Send CathInfo's owner Matthew a gift from his Amazon wish list:
https://www.amazon.com/hz/wishlist/ls/25M2B8RERL1UO

Author Topic: If the MSM is admitting this now...  (Read 842 times)

0 Members and 1 Guest are viewing this topic.

Offline tmw89

  • Newbie
  • *
  • Posts: 126
  • Reputation: +103/-0
  • Gender: Male
If the MSM is admitting this now...
« on: June 06, 2013, 05:14:51 AM »
  • Thanks!0
  • No Thanks!0
  • ...just imagine how much further this really goes.

    U.S. Is Secretly Collecting Records of Verizon Calls
    By CHARLIE SAVAGE and EDWARD WYATT
    Published: June 5, 2013
    http://www.nytimes.com/2013/06/06/us/us-secretly-collecting-logs-of-business-calls.html?_r=0


    WASHINGTON — The Obama administration is secretly carrying out a domestic surveillance program under which it is collecting business communications records involving Americans under a hotly debated section of the Patriot Act, according to a highly classified court order disclosed on Wednesday night.

    The order, signed by Judge Roger Vinson of the Foreign Intelligence Surveillance Court in April, directs a Verizon Communications subsidiary, Verizon Business Network Services, to turn over “on an ongoing daily basis” to the National Security Agency all call logs “between the United States and abroad” or “wholly within the United States, including local telephone calls.”

    The order does not apply to the content of the communications.

    Verizon Business Network Services is one of the nation’s largest telecommunications and Internet providers for corporations. It is not clear whether similar orders have gone to other parts of Verizon, like its residential or cellphone services, or to other telecommunications carriers. The order prohibits its recipient from discussing its existence, and representatives of both Verizon and AT&T declined to comment Wednesday evening.

    The four-page order was disclosed Wednesday evening by the newspaper The Guardian. Obama administration officials at the F.B.I. and the White House also declined to comment on it Wednesday evening, but did not deny the report, and a person familiar with the order confirmed its authenticity. “We will respond as soon as we can,” said Marci Green Miller, a National Security Agency spokeswoman, in an e-mail.

    The order was sought by the Federal Bureau of Investigation under a section of the Foreign Intelligence Surveillance Act, the 1978 law that regulates domestic surveillance for national security purposes, including “tangible things” like a business’s customer records. The provision was expanded by Section 215 of the Patriot Act, which Congress enacted after the 9/11 terrorist attacks.

    The order was marked “TOP SECRET//SI//NOFORN,” referring to communications-related intelligence information that may not be released to noncitizens. That would make it among the most closely held secrets in the federal government, and its disclosure comes amid a furor over the Obama administration’s aggressive tactics in its investigations of leaks.

    The collection of call logs is set to expire in July unless the court extends it.

    The collection of communications logs — or calling “metadata” — is believed to be a major component of the Bush administration’s program of surveillance that took place without court orders. The newly disclosed order raised the question of whether the government continued that type of information collection by bringing it under the Patriot Act.

    The disclosure late Wednesday seemed likely to inspire further controversy over the scope of government surveillance. Kate Martin of the Center for National Security Studies, a civil liberties advocacy group, said that “absent some explanation I haven’t thought of, this looks like the largest assault on privacy since the N.S.A. wiretapped Americans in clear violation of the law” under the Bush administration. “On what possible basis has the government refused to tell us that it believes that the law authorizes this kind of request?” she said.

    For several years, two Democrats on the Senate Intelligence Committee, Senator Ron Wyden of Oregon and Senator Mark Udall of Colorado, have been cryptically warning that the government was interpreting its surveillance powers under that section of the Patriot Act in a way that would be alarming to the public if it knew about it.

    “We believe most Americans would be stunned to learn the details of how these secret court opinions have interpreted Section 215 of the Patriot Act,” they wrote last year in a letter to Attorney General Eric H. Holder Jr.

    They added: “As we see it, there is now a significant gap between what most Americans think the law allows and what the government secretly claims the law allows. This is a problem, because it is impossible to have an informed public debate about what the law should say when the public doesn’t know what its government thinks the law says.”

    A spokesman for Senator Wyden did not respond Wednesday to a request for comment on the Verizon order.

    The senators were angry because the Obama administration described Section 215 orders as being similar to a grand jury subpoena for obtaining business records, like a suspect’s hotel or credit card records, in the course of an ordinary criminal investigation. The senators said the secret interpretation of the law was nothing like that.

    Section 215 of the Patriot Act made it easier to get an order from the Foreign Intelligence Surveillance Court to obtain business records so long as they were merely deemed “relevant” to a national-security investigation.

    The Justice Department has denied being misleading about the Patriot Act. Department officials have acknowledged since 2009 that a secret, sensitive intelligence program is based on the law and have insisted that their statements about the matter have been accurate.

    The New York Times filed a Freedom of Information Act lawsuit in 2011 for a report describing the government’s interpretation of its surveillance powers under the Patriot Act. But the Obama administration withheld the report, and a judge dismissed the case.
    "The 'promise to respect' as Church law the New Code of Canon Law is to respect a number of supposed laws directly contrary to Church doctrine." --Bishop Williamson


    Offline tmw89

    • Newbie
    • *
    • Posts: 126
    • Reputation: +103/-0
    • Gender: Male
    If the MSM is admitting this now...
    « Reply #1 on: June 07, 2013, 06:08:24 AM »
  • Thanks!0
  • No Thanks!0
  • Well, whaddya know!  It does go much, much further!

    Docuмents: U.S. mining data from 9 leading Internet firms; companies deny knowledge
    By Barton Gellman and Laura Poitras, Published: June 6
    http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html


    The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, docuмents, and connection logs that enable analysts to track foreign targets, according to a top-secret docuмent obtained by The Washington Post.

    The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.

    Equally unusual is the way the NSA extracts what it wants, according to the docuмent: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.”

    PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority.

    Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. PRISM recruited its first partner, Microsoft, and began six years of rapidly growing data collection beneath the surface of a roiling national debate on surveillance and privacy. Late last year, when critics in Congress sought changes in the FISA Amendments Act, the only lawmakers who knew about PRISM were bound by oaths of office to hold their tongues.

    The court-approved program is focused on foreign communications traffic, which often flows through U.S. servers even when sent from one overseas location to another. Between 2004 and 2007, Bush administration lawyers persuaded federal FISA judges to issue surveillance orders in a fundamentally new form. Until then the government had to show probable cause that a particular “target” and “facility” were both connected to terrorism or espionage.

    In four new orders, which remain classified, the court defined massive data sets as “facilities” and agreed to certify periodically that the government had reasonable procedures in place to minimize collection of “U.S. persons” data without a warrant.

    In a statement issue late Thursday, Director of National Intelligence James R. Clapper said “information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats. The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”

    Clapper added that there were numerous inaccuracies in reports about PRISM by The Post and the Guardian newspaper, but he did not specify any.

    Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said: “I would just push back on the idea that the court has signed off on it, so why worry? This is a court that meets in secret, allows only the government to appear before it, and publishes almost none of its opinions. It has never been an effective check on government.”

    Several companies contacted by The Post said they had no knowledge of the program, did not allow direct government access to their servers and asserted that they responded only to targeted requests for information.

    “We do not provide any government organization with direct access to Facebook servers,” said Joe Sullivan, chief security officer for Facebook. “When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”

    “We have never heard of PRISM,” said Steve Dowling, a spokesman for Apple. “We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”

    It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing “collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,” rather than directly to company servers.

    Government officials and the docuмent itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.

    An internal presentation of 41 briefing slides on PRISM, dated April 2013 and intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President’s Daily Brief, which cited PRISM data in 1,477 items last year. According to the slides and other supporting materials obtained by The Post, “NSA reporting increasingly relies on PRISM” as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.

    That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.

    The technology companies, whose cooperation is essential to PRISM operations, include most of the dominant global players of Silicon Valley, according to the docuмent. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” PalTalk, although much smaller, has hosted traffic of substantial intelligence interest during the Arab Spring and in the ongoing Syrian cινιℓ ωαr.

    Dropbox, the cloud storage and synchronization service, is described as “coming soon.”

    Sens. Ron Wyden (D-Ore.) and Mark Udall (D-Colo.), who had classified knowledge of the program as members of the Senate Intelligence Committee, were unable to speak of it when they warned in a Dec. 27, 2012, floor debate that the FISA Amendments Act had what both of them called a “back-door search loophole” for the content of innocent Americans who were swept up in a search for someone else.

    “As it is written, there is nothing to prohibit the intelligence community from searching through a pile of communications, which may have been incidentally or accidentally been collected without a warrant, to deliberately search for the phone calls or e-mails of specific Americans,” Udall said.

    Wyden repeatedly asked the NSA to estimate the number of Americans whose communications had been incidentally collected, and the agency’s director, Lt. Gen. Keith B. Alexander, insisted there was no way to find out. Eventually Inspector General I. Charles McCullough III wrote Wyden a letter stating that it would violate the privacy of Americans in NSA data banks to try to estimate their number.

    Roots in the ’70s

    PRISM is an heir, in one sense, to a history of intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. The NSA calls these Special Source Operations, and PRISM falls under that rubric.

    The Silicon Valley operation works alongside a parallel program, code-named BLARNEY, that gathers up “metadata” — technical information about communications traffic and network devices — as it streams past choke points along the backbone of the Internet. BLARNEY’s top-secret program summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”

    But the PRISM program appears to more nearly resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over exponential growth in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques.

    The Obama administration points to ongoing safeguards in the form of “extensive procedures, specifically approved by the court, to ensure that only non-U.S. persons outside the U.S. are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about U.S. persons.”

    And it is true that the PRISM program is not a dragnet, exactly. From inside a company’s data stream the NSA is capable of pulling out anything it likes, but under current rules the agency does not try to collect it all.

    Analysts who use the system from a Web portal at Fort Meade, Md., key in “selectors,” or search terms, that are designed to produce at least 51 percent confidence in a target’s “foreignness.” That is not a very stringent test. Training materials obtained by The Post instruct new analysts to make quarterly reports of any accidental collection of U.S. content, but add that “it’s nothing to worry about.”

    Even when the system works just as advertised, with no American singled out for targeting, the NSA routinely collects a great deal of American content. That is described as “incidental,” and it is inherent in contact chaining, one of the basic tools of the trade. To collect on a suspected spy or foreign terrorist means, at minimum, that everyone in the suspect’s inbox or outbox is swept in. Intelligence analysts are typically taught to chain through contacts two “hops” out from their target, which increases “incidental collection” exponentially. The same math explains the aphorism, from the John Guare play, that no one is more than “six degrees of separation” from any other person.

    A ‘directive’

    In exchange for immunity from lawsuits, companies such as Yahoo and AOL are obliged to accept a “directive” from the attorney general and the director of national intelligence to open their servers to the FBI’s Data Intercept Technology Unit, which handles liaison to U.S. companies from the NSA. In 2008, Congress gave the Justice Department authority for a secret order from the Foreign Surveillance Intelligence Court to compel a reluctant company “to comply.”

    In practice, there is room for a company to maneuver, delay or resist. When a clandestine intelligence program meets a highly regulated industry, said a lawyer with experience in bridging the gaps, neither side wants to risk a public fight. The engineering problems are so immense, in systems of such complexity and frequent change, that the FBI and NSA would be hard pressed to build in back doors without active help from each company.

    Apple demonstrated that resistance is possible when it held out for more than five years, for reasons unknown, after Microsoft became PRISM’s first corporate partner in May 2007. Twitter, which has cultivated a reputation for aggressive defense of its users’ privacy, is still conspicuous by its absence from the list of “private sector partners.”

    Google, like the other companies, denied that it permitted direct government access to its servers.

    “Google cares deeply about the security of our users’ data,” a company spokesman said. “We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a ‘back door’ for the government to access private user data.”

    Microsoft also provided a statement: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”

    Yahoo also issued a denial.

    “Yahoo! takes users’ privacy very seriously,” the company said in a statement. “We do not provide the government with direct access to our servers, systems, or network.”

    Like market researchers, but with far more privileged access, collection managers in the NSA’s Special Source Operations group, which oversees the PRISM program, are drawn to the wealth of information about their subjects in online accounts. For much the same reason, civil libertarians and some ordinary users may be troubled by the menu available to analysts who hold the required clearances to “task” the PRISM system.

    There has been “continued exponential growth in tasking to Facebook and Skype,” according to the PRISM slides. With a few clicks and an affirmation that the subject is believed to be engaged in terrorism, espionage or nuclear proliferation, an analyst obtains full access to Facebook’s “extensive search and surveillance capabilities against the variety of online social networking services.”

    According to a separate “User’s Guide for PRISM Skype Collection,” that service can be monitored for audio when one end of the call is a conventional telephone and for any combination of “audio, video, chat, and file transfers” when Skype users connect by computer alone. Google’s offerings include Gmail, voice and video chat, Google Drive files, photo libraries, and live surveillance of search terms.

    Firsthand experience with these systems, and horror at their capabilities, is what drove a career intelligence officer to provide PowerPoint slides about PRISM and supporting materials to The Washington Post in order to expose what he believes to be a gross intrusion on privacy. “They quite literally can watch your ideas form as you type,” the officer said.

    [the following are slides from the NSA presentation introducing the program]







    "The 'promise to respect' as Church law the New Code of Canon Law is to respect a number of supposed laws directly contrary to Church doctrine." --Bishop Williamson


    Offline Mithrandylan

    • Hero Member
    • *****
    • Posts: 4452
    • Reputation: +5061/-436
    • Gender: Male
    If the MSM is admitting this now...
    « Reply #2 on: June 07, 2013, 06:58:56 AM »
  • Thanks!0
  • No Thanks!0
  • I'm glad it's not just Verizon, I was feeling left out for a second!
    "Be kind; do not seek the malicious satisfaction of having discovered an additional enemy to the Church... And, above all, be scrupulously truthful. To all, friends and foes alike, give that serious attention which does not misrepresent any opinion, does not distort any statement, does not mutilate any quotation. We need not fear to serve the cause of Christ less efficiently by putting on His spirit". (Vermeersch, 1913).

    Offline Maizar

    • Full Member
    • ***
    • Posts: 536
    • Reputation: +275/-1
    • Gender: Male
    If the MSM is admitting this now...
    « Reply #3 on: June 07, 2013, 07:30:21 AM »
  • Thanks!0
  • No Thanks!0
  • It goes so far as Apple and Microsoft ... where it goes further is hardware level snooping.

    Similar thread also in Catholic Bunker, for what it's worth.

    Offline Luker

    • Full Member
    • ***
    • Posts: 507
    • Reputation: +639/-0
    • Gender: Male
    If the MSM is admitting this now...
    « Reply #4 on: June 07, 2013, 10:05:56 AM »
  • Thanks!0
  • No Thanks!0
  • If you work off the assumption that every email, message, facebook post, google search, cell phone call etc etc is being recorded and a database being compiled on you, it will be a lot closer to the truth than assuming that what you say and do on the internet/phone is private and yours.

    Internet privacy is a thing of the past, if we (regular folk) even ever had it.  Try doing a (non-google) search on true internet privacy.  It may be possible but it is seriously hard work, probably beyond what 90% of regular internet users are capable of technologically.

    I can relate an interesting story regarding phones that happened to my family.  It was newyears eve 1999 (that is why I remember it so well).  My dad and mom and I were having some dinner and the phone rang, but there was nobody on the other line.  We thought it was a crank call so we just hung it up.  But then we could here some talking still coming from the phone even though it was hung up so my dad picked it up again.  When he picked the phone up we could all hear the voices coming through loud and clear.  It was in swedish.  My dad knows some swedish from when he was younger so he could pick out some words.  It was ordinary conversation between 2-3 people like they were in their living room or kitchen just visiting and talking, they were NOT talking into the phone.  We confirmed this when someone on their end picked up their phone, dialed a number and talked to someone else briefly and then hung up, we could hear their whole conversation.  After they hung up, we could still here them resume their dinner conversation or whatever.  This went on for about 25-30 minutes.  We were completely blown away listening to this wondering how on earth this could be happening.  I still don't know how the wires got crossed or whatever, but I know for a fact an ordinary phone (this was a landline) can serve as a listening device.  The voices came in very clear, you could even tell when people were walking around as the voices would get quieter or louder, I guess as they got closer or farther from the phone in their room.  It was a really weird evening to say the least.

    Luke
    Pray the Holy Rosary every day!!


    Offline Incredulous

    • Hero Member
    • *****
    • Posts: 8901
    • Reputation: +8675/-849
    • Gender: Male
    If the MSM is admitting this now...
    « Reply #5 on: June 07, 2013, 04:19:51 PM »
  • Thanks!0
  • No Thanks!0
  • Two Bombshell Articles tmw89... thanks!
    "Some preachers will keep silence about the truth, and others will trample it underfoot and deny it. Sanctity of life will be held in derision even by those who outwardly profess it, for in those days Our Lord Jesus Christ will send them not a true Pastor but a destroyer."  St. Francis of Assisi

    Offline lefebvre_fan

    • Jr. Member
    • **
    • Posts: 458
    • Reputation: +234/-9
    • Gender: Male
    If the MSM is admitting this now...
    « Reply #6 on: June 07, 2013, 04:25:05 PM »
  • Thanks!0
  • No Thanks!0
  • Can you hear me now? NOT good.  :scared2:
    "The Catholic Church is the only thing which saves a man from the degrading slavery of being a child of his age."--G. K. Chesterton

    Offline Maizar

    • Full Member
    • ***
    • Posts: 536
    • Reputation: +275/-1
    • Gender: Male
    If the MSM is admitting this now...
    « Reply #7 on: June 08, 2013, 12:46:47 AM »
  • Thanks!0
  • No Thanks!0
  • http://www.washingtonsblog.com/2013/06/microsoft-programmed-in-nsa-backdoor-in-windows-by-1999.html
    Quote
    A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

    The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren [an expert in computer security]. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

    ...

    But according to two witnesses attending the conference, even Microsoft’s top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was “stunned” to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the “entropy” of programming code.

    Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.

    Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone’s and everyone’s Windows computer to intelligence gathering techniques deployed by NSA’s burgeoning corps of “information warriors”.

    According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system “is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system“. The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.