Your blogger

My photo
When Roger West first launched the progressive political blog "News From The Other Side" in May 2010, he could hardly have predicted the impact that his venture would have on the media and political debate. As the New Media emerged as a counterbalance to established media sources, Roger wrote his copious blogs about national politics, the tea party movement, mid-term elections, and the failings of the radical right to the vanguard of the New Media movement. Roger West's efforts as a leading blogger have tremendous reach. NFTOS has led the effort to bring accountability to mainstream media sources such as FOX NEWS,CNN and Andy Breitbart's "Big Journalism. Roger's breadth of experience, engaging style, and cultivation of loyal readership - over 92 million visitors - give him unique insight into the past, present, and future of the New Media and political rhetoric that exists in our society today. What we are against: Radical Right Wing Agendas Incompetent Establishment Public Coruption Corporate Malfeasence We are for: Global and Econmoic Security Social and Economic Justice Media Accountability Healthy Communities

Friday, June 7, 2013

VERIZON SPYGATE, JUST THE FACTS

NSA'S DATA MINING PROGRAM
BREAKING UPDATE 6/7/13 12:56

The group called "Anonymous" leaks NSA Documents.

Maybe, just maybe. if House Republicans had voted to repeal the PATRIOT Act 37 times. Then the NSA looking at your phone records would not be an issue.

Hot off the heels of the revelation that Verizon has been supplying the National Security Agency (NSA) with phone records for all domestic calls, the Washington Post reveals the NSA and FBI are data mining the servers of nine technology companies, “extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.”

Companies participating in the program are obliged to accept “a directive” from the attorney general and the director of national intelligence to open their servers to the FBI’s Data Intercept Technology Unit. In exchange, the companies receive immunity from lawsuits.

The broad, top secret program, code-named PRISM, was established in 2007 with Microsoft as its first partner but now counts Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple among its membership. Twitter is notably absent from the list.

PRISM appears to closely resemble the warrant-less surveillance orders issues by President Bush after the September 11th, 2001 terrorist attacks rather than a dragnet data collection operation, but the NSA has the capability to search through the company’s servers for whatever it likes. To collect data, analysts in Fort Meade key in search terms designed to produce an “at least 51 percent confidence in a target’s ‘foreignness.’”

But even when meeting that relatively low threshold, by its very nature the system likely collects information about Americans who have had communications with the target, and analysts are trained to chain through two degrees of separation of contacts from the initial target. This chaining means that many Americans are likely the subject of “incidental” surveillance.

Analysts have access to Facebook’s “extensive search and surveillance capabilities” while the Skype partnership allows for monitoring of any combination of “audio, video, chat, and file transfers”, and Google allows surveillance of “Gmail, voice and video chat, photo libraries, and live surveillance of search terms.” The career intelligence officer who leaked documents about the program to the Washington Post noted “they quite literally can watch your ideas form as you type.”

Apple and Facebook have both denied participation in the program, with Apple saying they've “never heard” of it, and Facebook flatly denying they provide “any government organization with direct access” to their servers. Google has been slightly less clear, but told Washington Post they lack a back door for the government to obtain access to private user data and care “deeply” about the privacy of users.

An internal presentation on the operation obtained by the Post claims PRISM is the most frequent contributor to the President’s Daily Brief, saying it was cited in 1,477 articles last year and accounts for nearly 1 in 7 intelligence reports within the NSA. A parallel initiative also revealed by the Post, codenamed BLARNEY, is an ongoing data collection program that gathers “metadata” such as address packets and device signatures as it streams past choke points in internet infrastructure.

Additionally, since the writing of this blog:

Amie Stepanovich, Director of the Electronic Privacy Information Center’s Domestic Surveillance Project noted that the 51 percent threshold reportedly used by NSA analysts not only “leaves a lot of room for error” initially, but combined with the chaining effect and how studies of private data brokers have shown that innate qualities like “foreignness” are often quite difficult to determine, the chance of an American citizens’ data being incidentally caught up in the program could actually be “incredibly high.”

The Washington Post has now backtracked on their claims that government had direct access to servers, editing their report to include more responses from companies and this statement: “it is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.” This change only strengthens the argument that the NSA had access to copies of the data.

The National Security Agency and the FBI don't bear all the responsibility for the revelation that Verizon is turning phone records over to the government. That responsibility lies with the members of Congress who voted for the PATRIOT Act, as well as extensions of it and the provisions related to collecting those records. Over 100 people currently serving in the House and Senate voted for the original Act in 2001. Last year, over 300 voted to extend a key provision.

The problem with all this is again, this is a by-product of G.W. Bush regime. Where was the anger in 2001 [and 2011] when congress passed this and Bush signed into law? Who's to blame ?

At the end of the day, in this time of terror, this is a necessary evil. I personally do not feel violated that my phone numbers are monitored - what should be more irritating is that Facebook, Google and others monitor your activities much more than NSA, where is the outcry over this?

This is the sign of the times - of a post 9/11 country, while you may find it intrusive, I find it acceptable, for the failure not to monitor, is just another invitation to another horrible terrorist act on this great land.


NFTOS
Editor-In-Chief
Roger West