Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
13 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies

longship

(40,416 posts)
1. My friend. I crave your indulgence...
Thu Jun 20, 2013, 01:26 AM
Jun 2013

Last edited Thu Jun 20, 2013, 01:56 AM - Edit history (1)

I am a Nigerian prince and need your assistance to get my multimillion dollar inheritance...

On edit:
Post spoofs Nigerian scam e-mails which I am sure the NSA will have their full of.

think4yourself

(839 posts)
3. Binney left
Thu Jun 20, 2013, 01:46 AM
Jun 2013

Because his work, which was designed during the Cold War and used on Soviets, was being turned inward and used on Americans.
When he speaks it's a good idea to listen.

Catherina

(35,568 posts)
5. I'm only at minute 5 and this is frightening.
Thu Jun 20, 2013, 01:59 AM
Jun 2013

I can't believe the woman's response at minute 5 when he asks how she can say someone has legal recourse since the National contains a gag order. And it still does, so we would never know and are totally defenseless if they twist the metadata to concoct a case against you. This is chilling.

I'm glad they discussed the National Security Letters because a few days ago, when Mueller was asked about warrants, he stated:

Nadler: Secondly, under Section 215, if you’ve gotten information from metadata, and you as a result of that think that gee, this phone number, 873-whatever, looks suspicious and we ought to get the contents of the phone, do you need a new specific warrant?

Mueller: You need at least a new National Security Letter. All you have is a telephone number. You do not have subscriber information, so you need subscriber information you would have to get probably a National Security Letter to get that subscriber information. And then if you wanted to do more–


Th1onein

(8,514 posts)
6. What's chilling is that they are storing this data. Emails, text messages, everything.
Thu Jun 20, 2013, 02:31 AM
Jun 2013

It stops people from speaking freely, from communicating freely.

Catherina

(35,568 posts)
7. It's a long string of chilling things. "Cointelpro will never happen again. Trust us"
Thu Jun 20, 2013, 03:34 AM
Jun 2013

I'm glad they brought up how Cointelpro went after MLK.

Minute 9:44 is very interesting. Gen Alexander lied through his teeth when Hank Johnson (-D, Georgia) asked if the NSA was routinely intercepts Americans'

emails - no
cell phone conversations - no
google searches - no
text messages - no
amazon.com records - no
bank records - no


Or I guess those weren't lies, just the "least untruthful" answers. "The point is how you split the words".

'Is he more powerful than President Obama?' Yes, "probably the most powerful person in the world. If he controls the information that arrives on Obama's desk and Obama makes decisions based on the things on his desk, what decisions can he make except the decisions presented to him by the people he trusts? And when the people he trusts are the military, the military makes the decisions and the civilian is not actually actually in power".

Do you have the next part? That was really interesting.

Catherina

(35,568 posts)
12. That was still the same part I but, thank you because it helped me find part 2
Thu Jun 20, 2013, 12:32 PM
Jun 2013

I'll relisten to the part 1 at your link since it could be longer than the youtube. But I found part 2, thank you!

Catherina

(35,568 posts)
13. Part 2 Video and some highlights. Hadn't thought of this
Thu Jun 20, 2013, 12:57 PM
Jun 2013

So if a Congressperson asks too many questions, caused too many waves, they "would lose their clearance immediately and be off the committees".

I ask again, WHO IS RUNNING THIS SHOW?




Jacob Appelbaum works for TOR, a nonprofit dedicated to creating an anonymity network and the software that powers it.

Some highlights but everyone's mileage may differ

JACOB APPELBAUM: ...how has it changed my work? Well, like Laura, I don’t have important conversations in the United States anymore. I don’t have conversations in bed with my partner anymore. I don’t trust any of my computers for anything at all. And in a sense, one thing that it has done is push me away from the work that I’ve done around the world trying to help pro-democracy activists starting an Arab Spring, for example, because I present a threat, in some cases, to those people.

...

WILLIAM BINNEY: Well, I guess, first of all, it was a very depressing thing to have happen, that they would turn their—the capabilities that I built for them to do foreign—detection of foreign threats, to have that turned on the people of the United States. That was an extremely depressing thing for me to see happen internally in NSA, that was chartered for foreign intelligence, not domestic intelligence.

And I guess that simply made it more important for me to try to do things to get the government, first of all, to correct its own criminal activity, and I did that by going to the House Intelligence Committees. I also attempted to see Chief Justice Rehnquist to try to address that issue to him, and I also visited the Department of Justice Inspector General’s Office—after Obama came into office, by the way, to no avail.

...

AMY GOODMAN: And it’s not just the NSA who can gather phone information.

WILLIAM BINNEY: No, this—

AMY GOODMAN: Police departments now.

WILLIAM BINNEY: Right. Actually, I think it’s shared, because if you—if you go back and look at Director Mueller’s testimony on the 30th of March to the Senate Judiciary Committee, he responded to a question when he was asked the question of "How would you prevent a future Fort Hood?" He responded by saying that "We have gotten together with the DOD and have created this technology database." He called it a "technology database." Utah will be included in that, I’m sure. And—

AMY GOODMAN: Meaning Bluffdale.

WILLIAM BINNEY: Yeah, right.

AMY GOODMAN: Where they’re building this massive data center.

WILLIAM BINNEY: Its storage, yeah. And he said, "From this technology base, with one query, we can get all past and all future emails. So we only have to make one query to get it." That means he gets a target, puts the target in, goes into the base, pulls all past ones, and as they come in, then he gets all future ones. So, that says they’re sharing it across the legal—with the legal authorities, so...

JUAN GONZÁLEZ: But then also having these private defense contractors and universities, I mean, you’re talking about a potential in terms of—not only of people gathering information, but of malicious use of that information by—

WILLIAM BINNEY: Yeah, you want to see if your wife is cheating on you? OK, you could do that, yes. That’s right. There’s a—that’s the hazard of assembling all this kind of data. It’s not just the government misusing it, but it’s also people working in it, looking at it, and using it in different ways. They have no effective way of monitoring how people are using that information. They don’t.

....



AMY GOODMAN: Jacob Appelbaum, I asked you before how people can protect themselves. I remember you mentioned, when they took your computer, the authorities at the border, there wasn’t a hard drive in it. Explain what people can do.

JACOB APPELBAUM: Well, I think one thing that is important is to know that if you’re being targeted, these people, they’re, you know, in the weapons industry. It turns out that they also have the ability to break into computers. So, if you’re being targeted, you have to take a lot of precautions. For example, there’s a bootable CD called "Tails," and the idea is you run Linux, and all your traffic routes over Tor, so you don’t have something like Adobe Flash trying to update itself, and then the NSA or someone else gets to perform what’s called a "man in the middle" attack. Instead of using Gmail, using something like Riseup. I mean, after their server was just seized, I think kicking them some cash is probably a good thing. They provide mutual aid for people all around the world to have emails that are not just given up automatically, or even with a court battle. They try to encrypt it so they can’t give things up. So people can make choices where their privacy is respected, but also they can make technical choices, like using Tor, to ensure, for example, that when data is gathered, it’s encrypted and it’s worthless. And I think that’s important to do, even though it’s not perfect. I mean, there is no perfection in this. But perfection is the enemy of "good enough."

AMY GOODMAN: How do you download Tor, T-O-R?

JACOB APPELBAUM: You go to TorProject.org, https://www.torproject.org. And the "S" is for "secure," for some value of "secure." And you download a copy of it, and it’s a web browser, for example. And the program, all put together, double-click it, run it, you’re good to go.

AMY GOODMAN: You can even Skype on it?

JACOB APPELBAUM: You—I would really recommend using something like Jitsi instead of Skype. Every time you use proprietary software—

AMY GOODMAN: "Jitsi" is spelled...?

JACOB APPELBAUM: J-I-T-S-I. So, every time you use proprietary software, you have to ask yourself, "Why is this provided to me for free?" And now that Microsoft is involved with Skype, the question is: Doesn’t Microsoft have some sort of government leaning on them, say the U.S. government, to give them so-called lawful interception capabilities? And of course the answer is going to be yes, right? If you log into Skype on a computer you’ve never used before, you get all your chat history. Well, why is that? Well, that’s because Skype has it. And if Skype can give it to you, they can give it to the Feds. And they will. And everybody that has that ability will. Some will fight it, like Twitter. But in the end, if the state asserts it has the right to get your data, sometimes without you even knowing that that’s happening, they’re going to get it, if they can get it.

So we have to solve these privacy problems with mathematics, because it’s pretty hard to solve math problems with a gun or threat of violence, right? No amount of violence is going to solve a math problem. And despite the fact that the NSA has got a lot of people working on those math problems, you know, podunk cops in Seattle, for example, they’re not going to be able to do that, and the NSA is not going to help them. Now, they may have surveillance capability. They may have IMSI catchers. They might have automatic license plate readers. They have an incredible surveillance state. They’re still not the NSA.

.... (Talks about TOR)



AMY GOODMAN: What gives you hope, William Binney? You worked in a top-secret agency for close to 40 years. You quit soon after 9/11 because you saw that the agency was spying on the American people, and you had helped develop the program that allowed this to happen.

WILLIAM BINNEY: Well, the only thing that gives me hope is programs like this or Wired articles that Jim Bamford would write about this activity, to get the word out so that people can be aware of what’s happening, so in a democracy we can stand forward and vote, in some way, as to what we want our government to do or not to do, and what kind of information we want them to have or not have.

JUAN GONZÁLEZ: And are there any members in Congress that you see waging a good fight around this issue?

WILLIAM BINNEY: Well, Senators Wydall sic and Udall are, so—Wyden and Udall, they are. And there are others. They’re just not speaking up. Of course, the problem is, you see, they can’t tell you what their concern, because—

LAURA POITRAS: Well, why? Why can’t they tell you? I mean, what would be the repercussions if you’re in Congress?

WILLIAM BINNEY: Well, because what happens when—if they did, for example, they would lose their clearance immediately and be off the committees.

...

The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to "democracynow.org".

http://www.democracynow.org/2012/4/23/more_secrets_on_growing_state_surveillance
Latest Discussions»General Discussion»Binney: US has copies of...