General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region Forumslongship
(40,416 posts)Last edited Thu Jun 20, 2013, 01:56 AM - Edit history (1)
I am a Nigerian prince and need your assistance to get my multimillion dollar inheritance...
On edit:
Post spoofs Nigerian scam e-mails which I am sure the NSA will have their full of.
Th1onein
(8,514 posts)Tx4obama
(36,974 posts)William Binney left the NSA in 2001
http://en.wikipedia.org/wiki/William_Binney_%28U.S._intelligence_official%29
think4yourself
(839 posts)Because his work, which was designed during the Cold War and used on Soviets, was being turned inward and used on Americans.
When he speaks it's a good idea to listen.
Catherina
(35,568 posts)I can't believe the woman's response at minute 5 when he asks how she can say someone has legal recourse since the National contains a gag order. And it still does, so we would never know and are totally defenseless if they twist the metadata to concoct a case against you. This is chilling.
I'm glad they discussed the National Security Letters because a few days ago, when Mueller was asked about warrants, he stated:
Mueller: You need at least a new National Security Letter. All you have is a telephone number. You do not have subscriber information, so you need subscriber information you would have to get probably a National Security Letter to get that subscriber information. And then if you wanted to do more
Th1onein
(8,514 posts)It stops people from speaking freely, from communicating freely.
Catherina
(35,568 posts)I'm glad they brought up how Cointelpro went after MLK.
Minute 9:44 is very interesting. Gen Alexander lied through his teeth when Hank Johnson (-D, Georgia) asked if the NSA was routinely intercepts Americans'
emails - no
cell phone conversations - no
google searches - no
text messages - no
amazon.com records - no
bank records - no
Or I guess those weren't lies, just the "least untruthful" answers. "The point is how you split the words".
'Is he more powerful than President Obama?' Yes, "probably the most powerful person in the world. If he controls the information that arrives on Obama's desk and Obama makes decisions based on the things on his desk, what decisions can he make except the decisions presented to him by the people he trusts? And when the people he trusts are the military, the military makes the decisions and the civilian is not actually actually in power".
Do you have the next part? That was really interesting.
Douglas Carpenter
(20,226 posts)Douglas Carpenter
(20,226 posts)Catherina
(35,568 posts)I'm looking forward to watching it first thing in the morning.
Catherina
(35,568 posts)I'll relisten to the part 1 at your link since it could be longer than the youtube. But I found part 2, thank you!
Douglas Carpenter
(20,226 posts)Catherina
(35,568 posts)So if a Congressperson asks too many questions, caused too many waves, they "would lose their clearance immediately and be off the committees".
I ask again, WHO IS RUNNING THIS SHOW?
Jacob Appelbaum works for TOR, a nonprofit dedicated to creating an anonymity network and the software that powers it.
Some highlights but everyone's mileage may differ
JACOB APPELBAUM: ...how has it changed my work? Well, like Laura, I dont have important conversations in the United States anymore. I dont have conversations in bed with my partner anymore. I dont trust any of my computers for anything at all. And in a sense, one thing that it has done is push me away from the work that Ive done around the world trying to help pro-democracy activists starting an Arab Spring, for example, because I present a threat, in some cases, to those people.
...
WILLIAM BINNEY: Well, I guess, first of all, it was a very depressing thing to have happen, that they would turn theirthe capabilities that I built for them to do foreigndetection of foreign threats, to have that turned on the people of the United States. That was an extremely depressing thing for me to see happen internally in NSA, that was chartered for foreign intelligence, not domestic intelligence.
And I guess that simply made it more important for me to try to do things to get the government, first of all, to correct its own criminal activity, and I did that by going to the House Intelligence Committees. I also attempted to see Chief Justice Rehnquist to try to address that issue to him, and I also visited the Department of Justice Inspector Generals Officeafter Obama came into office, by the way, to no avail.
...
AMY GOODMAN: And its not just the NSA who can gather phone information.
WILLIAM BINNEY: No, this
AMY GOODMAN: Police departments now.
WILLIAM BINNEY: Right. Actually, I think its shared, because if youif you go back and look at Director Muellers testimony on the 30th of March to the Senate Judiciary Committee, he responded to a question when he was asked the question of "How would you prevent a future Fort Hood?" He responded by saying that "We have gotten together with the DOD and have created this technology database." He called it a "technology database." Utah will be included in that, Im sure. And
AMY GOODMAN: Meaning Bluffdale.
WILLIAM BINNEY: Yeah, right.
AMY GOODMAN: Where theyre building this massive data center.
WILLIAM BINNEY: Its storage, yeah. And he said, "From this technology base, with one query, we can get all past and all future emails. So we only have to make one query to get it." That means he gets a target, puts the target in, goes into the base, pulls all past ones, and as they come in, then he gets all future ones. So, that says theyre sharing it across the legalwith the legal authorities, so...
JUAN GONZÁLEZ: But then also having these private defense contractors and universities, I mean, youre talking about a potential in terms ofnot only of people gathering information, but of malicious use of that information by
WILLIAM BINNEY: Yeah, you want to see if your wife is cheating on you? OK, you could do that, yes. Thats right. Theres athats the hazard of assembling all this kind of data. Its not just the government misusing it, but its also people working in it, looking at it, and using it in different ways. They have no effective way of monitoring how people are using that information. They dont.
....
AMY GOODMAN: Jacob Appelbaum, I asked you before how people can protect themselves. I remember you mentioned, when they took your computer, the authorities at the border, there wasnt a hard drive in it. Explain what people can do.
JACOB APPELBAUM: Well, I think one thing that is important is to know that if youre being targeted, these people, theyre, you know, in the weapons industry. It turns out that they also have the ability to break into computers. So, if youre being targeted, you have to take a lot of precautions. For example, theres a bootable CD called "Tails," and the idea is you run Linux, and all your traffic routes over Tor, so you dont have something like Adobe Flash trying to update itself, and then the NSA or someone else gets to perform whats called a "man in the middle" attack. Instead of using Gmail, using something like Riseup. I mean, after their server was just seized, I think kicking them some cash is probably a good thing. They provide mutual aid for people all around the world to have emails that are not just given up automatically, or even with a court battle. They try to encrypt it so they cant give things up. So people can make choices where their privacy is respected, but also they can make technical choices, like using Tor, to ensure, for example, that when data is gathered, its encrypted and its worthless. And I think thats important to do, even though its not perfect. I mean, there is no perfection in this. But perfection is the enemy of "good enough."
AMY GOODMAN: How do you download Tor, T-O-R?
JACOB APPELBAUM: You go to TorProject.org, https://www.torproject.org. And the "S" is for "secure," for some value of "secure." And you download a copy of it, and its a web browser, for example. And the program, all put together, double-click it, run it, youre good to go.
AMY GOODMAN: You can even Skype on it?
JACOB APPELBAUM: YouI would really recommend using something like Jitsi instead of Skype. Every time you use proprietary software
AMY GOODMAN: "Jitsi" is spelled...?
JACOB APPELBAUM: J-I-T-S-I. So, every time you use proprietary software, you have to ask yourself, "Why is this provided to me for free?" And now that Microsoft is involved with Skype, the question is: Doesnt Microsoft have some sort of government leaning on them, say the U.S. government, to give them so-called lawful interception capabilities? And of course the answer is going to be yes, right? If you log into Skype on a computer youve never used before, you get all your chat history. Well, why is that? Well, thats because Skype has it. And if Skype can give it to you, they can give it to the Feds. And they will. And everybody that has that ability will. Some will fight it, like Twitter. But in the end, if the state asserts it has the right to get your data, sometimes without you even knowing that thats happening, theyre going to get it, if they can get it.
So we have to solve these privacy problems with mathematics, because its pretty hard to solve math problems with a gun or threat of violence, right? No amount of violence is going to solve a math problem. And despite the fact that the NSA has got a lot of people working on those math problems, you know, podunk cops in Seattle, for example, theyre not going to be able to do that, and the NSA is not going to help them. Now, they may have surveillance capability. They may have IMSI catchers. They might have automatic license plate readers. They have an incredible surveillance state. Theyre still not the NSA.
.... (Talks about TOR)
AMY GOODMAN: What gives you hope, William Binney? You worked in a top-secret agency for close to 40 years. You quit soon after 9/11 because you saw that the agency was spying on the American people, and you had helped develop the program that allowed this to happen.
WILLIAM BINNEY: Well, the only thing that gives me hope is programs like this or Wired articles that Jim Bamford would write about this activity, to get the word out so that people can be aware of whats happening, so in a democracy we can stand forward and vote, in some way, as to what we want our government to do or not to do, and what kind of information we want them to have or not have.
JUAN GONZÁLEZ: And are there any members in Congress that you see waging a good fight around this issue?
WILLIAM BINNEY: Well, Senators Wydall sic and Udall are, soWyden and Udall, they are. And there are others. Theyre just not speaking up. Of course, the problem is, you see, they cant tell you what their concern, because
LAURA POITRAS: Well, why? Why cant they tell you? I mean, what would be the repercussions if youre in Congress?
WILLIAM BINNEY: Well, because what happens whenif they did, for example, they would lose their clearance immediately and be off the committees.
...
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to "democracynow.org".
http://www.democracynow.org/2012/4/23/more_secrets_on_growing_state_surveillance