HomeLatest ThreadsGreatest ThreadsForums & GroupsMy SubscriptionsMy Posts
DU Home » Latest Threads » kpete » Journal
Page: « Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Next »


Profile Information

Member since: Fri Sep 17, 2004, 03:59 PM
Number of posts: 63,204

Journal Archives

Snowden: They say it's better to kick someone out of a plane than let these people have day in court

Someone responding to the story said 'real spies do not speak like that'. Well, I am a spy and that is how they talk. Whenever we had a debate in the office on how to handle crimes, they do not defend due process – they defend decisive action. They say it is better to kick someone out of a plane than let these people have a day in court. It is an authoritarian mindset in general.


George Will Gets SMACKED HARD by his own words on NSA

During a panel discussion on ABC News, Will linked the NSA’s practice of collecting the phone records of millions of Americans with a so-called “scandal” involving the Internal Revenue Service targeting conservative groups.

“This is where the IRS scandal metastasizes into a national security scandal,” Will opined. “Because I’m sure I’m not the only American saying — looking at the NSA information gathering and saying, ‘Well, this would really be a problem if we had the kind of government that, say, unleashes the IRS on political opponents. Oh, come to think about it, we do have that kind of government.’ And, therefore, the willingness to trust the executive branch is today minimal and should be.”

At that point, Ellison reached into his jacket pocket and pulled out Will’s 2006 column excoriating President George W. Bush’s administration for using the NSA to spy on Americans’ phone calls without a warrant and without congressional oversight.

“Besides, terrorism is not the only new danger of this era,” Will wrote. “Another is the administration’s argument that because the president is commander in chief, he is the ‘sole organ for the nation in foreign affairs.’”



Clintons Spy Program "ThinThread" Was "Far Superior" (w/o violating privacy) To Bushes NSA Program

“You can have a democratic surveillance state which collects as little data as possible and tells you as much as possible about what it's doing, or you can have an authoritarian surveillance state which collects as much as possible and tells the public as little as possible,” Krugman said. “And we are kind of on the authoritarian side.

Why would Bush use a program that does not actually assist the finding of terrorists, yet also has the disadvantage of invading Americans' privacy rights?

Excellent diary and article in May 2006 ...

What Is The Real Purpose Of Bush's NSA Surveillance? by Patriot Daily

The Baltimore Sun http://www.commondreams.org/headlines06/0518-07.htm reported today that Bush rejected President Clinton's effective, legal surveillance program that did not invade privacy to adopt the current NSA spying program, which is ineffective, illegal and invasive of citizens' privacy rights. So, the question jumping off the page may be: Why would Bush use a program that does not actually assist the finding of terrorists, yet also has the disadvantage of invading Americans' privacy rights?

The Clinton surveillance program, called ThinThread, was created during the late 1990s to "gather and analyze massive amounts of communications data without running afoul of privacy laws." Several bloggers provide excellent posts on the components and nature of the program.

The key to evaluating Bush's true motive for his NSA program is that testing of ThinThread showed it was far better in finding potential threats and protecting privacy than the current NSA program that Bush chose in its stead. "For example, its ability to sort through massive amounts of data to find threat-related communications far surpassed the existing system, sources said. It also was able to rapidly separate and encrypt U.S.-related communications to ensure privacy." But, Gen. Hayden of NSA decided not to use these two tools or the monitoring feature to prevent abuse of the records. The problem is that not using the ThinThread program has "undermined the agency's ability to zero in on potential threats." Moreover, "ThinThread could have provided a simple solution to privacy concerns."

Incredibly, the ThinThread program was far superior to the NSA program in place in 2004.

TIA Never Dead Under Jeb/George Bush-Cheney

Cheney was very fond of the program started in Florida as extension of the 2000 election fraud and continued in secrecy with funding by Jeb Bush as governor in Florida.



1/21/09 COUNTDOWN - The “missing part” of the timeline in today’s NY Times lead story

Uploaded on Jan 21, 2009
Keith's exclusive with Russel Tice who says that the Bush administration was spying on and targeting journalists and had access to all Americans phone calls, emails and computer communications.

So, here we are in this “missing part” of the timeline in today’s NY Times lead story, which brings us to the very first days of the Obama administration, in January 2009…

Enter former NSA employee and whistleblower Russell Tice.

more info, videos, etc., etc., etc. plus a billion links:

Cummings calls Issa’s IRS bluff: ‘I’ll release’ transcripts clearing White House if he doesn’t

Source: Raw Story


“He’s the chairman of the committee, we’re not in power,” the Maryland Democrat pointed out. “If he does not release them, I will. Period.”

“I’m willing to come on your show next week with the chairman, with the transcripts, if he agrees to do that,” he added. “But if he doesn’t, I’ll release them by the end of the week.”

Crowley observed that in a portion of the transcripts that had been released, an IRS screening group manager in the Cincinnati office told Issa’s committee that he had “no reason to believe” that the White House had ordered the targeting of conservative groups.

“He was a 21-year veteran,” Cummings said of the IRS manager. “He described himself in the interviews in response to a Republican attorney’s question as a conservative Republican. Very significant. He is a conservative Republican working for the IRS. I think these interviews and these statements go a long way to showing the White House was not involved in this.”

Read more: http://www.rawstory.com/rs/2013/06/09/cummings-calls-issas-irs-bluff-ill-release-transcripts-clearing-white-house-if-he-doesnt/

Going "Full Stasi" The Transnational Elite Oligarch's Way Of Keeping Control Indefinitely...

The Logic of the Surveillance State
2013 JUNE 9
by Ian Welsh


The solution is a transnational elite, in broad agreement on the issues, who do not believe in nationalism, and who play by the same rules and ideology. If you’re all the same, if nations are just flags, if you feel more kinship for your fellow oligarchs, well then, you’re safe. There’s still competition, to be sure, but as a class, you’re secure.

That leaves the internal problem, of revolt. The worse you treat people, the more you’re scared of them. The more you clamp down. This is really, really expensive and it breaks down over generations, causing internal rot, till you can’t get the system to do anything, no matter how many levers you push.

What is being run right now is a vast experiment to see if modern technology has fixed these problems with surveillance and opporessive states. Is it cheap enough to go full Stasi, and with that level of surveillance can you keep control over the economy, keep the levers working, make people do what you want, and not all slack off and resist passively, by only going through the motions?

The oligarchs are betting that the technology has made that change. With the end of serious war between primary nations (enforced by nukes, among other things), with the creation of a transnational ruling class, and with the ability to scale surveillance, it may be possible to take and keep control indefinitely, and bypass the well understood problems of oligarchy and police and surveillance states.


way more:

Wake Up Already America!!! NSA Built Back Door In ALL Windows Software by 1999---Long BEFORE 9/11

We have repeatedly pointed out that widespread spying on Americans began prior to 9/11.

NSA Built Back Door In All Windows Software by 1999
Posted on June 7, 2013 by WashingtonsBlog
Government Built Spy-Access Into Most Popular Consumer Program Before 9/11

Digging a little further, we found a 1999 article by leading European computer publication Heise which noted that the NSA had already built a backdoor into all Windows software:

A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.


A third key?!

But according to two witnesses attending the conference, even Microsoft’s top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was “stunned” to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the “entropy” of programming code.

Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.

Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone’s and everyone’s Windows computer to intelligence gathering techniques deployed by NSA’s burgeoning corps of “information warriors”.

According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system “is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system“. The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.



The World, thru a Repuke Lense

stolen from:

it has come to this...

WaPo Misread Powerpoint- Story on Feds tapping directly into internet companies was wrong & rushed

The real story in the NSA scandal is the collapse of journalism
Summary: A bombshell story published in the Washington Post this week alleged that the NSA had enlisted nine tech giants, including Microsoft, Google, Facebook, and Apple, in a massive program of online spying. Now the story is unraveling, and the Post has quietly changed key details. What went wrong?

So what went wrong with the Post?

The biggest problem was that the Post took a leaked PowerPoint presentation from a single anonymous source and leaped to conclusions without supporting evidence. McCullagh quotes one of his named (not anonymous) sources, former general counsel of the NSA Stewart Baker, as saying the slides look “flaky”:

"The PowerPoint is suffused with a kind of hype that makes it sound more like a marketing pitch than a briefing -- we don't know what its provenance is and we don't know the full context," Baker said. He added, referring to the Post's coverage: "It looks rushed and it looks wrong."

“Rushed” would indeed be the best way to describe why the Post story changed so dramatically in a 24-hour period. Normally, an investigative piece like this would be reported thoroughly before being published. Instead, it looks like the Post rushed to publish, perhaps fearing that the slide deck had been leaked to another publication that would beat them to the punch.


Declan McCullagh of CNET examined the Washington Post story independently and concluded that the Post story was wrong.

Those reports are incorrect and appear to be based on a misreading of a leaked Powerpoint document, according to a former government official who is intimately familiar with this process of data acquisition and spoke today on condition of anonymity.

"It's not as described in the histrionics in the Washington Post or the Guardian," the person said. "None of it's true. It's a very formalized legal process that companies are obliged to do."



And then a funny thing happened the next morning. If you followed the link to that story, you found a completely different story, nearly twice as long, with a slightly different headline:
much more INCLUDING WAPO's before and after versions.
Go to Page: « Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Next »