Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Octafish

(55,745 posts)
Wed Aug 27, 2014, 09:52 AM Aug 2014

The NSA Search Engine is a Keyhole to You

And it's largely owned and operated by the corporate cronies of War Inc, the BFEE.



Obese Intelligence

The NSA Search Engine

by BINOY KAMPMARK
CounterPunch, Aug. 27, 2014

The Intercept was already getting the intelligence community excited with its revelations that the National Security Agency had decided to mimic inspector Google. Through creating a search engine in the manner of those pro-transparency pioneers, the intelligence community was turning the tables on the very idea of searchable information. Why keep it the operating preserve of the public? The search engine has, as it stands, over 850 billion records about phone calls, emails, cellphone locations, and internet chats.

The revelations have a few implications, the most obvious one confirming the seamless transition between intelligence work on the one hand, and the policing function on the other. The distinction between intelligence communities whose interests are targeting matters foreign to the polity; and those who maintain order within the boundaries of a state in a protective capacity, prove meaningless in this form. The use of ICREACH makes it clear that the Drug Enforcement Administration and the Federal Bureau of Investigation are regular clients and users of the system.

A 2010 memorandum from the Chief of Liaison Support Group at the CIA titled “CIA colleagues enthusiastically welcome NSA training” speaks with praise about those “NSA-ers embedded in CIA’s workspaces”. Indeed, it speaks very highly of the “information sharing” ethos of the NSA within the Intelligence Community, channelling Google’s operating rationale within more secret spaces. Furthermore, in 2010, the relevant data base provided the NSA “and second Party telephony metadata events to over 1000 analysts across 23 US Intelligence Community agencies.”

Those keen on squirreling information into such a data base are no doubt thrilled by the prospects that it can be made available to the “appropriate” sources. ICREACH has become one of the largest, if not largest system for the internal processing and sharing of surveillance records within the United States. It is not, according to The Intercept, connected with the NSA database that stores data on Americans’ phone calls pursuant to s. 215 of the Patriot Act.

The difference between the two accumulated pools of data is one of scope: ICREACH is mammoth in reach, and positively defiant in its push against the law; the database gathered under s. 215 guidelines is minute in comparison, confined to the dangerously pertinent idea of combating terrorism and like threats. ICREACH exists outside the system of court orders, being a creature of Executive Order 12333. The document, instituted by President Ronald Reagan in 1981, was intended to add robustness to the intelligence gathering capabilities of the US intelligence community.

CONTINUED...

http://www.counterpunch.org/2014/08/27/the-nsa-search-engine/

----------------------------------------------------------------------------------------------------------------

Those "in the know" have something the rest of us -- the "Little People" -- don't have access to: Inside Information. Judging by the historical record and the revolving door between the secret government and private industry, it doesn't get shared in a way that's best for democracy. No wonder the rich get richer and the rest of the country becomes poorer. And the wars for personal profit and concentrated secret power continue without end.

22 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
The NSA Search Engine is a Keyhole to You (Original Post) Octafish Aug 2014 OP
I figure interested parties has had the capability to know anything they want for many decades. gordianot Aug 2014 #1
True. The NAZIs the CIA brought in to fight the Commies were owned by the Commies. Octafish Aug 2014 #2
Important to add what Sen. Frank Church (D-Idaho) said in 1975 re NSA Surveillance Octafish Aug 2014 #3
I tend to view human behavior in a biological behavioral context. gordianot Aug 2014 #7
The idiot who replaced Church was an embarrassment to the state of Idaho IDemo Aug 2014 #19
k&r for exposure. n/t Laelth Aug 2014 #4
How VP Poppy of CIA got so big when Pruneface was Head Honcho Octafish Aug 2014 #8
Holy shit, I have never seen that photo before. If looks could kill... AtheistCrusader Aug 2014 #13
Here's one that has me wondering: Bill Clinton, George Bush & George Wallace Octafish Aug 2014 #14
K&R. nt OnyxCollie Aug 2014 #5
The NSA shares what they find. Octafish Aug 2014 #11
Is this K & R being recorded? L0oniX Aug 2014 #6
Down to the penny. Octafish Aug 2014 #15
K & R !!! WillyT Aug 2014 #9
I.B.M. rings a bell that tolls. Octafish Aug 2014 #16
This message was self-deleted by its author questionseverything Aug 2014 #10
Well, I hope they like porn. AtheistCrusader Aug 2014 #12
If anybody should know... Octafish Aug 2014 #17
John Negroponte was one beneficiary of the ability to GOOGLE your "Chat Handle" Octafish Aug 2014 #18
EO 12333 Octafish Aug 2014 #20
K&R woo me with science Aug 2014 #21
''When the president does it, it's not illegal.'' -- Richard Milhous Nixon, Crook Octafish Aug 2014 #22

gordianot

(15,237 posts)
1. I figure interested parties has had the capability to know anything they want for many decades.
Wed Aug 27, 2014, 10:11 AM
Aug 2014

Technology has only made it more convenient. Knowing though is ultimately controlling, the question is Who? Closely followed by Why? Answers may vary.

Octafish

(55,745 posts)
2. True. The NAZIs the CIA brought in to fight the Commies were owned by the Commies.
Wed Aug 27, 2014, 10:48 AM
Aug 2014

Joseph Trento chronicled the case of one Igor Orlov. Supposedly a loyal NAZI Gehlen Org superspy brought to America, really Orlov was loyal to the Kremlin. Dulles and Co. loved what he had to say, despite knowing him as a "man with the soul of a sociopath." The woman with him in the photo below is his wife, in whom he never totally confided.



Orlov’s birth name was Aleksandr Grigoryevich Kopatzky. He was a loyal Stalinist. He volunteered to serve the Kremlin as a double-agent against the NAZIs. He was ordered to fly over NAZI occupied land, shoot the pilot and crew in cold blood, and bail out. He did and was wounded by troops on the ground. He told the story that he wanted to defect from the Soviets. He even gave up the names of several lower Soviet agents who had previously penetrated the Nazis. These men were executed, but helped get Orlov accepted within the Gehlen spy network.



(William) Harvey told (Paul) Garbler that he would be running the Orlov operation, and he explained that he had “major plans” for it. “Nothing,” Harvey said, “is more important than trying to get our own agents recruited in Karlshorst.” He briefed Garbler on Orlov’s use of women to compromise Soviet officers. “To be told you are to be running an operation involving 11 whores and a one-armed piano player was pretty interesting …,” said Garbler. “They wanted me to expand the operation…. They figured that with more girls, we had a better chance of recruiting more officers.” At the outset of a CIA career that was full of hope and promise, Garbler had no way of knowing that he was walking into a nightmare that would dominate the rest of his life.

Garbler’s first meeting at a safe house with Orlov, like his first meeting with Harvey, was unforgettable: “He was a tiny little man. He was perfectly proportioned with those piercing blue eyes and dressed to the nines. He was extremely formal. He was very businesslike. He had this way of capturing your attention…. We never developed a personal relationship. He seemed so very serious.” It was the first of over one hundred safe house sessions between the two men.

From the start, Garbler found the Orlov operation strange. He did not understand why he had to deal with Orlov in German when he and Orlov both spoke Russian fluently. It was one of many things he neve understood about running the little man.

SOURCE: Joseph Trento, "The Secret History of the CIA," pp 130-131.



So, when the NAZIs in CIA wanted to do NAZI things, like experiment and torture, they may have been doing so for their former masters, in addition to their (then-) current USG employer.



CIA-Nazi Link Grows Clearer as More Documents Come to Light

Nazi war criminal Adolf Eichmann stands trial in Jerusalem in 1961. Apparently, the CIA knew of his whereabouts as early as 1958.

Ron Kampeas
Jewish Telegraphic Agency
WASHINGTON

A former Nazi rose to the highest ranks of a Western intelligence agency - and was a Soviet mole. A lead to Adolf Eichmann was ignored. A spy whose pathological lies made him useless, but who still escaped prosecution for war crimes.

These are among the revelations found among some 8 million pages of documents released here Tuesday that deal with German and Japanese war crimes, including 27,000 pages that detail the relationship after World War II between U.S. government agencies and suspected Nazis war criminals.

The message threading the documents was clear: The price one pays for consorting with evil men far outweighs the return.

"Using very bad people can have very bad consequences," Elizabeth Holtzman, a former U.S. congresswoman and a member of the Interagency Working Group that released the documents, said at a news conference last Tuesday at the National Archives. The group was established in 1999 to declassify rooms full of documents related to Nazi war crimes.

The mandate was later extended to Japanese war crimes.

CONTINUED…

http://www.jweekly.com/article/full/29521/declassified-archive-shows-cia-protected-nazis-after-wwii/



That's why I don't go for secret government. It lets people with the secrets, no matter how noble or well-informed, decide what's best for the rest of us. As shown by the history of the last 51 years, it hasn't worked out, except for the super-wealthy served by the Karl Roves, Ralph Reeds and Grover Norquists among us.

Octafish

(55,745 posts)
3. Important to add what Sen. Frank Church (D-Idaho) said in 1975 re NSA Surveillance
Wed Aug 27, 2014, 11:07 AM
Aug 2014

From back when ECHELON was new...



Frank Church (D-Idaho) explained why, speaking of the awesome power to eavesdrop on every American the NSA possessed in 1976:

[font color="blue"]“That capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology.

"I don’t want to see this country ever go across the bridge. I know the capability that is there to make tyranny total in America, and we must see it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.” [/font color]

-- Sen. Frank Church (D-Idaho) FDR New Deal, Liberal, Progressive, World War II combat veteran. Evidently targeted for removal by the conservative spy class, he narrowly lost re-election a few years later in the "Reagan Landslide." A brave man, the NSA was turned on him, a coincidence, certainly.

http://journals.democraticunderground.com/Octafish/277

PS: Sorry to be so darn pedantic, gordianot. Thank you for knowing the why.

gordianot

(15,237 posts)
7. I tend to view human behavior in a biological behavioral context.
Wed Aug 27, 2014, 11:39 AM
Aug 2014

As a species we have evolved an impressive degree of pattern recognition along with our ancestors ancient need for an Alpha leader. These imperatives will always conflict and in my opinion are central to the human dilemma. The problem is there are too many of us for an Alpha leader as ruling factions compete for control. Great articles and observations, may we continue to evolve, no reason to be sorry. I appreciate and value your opinion.

IDemo

(16,926 posts)
19. The idiot who replaced Church was an embarrassment to the state of Idaho
Thu Aug 28, 2014, 09:24 AM
Aug 2014

And a blueprint for the coming decades of Republican morons.

Octafish

(55,745 posts)
8. How VP Poppy of CIA got so big when Pruneface was Head Honcho
Wed Aug 27, 2014, 11:43 AM
Aug 2014

In Detroit, at the 1980 GOP nominating convention:



After the election, the relationship really changed:



George Bush Takes Charge

The Uses of "Counter-Terrorism"

By Christopher Simpson
Covert Action Quarterly 58

A paper trail of declassified documents from the Reagan‑Bush era yields valuable information on how counter‑terrorism provided a powerful mechanism for solidifying Bush's power base and launching a broad range of national security initiatives.

During the Reagan years, George Bush used "crisis management" and "counter‑terrorism" as vehicles for running key parts of the clandestine side of the US government.

Bush proved especially adept at plausible denial. Some measure of his skill in avoiding responsibility can be taken from the fact that even after the Iran‑Contra affair blew the Reagan administration apart, Bush went on to become the "foreign policy president," while CIA Director William Casey, by then conveniently dead, took most of the blame for a number of covert foreign policy debacles that Bush had set in motion.

The trail of National Security Decision Directives (NSDDS) left by the Reagan administration begins to tell the story. True, much remains classified, and still more was never committed to paper in the first place. Even so, the main picture is clear: As vice president, George Bush was at the center of secret wars, political murders, and America's convoluted oil politics in the Middle East.

SNIP...

Reagan and the NSC also used NSDDs to settle conflicts among security agencies over bureaucratic turf and lines of command. It is through that prism that we see the first glimmers of Vice President Bush's role in clandestine operations during the 1980s.

CONTINUED...



More details from the good professor:



EXCERPT...

NSDD 159. MANAGEMENT OF U.S. COVERT OPERATIONS, (TOP SECRET/VEIL‑SENSITIVE), JAN. 18,1985

The Reagan administration's commitment to significantly expand covert operations had been clear since before the 1980 election. How such operations were actually to be managed from day to day, however, was considerably less certain. The management problem became particularly knotty owing to legal requirements to notify congressional intelligence oversight committees of covert operations, on the one hand, and the tacitly accepted presidential mandate to deceive those same committees concerning sensitive operations such as the Contra war in Nicaragua, on the other.

The solution attempted in NSDD 159 was to establish a small coordinating committee headed by Vice President George Bush through which all information concerning US covert operations was to be funneled. The order also established a category of top secret information known as Veil, to be used exclusively for managing records pertaining to covert operations.

[font color="red"]The system was designed to keep circulation of written records to an absolute minimum while at the same time ensuring that the vice president retained the ability to coordinate US covert operations with the administration's overt diplomacy and propaganda.

Only eight copies of NSDD 159 were created. The existence of the vice president's committee was itself highly classified.
[/font color] The directive became public as a result of the criminal prosecutions of Oliver North, John Poindexter, and others involved in the Iran‑Contra affair, hence the designation "Exhibit A" running up the left side of the document.

CONTINUED...

CovertAction Quarterly no 58 Fall 1996 pp31-40.



This all used to be online, easily found via the GOOGLE. It's gone now, for some strange reason.

Octafish

(55,745 posts)
14. Here's one that has me wondering: Bill Clinton, George Bush & George Wallace
Wed Aug 27, 2014, 04:21 PM
Aug 2014

Kennebunkport, Maine, July 30, 1983.



Wallace and his third wife, the former Lisa Taylor, meet with Vice President George Bush and Arkansas Gov. Bill Clinton at a lobster bake at Bush's residence at Kennebunkport, Maine, July 30, 1983. The third Mrs. Wallace, whom the governor married in 1981, was 30 years his junior and half of a country-western singing duo, Mona and Lisa, who had performed during his campaign in 1968.

CREDIT: AP/Birmingham Post

SOURCE: http://www.cbsnews.com/pictures/george-wallace/13/

George Wallace did all he could to oppose President Kennedy and his administration's policy to integrate public schools, including the University of Alabama.

Something else important to know: Wallace’s running mate in 1968 was Gen. Curtis LeMay, who exhibited insubordination to President Kennedy during the Cuban Missile Crisis.

Octafish

(55,745 posts)
11. The NSA shares what they find.
Wed Aug 27, 2014, 12:24 PM
Aug 2014
NSA Shares Its Data Wealth

"The idea that the government is making it easier for not only national security agencies but also agencies dealing with domestic law to access this information is troubling," said the ACLU's Neema Guliani, "and the idea that you don't know what was collected and can't challenge how the information was gathered raises concern that the (NSA) abuses ... are bleeding over into other areas."

By Richard Adhikari
TechNewsWorld.com, 08/26/14

EXCERPT...

"The idea that the government is making it easier for not only national security agencies but also agencies dealing with domestic law to access this information is troubling," Neema Guliani, legislative counsel at the American Civil Liberties Union, told TechNewsWorld.

"And the idea that you don't know what was collected and can't challenge how the information was gathered raises concern that the abuses we've seen in the NSA architecture are bleeding over into other areas," she continued.

Fear, Uncertainty and Doubt

"If the reports are accurate, ICREACH demonstrates the sensitivity of large-scale collection of personal information," Harley Geiger, senior counsel at the Center for Democracy & Technology, told TechNewsWorld.

"No piece of information is collected in a vacuum, and data aggregation paints a detailed picture of an individual," he elaborated.

Indeed, "we kill people based on metadata," former CIA head Michael Hayden said during a panel discussion.

CONTINUED...

http://www.technewsworld.com/story/80945.html?rss=1

Makes one wonder why some pols get ahead and others get left behind.

Octafish

(55,745 posts)
15. Down to the penny.
Wed Aug 27, 2014, 05:06 PM
Aug 2014

Anyone know when it started? 1947?

The late Steve Kangas made a good case for "why the richest 1 percent have exploded ahead since 1975, with the help of the New Right, Corporate America and, surprisingly, the CIA."



The Origins of the Overclass

By Steve Kangas

The wealthy have always used many methods to accumulate wealth, but it was not until the mid-1970s that these methods coalesced into a superbly organized, cohesive and efficient machine. After 1975, it became greater than the sum of its parts, a smooth flowing organization of advocacy groups, lobbyists, think tanks, conservative foundations, and PR firms that hurtled the richest 1 percent into the stratosphere.

The origins of this machine, interestingly enough, can be traced back to the CIA. This is not to say the machine is a formal CIA operation, complete with code name and signed documents. (Although such evidence may yet surface — and previously unthinkable domestic operations such as MK-ULTRA, CHAOS and MOCKINGBIRD show this to be a distinct possibility.) But what we do know already indicts the CIA strongly enough. Its principle creators were Irving Kristol, Paul Weyrich, William Simon, Richard Mellon Scaife, Frank Shakespeare, William F. Buckley, Jr., the Rockefeller family, and more. Almost all the machine's creators had CIA backgrounds.

During the 1970s, these men would take the propaganda and operational techniques they had learned in the Cold War and apply them to the Class War. Therefore it is no surprise that the American version of the machine bears an uncanny resemblance to the foreign versions designed to fight communism. The CIA's expert and comprehensive organization of the business class would succeed beyond their wildest dreams. In 1975, the richest 1 percent owned 22 percent of America’s wealth. By 1992, they would nearly double that, to 42 percent — the highest level of inequality in the 20th century.

How did this alliance start? The CIA has always recruited the nation’s elite: millionaire businessmen, Wall Street brokers, members of the national news media, and Ivy League scholars. During World War II, General "Wild Bill" Donovan became chief of the Office of Strategic Services (OSS), the forerunner of the CIA. Donovan recruited so exclusively from the nation’s rich and powerful that members eventually came to joke that "OSS" stood for "Oh, so social!"

Another early elite was Allen Dulles, who served as Director of the CIA from 1953 to 1961. Dulles was a senior partner at the Wall Street firm of Sullivan and Cromwell, which represented the Rockefeller empire and other mammoth trusts, corporations and cartels. He was also a board member of the J. Henry Schroeder Bank, with offices in Wall Street, London, Zurich and Hamburg. His financial interests across the world would become a conflict of interest when he became head of the CIA. Like Donavan, he would recruit exclusively from society’s elite.

CONTINUED...

http://www.huppi.com/kangaroo/L-overclass.html



Clark Clifford was in on at the beginning, when the National Security Act of 1947 was created, including the two lines of fine print enabling CIA to have its way with operations. Clifford also, decades later, proved instrumental in bringing the corrupt BCCI into American banking.

What's changed since 1947? The rich get richer, wars without end for unlimited and unaccounted trillions in profit, and their minions have a hand on, if not control of, the Bomb.

Octafish

(55,745 posts)
16. I.B.M. rings a bell that tolls.
Wed Aug 27, 2014, 05:30 PM
Aug 2014

The company and its Hollerith machines enabled the fascists to tabulate census data and find out "who was who?" and "who did what?"and "who lives where?"



The IBM Hollerith machines and the punch cards they used helped the NAZI government process information, including religious information. Also tabulated were "how many" of each race and at "what address" they resided also were recorded.



IBM & "Death's Calculator"

by Edwin Black

EXCERPT...

When the Reich needed to mount a systematic campaign of Jewish economic disenfranchisement and later began the massive movement of European Jews out of their homes and into ghettos, once again, the task was so prodigious it called for a computer. But in 1933, no computer existed. When the Final Solution sought to efficiently transport Jews out of European ghettos along railroad lines and into death camps, with timing so precise the victims were able to walk right out of the boxcar and into a waiting gas chamber, the coordination was so complex a task, this too called for a computer. But in 1933, no computer existed.

However, another invention did exist: the IBM punch card and card sorting system-a precursor to the computer. IBM, primarily through its German subsidiary, made Hitler's program of Jewish destruction a technologic mission the company pursued with chilling success. IBM Germany, using its own staff and equipment, designed, executed, and supplied the indispensable technologic assistance Hitler's Third Reich needed to accomplish what had never been done before-the automation of human destruction. More than 2,000 such multi-machine sets were dispatched throughout Germany, and thousands more throughout German-dominated Europe. Card sorting operations were established in every major concentration camp. People were moved from place to place, systematically worked to death, and their remains cataloged with icy automation.

SNIP...

I was haunted by a question whose answer has long eluded historians. The Germans always had the lists of Jewish names. Suddenly, a squadron of grim-faced SS would burst into a city square and post a notice demanding those listed assemble the next day at the train station for deportation to the East. But how did the Nazis get the lists? For decades, no one has known. Few have asked.

The answer: IBM Germany's census operations and similar advanced people counting and registration technologies. IBM was founded in 1898 by German inventor Herman Hollerith as a census tabulating company. Census was its business. But when IBM Germany formed its philosophical and technologic alliance with Nazi Germany, census and registration took on a new mission. IBM Germany invented the racial census-listing not just religious affiliation, but bloodline going back generations. This was the Nazi data lust. Not just to count the Jews — but to identify them.

CONTINUED...

http://www.jewishvirtuallibrary.org/jsource/Holocaust/gypibm.html



I wonder what they're capable of today, knowing what we've learned via Snowden and other whistleblowers about the vast US government spy network pointing at the American people.

Response to Octafish (Original post)

Octafish

(55,745 posts)
17. If anybody should know...
Wed Aug 27, 2014, 10:43 PM
Aug 2014
Ex-NSA Chief Mocks Snowden Fans: ‘Twentysomethings Who Haven’t Talked To Opposite Sex In 5 Years’

by Evan McMurry | 4:09 pm, August 6th, 2013

Calling their demands ‘unsatisfiable,’ former National Security Agency director Michael Hayden wondered if those sympathetic to leaker Edward Snowden’s plight might respond to his arrest with cyber-attacks. In a speech on Tuesday, Hayden also criticized the lifestyle of the hackers themselves.

“If and when our government grabs Edward Snowden, and brings him back here to the United States for trial, what does this group do?” Hayden said, calling them “nihilists, anarchists, activists, Lulzsec, Anonymous, twentysomethings who haven’t talked to the opposite sex in five or six years.”

“Who are they going after?” Hayden asked. “Who for them are the World Trade Centers?”

Hayden, who ran the NSA during the early years of the Patriot Act, was speaking on cybersecurity at the Bipartisan Policy Center.

“Certainly Mr Snowden has created quite a stir among those folks who are very committed to transparency and global transparency and the global web, kind of ungoverned and free,” he told the crowd. “And I don’t know that there’s a logic between trying to [punish] America or American institutions for his arrest, but I hold out the possibility. I can sit here and imagine circumstances and scenarios, but they’re nothing more than imaginative.”

CONTINUED...

http://www.mediaite.com/online/ex-nsa-chief-mocks-snowden-fans-twentysomethings-who-havent-talked-to-opposite-sex-in-5-years/


Octafish

(55,745 posts)
18. John Negroponte was one beneficiary of the ability to GOOGLE your "Chat Handle"
Thu Aug 28, 2014, 09:19 AM
Aug 2014

As Director of National Intelligence, Reagan's man on El Salvador and its Death Squads had access to the kind of information on American's private communications, connections, and interests that would have amazed KGB boss Lavrentiy Beria.



The Surveillance Engine: How the NSA Built Its Own Secret Google

By Ryan Gallagher
The Intercept, 25 Aug 2014

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept.

SNIP...

One-Stop Shopping

The mastermind behind ICREACH was recently retired NSA director Gen. Keith Alexander, who outlined his vision for the system in a classified 2006 letter to the then-Director of National Intelligence John Negroponte. The search tool, Alexander wrote, would “allow unprecedented volumes of communications metadata to be shared and analyzed,” opening up a “vast, rich source of information” for other agencies to exploit. By late 2007 the NSA reported to its employees that the system had gone live as a pilot program.

The NSA described ICREACH as a “one-stop shopping tool” for analyzing communications. The system would enable at least a 12-fold increase in the volume of metadata being shared between intelligence community agencies, the documents stated. Using ICREACH, the NSA planned to boost the amount of communications “events” it shared with other U.S. government agencies from 50 billion to more than 850 billion, bolstering an older top-secret data sharing system named CRISSCROSS/PROTON, which was launched in the 1990s and managed by the CIA.

To allow government agents to sift through the masses of records on ICREACH, engineers designed a simple “Google-like” search interface. This enabled analysts to run searches against particular “selectors” associated with a person of interest—such as an email address or phone number—and receive a page of results displaying, for instance, a list of phone calls made and received by a suspect over a month-long period. The documents suggest these results can be used reveal the “social network” of the person of interest—in other words, those that they communicate with, such as friends, family, and other associates.

The purpose of ICREACH, projected initially to cost between $2.5 million and $4.5 million per year, was to allow government agents to comb through the NSA’s metadata troves to identify new leads for investigations, to predict potential future threats against the U.S., and to keep tabs on what the NSA calls “worldwide intelligence targets.”

However, the documents make clear that it is not only data about foreigners’ communications that are available on the system. Alexander’s memo states that “many millions of…minimized communications metadata records” would be available through ICREACH, a reference to the process of “minimization,” whereby identifying information—such as part of a phone number or email address—is removed so it is not visible to the analyst. NSA documents define minimization as “specific procedures to minimize the acquisition and retention [of] information concerning unconsenting U.S. persons”—making it a near certainty that ICREACH gives analysts access to millions of records about Americans. The “minimized” information can still be retained under NSA rules for up to five years and “unmasked” at any point during that period if it is ever deemed necessary for an investigation.

The Brennan Center’s Goitein said it appeared that with ICREACH, the government “drove a truck” through loopholes that allowed it to circumvent restrictions on retaining data about Americans. This raises a variety of legal and constitutional issues, according to Goitein, particularly if the data can be easily searched on a large scale by agencies like the FBI and DEA for their domestic investigations.

CONTINUED...

https://firstlook.org/theintercept/article/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/

Octafish

(55,745 posts)
20. EO 12333
Thu Aug 28, 2014, 09:39 AM
Aug 2014
The executive order that led to mass spying, as told by NSA alumni

Feds call it “twelve triple three”; whistleblowers says it's the heart of the problem.

by Cyrus Farivar
ArsTechnica, Aug 27 2014, 9:00pm EDT

One thing sits at the heart of what many consider a surveillance state within the US today.

The problem does not begin with political systems that discourage transparency or technologies that can intercept everyday communications without notice. Like everything else in Washington, there’s a legal basis for what many believe is extreme government overreach—in this case, it's Executive Order 12333, issued in 1981.

“12333 is used to target foreigners abroad, and collection happens outside the US," whistleblower John Tye, a former State Department official, told Ars recently. "My complaint is not that they’re using it to target Americans, my complaint is that the volume of incidental collection on US persons is unconstitutional.”

The document, known in government circles as "twelve triple three," gives incredible leeway to intelligence agencies sweeping up vast quantities of Americans' data. That data ranges from e-mail content to Facebook messages, from Skype chats to practically anything that passes over the Internet on an incidental basis. In other words, EO 12333 protects the tangential collection of Americans' data even when Americans aren't specifically targeted—otherwise it would be forbidden under the Foreign Intelligence Surveillance Act (FISA) of 1978.

In a May 2014 interview with NBC, former NSA contractor Edward Snowden said that he specifically asked his colleagues at the NSA whether an executive order could override existing statutes. (They said it could not.) Snowden’s lawyer, Jesselyn Radack, told Ars that her client was specifically “referring to EO 12333.”

CONTINUED...

http://arstechnica.com/tech-policy/2014/08/a-twisted-history-how-a-reagan-era-executive-order-led-to-mass-spying/

SIDEBAR:



EO 12333, SECTION 2.3 PARAGRAPH

2.3 Collection of Information. Agencies within the Intelligence Community are authorized to collect, retain, or disseminate information concerning United States persons only in accordance with procedures established by the head of the agency concerned and approved by the Attorney General, consistent with the authorities provided by Part 1 of this Order. Those procedures shall permit collection, retention, and dissemination of the following types of information:

(a) Information that is publicly available or collected with the consent of the person concerned;

(b) Information constituting foreign intelligence or counterintelligence, including such information concerning corporations or other commercial organizations. Collection within the United States of foreign intelligence not otherwise obtainable shall be undertaken by the FBI or, when significant foreign intelligence is sought, by other authorized agencies of the Intelligence Community, provided that no foreign intelligence collection by such agencies may be undertaken for the purpose of acquiring information concerning the domestic activities of United States persons;

(c) Information obtained in the course of a lawful foreign intelligence, counterintelligence, international narcotics or international terrorism investigation;

Octafish

(55,745 posts)
22. ''When the president does it, it's not illegal.'' -- Richard Milhous Nixon, Crook
Fri Aug 29, 2014, 09:23 AM
Aug 2014

Not so. Yet, presidents continue to act as it is.



Reviving the Nixon Doctrine: NSA Spying, the
Commander-In-Chief, and Excutive Power in the
War on Terror


David Cole
Georgetown University Law Center
2006

EXCERPT...

"When the President does it, that means that it is not illegal."1
So Richard Nixon infamously defended his approval of a plan to engage in
warrantless wiretapping of Americans involved in the antiwar movement of
the 1970s. For thirty years Nixon's defense has stood as the apogee of
presidential arrogance. Nixon was ultimately proved wrong. The
wiretapping plan was shelved when FBI Director J. Edgar Hoover, of all
people, objected to it. Nixon's approval of the program was listed in the
articles of impeachment, and he was forced to resign. Nixon learned the hard
way that presidents are not above the law.

President George W. Bush appears not to have learned that lesson.
His defense of the National Security Agency's warrantless wiretapping of
Americans resurrects the Nixon doctrine with one modification. For Bush,
when the Commander-in-Chief does it, it is not illegal. In a memorandum to
Congress, the Bush Administration argued that the Commander-in-Chief
may not be restricted in his choice of the "means and methods of engaging
the enemy," and that President Bush is therefore free to wiretap Americans
without court approval in the "war on terror" even though Congress has
made it a crime to do so.2

This is not the first time President Bush has
asserted uncheckable executive power in the "war on terror." He has claimed
similar powers with respect to torture; cruel, inhuman, and degrading
treatment; and detention of so-called "enemy combatants." These claims to
unchecked power have triggered strong negative reactions from
conservatives and liberals, Republicans and Democrats, and Supreme Court
Justices and members of Congress. Yet these rebukes seem not to affect the
president, who continues to assert the authority.

The administration’s stance with respect to National Security
Agency (NSA) spying is emblematic of its approach to the war on terror. At
virtually every juncture, it has taken overly aggressive positions that
unnecessarily run roughshod over fundamental principles of the rule of law.
By doing so, the president has sparked negative feedback at home and
abroad. This pattern of overreaching is unnecessary to keep us secure and is
in fact likely to make us less safe, as it divides our nation and plays into the
terrorists’ hands by fueling anti-American sentiment abroad.

This essay will argue that the administration’s defense of the NSA
spying program is fundamentally flawed, both as a matter of law and as a
matter of national security policy. The administration makes three legal
arguments in defense of the policy, contending that: (1) Congress authorized
the program without saying so when it authorized the use of military force
against al Qaeda; (2) the Commander-in-Chief has inherent and uncheckable
authority under Article II of the Constitution to conduct such warrantless
wiretapping, notwithstanding a criminal prohibition; and (3) the program is
consistent with the Fourth Amendment.3

Each argument fails. The
argument that Congress authorized the program defies basic principles of
statutory construction. The claim that the Commander-in-Chief has
uncheckable authority with respect to "the means and methods of engaging
the enemy" is contrary to the text of the Constitution, the structure of checks
and balances, and a long line of Supreme Court precedent. And no Fourth
Amendment precedent supports the notion that the president may wiretap
Americans without probable cause or a warrant.

As a matter of national security policy, the administration defends
the program by claiming that if al Qaeda is calling into the United States, we
should be listening to that call. Few dispute that proposition. But under
existing law, the president did not need to authorize conduct in violation of
the Foreign Intelligence Surveillance Act (FISA)4
to track those calls.

Accordingly, the NSA program presumably must be broader than that.
Second, to the extent the president seeks to engage in more widespread
surveillance than that authorized by FISA, the proper recourse was to ask
Congress to change the law. The administration sent what ultimately became
the USA PATRIOT ACT (Patriot Act)5
to Congress within days of the
terrorist attacks of September 11, 2001, and the Patriot Act made several
revisions to FISA. But the president chose not to ask Congress to change
FISA to authorize this particular program, and instead ordered that the law be
violated in secret. That is not a permissible option in a democracy.
Moreover, had the president pursued the legal avenue for changing the law, it
is likely Congress would have extended him authority to do what was
necessary, and the program would have generated far less attention and
controversy than it has today. The controversy surrounding the program
centers not so much on the surveillance itself, but on the fact that the
president has asserted unchecked authority to violate criminal law in secret.
There would have been far less controversy, and far less public disclosure,
had the president followed the law.

SOURCE PDF: http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=1404&context=facpub&sei-redir=1&referer=http%3A%2F%2Fscholar.google.com%2Fscholar_url%3Fhl%3Den%26q%3Dhttp%3A%2F%2Fscholarship.law.georgetown.edu%2Fcgi%2Fviewcontent.cgi%253Farticle%253D1404%2526context%253Dfacpub%26sa%3DX%26scisig%3DAAGBfm2Nz2lXaPDdNuO_mwhxFrLKz58h0Q%26oi%3Dscholarr#search=%22http%3A%2F%2Fscholarship.law.georgetown.edu%2Fcgi%2Fviewcontent.cgi%3Farticle%3D1404%26context%3Dfacpub%22



Members of the government -- often unknown or secret -- possessing secret spying powers on the People are not only un-constitutional, it's why the constitution was written -- to keep the State from having unchecked power on the People.
Latest Discussions»General Discussion»The NSA Search Engine is ...