General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsThe Nation: Remember When NSA Surveillance Was Used to Help Launch the Iraq War?
http://www.thenation.com/blog/174744/remember-when-nsa-surveillance-was-used-help-launch-iraq-warRemember When NSA Surveillance Was Used to Help Launch the Iraq War?
George Zornick on June 11, 2013 - 10:33 AM ET
- snip -
But what if the government abuses the vast surveillance power it is accumulating? What if the NSA is used for political purposes, not safety? This is often left out of the debate, or dismissed outright. Eric Posner wrote at The New York Times website that I am unawareand correct me if I am wrongof a single instance during the last 12 years of war-on-terror-related surveillance in which the government used information obtained for security purposes to target a political opponent, dissenter or critic.
Unfortunately, the NSA has already abused its surveillance power in at least one case where political opponents were targeted, and its a big one.
In 2003, a woman named Katharine Gun, who was working for a British intelligence agency, leaked a memo to the press from an NSA agent named Frank Koza. It described a massive American effort to monitor the communications of six delegations to the United Nationsthe so-called Middle Six who were undecided on authorizing the Iraq War and who were being fiercely courted by both sides.
Heres what memo said, in part. (Note the Agency is the NSA):
- snip -
James Bamford, a veteran journalist covering the NSA, confirmed the account in his book and said it extended to monitoring United Nations weapons inspectors in Iraq. At the time, however, US media outlets covered the story lightly, or ignored it completely, in the case of The New York Times.
- snip -
One chief argument made by civil libertarians is that massive surveillance power will inevitably lead to abusethat the mission will creep from security to political and diplomatic applications. The fact is, it already has.
So one must then wonder: Where does it go next?
MORE[p]
Tx4obama
(36,974 posts)villager
(26,001 posts)Yeah, well, that certainly slowed 'em down!
Tx4obama
(36,974 posts)I am not surprised that they would cross all the T's and dot all the I's and would outline in detail the 'probable cause'.
So, there would be no reason that the Court would reject the requests.
Sounds like 'competent attorneys' are taking care of business.
villager
(26,001 posts):wave:
Tx4obama
(36,974 posts)Since the meta-data that the telecoms has is owned by the telecoms and not by the customers, I think that the customers would not have 'standing' to go to court.
=====
Smith v. Maryland, 442 U.S. 735 (1979), was a case in which the Supreme Court of the United States held that the installation and use of the pen register was not a "search" within the meaning of the Fourth Amendment, and hence no warrant was required. The pen register was installed on telephone company property at the telephone company's central offices. In the Majority opinion, Justice Blackmun rejected the idea that the installation and use of a pen registry constitutes a violation of the "legitimate expectation of privacy" since the numbers would be available to and recorded by the phone company anyway.
Background
In Katz v. United States (1967), the United States Supreme Court established its "reasonable expectation of privacy" test. It overturned Olmstead v. United States and held that wiretaps were unconstitutional searches, because there was a reasonable expectation that the communication would be private. The government was then required to get a warrant to execute a wiretap.
In Smith v. Maryland, the Supreme Court held that a pen register is not a search because the "petitioner voluntarily conveyed numerical information to the telephone company." Since the defendant had disclosed the dialed numbers to the telephone company so they could connect his call, he did not have a reasonable expectation of privacy in the numbers he dialed. The court did not distinguish between disclosing the numbers to a human operator or just the automatic equipment used by the telephone company.
The Smith decision left pen registers completely outside constitutional protection. If there was to be any privacy protection, it would have to be enacted by Congress as statutory privacy law.
-snip-
http://en.wikipedia.org/wiki/Smith_v._Maryland
Thus, some Supreme Court cases have held that you have no reasonable expectation of privacy in information you have "knowingly exposed" to a third party for example, bank records or records of telephone numbers you have dialed even if you intended for that third party to keep the information secret. In other words, by engaging in transactions with your bank or communicating phone numbers to your phone company for the purpose of connecting a call, youve "assumed the risk" that they will share that information with the government.
-snip-
Full page here: https://ssd.eff.org/your-computer/govt/privacy
http://www.democraticunderground.com/101665881
villager
(26,001 posts)...whose 4th Amendment rights are being invaded have no "standing."
Gotcha.
Tx4obama
(36,974 posts)villager
(26,001 posts)We can all rest easy now against the intrusions of the military/intelligence apparatus!
Tx4obama
(36,974 posts)Skittles
(153,150 posts)I don't think it is possible - I don't think you believe a damn thing you're saying
pam4water
(2,916 posts)personalities over principle.
nadinbrzezinski
(154,021 posts)Straight from it...Orwellian does not start to describe this
Hissyspit
(45,788 posts)kenny blankenship
(15,689 posts)We need them at full strength and acting with a free hand TO KEEP US SAFE.
TakeALeftTurn
(316 posts)You don't think the FBI asked the NSA to help their harassment of Occupy?
Ichingcarpenter
(36,988 posts)modrepub
(3,494 posts)"all this surveillance didn't help prevent the Boston Marathon bombings". We're spending $50B/year for something that doesn't appear to work very well. IMO it would be better if we spent this money beefing up our First Response capabilities and internal infrastructure.
DCKit
(18,541 posts)pam4water
(2,916 posts)Hissyspit
(45,788 posts)nothing like bugging the phones of UN diplomats, when you need to start a war based on lies, to keep us all safe!
Octafish
(55,745 posts)xchrom
(108,903 posts)Initech
(100,063 posts)It's not a war on terror. It's actually creating more terror than it was designed to prevent. It's a war on American citizens and civil liberties more like it.
ProSense
(116,464 posts)...Bush's illegal spying, and the media were complicit. From the link in that paragraph (see original).
http://www.commondreams.org/views05/1227-26.htm
reusrename
(1,716 posts)Go ahead, sputter some more about it.
ProSense
(116,464 posts)"If it's made retroactively legal, then what you are saying is nonsense. Go ahead, sputter some more about it. "
...should I get in the way of your good "sputter"?
The telecoms were given retroactive immunity for participating in the law-breaking activity. The law did not make the activity legal.
reusrename
(1,716 posts)You are nonsensical. No one can ever be arrested for any of it, correct?
Tierra_y_Libertad
(50,414 posts)The National Security Agency has long resisted the declassification of material on the Gulf of Tonkin incident, despite efforts by Senate Foreign Relations Committee staffer Carl Marcy (who had prepared a staff study on the August 4 incident); former Deputy Director Louis Tordella, and John Prados to push for declassification of key documents. Today's release is largely due to the perseverance of FOIA requester Matthew M. Aid, who requested the Hanyok study in April 2004 and brought the issue to the attention of The New York Times when he learned that senior National Security Agency officials were trying to block release of the documents. New York Times reporter Scott Shane wrote that higher-level officials at the NSA were "fearful that [declassification] might prompt uncomfortable comparisons with the flawed intelligence used to justify the war in Iraq." The glaring light of publicity encouraged the Agency's leaders finally to approve declassification of the documents.