Big Brother in the Whitehouse

1 10 2014

New docs show how Reagan-era executive order unbounded NSA
Newly declassified info sheds light on EO 12333 and the feds’ obscuring tactics.

By Cyrus Farivar

A set of newly declassified documents shows definitively and explicitly that the United States intelligence community relies heavily on what is effectively unchecked presidential authority to conduct surveillance operations, as manifested through the Reagan-era Executive Order (EO) 12333.

And at a more basic level, the new documents illustrate that the government is adept at creating obscure legalistic definitions of plain language words, like “collection of information,” which help obfuscate the public’s understanding of the scope and scale of such a dragnet. . . .

http://arstechnica.com/tech-policy/2014/09/new-docs-show-how-reagan-era-executive-order-unbounded-nsa/

Executive Order 12333–United States intelligence activities

Some nuggets:

The spies get to police themselves –

1.2 The National Security Council. (a) Purpose. The National Security Council (NSC) was established by the National Security Act of 1947 to advise the President with respect to the integration of domestic, foreign and military policies relating to the national security. The NSC shall act as the highest Executive Branch entity that provides review of, guidance for and direction to the conduct of all national foreign intelligence, counterintelligence, and special activities, and attendant policies and programs.
(b) Committees. The NSC shall establish such committees as may be necessary to carry out its functions and responsibilities under this Order. The NSC, or a committee established by it, shall consider and submit to the President a policy recommendation, including all dissents, on each special activity and shall review proposals for other sensitive intelligence operations.

CIA embedded in your police dept. –

2.6 Assistance to Law Enforcement Authorities. Agencies within the Intelligence Community are authorized to:
(a) Cooperate with appropriate law enforcement agencies for the purpose of protecting the employees, information, property and facilities of any agency within the Intelligence Community….

Josef Mengele –

2.10 Human Experimentation. No agency within the Intelligence Community shall sponsor, contract for or conduct research on human subjects except in accordance with guidelines issued by the Department of Health and Human Services. The subject’s informed consent shall be documented as required by those guidelines.

 





NSA Screwing Up the Web

13 04 2014

NSA reportedly exploited Heartbleed bug for years: Should you be worried?

The Heartbleed bug, which shocked the Internet and web security community earlier this week, has allegedly been a tool used by the National Security Agency (NSA) as an exploit for the past two years. Apparently, the bug was kept under secrecy by the NSA for the purpose of national security, according to an anonymous source who spoke with Bloomberg. . .

 





Snowden Has More Info to Reveal

20 03 2014

Snowden Makes Unscheduled Appearance At TED: “The Biggest Revelations Are Yet To Come”

Before It’s News Edward Snowden, the NSA whistleblower who stole thousands of classified documents before leaving the United States recently made an unexpected and unscheduled appearance at a TED conference in Vancouver, Canada on Tuesday night . . . . (more)

LINK – http://youtu.be/yVwAodrjZMY





Your iPhone Spies on You for NSA

31 12 2013

iPhone is an NSA spyPhone

Leaked documents detail 2008 NSA program to hack and remote control iPhones (video)

“. . . . the documents dated to 2008, around the introduction of the iPhone, Appelbaum quoted the NSA QUANTUMTHEORY “toolbox” which claimed a 100 percent success rate at implanting this spyware.”

LINK –  http://youtu.be/b0w36GAyZIA





Boeing Jumps Into Spy Biz Feet First

17 12 2013

Just had this item sent in –

“Boeing has purchased this small company near DC. They are retrofitting Beechcraft planes with spy cameras. Boeing signed a contract with Beechcraft that the planes will not be used for domestic spying. But when Boeing sells the planes to the US military, it won’t have the same contract. So, NSA and DHS are expanding their spying tactics even further.”

U.S. Army conducts first flight of Boeing-Beechcraft reconnaissance plane – has PHOTO

Boeing Press Releases





Anti-Keystone activists measures

11 12 2013

WikiLeaks reveals energy giants’ strategies to suppress anti-Keystone activists

A recent WikiLeaks disclosure reveals a fourfold strategy for countering anti-Keystone XL pipeline activists. Environmental groups are concerned about a 2010 document recently released by WikiLeaks. The issued document laid out energy companies’ strategies for dealing with those who oppose the oil sands pipeline from western Canada to the Gulf of Mexico.

http://voiceofrussia.com/news/2013_12_11/WikiLeaks-reveals-energy-giants-strategies-to-suppress-anti-Keystone-activists-6460/

This is the document





NSA is going Willy-Nilly everywhere (contrary to Obama speech)

21 08 2013

Wall St. Journal – New Details Show Broader NSA Surveillance Reach

Programs Cover 75% of Nation’s Traffic, Can Snare Emails

By SIOBHAN GORMAN and JENNIFER VALENTINO-DEVRIES
WASHINGTON—The National Security Agency—which possesses only limited legal authority to spy on U.S. citizens—has built a surveillance network that covers more Americans’ Internet communications than officials have publicly disclosed, current and former officials say.

The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

The NSA’s filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system’s broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones. . . . (more)

http://online.wsj.com/article/SB10001424127887324108204579022874091732470.html