obtain a search warrant based upon probably cause before a particular suspect’s communications could be decrypted. But the NSA now collects all data in an unencrypted form, so that no probable cause is needed to view any citizen’s information. He says that it is actually cheaper and easier to store the data in an encrypted format: so the government’s current system is being done for political – not practical – purposes.

Binney’s statements have been  confirmed by other high-level NSA whistleblowers, including Thomas Drake.

They’ve also been confirmed by Congressman Holt, the former Chairman of the House Select Intelligence Oversight Panel:

Former NSA executive Thomas Drake … and a team of NSA colleagues [Binney led Drake's team] had actually developed a relatively cheap, very effective and privacy-compliant way of getting the kind of terrorism-related data our government needed to fight groups like al-Qaida.

Unfortunately, his discovery angered NSA’s senior management….

Binney also says:

NSA whistleblower J. Kirk Wiebe has long said that such intrusions on Americans’ privacy were never necessary to protect national security.  NSA whistleblower Thomas Drake agrees. So does NSA whistleblower Russell Tice.

Israeli-American terrorism expert Barry Rubins points out:

What is most important to understand about the revelations of massive message interception by the U.S. government is this:

In counterterrorist terms, it is a farce. Basically the NSA, as one of my readers suggested, is the digital equivalent of the TSA strip-searching an 80 year-old Minnesota grandmothers rather than profiling and focusing on the likely terrorists.

***

And isn’t it absurd that the United States can’t … stop a would-be terrorist in the U.S. army who gives a power point presentation on why he is about to shoot people (Major Nadal Hassan), can’t follow up on Russian intelligence warnings about Chechen terrorist contacts (the Boston bombing), or a dozen similar incidents must now collect every telephone call in the country? A system in which a photo shop clerk has to stop an attack on Fort Dix by overcoming his fear of appearing “racist” to report a cell of terrorists or brave passengers must jump a would-be “underpants bomber” from Nigeria because his own father’s warning that he was a terrorist was insufficient?

And how about a country where terrorists and terrorist supporters visit the White House, hang out with the FBI, advise the U.S. government on counter-terrorist policy (even while, like CAIR) advising Muslims not to cooperate with law enforcement….

***

Or how about the time when the U.S. Consulate in Jerusalem had a (previously jailed) Hamas agent working in their motor pool with direct access to the vehicles and itineraries of all visiting US dignitaries and senior officials.

***

Suppose the U.S. ambassador to Libya warns that the American compound there may be attacked. No response. Then he tells the deputy chief of mission that he is under attack. No response. Then the U.S. military is not allowed to respond. Then the president goes to sleep without making a decision about doing anything because communications break down between the secretaries of defense and state and the president, who goes to sleep because he has a very important fund-raiser the next day. But don’t worry because three billion telephone calls by Americans are daily being intercepted and supposedly analyzed.

In other words, you have a massive counterterrorist project costing $1 trillion but when it comes down to it the thing repeatedly fails. In that case, to quote the former secretary of state, “”What difference does it make?”

If one looks at the great intelligence failures of the past, these two points quickly become obvious. Take for example the Japanese surprise attack on Pearl Harbor on December 7, 1941. U.S. naval intelligence had broken Japanese codes. They had the information needed to conclude the attack would take place. [Background.] Yet a focus on the key to the problem was not achieved. The important messages were not read and interpreted; the strategic mindset of the leadership was not in place.

***

And remember that the number of terrorists caught by the TSA hovers around the zero level. The shoe, underpants, and Times Square bombers weren’t even caught by security at all and many other such cases can be listed. In addition to this, the U.S.-Mexico border is practically open.

**

The war on al-Qaida has not really been won, since its continued campaigning is undeniable and it has even grown in Syria, partly thanks to U.S. policy.

***

So the problem of growing government spying is three-fold.

–First, it is against the American system and reduces liberty.

–Second, it is a misapplication of resources, in other words money is being spent and liberty sacrificed for no real gain.

–Third, since government decisionmaking and policy about international terrorism is very bad the threat is increasing.

Senators Wyden and Udall – both on the Senate Intelligence Committee, with access to all of the top-secret information about the government’s spying programs – write:

“We are quite familiar with the bulk email records collection program that operated under the USA Patriot Act and has now been confirmed by senior intelligence officials. We were very concerned about this program’s impact on Americans’ civil liberties and privacy rights, and we spent a significant portion of 2011 pressing intelligence officials to provide evidence of its effectiveness. They were unable to do so ….

***

In our judgment it is also important to note that intelligence agencies made statements to both Congress and the Court that significantly exaggerated this program’s effectiveness. This experience demonstrates to us that intelligence agencies’ assessments of the usefulness of particular collection programs – even significant ones – are not always accurate. This experience has also led us to be skeptical of claims about the value of the bulk phone records collection program in particular.

***

Assertions from intelligence agencies about the value and effectiveness of particular programs should not simply be accepted at face value by policymakers or oversight bodies any more than statements about the usefulness of other government programs should be taken at face value when they are made by other government officials. It is up to Congress, the courts and the public to ask the tough questions and press even experienced intelligence officials to back their assertions up with actual evidence, rather than simply deferring to these officials’ conclusions without challenging them.

NBC News reported 2 days ago:

“I’ve never liked the idea of security vs. privacy, because no one feels more secure in a surveillance state,” said Bruce Schneier, security expert and author of Beyond Fear: Thinking Sensibly About Security in an Insecure World. “There’s plenty of examples of security that doesn’t infringe on privacy. They are all around. Door locks. Fences … Firewalls. People are forgetting that quite a lot of security doesn’t affect privacy. The real dichotomy is liberty vs. control.”

Dan Solove, a privacy law expert at George Washington University Law School, said the privacy vs. security framing has interfered with what could be a healthy national debate about using high-tech tools to fight terror.

“You have pollsters and pundits and (National Intelligence Director James) Clapper saying, ‘Do you want us to catch the terrorists or do you want privacy?’ But that’s a false choice. It’s like asking, ‘Do you want the police to exist or not?’” he said. “We already have the most invasive investigative techniques permissible with the right oversight. With probable cause you can search my home. … People want limitations and transparency, so they can make a choice about how much surveillance (they) are willing to tolerate.”

By creating an either/or tension between privacy and security, government officials have invented a heavy weapon to wield against those who raise civil liberties concerns, he said. It’s easy to cast the choice in stark terms: Who wouldn’t trade a little personal data to save even one American life?

An honest, open examination of surveillance programs might show the choice is not so simple, says Ashkan Soltani, an independent security researcher.

“The government feels like they need all this information in order to do its job, that there can’t be security without them having access to everything. Well, that’s a lazy or shortsighted way of seeing things,” he says. “The idea I reject is that you need to violate everyone’s privacy rather than be better at your job of identifying specific (targets).’”

An article on Bloomberg notes that real terrorists don’t even use the normal phone service or publicly-visible portions of the web that we innocent Americans use:

The debate over the U.S. government’s monitoring of digital communications suggests that Americans are willing to allow it as long as it is genuinely targeted at terrorists. What they fail to realize is that the surveillance systems are best suited for gathering information on law-abiding citizens.

***

The infrastructure set up by the National Security Agency, however, may only be good for gathering information on the stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on access to the servers of America’s largest Internet companies, which support such popular services as Skype, Gmail and iCloud. These are not the services that truly dangerous elements typically use.

In a January 2012 report titled “Jihadism on the Web: A Breeding Ground for Jihad in the Modern Age,” the Dutch General Intelligence and Security Service drew a convincing picture of an Islamist Web underground centered around “core forums.” These websites are part of the Deep Web, or Undernet, the multitude of online resources not indexed by commonly used search engines.

The Netherlands’ security service, which couldn’t find recent data on the size of the Undernet, cited a 2003 study from the University of California at Berkeley as the “latest available scientific assessment.” The study found that just 0.2 percent of the Internet could be searched. The rest remained inscrutable and has probably grown since. In 2010, Google Inc. said it had indexed just 0.004 percent of the information on the Internet.

Websites aimed at attracting traffic do their best to get noticed, paying to tailor their content to the real or perceived requirements of search engines such as Google. Terrorists have no such ambitions. They prefer to lurk in the dark recesses of the Undernet.

“People who radicalise under the influence of jihadist websites often go through a number of stages,” the Dutch report said. “Their virtual activities increasingly shift to the invisible Web, their security awareness increases and their activities become more conspiratorial.”

***

Communication on the core forums is often encrypted. In 2012, a French court found nuclear physicist Adlene Hicheur guilty of, among other things, conspiring to commit an act of terror for distributing and using software called Asrar al-Mujahideen, or Mujahideen Secrets. The program employed various cutting-edge encryption methods, including variable stealth ciphers and RSA 2,048-bit keys.

***

Even complete access to these servers brings U.S. authorities no closer to the core forums. These must be infiltrated by more traditional intelligence means, such as using agents posing as jihadists or by informants within terrorist organizations.

Similarly, monitoring phone calls is hardly the way to catch terrorists. They’re generally not dumb enough to use Verizon.

***

At best, the recent revelations concerning Prism and telephone surveillance might deter potential recruits to terrorist causes from using the most visible parts of the Internet. Beyond that, the government’s efforts are much more dangerous to civil liberties than they are to al-Qaeda and other organizations like it.

(And see this and this.)

Mass Spying Actually HURTS – Rather than Helps – Anti-Terror Efforts

Not yet convinced?

Former NSA executive William Binney – who was the head of the NSA’s entire digital spying program – told Daily Caller that the spying dragnet being carried out by the government is less than useless:

Daily Caller: So it seems logical to ask: Why do we need all of this new data collection when they’re not following up obvious leads, such as an intelligence agency calling and saying you need to be aware of this particular terrorist?

Binney: It’s sensible to ask, but that’s exactly what they’re doing. They’re making themselves dysfunctional by collecting all of this data. They’ve got so much collection capability but they can’t do everything.

***

[All this data gathered is] putting an extra burden on all of their analysts. It’s not something that’s going to help them; it’s something that’s burdensome. There are ways to do the analysis properly, but they don’t really want the solution because if they got it, they wouldn’t be able to keep demanding the money to solve it. I call it their business statement, “Keep the problems going so the money keeps flowing.” It’s all about contracts and money.

***

The issue is, can you figure out what’s important in it? And figure out the intentions and capabilities of the people you’re monitoring? And they are in no way prepared to do that, because that takes analysis. That’s what the big data initiative was all about out of the White House last year. It was to try to get algorithms and figure out what’s important and tell the people what’s important so that they can find things. The probability of them finding what’s really there is low.

Indeed, even before 9/11 – when Binney was building the precursor to the NSA’s current digital collection system – there weren’t enough analysts to look through the more modest amount of data being collected at the time:

The danger of the mass collection of data by the NSA is that it “buries” analysts in data, said Binney, who developed a surveillance program called ThinThread intended to allow the NSA to look at data but not collect it. The NSA dumped that program in favor of more extensive data collection.

“The biggest problem was getting data to a manageable level,” he said. “We didn’t have enough people, we couldn’t hire enough people east of the Mississippi to manage all the data we were getting.”

The NSA chief and NSA technicians confirmed Binney’s statement 3 months before 9/11:

In an interview, Air Force Lt. Gen. Michael Hayden, the NSA’s director … suggested that access isn’t the problem. Rather, he said, the sheer volume and variety of today’s communications means “there’s simply too much out there, and it’s too hard to understand.”

***

“What we got was a blast of digital bits, like a fire hydrant spraying you in the face,” says one former NSA technician with knowledge of the project. “It was the classic needle-in-the-haystack pursuit, except here the haystack starts out huge and grows by the second,” the former technician says. NSA’s computers simply weren’t equipped to sort through so much data flying at them so fast.

Terrorism expert Barry Rubins writes:

There is a fallacy behind the current intelligence strategy of the United States, the collection of massive amounts of phone calls, emails, and even credit card expenditures, up to 3 billion phone calls a day alone, not to mention the government spying on the mass media. It is this:

The more quantity of intelligence, the better it is for preventing terrorism.

In the real, practical world this is—though it might seem counterintuitive—untrue. You don’t need–to put it in an exaggerated way–an atomic bomb against a flea. The intelligence budget is not unlimited, is it? Where should hiring priorities be put?

***

It is not the quantity of material that counts but the need to locate and correctly understand the most vital material. This requires your security forces to understand the ideological, psychological, and organizational nature of the threat.

***

If the U.S. government can’t even figure out what the Muslim Brotherhood is like or the dangers of supporting Islamists to take over Syria, or the fact that the Turkish regime is an American enemy, or can’t even teach military officers who the enemy is, what’s it going to do with scores of billions of telephone call traffic to overcome terrorism? It isn’t even using the intelligence material it already has!

If, however, the material is almost limitless, that actually weakens a focus on the most needed intelligence regarding the most likely terrorist threats. Imagine, for example, going through billions of telephone calls even with high-speed computers rather than, say, following up a tip from Russian intelligence on a young Chechen man in Boston who is in contact with terrorists or, for instance, the communications between a Yemeni al-Qaida leader and a U.S. army major who is assigned as a psychiatrist to Fort Hood.

That is why the old system of getting warrants, focusing on individual email addresses, or sites, or telephones makes sense, at least if it is only used properly. Then those people who are communicating with known terrorists can be traced further. There are no technological magic spells. If analysts are incompetent … and leaders unwilling to take proper action, who cares how much data was collected?

***

Decision-makers and intelligence analysts only have so many hours in the day. There can only be so many meetings; only so many priorities. And the policymaking pyramid narrows rapidly toward the top. There is a point of diminishing returns for the size of an intelligence bureaucracy. Lower-priority tasks proliferate; too much paper is generated and meetings are held; the system clogs when it has too much data.

PC World reports:

“In knowing a lot about a lot of different people [the data collection] is great for that,” said Mike German, a former Federal Bureau of Investigation special agent whose policy counsel for national security at the American Civil Liberties Union. “In actually finding the very few bad actors that are out there, not so good.”

The mass collection of data from innocent people “won’t tell you how guilty people act,” German added. The problem with catching terrorism suspects has never been the inability to collect information, but to analyze the “oceans” of information collected, he said.

Mass data collection is “like trying to look for needles by building bigger haystacks,” added Wendy Grossman, a freelance technology writer who helped organize the conference.

New Republic notes:

This kind of dragnet-style data capture simply doesn’t keep us safe.

First, intelligence and law enforcement agencies are increasingly drowning in data; the more that comes in, the harder it is to stay afloat. Most recently, the failure of the intelligence community to intercept the 2009 “underwear bomber” was blamed in large part on a surfeit of information: according to an official White House review, a significant amount of critical information was “embedded in a large volume of other data.” Similarly, the independent investigation of the alleged shootings by U.S. Army Major Nidal Hasan at Fort Hood concluded that the “crushing volume” of information was one of the factors that hampered the FBI’s analysis before the attack.

Multiple security officials have echoed this assessment. As one veteran CIA agent told The Washington Post in 2010, “The problem is that the system is clogged with information. Most of it isn’t of interest, but people are afraid not to put it in.” A former Department of Homeland Security official told a Senate subcommittee that there was “a lot of data clogging the system with no value.” Even former Defense Secretary Robert Gates acknowledged that “we’ve built tremendous capability, but do we have more than we need?” And the NSA itself was brought to a grinding halt before 9/11 by the “torrent of data” pouring into the system, leaving the agency “brain-dead” for half a week and “[unable] to process information,” as its then-director Gen. Michael Hayden publicly acknowledged.

National security hawks say there’s a simple answer to this glut: data mining. The NSA has apparently described its computer systems as having the ability to “manipulate and analyze huge volumes of data at mind-boggling speeds.” Could those systems pore through this information trove to come up with unassailable patterns of terrorist activity? The Department of Defense and security experts have concluded that the answer is no: There is simply no known way to effectively anticipate terrorist threats.

***

The FBI’s and NSA’s scheme is an affront to democratic values. Let’s also not pretend it’s an effective and efficient way of keeping us safe.

Fortune writes that the NSA’s “big data” strategy is ineffective:

The evidence for big data is scant at best. To date, large fields of data have generated meaningful insights at times, but not on the scale many have promised. This disappointment has been documented in the Wall Street Journal, Information Week, and SmartData Collective.

***

According to my firm’s research, local farmers in India with tiny fields frequently outperform — in productivity and sustainability — a predictive global model developed by one of the world’s leading agrochemical companies. Why? Because they develop unique planting, fertilizing, or harvesting practices linked to the uniqueness of their soil, their weather pattern, or the rare utilization of some compost. There is more to learn from a local Indian outlier than from building a giant multivariate yield prediction model of all farms in the world. The same is true for terrorism. Don’t look for a needle in a giant haystack. Find one needle in a small clump of hay and see whether similar clumps of hay also contain needles.

You need local knowledge to glean insights from any data. I once ran a data-mining project with Wal-Mart (WMT) where we tried to figure out sales patterns in New England. One of the questions was, “Why are our gun sales lower in Massachusetts than in other states, even accounting for the liberal bias of the state?” The answer: There were city ordinances prohibiting the sale of guns in many towns. I still remember the disappointed look of my client when he realized the answer had come from a few phone calls to store managers rather than from a multivariate regression model.

So, please, Mr. President, stop building your giant database in the sky and quit hoping that algorithm experts will generate a terrorist prevention strategy from that data. Instead, rely on your people in the field to detect suspicious local patterns of behavior, communication, or spending, then aggregate data for the folks involved and let your data hounds loose on these focused samples. You and I will both sleep better. And I won’t have to worry about who is lurking in the shadows of my business or bedroom.

Security expert Bruce Schneier explained in 2005:

Many believe data mining is the crystal ball that will enable us to uncover future terrorist plots. But even in the most wildly optimistic projections, data mining isn’t tenable for that purpose. We’re not trading privacy for security; we’re giving up privacy and getting no security in return.

***

The promise of data mining is compelling, and convinces many. But it’s wrong. We’re not going to find terrorist plots through systems like this, and we’re going to waste valuable resources chasing down false alarms.

***

Data-mining systems won’t uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless.

All data-mining systems fail in two different ways: false positives and false negatives.

***

Data mining for terrorist plots will be sloppy, and it’ll be hard to find anything useful.

***

When it comes to terrorism, however, trillions of connections exist between people and events — things that the data-mining system will have to “look at” — and very few plots. This rarity makes even accurate identification systems useless.

Let’s look at some numbers. We’ll be optimistic — we’ll assume the system has a one in 100 false-positive rate (99 percent accurate), and a one in 1,000 false-negative rate (99.9 percent accurate). Assume 1 trillion possible indicators to sift through: that’s about 10 events — e-mails, phone calls, purchases, web destinations, whatever — per person in the United States per day. Also assume that 10 of them are actually terrorists plotting.

This unrealistically accurate system will generate 1 billion false alarms for every real terrorist plot it uncovers. Every day of every year, the police will have to investigate 27 million potential plots in order to find the one real terrorist plot per month. Raise that false-positive accuracy to an absurd 99.9999 percent and you’re still chasing 2,750 false alarms per day — but that will inevitably raise your false negatives, and you’re going to miss some of those 10 real plots.

This isn’t anything new. In statistics, it’s called the “base rate fallacy,” and it applies in other domains as well. For example, even highly accurate medical tests are useless as diagnostic tools if the incidence of the disease is rare in the general population. Terrorist attacks are also rare, any “test” is going to result in an endless stream of false alarms.

This is exactly the sort of thing we saw with the NSA’s eavesdropping program: the New York Times reported that the computers spat out thousands of tips per month. Every one of them turned out to be a false alarm.

And the cost was enormous — not just for the FBI agents running around chasing dead-end leads instead of doing things that might actually make us safer, but also the cost in civil liberties.

***

Finding terrorism plots is not a problem that lends itself to data mining. It’s a needle-in-a-haystack problem, and throwing more hay on the pile doesn’t make that problem any easier. We’d be far better off putting people in charge of investigating potential plots and letting them direct the computers, instead of putting the computers in charge and letting them decide who should be investigated.

Schneier noted in 2008:

According to a massive report from the National Research Council, data mining for terrorists doesn’t work.

The former Chairman of the House Select Intelligence Oversight Panel, Rush Holt, says:

Over the last decade, multiple individuals in the executive branch — and a few in Congress, including me — have warned repeatedly about how the radical over-reach of these programs was undermining the very foundations of our republic, even as the mass collection activities were not making us any safer. And that is the most important point: If investigators are following the Fourth Amendment probable cause guidelines, they will do a better job. Undisciplined fishing expeditions have not made us safer.

NBC News reports:

Casting such wide nets is also ineffective, [security researcher Ashkan Soltani] argues. Collecting mountains and mountains of data simply means that when the time comes to find that proverbial needle in a haystack, you’ve simply created a bigger haystack.”Law enforcement is being sold bill of goods that the more data you get, the better your security is. We find that is not true,” Soltani said.

Collecting data is a hard habit to break, as many U.S. corporations have discovered after years of expensive data breaches. The NSA’s data hoard may be useful in future investigations, helping agents in the future in unpredictable ways, some argue. Schneier doesn’t buy it.

“The NSA has this fetish for data, and will get it any way they can, and get as much as they can,” he said. “But old ladies who hoard newspapers say the same thing, that someday, this might be useful.”

Even worse, an overreliance on Big Data surveillance will shift focus from other security techniques that are both less invasive and potentially more effective, like old-fashioned “spycraft,” Soltani says.

Nassim Taleb writes:

Big data may mean more information, but it also means more false information.

***

Because of excess data as compared to real signals, someone looking at history from the vantage point of a library will necessarily find many more spurious relationships than one who sees matters in the making; he will be duped by more epiphenomena. Even experiments can be marred with bias, especially when researchers hide failed attempts or formulate a hypothesis after the results — thus fitting the hypothesis to the experiment (though the bias is smaller there).

This is the tragedy of big data: The more variables, the more correlations that can show significance. Falsity also grows faster than information; it is nonlinear (convex) with respect to data (this convexity in fact resembles that of a financial option payoff). Noise is antifragile. Source: N.N. Taleb

(Here’s an example.)

If big data leads to more false correlations, then mass surveillance may lead to more false accusations of terrorism.

(Just what we need …)

This entry was posted in Politics / World News. Bookmark the permalink.
  • steven andresen

    Mr. Binney said, “…They’re making themselves dysfunctional by collecting all of this data. ” I think that they had a lot of data about hijacking planes and people being set up to attack buildings, and so on, before 9-11. One of the arguments that they used to say that 9-11 wasn’t allowed to happen, one of the options, was that there was so much information, the people in charge had no way to put together exactly what was happening. This went to justify a bigger expenditure for the dept. of Homeland security, so that they could sift the data better.

    Now we find out they have more data, and no better ability to put any of it together because of all the clutter.

    …it sounds like a cover story now, like it did then.

  • Tonto

    HUMAN NATURE seems to dictate that all this information has been and will continue to be the source of more untraceable insider information used for purposes that were never intended, personal gain and retribution, political and otherwise. Honestly, how many times do you think these NSA/CIA dweebs checked up on their significant other using these invasive snooping systems? The purposes to which this information can be used are boundless, and, completely untraceable.

    That’s the real scandal here. The idea that NSA has recruited personnel who are beyond reproach is absolutely laughable. This is the story of the Invisible Man writ large. The fly on the wall is literally some snot-nosed kid working for the NSA.

    Look really closely at the attached picture. These kids look about as worldly and mature as your typical newly hired postal employee. I wouldn’t trust one of them with five dollars to go to the store for me to buy me a pound of Swiss Cheese. They don’t look capable. In fact, I am willing to bet more than three-quarters of them have tattoos on their asses.

  • Synick46

    While it is useful to point out the fallacy of “surveillance-means-safety”, it misses the point. Regardless of potential criminal activities, the information being collected is very valuable to various politically-connected parties. Every business wants to track our purchases, movements, habits, etc., in order to design targeted marketing. It is an expensive process, so why not have the taxpayers foot the bill? The purpose of the NSA spy program is not to provide government with information, that’s just the cover story. It’s for corporations to get cheap access to as much info as they want. Look past the “evil government” as the the foundation of this evil. Government is the means, not the origin.

    • Howard Treesong

      “Every business wants to track our purchases, movements, habits, etc., in order to design targeted marketing.”

      I am not here for their purpose. I do not exist to please these people, nor will I ever.

    • Gene Therapy

      Marketing?

      “NSA whistleblower Russel Tice – a key source in the 2005 New York Times report…
      Okay. They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial. But they went after other ones, too. They went after lawyers and law firms. All kinds of–heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House–their own people. They went after antiwar groups. They went after U.S. international–U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that–like the Red Cross, people like that that go overseas and do humanitarian work. They went after a few antiwar civil rights groups. So, you know, don’t tell me that there’s no abuse, because I’ve had this stuff in my hand and looked at it. And in some cases, I literally was involved in the technology that was going after this stuff. And you know, when I said to [former MSNBC show host Keith] Olbermann, I said, my particular thing is high tech and you know, what’s going on is the other thing, which is the dragnet. The dragnet is what Mark Klein is talking about, the terrestrial dragnet. Well my specialty is outer space. I deal with satellites, and everything that goes in and out of space. I did my spying via space. So that’s how I found out about this.”

      http://www.washingtonsblog.com/2013/06/nsa-whistleblower-nsa-spying-on-and-blackmailing-high-level-government-officials-and-military-officers.html

  • Rich H

    The NSA exists as a means to funnel public money into private hands. Think Haliburtion times a billion.
    The only thing it will likely be used for is to quell political dissent.

  • Rehmat

    Both mass surveillance and ‘war on terror’ are imperialist rackets – and Israel has benefitted the most from them.

    On April 3, 2012, James Bamford exposed several shady firms with ties to Israel, such as Amdocs, Naru and Verint, which are providing wiretapping equipment and monitoring NSA spying operation.

    On June 10, 2013, Israeli daily Ha’aretz confirmed Bamford’s story, saying “the NSA’s PRISM surveillance program may lead to tougher standards for telecommunications gear like that developed, manufactured in Israel“.
    With Israeli Mossad, running its largest espionage network inside United States, Israelis have long been active in surveillance on anti-Israel Americans, especially country’s Muslim population.

    http://rehmat1.com/2013/06/20/nsa-spying-scandal-and-israel/

  • Joe Average

    “In other words, you have a massive counterterrorist project costing $1 trillion but when it comes down to it the thing repeatedly fails. In that case, to quote the former secretary of state, “”What difference does it make?””

    The assumptions about motive are obviously wrong. When will the issue of real motive come out, if it is so obvious to so many experts that such data mining is not being used to intercept so-called “terrorists”, then what IS it being used for exactly?

    Fortunately, there is no need to speculate about this question. It was already answered.
    So when will the mainstream media put the pieces together?
    It will not. Because your boss will not allow it. Because corporations are dictatorships, and the boss all the way at the top, is the guy who is seeing to it the NSA continues to do what it is doing.

    “NSA whistleblower Russel Tice – a key source in the 2005 New York Times report…
    Okay. They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial. But they went after other ones, too. They went after lawyers and law firms. All kinds of–heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House–their own people. They went after antiwar groups. They went after U.S. international–U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that–like the Red Cross, people like that that go overseas and do humanitarian work. They went after a few antiwar civil rights groups. So, you know, don’t tell me that there’s no abuse, because I’ve had this stuff in my hand and looked at it. And in some cases, I literally was involved in the technology that was going after this stuff. And you know, when I said to [former MSNBC show host Keith] Olbermann, I said, my particular thing is high tech and you know, what’s going on is the other thing, which is the dragnet. The dragnet is what Mark Klein is talking about, the terrestrial dragnet. Well my specialty is outer space. I deal with satellites, and everything that goes in and out of space. I did my spying via space. So that’s how I found out about this.”

    http://www.washingtonsblog.com/2013/06/nsa-whistleblower-nsa-spying-on-and-blackmailing-high-level-government-officials-and-military-officers.html

  • Daniel Lambert

    Richard Clark says, “There are no technical disadvantages to doing it that way (the right way), although it might be more expensive.”

    I strongly disagree. I believe it would be a lot less expensive than going through trillions of megabytes of data rather than focusing on real threats. It’s been a total waste of money with a great amount of unnecessary evasion of privacy that can ultimately be misused and abused. The latter of which has already been happening.

  • RationGeezer

    It might help if a high-ranking intelligence official [Brenner] were not a Muslim, and if the President of the US were not a Muslim traitor. Is it any wonder why this is so screwed up? Simply because the Muslim traitor is also black (OK, half black) and those who vote for him and his traitor minions are so stupid and/or greedy that they cannot see that they will bring the entire enterprise down on all of our heads? Is it any wonder?

  • GrumpyOne

    “And isn’t it absurd that the United States can’t … stop a
    would-be terrorist in the U.S. army who gives a power point presentation
    on why he is about to shoot people (Major Nadal Hassan)…”

    But, but, but.. That wasn’t terrorism according to our Justice Department but rather “workplace violence.” So that is not an issue here, right?

    The author needs to sift out what is and what is not and reconcile the differences…

  • Timothy Rea

    “Keeping us safe” is not the goal of mass surveillance.

  • Silverado

    So basically, while all the roads. bridges and other infrastructure around the country crumbles because they say there’s no money for that, yet they’re spending billions on this pseudo security program that’s anti-Constitutional, ineffective, costly and destroys freedom & liberty??

    I’m telling you – it’s past time to take the printing press that facilitates all this illegal behavior & govt adventurism away from these criminals. When their easy access to easy cash ends so will all this atrocious behavior from Washington DC. End the paper dollar scam and end this too, all in one fell swoop.

  • citizenrights

    What needs to done is to make it a required subject in high schools across the country to learn in the Use of fire arms for all students and curriculum involving and identifying any domestic violence against the nation and communities. Arm all United States American Citizens with training in the handling of arms and some training in first aid. There could be a requirement that you must take a course in the handling of the fire arm the person has preference for. In order to carry it in any capacity Nationally. This would do more for the defense of the nation than any thing the government could ever accomplish.

  • watchman48

    There is no way that the NSA, Pres. Obama nor all of America’s Armed Forces can protect us when they allow the terrorist to enter our nation with virtually no resistance.

    God has given America His warnings since the late ’80s in the hope that the people would turn their hearts back to God….. BUT, I guess the people love their sins more than they love their lives…
    The curse on Sodom and Gomorrah stands for all eternity… and any person, city, state, or nation who follows their path of depravity will follow in their destiny. He who is the Glory of Israel does not lie or change his mind; for he is not a human being, that he should change his mind.” 1 Samuel 15:29

    God’s Wrath Against Sinful Humanity
    Romans 1:18-32 The wrath of God is being revealed from heaven against all the godlessness and wickedness of people, who suppress the truth by their wickedness, since what may be known about God is plain to them, because God has made it plain to them. For since the creation of the world God’s invisible qualities—his eternal power and divine nature—have been clearly seen, being understood from what has been made, so that people are without excuse.
    For although they knew God, they neither glorified him as God nor gave thanks to him, but their thinking became futile and their foolish hearts were darkened. Although they claimed to be wise, they became fools and exchanged the glory of the immortal God for images made to look like a mortal human being and birds and animals and reptiles.
    Therefore God gave them over in the sinful desires of their hearts to sexual impurity for the degrading of their bodies with one another. They exchanged the truth about God for a lie, and worshiped and served created things rather than the Creator—who is forever praised. Amen.
    Because of this, God gave them over to shameful lusts. Even their women exchanged natural sexual relations for unnatural ones. In the same way the men also abandoned natural relations with women and were inflamed with lust for one another. Men committed shameful acts with other men, and received in themselves the due penalty for their error.
    Furthermore, just as they did not think it worthwhile to retain the knowledge of God, so God gave them over to a depraved mind, so that they do what ought not to be done. They have become filled with every kind of wickedness, evil, greed and depravity. They are full of envy, murder, strife, deceit and malice. They are gossips, slanderers, God-haters, insolent, arrogant and boastful; they invent ways of doing evil; they disobey their parents; they have no understanding, no fidelity, no love, no mercy. Although they know God’s righteous decree that those who do such things deserve death, they not only continue to do these very things but also approve of those who practice them.
    To read God’s judgment for America, Google: “The Message For America, Hand of Help Ministries.” To read how I was led to this, Google: ” Watchman On The Wall, America ~ Mystery Babylon? ” To read the message of the 2nd major terrorist attack, Google; “The Eagle and the Serpents, Hand of Help Ministries.” And for where I believe the location of the 2nd attack will be, Google: “Watchman On The Wall, The Eagle and the Serpents (Part 2).”
    America’ days have been numbered and no man can save a cursed America… The only hope we have is with Jesus Christ and no other, no false gods such as Allah nor Buda can save anyone.

  • Robinson Caruso II

    Like the article states, and we are seeing happen, its being used politically, and many of us feel darkly, collecting info on anyone who aposes their ideas, then destroy them by medical, or finacial means. Rotten to the core.

  • Mary

    This surveillance set up is for one thing only, and that is to spy on Americans. Obama wants to know who is for and who is against him. Conservative and Christian groups are already targeted. We are the people that they are going after. The gov. even has us listed as potential terrorists. Who does Obama have in the WH but actual terrorists advising him and in the State Dept. etc. he is not concerned about Islamic terrorism. He is worried about us. He is making our Country a Police State and he is a tyrant.as for the monitoring that’s going on, Mosques are exempt. What does that tell you?

  • JB Smith

    The city of Newport News has installed laser yagi-uda antennas. This enables ubuquitous surveillance through your “wifi” electric meter. They can see into your home with holographics. Check out popsci.com seeing through walls with a wireless router. check out networkworld.com stealing computer strokes with a cheap laser. The brain initiative is the great deception. It is the deployment of implanting microchips on innocent citizens to imprint their brains. Check out Safeguards in a world of ambient intelligence by springer. Read page 9 Law enforcement would have you believe that you cannot be safe unless they know where you are every minute, what you are doing and …what you are “THINKING”. This book costs $200 – it is a law and technology book written by Phd’s explaining the use of ambient intelligence. If you go to digital barriers.com you can check out the latest. They have the ability to make your car keys. They have broken into my home numerous times and destroyed 9 laptops. In addition, they steal anything they want. it’s grand larceny. The commonwealth’s attorney is complicit. I saw the state police and the Hampton police exiting my home and provided the CA her license plate number 8675US. All state police plates end in US or they have a blue stripe on the back. Where do you go for help from all the torture and pain I am in 24/7. They are evil.

 

 

Twitter