Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Best Short Video On State Of US/NSA Electronic Spying on Citizens!
#1
Here is the video.....take notes...as a lot of important things you will want to note down are said! [on best programs and practices to avoid being spied upon!] I'll post the transcript shortly!
http://www.democracynow.org/2012/4/23/mo...rveillance
Hitler
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#2
AMY GOODMAN: We turn to part two of Democracy Now!'s whistleblowerwilliam">national broadcast exclusive on the growing domestic surveillance state and the Department of Homeland Security's efforts to spy on dissident journalists, whistleblowers and activists.
We play more of our interview with National Security Agency whistleblower William Binney. He was a key source for James Bamford's recent exposé in Wired Magazine about the NSA, how the National Security Agency is quietly building the largest spy center in the country in Bluffdale, Utah. Binney served in the NSA for close to 40 years, including a time as technical director of the NSA's World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned the agency's data-mining program has become so vast it could, quote, "create an Orwellian state." In 2007, the FBI raided Binney's house. An agent put a gun to his head. His appearance on Democracy Now! on Friday marked the first time Binney spoke on national television about surveillance by the National Security Agency. He revealed the agency collected vast amounts of data on communications between U.S. citizens.
Juan González and I also interviewed two people who have been frequent targets of government surveillance. Laura Poitras is the Oscar-nominated filmmaker, and Jacob Appelbaum, a computer security researcher who has volunteered with WikiLeaks. Poitras is the director of documentary films, My Country, My Country, about Iraq, and The Oath, about Guantánamo and Yemen. Both Poitras and Appelbaum have been repeatedly detained and interrogated by federal agents when entering the United States. Their laptops, cameras, cell phones have been seized. Presumably, their data has been copied. The Justice Department has also targeted Appelbaum's online communications.
I started by asking Jacob Appelbaum about his work and how being targeted for surveillance has impacted him.
JACOB APPELBAUM: I work for a nonprofit, and I work for
AMY GOODMAN: Explain the nonprofit.
JACOB APPELBAUM: The nonprofit is the Tor Project, TorProject.org. It's a nonprofit dedicated to creating an anonymity network and the software that powers it. It's free software for freedom, so that everybody has the right to read and to speak freely. No logins, no payment, nothing. It's run by volunteers. And I also work at the University of Washington, which technically is a government institution, as a staff research scientist in the Security and Privacy Research Lab.
And how has it changed my work? Well, like Laura, I don't have important conversations in the United States anymore. I don't have conversations in bed with my partner anymore. I don't trust any of my computers for anything at all. And in a sense, one thing that it has done is push me away from the work that I've done around the world trying to help pro-democracy activists starting an Arab Spring, for example, because I present a threat, in some cases, to those people. And I have a duty as a human being, essentially, to not create a threat for people. And so, in a sense, the state targeting me makes me less effective in the things they even, in some cases, fund the Tor Project to do, which is to help people to be anonymous online and to fight against censorship and surveillance.
JUAN GONZÁLEZ: I'd like to ask, William Binney, the impact of having devoted your entire working life to an agencythat is, to protecting the national security of the United Statesto have that very agency then attempt to turn you into a criminal and to view you as a criminal, the emotional toll on you and your family of what's happened the last few years?
WILLIAM BINNEY: Well, I guess, first of all, it was a very depressing thing to have happen, that they would turn theirthe capabilities that I built for them to do foreigndetection of foreign threats, to have that turned on the people of the United States. That was an extremely depressing thing for me to see happen internally in NSA, that was chartered for foreign intelligence, not domestic intelligence.
And I guess that simply made it more important for me to try to do things to get the government, first of all, to correct its own criminal activity, and I did that by going to the House Intelligence Committees. I also attempted to see Chief Justice Rehnquist to try to address that issue to him, and I also visited the Department of Justice Inspector General's Officeafter Obama came into office, by the way, to no avail. I mean, that was before the 2009 joint IG report on surveillance.
AMY GOODMAN: Which said?
WILLIAM BINNEY: Basically it just said you need to have better and more active monitoring of these surveillance programs. It didn't say anything else. So that just simply did absolutely nothing, because the oversight that's given to the intelligence community is virtually nonexistent from Congress. I mean, allthey are totally dependent, because they have no way of really knowing what's happening inside the agencies that are involved. Unless they had people who would come forward and tell themlike me, for examplethey would not know those things.
AMY GOODMAN: Bill Binney, can you compare today's surveillance to John Poindexter's Total Information Awareness, who was head of DARPAand you can explain what that military agency wasthe outcry then, forcing ultimately the Bush administration to say, "It is shut down. We're ending Total Information Awareness"?
WILLIAM BINNEY: Well, here's how I viewed Poindexter's efforts. He was actually pushed out as a test, to test the waters in Congress to see how they would be receptive to something they were already doing. In other words, that process of building that information about everybody getting total information was already happening. And they threw Poindexter out with DARPA, which is the basean advanced research group. They fund advanced research programs, and that was one of the things they were saying they were doing, but it was actually already happening. And the question was, would it be acceptable to Congress, because they were keeping it very closely held in Congress under thecalling it a covert program. So, that makes itthat would make it a process to find out what the reaction would be, if they exposed to Congress what they were already doing.
JUAN GONZÁLEZ: But the NSA is such a huge agency, and there are so many career people in that agency. Your concerns cannot be yours alone. There must be many within the agency who are deeply troubled by what's going on.
WILLIAM BINNEY: Oh, yeah, I'm sure there are. I mean, I know a number of them that are. But they're stillthey're so afraid to do anything. I mean, they've seen what happened to us. They sent the FBI to us. So they're afraid of being indicted, prosecuted. And even if you win the case, if you're indicted, you still lose, because you've had to hire a lawyer and all, like Tom did and we did.
AMY GOODMAN: Tom Drake.
WILLIAM BINNEY: Right, Tom Drake. And so, you lose any way you speak of it. When they have unlimited funds to do whatever they want and you don't, they can indict you on any number of things, like they tried to do with us.
AMY GOODMAN: They didn't indict you, though.
WILLIAM BINNEY: They drafted an indictment, but they didn'tthey didn't actually do it, because I found evidence of malicious prosecution. And they dropped it.
AMY GOODMAN: How?
WILLIAM BINNEY: Well, the indictment was drawn up against all of us who were on the IG report, and also Tom Drake, because we all met, plus some others, at the Turf Valley Club, and they had all our emails and all of our data to show that we were doing that. Plus they had the view graphs that we prepared there. And their whole objective there was, how could we incorporate to attack Medicare/Medicaid fraud? And so, what we were doing was preparing a joint teaming paper that would be a kind of a incorporation papers. They called that the "conspiracy paper." They called it a conspiracy, and we were conspiring to do something. But they didn'tthey thought they had all the exculpatory evidence, and they didn't, because there were two other people there that weren'tthat had never had a clearance, and they were going to participate in this, in this development, so they had all the data, too.
And when I found out, because they told our lawyer that they were preparing to indict us on that as a conspiracy, why, I went through and pulled all the data together. And since Tom had been indicted at that time, and I knew his phone was tapped, so Iby the FBII decided I would give him a call and tell him what all the evidence is of malicious prosecution, so that I was speaking to the FBI people, and they would pass the information along to the DOJ, that would say, "Hey, we know this is malicious prosecution. You had the emails that listed the agenda, what we were going to discuss at the Turf Valley Club. You also had all of the slides that we prepared at the Turf Valley Club. And, oh, by the way, if you need to find out when they were prepared, you go in to click on the file, go down to properties, look in the properties and see the date and time that the file was created, and that's when we were at the Turf Valley Club. So it was direct evidence of what we were doing there. Plus there were two other people that were there that they didn't have a grudge against, so they weren't targeting, and they never talked to them at all about what the meeting was about." So I said, "This is all evidence of malicious prosecution. And you need, Tom, to tell your lawyer about this," because I was telling the FBI that we're going to notify all our lawyers what you're doing. So, and after that phone call, we never heard about the Turf Valley Club again. That was dead.
AMY GOODMAN: Tom Drake then, though, faced espionage charges.
WILLIAM BINNEY: They createdyeah, they created other charges.
AMY GOODMAN: They said he had aided the enemy, etc. Ultimately, the case went away.
WILLIAM BINNEY: Those were all fabricated charges, yeah.
AMY GOODMAN: William Binney, federal aviation regulators have acknowledged dozens of universities and law enforcement agencies have been given approval to use drones inside the United States. The list includes Department of Homeland Security, Customs and Border Protection, various branches of military, defense contractor Raytheon, drone manufacturer General Atomics, as well as numerous universities, Police departments with drone permits include North Little Rock, Arkansas; Arlington, Texas; Seattle, Washington; Gadsden, Alabama; and Ogden, Utah.
WILLIAM BINNEY: Well, that's simply another step in the assembly of information. This is the visual part of the electronic information they're collecting about people. So here's your visual part. I mean, you could collect on phonethe cell phones as you move around, and then you can watch them now with a drone.
AMY GOODMAN: And it's not just the NSA who can gather phone information.
WILLIAM BINNEY: No, this
AMY GOODMAN: Police departments now.
WILLIAM BINNEY: Right. Actually, I think it's shared, because if youif you go back and look at Director Mueller's testimony on the 30th of March to the Senate Judiciary Committee, he responded to a question when he was asked the question of "How would you prevent a future Fort Hood?" He responded by saying that "We have gotten together with the DOD and have created this technology database." He called it a "technology database." Utah will be included in that, I'm sure. And
AMY GOODMAN: Meaning Bluffdale.
WILLIAM BINNEY: Yeah, right.
AMY GOODMAN: Where they're building this massive data center.
WILLIAM BINNEY: Its storage, yeah. And he said, "From this technology base, with one query, we can get all past and all future emails. So we only have to make one query to get it." That means he gets a target, puts the target in, goes into the base, pulls all past ones, and as they come in, then he gets all future ones. So, that says they're sharing it across the legalwith the legal authorities, so...
JUAN GONZÁLEZ: But then also having these private defense contractors and universities, I mean, you're talking about a potential in terms ofnot only of people gathering information, but of malicious use of that information by
WILLIAM BINNEY: Yeah, you want to see if your wife is cheating on you? OK, you could do that, yes. That's right. There's athat's the hazard of assembling all this kind of data. It's not just the government misusing it, but it's also people working in it, looking at it, and using it in different ways. They have no effective way of monitoring how people are using that information. They don't.
AMY GOODMAN: You can get information under the Freedom of Information Act about your FBI files, but can you get information about what the NSA has on you? And explain the difference between the CIA and the NSA. I think a lot of people don't even realize there's this far larger intelligence agency in the United States than the CIA.
WILLIAM BINNEY: Yeah, it's about three to four times as large, yeah. The difference is that the primary focus of CIA is supposed to be human intelligence, a human espionage, you know, like spies, recruiting sources around the world, and so on, whereas NSA's responsibility is electronic intercept and electronicanalysis of electronic communications, to form intelligence from what they're either saying or how they're acting, to assess threat. And CIA is to take the people input side, the human input side. That's their charter, anyway, so... But they also do some of their own intelligence gathering, that there's kind of some overlap there, which is, I guess, a part of their charter also. I've not really looked at the CIA charter that much. But sobut I do know they do some of that. But they're primarily focused on human intelligence.
JUAN GONZÁLEZ: And has there been any historic conflict or competition between the NSA and the CIA, as you often have seen that
WILLIAM BINNEY: Yes.
JUAN GONZÁLEZ: more recently with the FBI and the CIA?
WILLIAM BINNEY: It's notit's not historical. It's continuous. It is a continuous competition. It'sthe barrier for sharing, the way I would put it, is they're hesitant to share knowledge and information, because then that's sharing power, and you no longer control that kind of input to higher authorities for decision making. So when they do that, that's like releasing knowledge and releasing their power to others. And that's a barrier for them.
AMY GOODMAN: Jacob Appelbaum, I asked you before how people can protect themselves. I remember you mentioned, when they took your computer, the authorities at the border, there wasn't a hard drive in it. Explain what people can do.
JACOB APPELBAUM: Well, I think one thing that is important is to know that if you're being targeted, these people, they're, you know, in the weapons industry. It turns out that they also have the ability to break into computers. So, if you're being targeted, you have to take a lot of precautions. For example, there's a bootable CD called "Tails," and the idea is you run Linux, and all your traffic routes over Tor, so you don't have something like Adobe Flash trying to update itself, and then the NSA or someone else gets to perform what's called a "man in the middle" attack. Instead of using Gmail, using something like Riseup. I mean, after their server was just seized, I think kicking them some cash is probably a good thing. They provide mutual aid for people all around the world to have emails that are not just given up automatically, or even with a court battle. They try to encrypt it so they can't give things up. So people can make choices where their privacy is respected, but also they can make technical choices, like using Tor, to ensure, for example, that when data is gathered, it's encrypted and it's worthless. And I think that's important to do, even though it's not perfect. I mean, there is no perfection in this. But perfection is the enemy of "good enough."
AMY GOODMAN: How do you download Tor, T-O-R?
JACOB APPELBAUM: You go to TorProject.org, https://www.torproject.org. And the "S" is for "secure," for some value of "secure." And you download a copy of it, and it's a web browser, for example. And the program, all put together, double-click it, run it, you're good to go.
AMY GOODMAN: You can even Skype on it?
JACOB APPELBAUM: YouI would really recommend using something like Jitsi instead of Skype. Every time you use proprietary software
AMY GOODMAN: "Jitsi" is spelled...?
JACOB APPELBAUM: J-I-T-S-I. So, every time you use proprietary software, you have to ask yourself, "Why is this provided to me for free?" And now that Microsoft is involved with Skype, the question is: Doesn't Microsoft have some sort of government leaning on them, say the U.S. government, to give them so-called lawful interception capabilities? And of course the answer is going to be yes, right? If you log into Skype on a computer you've never used before, you get all your chat history. Well, why is that? Well, that's because Skype has it. And if Skype can give it to you, they can give it to the Feds. And they will. And everybody that has that ability will. Some will fight it, like Twitter. But in the end, if the state asserts it has the right to get your data, sometimes without you even knowing that that's happening, they're going to get it, if they can get it.
So we have to solve these privacy problems with mathematics, because it's pretty hard to solve math problems with a gun or threat of violence, right? No amount of violence is going to solve a math problem. And despite the fact that the NSA has got a lot of people working on those math problems, you know, podunk cops in Seattle, for example, they're not going to be able to do that, and the NSA is not going to help them. Now, they may have surveillance capability. They may have IMSI catchers. They might have automatic license plate readers. They have an incredible surveillance state. They're still not the NSA.
And even if they are sharing information, what we want to do is make whatever information they would share worthless, especially if it's encrypted. So if your browsing is going over Tor, at least if someone is watching your home internet connection, they don't see that you're looking at Democracy Now!'s website. They don't see that you're checking your Riseup email. They see that you're talking to the Tor network. And there's a lot of value in that, especially because your geographic location is hidden. So when you log into Gmaillet's say you still use Gmailbut you don't want Gmail to have a log of every place you've been, you use Tor, and Gmail sees Tor, and anyone watching you sees Tor. And that's really useful, because it means that they don't get your home address, they don't know when you're at work. You make the metadata worthless, essentially, for people that are surveilling you.
JUAN GONZÁLEZ: I think you may have just gotten a lot of customers for Tor, for Project Tor.
AMY GOODMAN: When your computer or phones are taken at the airport, do you use them again?
JACOB APPELBAUM: I never had my phones returned to me, and I can't talk about that. And my computer, I hadI mean, I can't remember where I put it, so, I mean, the government back door that's probably in it is hopefully in safety somewhere.
AMY GOODMAN: The New York Times blog says, "Companies that make many of the most popular smartphone apps for Apple and Android devices Twitter, Foursquare and Instagram among them routinely gather the information in personal address books on the phone and in some cases store it on their own computers. The practice came under scrutiny Wednesday by members of Congress who saw news reports that taking such data was an 'industry best practice.'" Jacob Appelbaum?
JACOB APPELBAUM: Sounds like a data Valdez waiting to happen.
AMY GOODMAN: What gives you hope, William Binney? You worked in a top-secret agency for close to 40 years. You quit soon after 9/11 because you saw that the agency was spying on the American people, and you had helped develop the program that allowed this to happen.
WILLIAM BINNEY: Well, the only thing that gives me hope is programs like this or Wired articles that Jim Bamford would write about this activity, to get the word out so that people can be aware of what's happening, so in a democracy we can stand forward and vote, in some way, as to what we want our government to do or not to do, and what kind of information we want them to have or not have.
JUAN GONZÁLEZ: And are there any members in Congress that you see waging a good fight around this issue?
WILLIAM BINNEY: Well, Senators Wydall sic and Udall are, soWyden and Udall, they are. And there are others. They're just not speaking up. Of course, the problem is, you see, they can't tell you what their concern, because
LAURA POITRAS: Well, why? Why can't they tell you? I mean, what would be the repercussions if you're in Congress?
WILLIAM BINNEY: Well, because what happens whenif they did, for example, they would lose their clearance immediately and be off the committees.
AMY GOODMAN: Talk about the Gang of Eight, what they know, who they are.
WILLIAM BINNEY: Well, according to Cheney, it originally started with a Gang of Four. And then, after the 2004 objections in the DOJ, then it expanded to the Gang of Eight. The Gang of Four initially was the majority and minority leader of the IntelligenceHouse Intelligence Committee and the Senate Intelligence Committee, the HPSCI and SSCI. Then, after theand that, on the House side, that was Chairman Goss and Nancy Pelosi, initially, in 2001. I don't remember the other two on the Senate side. And then it expanded in 2004, it expanded to the Gang of Eight, which addedon top of those four, it added the seniorthe majority and minority leaders of the House and the majority and minority leaders of the Senate.
AMY GOODMAN: So, Jacob Appelbaum, Laura Poitras, your response to what these civilian elected leaders know?
LAURA POITRAS: Well, it's shameful. I mean, I don't know how they're going to explain it to their grandkids, right? I mean, I think this whole post-9/11 era isit's indefensible, right? I meanand so, if the risk is losing one's clearance, is that really a risk? I mean, or I don't know. It seems to me that if you have that kind of information, you have an obligation to come forward with it, because it's illegal. And they've been saying that. I mean, they'veyou know, Wyden and Udall have been saying that this is illegal or that this is secret interpretation that the American public doesn't know about, and I think that they should come forward, because I
WILLIAM BINNEY: Well, yeah, more importantly, it's a violation of the constitutional rights of every American citizen. And that's a violation that they took an oath to defend against.
JACOB APPELBAUM: I think that it's
AMY GOODMAN: Jacob Appelbaum?
JACOB APPELBAUM: You know, Cindy Cohn at the EFF is fighting the good fight.
AMY GOODMAN: Electronic Frontier Foundation?
JACOB APPELBAUM: Yeah, the Electronic Frontier Foundation is like the legal version of Riseup, in my mind, you know? They're really amazing. And they're fighting these cases, such as NSA v. Jewel. And I think that it is incredibly important basically to point outand when we want to talk about Congress for a second, I mean, the judiciary has some
AMY GOODMAN: We have 30 seconds.
JACOB APPELBAUM: They have some power, but what reallywhat really matters is that Congress needs to have people like Bill. They need to have people who actually understand the technology questioning people like General Alexander, not people who are bamboozled and fooled by the word "email" or the word "network." And that's what we need to do is we need to have people that know speak to the people that don't know. And that is Congress.
AMY GOODMAN: Jacob Appelbaum is a computer security researcher. He works with the TorProject.org. That's T-O-R Project-dot-org. William Binney directed the NSA's World Geopolitical and Military Analysis Reporting Group. That's the National Security Administration. He worked there for close to 40 years. And Laura Poitras is the Oscar-nominated filmmaker, her films, My Country, My Country and The Oath. This was part two of our broad discussion on the surveillance state. We began it on Friday. You can go to our website at democracynow.org to see the full discussion or read the transcript or listen.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#3
JUAN GONZALEZ: Today we bring you a Democracy Now! special on the growing domestic surveillance state and the Department of Homeland Security's efforts to spy on dissident journalists and activists. In a national broadcast exclusive, we're joined by National Security Agency whistleblower William Binney. He was a key source for James Bamford's recent [exposé] in Wired Magazine about the NSAhow the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain nearly bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls and Google searches and other personal data.
Binney served in the NSA for over 30 years, including a time as director of the NSA's World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the agency's data-mining program has become so vast that it could, quote, "create an Orwellian state." Today marks the first time Binney has spoken on national television about surveillance by the National Security Agency.
AMY GOODMAN: We're also joined by two individuals who have been frequent targets of government surveillance: Laura Poitras, the Academy Award-nominated filmmaker, and Jacob Appelbaum, a computer security researcher who has volunteered with WikiLeaks. Poitras is the director of the documentary films My Country, My Country and The Oath. Both Poitras and Appelbaum have been repeatedly detained and interrogated by federal agents when entering the United States. Their laptops, cameras and cell phones have been seized, and presumably their data has been copied.
The Justice Department has also targeted Applebaum's online communications. In November, a federal judge ordered Twitter to hand over information about his account. In October, the Wall Street Journal revealed the Justice Department had obtained a secret court order to force Google and the internet provider Sonic.net to turn over information about Appelbaum's email accounts.
William Binney, Laura Poitras and Jacob Appelbaum will be speaking tonight at the Whitney Museum here in New York for a teach-in on surveillance. The three of them join us here in our studio together in a broadcast for the first time. We're going to begin with William Binney.
You worked for the National Security Agency for more than three decades.
WILLIAM BINNEY: Almost four.
AMY GOODMAN: Almost four decades.
WILLIAM BINNEY: Yeah.
AMY GOODMAN: You, for a time, directed the NSA's World Geopolitical and Military Analysis Reporting Group. Tell us what you did and then why you left and what happened to you afterwards.
WILLIAM BINNEY: Well, I was the technical director of that group, that basically looked at the world, so we looked at all the technical problems ofin the world, and see how we could solve collection, analysis and reporting on military and geopolitical issues all around the world, every country in the world. So, it was a rather large technical problem to tackle, but itand one of the largest problems we thought we had was looking at the World Wide Web and all the ballooning and mushrooming communications in the world. And our ability to deal with that was diminishing over time, so I kind of referred to it as our inability to keep up with the rate of change. So, we were falling behind the rate of change.
So weI had a very small group of people in a lab, and we decided to attack that problem. And we did it by looking at how we could graph the network of communications and all the communications in the world, and thenand then focus in on that graph and use the graph to limit what we wanted to attack. And we basically succeeded at that, but in the process, of course, we scooped up Americans from different places, so we had to protect their identities, according to our laws and privacy rights of U.S. citizens. So, under USSID 18, we built in protections to anonymize their identities, so you couldn't really tell who you were looking at.
JUAN GONZALEZ: And that's because the NSA could do surveillance from abroad, but not of U.S. citizens.
WILLIAM BINNEY: Well, and, you see, the World Wide Web routes things all over, so you never really know where U.S. citizens' communications are going to be routed. So, youif you were collecting somewhere else on another continent, you could still get U.S. citizens. That'ssee, that was a universal problem. So we devised how to do that and protect U.S. citizens. Soand this was all before 9/11. And we devised how to do that, made that effective and operating. So we were actually prepared to deploy about eight months before 9/11 and actually have a system that would run and manage thewhat I call 20 terabytes a minute of activity.
Sobut after 9/11, all the wraps came off for NSA, and they decided tobetween the White House and NSA and CIA, they decided to eliminate the protections on U.S. citizens and collect on domestically. So they started collecting from a commercialthe one commercial company that I know of that participated provided over 300probably, on the average, about 320 million records of communication of a U.S. citizen to a U.S. citizen inside this country.
AMY GOODMAN: What company?
WILLIAM BINNEY: AT&T. It was long-distance communications. So they were providing billing data. At that point, I knew I could not stay, because it was a direct violation of the constitutional rights of everybody in the country. Plus it violated the pen register law and Stored Communications Act, the Electronic Privacy Act, the intelligence acts of 1947 and 1978. I mean, it was just this whole series ofplus all the laws covering federal communications governing telecoms. I mean, all those laws were being violated, including the Constitution. And that was a decision made that wasn't going to be reversed, so I could not stay there. I had to leave.
JUAN GONZALEZ: And I wanted to get back to, for a moment, when you say that you were developing a way to cope with the fact that the agency was falling behind, just because the sheer volume of the material that they were sweeping up was so great, that it was impossible, at times, to find the important intelligence material.
WILLIAM BINNEY: Yes.
JUAN GONZALEZ: So you, in essence, were creating a program that filtered out the valuable stuff.
WILLIAM BINNEY: Right. That's right.
JUAN GONZALEZ: Whatdid it have a name, the program?
WILLIAM BINNEY: Well, it was called Thin Thread. I mean, Thin Thread was oura test program that we set up to do that. By the way, I viewed it as we never had enough data, OK? We never got enough. It was never enough for us to work at, because I looked at velocity, variety and volume as all positive things. Volume meant you got more about your target. Velocity meant you got it faster. Variety meant you got more aspects. These were all positive things. All we had to do was to devise a way to use and utilize all of those inputs and be able to make sense of them, which is what we did.
JUAN GONZALEZ: And when they didn't use your system, theythe NSA developed another or attempted to develop another system to do the same?
WILLIAM BINNEY: Well, that one failed. They didn't produce anything with that one.
AMY GOODMAN: And that one was called?
WILLIAM BINNEY: Trailblazer, yeah.
AMY GOODMAN: Trailblazer, and
WILLIAM BINNEY: I called itI called it five-year plan number one. Five-year plan number two was Turbulence. Five-year plan number three is
AMY GOODMAN: And Trailblazer cost how much money?
WILLIAM BINNEY: That was, I think, in mymy sense, was a little over $4 billion.
AMY GOODMAN: Four billion dollars.
WILLIAM BINNEY: Right.
AMY GOODMAN: But it was scuttled. It was done away with in 2006?
WILLIAM BINNEY: Yes, '05, I think it was. But yes, that's right. And we developed our program with $3 million, roughly.
JUAN GONZALEZ: And Trailblazer was largely developed by SAIC, the
WILLIAM BINNEY: Well, they were contributing contractors, yeah. But theyI think they had the leadthey were the lead contractors in some of contracts, yeah.
AMY GOODMAN: And why did they go with this one, though, ultimately, they did not use it? This is under Michael Hayden at the time?
WILLIAM BINNEY: Yes. Well
AMY GOODMAN: Under the Bush administration?
WILLIAM BINNEY: Well, I thoughtmy sense was it was a good employment program. And it was a large budget program. It would spend money, a lot of money, so it would build the budget and
AMY GOODMAN: Go to a major weapons manufacturer.
WILLIAM BINNEY: Right.
AMY GOODMAN: And heads of the agency, National Security Agency, would go back and forth working at NSA, working at SAIC.
WILLIAM BINNEY: It waswe called it an incestuous relationship, yeah.
AMY GOODMAN: What happened to you after you quit? You quit within a month of the 9/11 attacks.
WILLIAM BINNEY: Thirty-first of October of 2001, yeah.
AMY GOODMAN: And then what happened?
WILLIAM BINNEY: Well, we tried to form out the company to at least help the government to deal with some of the massive data problems they had, like ineven in the FBI, and also Customs and Border Protection and NRO and various other agencies. And every time we went somewhere to try to develop something, why, we got canceled, our contract got canceled, forbasically because, we have heard, anyway, that they were told that certain agencies didn't want them hiring us, so they didn't want us working for them, so...
JUAN GONZALEZ: And before you left, in that short period when it became obvious to you the direction that the NSA was going to, did youwhen you raised objections or raised concerns, what was the response?
WILLIAM BINNEY: Well, I went directly to the Intelligence Committee, because it was their job tobecause, first of all, when that happened, I mean, the people they had to use to set it upsince they used part of the program we developed to set it up, they had to use our people to set it up, initially, because no one else knew the code, and no one else knew how to get it operating. So, when they did that, they camethose people came to me and said, "You know, they're doing this," you know, and they told me what they were doing. And so I immediately went to the Intelligence Committee, because they werethe intelligence committees were formed to have oversight over the intelligence community to make sure they didn't monitor U.S. citizens. This was a fallout of the Church Committee back in the '70s. And the member of the staff that I went to went to Porter Goss, who was chairman of that committee at the time, and he referred her to General Hayden for any further. When it was the job of that committee to do the oversight on all this domestic spying, they weren't doing it, OK? Basically, theat the time, according to Dick Cheney's interview on the 10th anniversary of 9/11, he said theat that time, only the majority or minority leaders, the HPSCI and the SSCI, were involved in having knowledge about this program, Stellar Wind, which you had talked with Tom Drake about.
AMY GOODMAN: The former NSA
WILLIAM BINNEY: Right, right.
AMY GOODMAN: employee who was also a whistleblower.
WILLIAM BINNEY: And that was the program, of course, that Director Mueller reported was the issue thatwith the hospital visit with Ashcroft. So
AMY GOODMAN: And explain that, very briefly, forto remind people.
WILLIAM BINNEY: Well, the whole program, I guess, had to be reauthorized every 45 days, and they had to have the director of NSA, director of CIA and the attorney general sign an affidavit that they still needed the program and that it was legal. And when Comey and Goldsmith in the DOJ decided that this really was a violation of the Constitution and was illegal, then that issue came up. And that's whatthat's what got everybody kind of disturbed and ready toready, actually, to resign in 2004, early 2004, I believe that was. And as a part of it was coming up for reauthorization, and so Gonzales left the White House, along with one other person I can't remember, and went to the hospital where Ashcroft was, because he washad pancreatitis, I believe, and was in the hospital, and Comey was the acting attorney general. And so, at that point, they went to Ashcroft to see if he would overrule Comey, who had denied reauthorization and declared it basically illegal. And so, they tried to get Ashcroft to overrule that and went to the hospital to do that. And Director Mueller, I think, also quickly got to the hospital to help ensure that Ashcroft was not taken advantage of, I guess. So...
AMY GOODMAN: When was your home raided?
WILLIAM BINNEY: Twenty-sixth of July of 2007.
AMY GOODMAN: What happened? Where did you
WILLIAM BINNEY: I shouldI should say that it was the morning of the second day after Gonzales's testimony, the then-Attorney General Gonzales's testimony, to the Senate Judiciary Committee on the TSP, thewhat was called the TSP, which I refer to as a fabricated plan. It was created to cover a number of plans, one of which was Stellar Wind, and the otherswhich they didn't want to discuss. And the others were wiretapping. And so, they picked on the wiretapping ones, because the public would generally say, "Yes, anybody that was potentially a terrorist, a foreign terrorist, communicating with anybody in the United States, we want you to monitor their communications." So that was the acceptable part of it. But it was grouped with Stellar Wind and some other programs, so that they could give cover to it, talk about some programs, say they're talking about the Terrorist Surveillance Program, but it was basically a group of programs, some of which they did not want to talk about. And he did not testify to that at theand I believe some of theWhitehouse and Feingold, I think, were the two who were on the Senate Intelligence Committee that did challenge him at the time, saying he wasn't being truthful, and that washe wasn't being completely honest. So...
AMY GOODMAN: You live where?
WILLIAM BINNEY: I live in Maryland, actually four miles from NSA.
AMY GOODMAN: And what happened?
WILLIAM BINNEY: They came busting in.
AMY GOODMAN: Who's "they"?
WILLIAM BINNEY: The FBI. About 12 of them, I think, 10 to 12. They came in with the guns drawn, on my house.
AMY GOODMAN: Where were you?
WILLIAM BINNEY: I was in the shower. I was taking a shower, so my son answered the door. And they of course pushed him out of the way at gunpoint and came running upstairs and found me in the shower, and came in and pointed the gun at me while I was, you know
AMY GOODMAN: Pointed a gun at your head?
WILLIAM BINNEY: Oh, yeah. Yes. Wanted to make sure I saw it and that I was duly intimidated, I guess.
JUAN GONZALEZ: And what did theywhat did they do at that point? Did they begin questioning you? Or they just took you to headquarters? Or
WILLIAM BINNEY: No, no. Yeah, they basically separated us fromI was separated from my family. Took me on the back porch, and they started asking me questions about it. They were basically wanting me to tell them something that would implicate someone in a crime. And so, I told them that I didn't really knowthey wanted to know about certain people, that wasthey were the ones that were being raided at the same time, people whowe all signedthose who were raided that day, all of us signed the DOD-IG complaint. We were the ones who filed that complaint.
AMY GOODMAN: The Pentagon
WILLIAM BINNEY: The Pentagon DOD-IG, against
AMY GOODMAN: inspector general complaint.
WILLIAM BINNEY: Against NSA, yes, talking about fraudbasically corruption, fraud, waste and abuse. And then
AMY GOODMAN: Tom Drake was raided at the same time?
WILLIAM BINNEY: No, he was raided in November of that year. We were just the ones who signed it, were raided.
JUAN GONZALEZ: So, and who were the other people that were raided that same day?
WILLIAM BINNEY: Diane Roark, Kirk Wiebe and Ed Loomis.
AMY GOODMAN: Diane Roark worked for the Senate committee?
WILLIAM BINNEY: Diane was the senior staffer. She had the NSA account on the HPSCI side, on the House side. So she was monitoring. She was doing oversight. She was doing real oversight; the others weren't. Basically, the others were simply taking what the NSA said verbatim and taking them at their word. So, basically, that was not oversight. But Diane would probe and be prying into what they were saying to find out really clearly what was going on. And
JUAN GONZALEZ: And ostensibly, they were searching for who was leaking information to thewho had leaked information to the New York Times.
WILLIAM BINNEY: That was the pretext, yes. But I accused them of being sent there by someone outside the FBI. And thattheir body language told me that I hit it right on the head. Soand I alsoafter a while, they were questioning me, and I couldn't tell them anything, because I didn't know anything that would implicate any of the four of us, so
AMY GOODMAN: They were looking for leaks.
WILLIAM BINNEY: Well, that was the pretext, the leak on theto give the New York Times thing. The real thingwhat they were really doing was retribution and intimidation so we didn't go to the Judiciary Committee in the Senate and tell them, "Well, here's what Gonzales didn't tell you, OK." That was what it was really all about. And also, it was retribution for that DOD-IG complaint, because it was a rather embarrassing report that they gave, so...
JUAN GONZALEZ: And what is it that Gonzales didn't tell them, in your perspective, in terms of what is happening to our national security surveillance situation?
WILLIAM BINNEY: Well, it was aboutit was about Stellar Wind and all of the domestic spying.
AMY GOODMAN: We're going to break and come back to this conversation. William Binney was the technical director of the National Security Agency, which, by the way, is a number of times larger than the CIA, the National Security Agency's World Geopolitical and Military Analysis Reporting Group. When we come back, we'll also speak with a well-known hacker, Jacob Appelbaum, who has volunteered for WikiLeakshe's a computer security researcherand Laura Poitras, whose films, My Country, My Country and The Oath, are well known. She's been nominated for an Oscar.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#4
JUAN GONZALEZ: Jacob, your experiences entering the United States at various times?
JACOB APPELBAUM: Well, after the summer of 2010, my life became a little hectic with regard to flying. I do a lot of traveling, working with the Tor Project. And after the summer of 2010, where I gave a speech at Hackers on Planet Earth in place of Julian Assange, I was targeted by the U.S. government and essentially, until the last four times that I've flown, I was detained basically every time. Sometimes men would meet me at the jetway, similarly, with guns.
AMY GOODMAN: Let us play that moment when you went to the HOPE conference.
JACOB APPELBAUM: Oh, dear.
AMY GOODMAN: Hackers on Planet Earth. Julian Assange was supposed to be there. He wasn't. You stood up. This is the beginning of what you said.
JACOB APPELBAUM: Hello to all my friends and fans in domestic and international surveillance. I'm here today because I believe that we can make a better world.
AMY GOODMAN: And what did you go on to say?
JACOB APPELBAUM: Basically, I went on to talk about how I feel that people like Bill need to come forward to talk about what the U.S. government is doing, so that we can make informed choices as a democracy. And I went on to talk about how WikiLeaks is a part of making that happen. And as long as we have excessive classification and secrecy, that we need a WikiLeaks, and we need to stand in solidarity together, so that people will have the information that they need to understand what's actually happening in their names.
JUAN GONZALEZ: You mentioned the Tor Project that you work with. What is it?
JACOB APPELBAUM: The Tor Project is an anonymity network, which ensures that each person has the right to read, without restriction, and the right to speak freely, with no exception.
AMY GOODMAN: T-O-R?
JACOB APPELBAUM: TorProject.org. And the basic idea is that every person in the world has the right to read and the right to speak freely. And using their software, using principles of mutual aid and solidaritysomething familiar to Democracy Now! viewers, I imagineit's possible for everybody to use this anonymity network, spread out across the planet. It's a thing that's useful for resisting so-called lawful interception. So, for example, when Mubarak in Egypt wants to wiretap someone, they only see an activist talking to the Tor network; they don't see that person connecting to Twitter. And that is something that can be used by everybody everywhere to resist so-called lawful interception.
JUAN GONZALEZ: And you use a program that was actually developed by the U.S. government?
JACOB APPELBAUM: Well, yeah. So, originally, the Tor Project is born from ideas that come from the anonymity community, of which the U.S. military has actually contributed quite heavily to. But since the times of the original onion routing patents, it has become a free software project, where, as far as I know, the U.S. Navy has contributed zero lines of code to it, but certainly lots of good ideas, because they understand, as many other people do, that if everyone has anonymous communication, that means everyone does, and if only special people do, it means that you can tell that those are special people that have special privileges, and you can basically see who they are.
So, for example, the Riseup Collective, which you mentioned earlier on the show, they run a number of tor nodes. And I run some, and many other people do. And as long as you get one good one, you have some of the properties that you need. And this helps people to resist not just so-called lawful interception, but also to resist censorship. So if you can't see inside of the communications, you can't selectively discriminate based on the content.
AMY GOODMAN: Just to say that in our news headlines today, we said the FBI has just seized a computer server at the New York facility shared by the internet organization Riseup Networks and May First/People Link. But I want to go back to your experience at the airport. If you could just briefly sayI mean, it's been dozens and dozens of times that you have
JACOB APPELBAUM: I don't fly as much as Laura, and Laura has been at it for a lot longer than I have. But in the period of time since they've started detaining me, around a dozen-plus times. I've been detained a number of times. The first time I was actually detained by the Immigration and Customs Enforcement, I was put into a special room, where they frisked me, put me up against the wall. One guy cupped me in a particularly uncomfortable way. Another one held my wrists. They took my cell phones. I'm not really actually able to talk about what happened to those next.
AMY GOODMAN: Why?
JACOB APPELBAUM: Because we don't live in a free country. And if I did, I guess I could tell you about it, right? And they took my laptop, but they gave it back. They were a little surprised it didn't have a hard drive. I guess that threw them for a loop. And, you know, then they interrogated me, denied me access to a lawyer. And when they did the interrogation, they has a member of the U.S. Army, on American soil. And they refused to let me go. They triedyou know, they tried their usual scare tactics. So they sort of implied that if I didn't make a deal with them, that I'd be sexually assaulted in prison, you know, which is the thing that they do these days as a method of punitive punishment, and they of course suggested that would happen.
AMY GOODMAN: How did they imply this?
JACOB APPELBAUM: Well, you know, they say, "You know, computer hackers like to think they're all tough. But really, when it comes down to it, you don't look like you're going to do so good in prison." You know, that kind of stuff.
JUAN GONZALEZ: And what was the main thrust of the questions they were asking you?
JACOB APPELBAUM: Well, they wanted to know about my political views. They wanted to know about my work in any capacity as a journalist, actually, the notion that I could be in some way associated with Julian. They wanted, basically, to know any
AMY GOODMAN: Julian Assange.
JACOB APPELBAUM: Julian Assange, the one and only. And they wantedthey wanted, essentially, to ask me questions about the Iraq war, the Afghan war, what I thought politically. They didn't ask me anything about terrorism. They didn't ask me anything about smuggling or drugs or any of the customs things that you would expect customs to be doing. They didn't ask me if I had anything to declare about taxes, for example, or about importing things. They did it purely for political reasons and to intimidate me, denied me a lawyer. They gave me water, but refused me a bathroom, to give you an idea about what they were doing.
AMY GOODMAN: What happened to your Twitter account?
JACOB APPELBAUM: Well, the U.S. government, as I learned while I was in Iceland, actually, sent what's called an administrative subpoena, or a 2703(d) order. And this is, essentially, less than a search warrant, and it asserts that you can get just the metadata and that the third party really doesn't have a standing to challenge it, although in our case we were very lucky, in that we got to haveTwitter actually did challenge it, which was really wonderful. And we have been fighting this in court.
And without going into too much detail about the current court proceedings, we lost a stay recently, which says that Twitter has to give the data to the government. Twitter did, as I understand it, produce that data, I was told. And that metadata actually paintsyou know, metadata and aggregate is content, and it paints a picture. So that's all the IP addresses I logged in from. It's all of the, you know, communications that are about my communications, which is Bill's specialty, and he can, I'm sure, talk about how dangerous that metadata is.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#5
JUAN GONZALEZ: Well, I wanted to ask William Binney about this issue. When it comes to snail mail, the old postal system, it's very tough for the government to intercept mail, except in times of war, particular situations. When it comes to phone conversations, land phone conversations, you need a warrant to be able to intercept phone conversations. But what about email, and what about the communication now that is really the dominant form that not only Americans, but many people around the world communicate? What are the restrictions on the government in terms of email?
WILLIAM BINNEY: Well, after some of the laws they passed, like the PATRIOT Act and their secret interpretation of Section 215, which ismy view, of course, is same as Tom Drake's, is that that gives them license to take all the commercially held data about us, which is exceedingly dangerous, because if you take that and put it into forms of graphing, which is building relationships or social networks for everybody, and then you watch it over time, you can build up knowledge about everyone in the country. And having that knowledge then allows them the ability to concoct all kinds of charges, if they want to target you. Like in my case, they fabricated several charges and attempted to indict us on them. Fortunately, we were able to produce evidence that would make them look very silly in court, so they didn't do it. In fact, it wasI was basically assembling evidence of malicious prosecution, which was a countercharge to them. So...
AMY GOODMAN: Do you believe all emails, the government has copies of, in the United States?
WILLIAM BINNEY: I would thinkI believe they have most of them, yes.
AMY GOODMAN: And you're speaking from a position where you would know, considering your position in the National Security Agency.
WILLIAM BINNEY: Right. All they would have to do is put various Narus devices at various points along the network, at choke points or convergent points, where the network converges, and they could basically take down and have copies of most everything on the network.
AMY GOODMAN: Jacob, your email?
JACOB APPELBAUM: Well, I selectively chose to use certain public services, like Sonic.net and Gmail, and I specifically did that so as to serve as a warning to other people. I didn't use it for anything interesting, never once emailed Julian, for example, from those accounts. But the U.S. government again asserted in those cases, according to the Wall Street Journal, which is one way to find out about what's going on with youthey asserted that they have the right to all that metadata. And it is possibleon Monday, I had a little interaction with the FBI, where they sort of hinted that maybe there might be a national security letter for one of my email accounts, which is also hosted by Google, specifically because I want to serve as a canary in a coal mine for other people.
AMY GOODMAN: A national security letterit's believed the government has given out hundreds of thousands of those.
JACOB APPELBAUM: Yeah.
AMY GOODMAN: I have also written about NSLs. But if you get one, you are not allowed to talk about it, on pain of something like up to five years in prison, even to mention that you were handed a national security letter that said turn something over.
JACOB APPELBAUM: Yeah. That was the case of Nick Merrill, for example, who's a brave American, who essentially fought and won the NSL that was handed down to him.
AMY GOODMAN: And the librarians of Connecticut
JACOB APPELBAUM: Yes.
AMY GOODMAN: who were taking on the USA PATRIOT Act and didn't want to give information over about patrons in the library that the FBI wanted to get information on.
JACOB APPELBAUM: Right, absolutely. So, an NSL, what's specifically scary about it is that all that is required is for an FBI agent to assert that they need one, and that's it. And you don't have a chance to have judicial review, because you aren't the one served. Your service provider will be served. And they can't tell you, so you don't get your day in court.
AMY GOODMAN: Laura, can you set up this clip that we have?
LAURA POITRAS: Yes, actually, this is what Jake was alluding to. On Monday, there was a panel at the Open Society Institute. And Jakeand there was a deputy general counsel of the FBI who was present, and Jake had the opportunity to question her about national security letters.
JACOB APPELBAUM: Are you including national security letters in your comment about believing that there is judicial oversight with the FBI's actions?
FBI DEPUTY GENERAL COUNSEL: National security letters and administrative subpoenas have the ability to have judicial oversight, yes.
JACOB APPELBAUM: How many of those actually do have judicial oversight, in percentage?
FBI DEPUTY GENERAL COUNSEL: What do you mean by that? How many have
JACOB APPELBAUM: I mean, every time you get a national security letter, you have to go to a judge? Or
FBI DEPUTY GENERAL COUNSEL: No, as you well know, national security letters, just like administrative subpoenas, you don't have to go to a judge. The statute does allow for the person on whom those are served to seek judicial review. And people have done so.
JACOB APPELBAUM: And in the case of the third parties, such as, say, the 2703(d) orders that were served on my according to the Wall Street Journal my Gmail account, my Twitter account, and my internet service provider account, the third parties were prohibited from telling me about it, so how am I supposed to go to a judge, if the third party is gagged from telling me that I'm targeted by you?
FBI DEPUTY GENERAL COUNSEL: There are times when we have to have those things in place. So, at some point, obviously, you became aware. So at some point, the person does become aware. But yes, the statute does allow us to do that. The statute allows us.
AMY GOODMAN: Now, Jacob, explain who she was again.
JACOB APPELBAUM: So, my understanding is that she's the deputy general counsel of the FBI.
AMY GOODMAN: And the significance of what she has just said?
JACOB APPELBAUM: Essentially, what she says is, "We are just and righteous because you get judicial review. But there are some cases where you don't, and we are still just and righteous. And you should trust us, because COINTELPRO will never happen again." That's what I heard from that. And, in fact, later, someone asked about COINTELPRO and said, "How can we"
AMY GOODMAN: The counterintelligence program that targeted so many dissidents in the 1970s.
JACOB APPELBAUM: Yeah. Tried to get Martin Luther King Jr. to kill himself, for example. The FBI wrote him a letter and encouraged him to commit suicide. So for her to suggest that it is just and right and that we should always trust them sort of overlooks the historical problems with doing exactly that for any people in a position of power, with no judicial oversight.
JUAN GONZALEZ: William Binney, what about the companies that are approached by the government to participate or facilitate the surveillance? Your sense of the degree of opposition that they're mounting, if at all? And also, has there been any kind of qualitative change since the Obama administration came in versus what the Bush administration was practicing?
WILLIAM BINNEY: Well, first of all, I don't think any of them opposed it in any way. I mean, they were approached to saying, "You'll be patriotic if you support us." So I think they saluted and said, "Yes, sir," and supported them, because they were told it was legal, too. And then, of course, they had to be given retroactive immunity for the crimes they were committing. So
JUAN GONZALEZ: Approved by President Obama.
WILLIAM BINNEY: And President Bush, yeah. It started with Bush, yeah.
JUAN GONZALEZ: And the differences in the administrations?
WILLIAM BINNEY: Actually, I think the surveillance has increased. In fact, I would suggest that they've assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens.
AMY GOODMAN: How many?
WILLIAM BINNEY: Twenty trillion.
AMY GOODMAN: And you're saying that this surveillance has increased? Not only the
WILLIAM BINNEY: Yes.
AMY GOODMAN: targeting of whistleblowers, like your colleagues, like people like Tom Drake, who are actually indicted under the Obama administration
WILLIAM BINNEY: Right.
AMY GOODMAN: more timesthe number of people who have been indicted are more than all presidents combined in the past.
WILLIAM BINNEY: Right. And I think it's to silence what's going on. But the point is, the data that's being assembled is about everybody. And from that data, then they can target anyone they want.
AMY GOODMAN: Bill Binney, talk about Bluffdale, Utah. What is being built there?
WILLIAM BINNEY: Well, a very large storage device, basically, for remote interrogation and remote processing. That's the way I view that. Because there's not enough people there to actually work the data there, so it's being worked somewhere else.
AMY GOODMAN: Where do you get the number 20 trillion?
WILLIAM BINNEY: Just by the numbers of telecoms, it appears to me, from the questions that CNET posed to them in 2006, and they published the names and howwhat the responses were. I looked at that and said that anybody that equivocated was participating, and then estimated from that the numbers of transactions. That, by the way, estimate only was involving phone calls and emails. It didn't involve any queries on the net or any assemblesotherany financial transactions or credit card stuff, if they're assembling that. I do not know that, OK.
JUAN GONZALEZ: And the originalthe original allegations that you made, in terms of the crimes being committed under the Bush administration in terms of the rights of American citizens, could you detail those?
WILLIAM BINNEY: Well, I made thatI reported the crime when I was raided in 2007. And it was that Bush and Cheney and Hayden and Tenet conspired to subvert the Constitution and violate various laws of thethat exist in the statute at the time, and here's how they did it. And I was reporting this to the FBI on my back porch during the raid. And I went through Stellar Wind and told them what it did and what the information it was using and how they were spying onor assembling data to be able to spy on any American.
AMY GOODMAN: I want to go to a clip of Congress Member Hank Johnsonhe's the Georgia Democratquestioning National Security Administration director, General Keith Alexander, last month, asking him whether the NSA spies on U.S. citizens.
REP. HANK JOHNSON: Does the NSA routinely intercept American citizens' emails?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: Does the NSA intercept Americans' cell phone conversations?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: Google searches?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: Text messages?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: Amazon.com orders?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: Bank records?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: What judicial consent is required for NSA to intercept communications and information involving American citizens?
GEN. KEITH ALEXANDER: Within the United States, that would be the FBI lead. If it was a foreign actor in the United States, the FBI would still have the lead and could work that with NSA or other intelligence agencies, as authorized. But to conduct that kind of collection in the United States, it would have to go through a court order, and the court would have to authorize it. We are not authorized to do it, nor do we do it.
AMY GOODMAN: That was General Keith Alexander, the NSA director, being questioned by Democratic Congress Member Hank Johnson. Bill Binney, he's the head of your agency, of the NSA. Explain what he's sayingwhat he's not saying, as well.
WILLIAM BINNEY: Well, I think it'spart of it is a term, how you use the term "intercept," as to whether or not what they're saying is, "We aren't actually looking at it, but we have it," you know, or whether or not they're actually collecting it and storing it somewhere.
JUAN GONZALEZ: So the mistake of the congressman was not to ask, "Are you collecting information?"
WILLIAM BINNEY: Well, he also said things like, "We don't collect" or, "We don't collect against U.S. citizens unless we have a warrant." And then, at the same time, he said that we don'tat the same interview, he said, "We don't have the capability to collect inside this country." Well, those are kind of contradictory.
AMY GOODMAN: Is he lying? Is General Keith Alexander lying?
WILLIAM BINNEY: I wouldn'tyou know, the point is how you split the words. I wouldn't say "lying." It's a kind of avoiding the issue.
AMY GOODMAN: Jacob Appelbaum, how does this relate to you? And how powerful is General Keith Alexander?
JACOB APPELBAUM: I was saying to Bill that I think he's probably the most powerful person in the world, in the sense that
AMY GOODMAN: More powerful than President Obama?
JACOB APPELBAUM: Well, sure. I mean, if he controls the information that arrives on Obama's desk, and Obama makes decisions based on the things on his desk, what decisions can he make, ifexcept the decisions presented to him by the people he trusts? And when the people he trusts are the military, the military makes the decisions, then the civilian government is not actually in power.
AMY GOODMAN: Bill Binney, you're nodding your head.
WILLIAM BINNEY: Yes. I mean, well, for example, their responsibility is to interpret what they have and report up echelon. So, I mean, that's the responsibility of all the intelligence agencies. So, they basically filter the information to what they believe is important, which is what they should do, because, you know, they're occupyingit takes time for leaders to review material to make decisions. So they have to boil it down as best they can. So it's a function of their processing, but it is important that they do it correctly to make sure the information that gets there is correct and complete as it can.
AMY GOODMAN: Is General Alexander more powerful than President Obama?
WILLIAM BINNEY: In the sense of makingof presenting information for decision making, sure.
JUAN GONZALEZ: And Laura, the impact on journalists, who have to go through what you goyou've gone through the last few years, just to be able to report what's going on with our government? The chilling effect that this has onmaybe not on you, but on many other journalists?
LAURA POITRAS: Sure. I mean, I feel like I can't talk about the work that I do in my home, in my place of work, on my telephone, and sometimes in my country. So the chilling effect is huge. It's enormous.
AMY GOODMAN: You keep your computers and telephones away from conversations you're having in a room?
LAURA POITRAS: Yeah. When we had a meeting with you, remember, we told youwe kicked all your cell phones and all your computers out of the room.
AMY GOODMAN: You unthe wired phone, you unwired.
LAURA POITRAS: Yeah.
AMY GOODMAN: My cell phone, you didn't allow me to have it in the room. And you made sure there were no computers in the room.
LAURA POITRAS: Right.
AMY GOODMAN: Why?
LAURA POITRAS: Because we wantedwell, we wanted to talk aboutbecause we were bringingwe were bringing William to New York. And
AMY GOODMAN: We have to leave it there, but we're going to go online right now at democracynow.org. We're going to continue this conversation with Bill Binney of the NSA, formerly with NSA; Laura Poitras and Jacob Appelbaum.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#6
Quote:JUAN GONZÁLEZ: And has there been any historic conflict or competition between the NSA and the CIA, as you often have seen that

WILLIAM BINNEY: Yes.

JUAN GONZÁLEZ: more recently with the FBI and the CIA?

WILLIAM BINNEY: It's notit's not historical. It's continuous. It is a continuous competition. It'sthe barrier for sharing, the way I would put it, is they're hesitant to share knowledge and information, because then that's sharing power, and you no longer control that kind of input to higher authorities for decision making. So when they do that, that's like releasing knowledge and releasing their power to others. And that's a barrier for them.

And so these fucktards birth yet another fucktard agency, snappily called the Defence Clandestine Service.

It's clear the spooks, like the financial elites they serve, are not experiencing austerity.



Quote:Pentagon sets up new spy agency to eavesdrop on a changing world

Defense Clandestine Service will focus on global threats and emerging economic and military powers


Julian Borger, diplomatic editor

guardian.co.uk, Tuesday 24 April 2012 13.25 BST


The Pentagon is to create a new spy service to focus on global strategic threats and the challenges posed by countries including Iran, North Korea and China. The move will bring to 17 the total number of intelligence organisations in the US.

The Defense Clandestine Service is supposed to work closely with its counterpart in the CIA, the National Clandestine Service, recruiting spies from the ranks of the Pentagon's Defense Intelligence Agency (DIA) and deploying them globally to boost the flow of intelligence on perceived long-term threats to US national interests.

US military news website Insidedefense said the defence department had asked Congress for authority for spies to work undercover posing as businessmen when conducting covert operations abroad.

The move by the defence secretary, Leon Panetta, emerged in briefings to US journalists.

"You have to do global coverage," a senior defence official said, according to the Los Angeles Times. The new service would seek to "make sure officers are in the right locations to pursue those requirements", the Washington Post quoted the official as saying.

The Pentagon argues that the new service is necessary because the DIA spends most of its time and manpower reporting tactical intelligence about battlefields such as Afghanistan, and not enough time looking at strategic issues.

Obama administration officials have said they want to switch US national security focus away from the Middle East to address long-term issues such as China's rise and nuclear threats in North Korea and Iran. Pentagon sources suggested the new service would also focus on Africa, where al-Qaida affiliates are on the rise.

The new service will be relatively small, increasing in numbers "from several hundred to several more hundred" over the next few years, according to defence department officials.

The US already has 16 different intelligence organisations scattered around the defence, state, justice, homeland security and energy departments, as well as the armed services.

After the attacks of 11 September 2001 revealed a lack of co-operation and intelligence-sharing among them, the Bush administration restructured the "intelligence community", putting it all under a director of national intelligence.

Donald Rumsfeld, the defence secretary for most of the Bush era, attempted to increase the Pentagon's espionage capability dramatically but the attempt was rebuffed by the CIA, which was at loggerheads with Rumsfeld's defence department over Iraq.

The Pentagon insisted that this time its new clandestine service would be set up in close collaboration with the CIA, which is led by the former military commander General David Petraeus. The fact that Panetta is a former CIA director is also said to have helped smooth co-operation.

Not all intelligence experts are convinced that the creation of a new organisation will help America's espionage capacity, however. Some argue that the move reflects turf battles and empire-building.

"I'm not sure what they are supposed to achieve that the CIA doesn't," Joshua Foust, a former DIA Middle East analyst told the LA Times. "This seems like a territorial thing: 'Hey, the CIA has this why don't we have it, too?' … I'm pretty sceptical that it's necessary or good."
"It means this War was never political at all, the politics was all theatre, all just to keep the people distracted...."
"Proverbs for Paranoids 4: You hide, They seek."
"They are in Love. Fuck the War."

Gravity's Rainbow, Thomas Pynchon

"Ccollanan Pachacamac ricuy auccacunac yahuarniy hichascancuta."
The last words of the last Inka, Tupac Amaru, led to the gallows by men of god & dogs of war
Reply
#7
JUAN GONZÁLEZ: A legislative battle has erupted on Capitol Hill over a controversial House bill that critics say would allow private internet companies to hand over troves of confidential customer records and communications to the National Security Agency and other agencies. In a letter on Monday, 18 Democratic House members warned that unless specific limitations were put in place, the bill, quote, "would, for the first time, grant non-civilian federal agencies, such as the National Security Agency, unfettered access to information about Americans' internet activities and allow those agencies to use that information for virtually any purpose." The bill is titled the Cyber Intelligence Sharing and Protection Act, or simply CISPA.
Backers of the legislation say it is needed to help private companies crack down on foreign entitiesincluding the Chinese and Russian governmentscommitting online economic espionage that is stealing trade secrets from U.S. corporations and the government. But the bill has faced widespread criticism from online privacy advocates and even the Obama administration.
AMY GOODMAN: On Thursday, the White House threatened to veto the legislation, saying, quote, "The sharing of information must be conducted in a manner that preserves Americans' privacy, data confidentiality and civil liberties and recognizes the civilian nature of cyberspace. Cybersecurity and privacy are not mutually exclusive," they said. Critics also say the bill would essentially legalize a secret domestic surveillance program already being run by the National Security Agency.
Last week, a former top NSA official appeared on Democracy Now! to give his first TV interview. William Binney said domestic surveillance is already expanding under the Obama administration.
WILLIAM BINNEY: Actually, I think the surveillance has increased. In fact, I would suggest that they've assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens.
AMY GOODMAN: How many?
WILLIAM BINNEY: Twenty trillion.
AMY GOODMAN: Where do you get the number 20 trillion?
WILLIAM BINNEY: Just by the numbers of telecoms, it appears to me, from the questions that CNET posed to them in 2006, and they published the names and howwhat the responses were. I looked at that and said that anybody that equivocated was participating, and then estimated from that the numbers of transactions. That, by the way, estimate only was involving phone calls and emails. It didn't involve any queries on the net or any assemblesotherany financial transactions or credit card stuff, if they're assembling that. I do not know that.
AMY GOODMAN: National Security Agency whistleblower William Binney. To see the full interview with him, you can go to our website at democracynow.org.
We're joined now by two guests. Michelle Richardson is with us in Washington, D.C., legislative counsel for the American Civil Liberties Union. Jacob Appelbaum is back with us again here in Democracy Now!'s studios in New York, computer security researcher, developer and advocate for the Tor Project, a system that enables its users to communicate anonymously on the internet.
Michelle, let's begin with you. Talk about this legislation, this bill that is expected to be voted on this week, debates beginning today.
MICHELLE RICHARDSON: CISPA, the bill that will come up later today and probably be voted on tomorrow, will create an exception to all existing privacy laws so that companies can share very sensitive and personal information directly with the government, including military agencies like the National Security Agency. And then, once the government has it, they can repurpose it and use it for a number of things, including an undefined national security use. The violations of privacy are just amazing under this bill, and it's even invoked a veto threat from the Obama administration.
JUAN GONZÁLEZ: And specifically in terms of the new powers that this grant, what does this do to existing laws that protect the privacy of American citizens and requires the government to get even FISA warrants when it wants to actually do surveillance in particular situations?
MICHELLE RICHARDSON: Right. Current law now creates a presumption of privacy in our phone calls, emails and internet records, and they say that companies have to keep them private unless there's an emergency or the government serves them with a subpoena or warrant. And in one fell swoop, this bill will say that these privacy laws simply no longer apply. So, all of the process afforded under those laws, the protections, the congressional reporting, the role of a judge, all of that is swept away in one bill and will allow companies to decide how much and what type of information they want to turn over to the government. And it can include incredibly sensitive information, like the content of emails or internet use history. There's no obligation on the companies to extract the personally identifiable information. And that's the important thing to remember here, that information sharing may be a good thing. There are ways that it could be done, where companies would share technical data with the government that wouldn't invade privacy. But that's not what we're talking about. This bill is incredibly broad and will allow the companies to turn over even the personally identifiable information.
AMY GOODMAN: The chief author of CISPA, Republican Congress Member Mike Rogers, the chair of the House Intelligence Committee and a former FBI agent, when he introduced the bill in November, predicted privacy advocates would oppose the legislation.
REP. MIKE ROGERS: I expect that some will allege that the bill creates a new wide-ranging government surveillance program. This is false. The bill has nothing to do with government surveillance. It simply provides clear authority to the private sector, not the government, to identify and share cyber threat information. And remember what the threat is: up to a trillion dollars a year in lost intellectual property. The one thing that has set America apart from every other nation is our innovation in our intellectual property. If we lose that game, we lose this fight.
Moreover, the bill only permits sharing of cybersecurity threat information when a company is engaged in the protection of its own systems or networks or those of the corporate customer. Our bill does not require anyone to provide information to the government. Any sharing of information with the government is completely voluntary every step of the way. A government surveillance program that doesn't require any information privileged to the government shouldn't be a very good surveillance program. Now, I couldn't believe it. As an old FBI guy, we would say that is an unworkable event.
AMY GOODMAN: House Intelligence chair, Michigan's Republican Congress Member Mike Rogers, unveiling the legislation at a meeting hosted by the National Cable and Telecommunications Association, a lobbying powerhouse. The association's president, Michael Powell, praised the legislation. Powell is the former chair of the Federal Communications Commission and the son of former secretary of state, General Colin Powell.
MICHAEL POWELL: It's not an exaggeration to say, when it comes to cybersecurity, what you don't know can hurt you. And one of the most valuable aspects of this legislation is it deals with the most critical problem when industries and government face a challenge like this: inadequate information flow. You can't fix what you don't know. You can't work in cooperation and coordination with others when you're not able to effectively share information. I think the legislation we'll hear about today takes a dramatic and important step.
AMY GOODMAN: That was Michael Powell, formerly chair of the FCC. Michelle Richardson, your response?
MICHELLE RICHARDSON: Well, the advocacy and civil liberties community is united in their opposition to this bill. We all believe that this is an unjustifiable infringement on privacy. And while the sponsors speak about limitations, they're just not in the bill. We're being asked to just trust the companies and the NSA to work in secret and protect our privacy. And we know from the warrantless wiretapping scandal after 9/11, when these groups are allowed to work in private like this, they're going to invade our privacy.
JUAN GONZÁLEZ: Well, Michelle Richardson, there's been apparently a series of amendments proposed, some of them by liberal Democrats like John Lewis and others who are hoping to make portions of this legislation more palatable. Your sense of these attempts at soothing the rough edges of this legislation, but leaving it essentially intact?
MICHELLE RICHARDSON: Well, last night, the House Rules Committee decided which amendments would actually get a vote on the floor tomorrow, and they decided that amendments offered by Mr. Lewis or Jan Schakowsky or some of the other progressive members simply will not get a floor vote. And these were incredibly important amendments that would have squarely made Congress decide whether the military and the NSA would be able to collect internet records on innocent Americans. But Congress will not be able to vote on that this week, and instead they'll just have to vote no on the entire bill, to send the message that they don't want the military surveilling internet.
AMY GOODMAN: Interestingly, the legislation was co-sponsored by Democratic Congress Member Dutch Ruppersberger, the ranking member of the House Intelligence Committee. He has denied the bill would increase surveillance.
REP. DUTCH RUPPERSBERGER: What the bill basically does isin 1947, there was a bill, the intelligence bill, that really created what the rules or regulations were for CIA, NSA and all of the intelligence agencies. And what this bill basically does is allow a government entityin most situations, the NSA hereit allows them to give information to the private sector. The 1947 bill says, if it's classified information, you cannot give it to the other side. And how the bill really came together was this DIB pilot program. It's a pilot program that allowed the NSA, working with the providers, theI believe it was AT&T, it was Verizon and Qwestand allowed them to give that information over to the private companies to work to protect themselves. That worked extremely well. And as a result of that, we kind ofwe kind of modeled our bill after that.
AMY GOODMAN: Now, interestingly, the Obama administration at this point says that they would veto this, but that's Democratic Congress Member Dutch Ruppersberger. And among those who are supporting the legislation are major companies, ones that have actually opposed SOPA, the Stop Online [Piracy] Actfor example, Google, and then there's Facebook and these other companies. What do they have to gain, and what are the companies that are supporting it?
MICHELLE RICHARDSON: Last I heard, all of the major corporations that are involved with the internet are supporting this CISPA, the Rogers bill. And frankly, they're going to make out like bandits. Under this bill, if they share our private information, they get complete protection from liability. Consumers will no longer be able to assert their privacy rights that exist under current law and hold them accountable in court. They can't be prosecuted by the government like they currently can for illegal wiretapping or sharing information. They're getting FOIA exemptions, so that no one will ever know about these breaches or the things that they share with the government. They're really walking away here with maximum flexibility to share our personal information with minimum accountability and no enforcement to make sure that they are not oversharing and infringing on our privacy.
JUAN GONZÁLEZ: Well, Michelle Richardson, what are the prospects of this legislation passing, first in the House, and obviously then it would also have to pass in the Senate? And how would the White House react to its possible passage?
MICHELLE RICHARDSON: Well, we were very, very pleased to see that the Obama administration issued a veto threat yesterday and said, in very clear terms, that they believe that control of the internet needs to remain civilian, and the military shouldn't be routinely collecting information on innocent people. We expect the bill to probably pass tomorrow, but we expect a strong no vote. And even just a month ago, if this bill had been brought to the floor, it probably would have sailed through without much amendment at all. But the online organizing and the organizing by the advocacy community over the last month has really changed the game, and the members are more educated. And I think we're going to see a very strong no vote from both Democrats and Republicans tomorrow.
AMY GOODMAN: Michelle Richardson
MICHELLE RICHARDSON: Now, the Senate has its own alternative and is slated to vote on their bill in May. And it does include more protections, so it will come down to a conference between the House and the Senate to see which bill prevails.
AMY GOODMAN: Michelle Richardson, legislative counsel for the American Civil Liberties Union.

AMY GOODMAN: Our guest, Jacob Appelbaum, is back with us from last Friday. He's a computer security researcher, developer and advocate for the Tor Project, a system that enables its users to communicate anonymously on the internet. He's going to be holding a public education seminar today in New York City for people to protect themselves online and using their phones, using their computers. But right now, this legislation.
When SOPA was put forward, Jacob, the Stop Online Privacy sic Act, the Congress members, Republican and Democrat, thought it would sail through. And then there was just a wildfire on the internet, and they backed off. Michelle Richardson said she thinks it is possible it will pass tomorrow in the House, but the Obama administration has said it would veto it. They also said they'd veto the National Defense Authorization Act, and they ultimately didn't. But what are your thoughts? What kind of online activism is happening right now?
JACOB APPELBAUM: Well, I think a lot of people are organizing around this. I think the Electronic Frontier Foundation, in particular, deserves a great deal of respect for the work that they've done and what they've written about this. For example, they show pretty clearly that this is a dramatic expansion of essentially powers of surveillance, not just in terms of the government, but in terms of corporations and their ability to be held liable. So there is this extremely scary part of the bill with a two-year statute of limitations. And the problem is that in the cases that the EFF has been fighting with the NSA, the government
AMY GOODMAN: That's the Electronic Frontier Foundation.
JACOB APPELBAUM: Yeah. So theyessentially, the government has said that they invoke state secrets privilege, and so they've been in litigation for six years on some of their cases. So, a two-year statute of limitation, it's unlikely that we would even discover that our rights had been violated in that time frame. Additionally, FOIA exemptions would mean that companies wouldn't even be able, maybe, or would not disclose that information. So it'sthe deck is essentially stacked against regular people. And this is basically what Bill Binney was talking about last week when he was talking about the warrantless wiretapping program. It's as if this week they decided to legalize all the stuff that Bill warned about and said that was already occurring. So that's a pretty scary prospect.
AMY GOODMAN: I just want to correct one thing: I said the "Stop Online Privacy Act"; it's the Stop Online Piracy Act.
JUAN GONZÁLEZ: Piracy Act, right.
AMY GOODMAN: Juan?
JUAN GONZÁLEZ: Yeah, I wanted to ask you about a recent report by the Brookings Institute, not exactly a liberal or progressive think tank. But they did a paper called "Recording Everything: Digital Stories as an Enabler of Authoritarian Governments." And some of the quotes here are astonishing. They say, quote, "Plummeting digital storage costs will soon make it possible for authoritarian regimes to not only monitor known dissidents, but to also store the complete set of digital data associated with everyone within their borders."
They go on to say, "When all of the telephone calls in an entire country can be captured and provided to voice recognition software programmed to extract key phrases, and when video footage from public spaces can be correlated, in real time, to the conversations, text messages and social media traffic associated with the people occupying those spaces, the arsenal of responses available to a regime facing dissent will expand. ... Pervasive monitoring will provide what amounts to a time machine allowing authoritarian governments to perform retrospective surveillance."
This is where the United States is heading, where other authoritarian regimes, much more authoritarian regimes than ours, are heading around the world. And yet, the level of public opposition, especially among some young people, to this continued invasion of their privacy is not thatI mean, it's strong, it's growing, but it's not where it should be.
JACOB APPELBAUM: It's pretty concerning. I think one thing that's important to note here is that it's not a theoretical thing. For example, the WikiLeaks "Spy Files" showed that this kind of dragnet surveillance of all the phone calls of a country is in fact a product that is often sold. I believe it was Libya that purchased some of this equipment from a company called Amesys in France. So, it seems to me that people will try to dismiss it and say, "Well, they'll never be able to analyze that kind of data." But that's the problem they've been working on for the last 20 years, but especially in the last 10 years. So it's not only that this data is being collected, but now they want to share it with the Department of Homeland Security, with the FBI and the NSA, essentially legalizing military surveillance over U.S. civiliansand the whole planet, frankly. So this has dramatic international implications in addition to national implications. And this is the same FBI that abuses the national security letters that have been given to them in the USA PATRIOT Act that abuses their authority on a regular basis. And they want to be without some kind of judicial oversight for all of their actions.
AMY GOODMAN: Last week, Laura Poitras, the filmmaker, and you, Jacob Appelbaum, and the NSA former official, William Binney, were on the show, and we played that clip from the Open Society meeting that you attended two Mondays ago. Can you introduce this clip for us? Who is this?
JACOB APPELBAUM: So, my understanding is that this is the deputy general counsel of the FBI.
AMY GOODMAN: And you questioned her.
JACOB APPELBAUM: I did.
JACOB APPELBAUM: Are you including national security letters in your comment about believing that there is judicial oversight with the FBI's actions?
FBI DEPUTY GENERAL COUNSEL: National security letters and administrative subpoenas have the ability to have judicial oversight, yes.
JACOB APPELBAUM: How many of those actually do have judicial oversight, in percentage?
FBI DEPUTY GENERAL COUNSEL: What do you mean by that? How many have
JACOB APPELBAUM: I mean, every time you get a national security letter, you have to go to a judge? Or
FBI DEPUTY GENERAL COUNSEL: No, as you well know, national security letters, just like administrative subpoenas, you don't have to go to a judge. The statute does allow for the person on whom those are served to seek judicial review. And people have done so.
JACOB APPELBAUM: And in the case of the third parties, such as, say, the 2703(d) orders that were served on my according to the Wall Street Journal my Gmail account, my Twitter account, and my internet service provider account, the third parties were prohibited from telling me about it, so how am I supposed to go to a judge, if the third party is gagged from telling me that I'm targeted by you?
FBI DEPUTY GENERAL COUNSEL: There are times when we have to have those things in place. So, at some point, obviously, you became aware. So at some point, the person does become aware. But yes, the statute does allow us to do that. The statute allows us.
AMY GOODMAN: Now, again, that's the deputy general counsel for the FBI talking to you, who was just in the audience, Jacob Appelbaum. She said, "as you know," so she must know you sounded like you had a national security letter, one of, what, hundreds of thousands given by the FBI, and if you even reveal that you have one, you could face five years in jail. Have you been handed an NSL?
JACOB APPELBAUM: So, to the best of my knowledge, no, though there's some speculation that perhaps she was hinting at the national security letter which Google is trying to unseal right now in the Fourth Circuit, I believe. So it could be that she just accidentally disclosed that there is a national security letter about me, and "as I well know" could be some kind of allusion to that, which, if that's the case, then I hope that they hold her accountable for that kind of disclosure, since that seems to be something like they like to do to lots of people. So we'll see if they hold their own accountable, if that's true. And otherwise, maybe she was just suggesting I know quite a lot about this.
AMY GOODMAN: But then the content of what she said and how this fits in with this legislation?
JACOB APPELBAUM: I mean, it sounds to me like they are trying to expand that power to include all facets of the government, including the military, over civilian life with regard to surveillance and essentially to make it impossible for anyone to resist or to have judicial oversight. And that is a serious problem, in my opinion.
JUAN GONZÁLEZ: And how would legislation, for instance, thatlike this House legislation, affect the work of your organization, the Tor Project, or would it, if it was enacted? Because you are set up to be able to protect the anonymity of people communicating over the internet.
JACOB APPELBAUM: Well, I'd like to think that it would mean that we'd have a lot more people using Tor every day. But
AMY GOODMAN: That's T-O-R Project-dot-org?
JACOB APPELBAUM: Yeah. I mean, the network is made up of people who care, right? So someone downloads it and says, "I want to help," and then the network gets bigger. We don't run the network like Google runs the network. So, different people make it up. The problem is that if the U.S. government was allowed to spy on everything, they can try to watch all of the network. And that's where it starts to break down. So one of the scary things here is that we're just not even sure how to exist in a completewhat's called "global passive adversary world," where they can watch the entire internet. And so, this is, I think, an existential threat to anonymity online, to privacy and to security of everyday people.
AMY GOODMAN: I mean, according to the Electronic Frontier Foundation, basic privacy practices that EFF recommends, like using the anonymizing service of Tor or even encrypting your emails, could be considered an indicator of a threat, under the Senate bills.
JACOB APPELBAUM: Yeah, I think that that's a really interesting tell about this. They suggest that people who protect themselves online, especially from the state, which is known to abuse its authority and power against innocent people on a regular basisto suggest that that means that you're a threat is an absolute scary, scary prospect.
AMY GOODMAN: Let's go to William Binney, who you were on with last week, the National Security Agency whistleblower who appeared on Democracy Now! We asked him about the NSA's practice of collecting and storing emails.
AMY GOODMAN: Do you believe all emails, the government has copies of, in the United States?
WILLIAM BINNEY: I would thinkI believe they have most of them, yes.
AMY GOODMAN: And you're speaking from a position where you would know, considering your position in the National Security Agency.
WILLIAM BINNEY: Right. All they would have to do is put various Narus devices at various points along the network, at choke points or convergent points, where the network converges, and they could basically take down and have copies of most everything on the network.
AMY GOODMAN: That, again, National Security Agency whistleblower William Binney. He spent nearly 40 years at the agency but retired about a month after September 11, 2001, due to concerns over unchecked domestic surveillance.
WILLIAM BINNEY: But after 9/11, all the wraps came off for NSA, and they decided tobetween the White House and NSA and CIA, they decided to eliminate the protections on U.S. citizens and collect on domestically. So they started collecting from a commercialthe one commercial company that I know of that participated provided over 300probably, on the average, about 320 million records of communication of a U.S. citizen to a U.S. citizen inside this country.
AMY GOODMAN: What company?
WILLIAM BINNEY: AT&T. It was long-distance communications. So they were providing billing data. At that point, I knew I could not stay, because it was a direct violation of the constitutional rights of everybody in the country. Plus it violated the pen register law and Stored Communications Act, the Electronic Privacy Act, the intelligence acts of 1947 and 1978. I mean, it was just this whole series ofplus all the laws covering federal communications governing telecoms. I mean, all those laws were being violated, including the Constitution. And that was a decision made that wasn't going to be reversed, so I could not stay there. I had to leave.
AMY GOODMAN: That was NSA whistleblower William Binney. I mean, he's saying some explosive stuff. Six years later, in 2007, the FBI raided his home, pushing aside his son, his wife, heldhe was in the shower. He also is a diabetic amputee. They put a gun to his head, the FBI. He was never charged with anything. This is a man who worked for the NSA for almost 40 years. Talk about the significance of what he's saying here, from Narus to reading all the email.
JACOB APPELBAUM: Sure. I mean, basically what he's saying is that the government is lying about what they are doing and what they have done, and they have not been held accountable in the last 10 years. And so, when they want to dramatically expand their ability to do these things in a so-called legal manner, it's important to note what they're trying to do is to legalize what they have already been doing and to suggest that they will be held accountable in a system where they already are not held accountable when they're breaking the law. So if it were legal, it seems incredibly fishy that things would change and it would somehow improve, when in fact it seems to be just getting worse.
So what Binney is saying here is amazing, because he spent 40 years at the NSA. To get a guy like that to come onto a show like this and to talk with us is an incredible thing. I mean, that says to me that he believes that it is a threat to national security in a way that everyone should be concerned about.
AMY GOODMAN: We have to wrap up, but I want to go to the Whitney event you had, the Whitney Art Museum on Friday night, where a document was handed out listing the addresses of eight possible domestic NSA interception points. What are these points? What are they?
JACOB APPELBAUM: Well, I think it's important for people to recognize the agency that they have every day in their life. And so, if the NSA is doing surveillance, as Mark Klein showed from AT&T's side, I thought it would be interesting to
AMY GOODMAN: He exposed AT&T spying on Americans' phone calls.
JACOB APPELBAUM: With the NSA. So these addresses are addresses I believe are potential domestic NSA interception points, similar to the ones that Mark Klein exposed. And there's a website. IXmaps is the name of it, and it's a Canadian site. And they actually show when your internet traffic goes through potential NSA interception points, so you can actually test your internet connection. And that's the Internet Exchange Maps project.
AMY GOODMAN: Where are they?
JACOB APPELBAUM: They are all listed on that website now as a result of it being released at the Whitney thing.
AMY GOODMAN: Do you know the cities? What the pamphlet said: St. Louis, Los Angeles, San Francisco, Atlanta, Chicago, New York, Bridgeton, Missouri.
JACOB APPELBAUM: Yeah. It would be great if people actually went and photographed these buildings and talked to the employees there and see if they're NSA people going in and out. They're not confirmed. This is something where people now have something that they can do. I mean, what they also need to do is visit the Electronic Frontier Foundation's website, eff.org, and actually take action against CISPA. We have to stop this legislation from passing. It is an incredible threat to our privacy, and it is a militarization of cyberspace.
AMY GOODMAN: I want to point out one last thing, and that is that the chair of the Intelligence Committee, Mike Rogershe's the former FBI agenthe made headlines in August of 2010 when he called for the execution of accused Army whistleblower Bradley Manning for allegedly leaking secret documents to WikiLeaks. Rogers appeared on MSNBC.
REP. MIKE ROGERS: Any of the operations of a soldier in the field that's released could lead to their death. That is an act of treason. And an act of treason is a capital offense, and it should be. That's my point. I argue that anyone that releases information of a classified nature to the enemy, to a third party that our enemy uses, is an act of treason.
AMY GOODMAN: That is the chair of the Intelligence Committee, Republican Congress Member Mike Rogers of Michigan, who is the author of CISPA. Final comment, Jacob Appelbaum?
JACOB APPELBAUM: Blowing the whistle on war crimes should not be a crime.
AMY GOODMAN: We're going to leave it there. Jacob Appelbaum is doing a public security lesson today from 12:00 to 3:00 at 56 Walker Street in New York City. Jacob Appelbaum, computer security researcher, developer and advocate for the Tor Projectthat's T-O-R Project-dot-orgwhich enables its users to communicate anonymously on the internet.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  New Malware spying at Internet service & telecommunications companies..and you! Peter Lemkin 2 5,923 25-11-2014, 09:13 AM
Last Post: Magda Hassan
  Government use of private tech companies to spy on citizens Ed Jewett 7 15,006 07-08-2014, 08:29 AM
Last Post: Magda Hassan
  Surveillance Blowback: The Making of the U.S. Surveillance State, 1898-2020 Keith Millea 2 3,609 15-07-2013, 10:07 PM
Last Post: Jan Klimkowski
  Air Force video reveals X-37B space plane landing Ed Jewett 3 3,565 18-06-2012, 07:15 AM
Last Post: Peter Lemkin
  Georgia Tech Online Spying Ed Jewett 0 2,237 07-12-2011, 06:55 AM
Last Post: Ed Jewett
  Why criminal governments spy on citizens Ed Jewett 0 2,669 07-10-2011, 11:17 PM
Last Post: Ed Jewett
  Secret Diplomatic Cables Reveal Microsoft's 'Win-Win' Deal with Tunisian Police State Ed Jewett 0 2,781 11-09-2011, 09:29 PM
Last Post: Ed Jewett
  Torture Island: Where Offshore Meets the National Surveillance State Ed Jewett 0 2,912 05-09-2011, 08:36 PM
Last Post: Ed Jewett
  Schools Spying on Students at Home Thru Laptop Webcams Bruce Clemens 5 4,391 19-02-2010, 10:48 PM
Last Post: Keith Millea

Forum Jump:


Users browsing this thread: 1 Guest(s)