PDA

View Full Version : Protests Against Echelon Vanish After 9/11



Gold9472
01-01-2006, 06:07 PM
Protests Against Echelon Vanish After 9/11

I was browsing the internet today, and I came across this (http://www.haitiaction.net/News/JM/1_1_6.html) article. I didn't read the whole thing. I got to this paragraph:

"I remember vividly what I was doing on the morning of September 11. My hair was standing on end before the planes struck the World Trade Centre. I was trolling the web and copied several stories about a new project called Echelon, a worldwide network of satellites and computers which had the capability to read or record the secrets of anyone, any company, any government, anywhere. The European Union was about to protest about Echelon, the stories said. After 9/11 there has been a complete absence of stories about Echelon."

I didn't know that... and as it turns out... he's right...

https://web.archive.org/web/20011110121901/http://www.statewatch.org/news/2001/sep/023link.htm (http://www.statewatch.org/news/2001/sep/023link.htm)
https://web.archive.org/web/20010713225158/http://www.newsfactor.com/perl/story/11770.html
https://web.archive.org/web/20180813145126/http://www.ilka.org/themen/infotech/tokio.html (https://web.archive.org/web/20200219213757/http://www.ilka.org/themen/infotech/tokio.html)
http://www.wsws.org/articles/2001/jun2001/ech-j06.shtml

It's amazing how many major stories were about to break before 9/11, and how they suddenly vanished afterwards.

Gold9472
07-01-2006, 09:30 AM
bump

werther
07-01-2006, 11:19 AM
you're right. I was able to find some interesting articles though

http://english.ohmynews.com/articleview/article_view.asp?no=297728&rel_no=1
http://www.stuff.co.nz/stuff/0,2106,3704389a11,00.html

borepstein
07-03-2006, 09:16 AM
As for things that went under the radar after 9/11 here is my personal favorite (http://pyramid.blog-city.com/rumsfeld_sept_10_2001_the_pentagon_cannot_account_ for_23_tri.htm).

Gold9472
11-29-2007, 01:13 PM
1945-1975: NSA’s Operation Shamrock Secretly Monitors US Citizens’ Overseas Communications
The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]

After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see September 13, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).
Early 1970s: NSA Develops ‘Rhyolite’ Satellite Surveillance System
The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

1980s: Reagan Administraion Has NSA Monitor US Congressperson
Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

1983: Margaret Thatcher Uses Echelon to Spy on Government Ministers
British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

April, 1988: Senator Thurmond Monitored by Echelon
Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Late April 1996: US Monitors Al-Qaeda Canceling Singapore Plot
According to counterterrorism expert Rohan Gunaratna, US intelligence monitoring al-Qaeda communications learn that al-Qaeda is canceling an attack on Western targets in Singapore. On April 18, 1996, 108 Lebanese civilians seeking refuge at a UN camp in Qana, Lebanon, are killed by mortars fired by Israeli forces. Bin Laden “was keen not to dissipate what he envisaged as widespread revulsion against Israel’s action and hence called off the strike in Southeast Asia. Al-Qaeda’s team in question was very determined to go ahead, having spent years preparing the attack, and according to the intercepts it proved difficult for Osama to convince it otherwise.” Gunaratna claims the US learned this through the NSA’s Echelon satellite network (see Before September 11, 2001) “and other technical monitoring of their communications traffic.” [Gunaratna, 2003, pp. 133-134] If true, this case supports other evidence that the US was successfully monitoring bin Laden’s communications from an early date (see Early 1990s) and that al-Qaeda’s Southeast Asia operations were penetrated years before an important al-Qaeda summit in Malaysia discussing the 9/11 plot (see January 5-8, 2000).

November 30, 1998: NSA Admits to Having Classified Information on Princess Diana
The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Gold9472
11-29-2007, 01:13 PM
February 27, 2000: NSA Spied on Public Figures, Human Rights Organizations, Intelligence Officials Reveal
The NSA’s Echelon satellite surveillance system has eavesdropped on numerous public figures, human rights organizations, charities, and even the Vatican, former British intelligence officials admit (see February 27, 2000). The NSA, which shares information with Britain, Canada, Australia, and New Zealand, has eavesdropped on, among others, Princess Diana (see November 30, 1998), Mark Thatcher (the son of former British prime minister Margaret Thatcher), the Pope, Mother Teresa, Amnesty International, Christian Aid, and others. It is unclear exactly when the NSA performed its surveillance operations, and what information it collected. The officials choose to speak out after the European Parliament announces it will open an inquiry into Echelon’s operations (see July 11, 2001). Former NSA official Wayne Madsen says, “Anybody who is politically active will eventually end up on the NSA’s radar screen.” The NSA routinely monitors charities and human rights organizations operating overseas because they often have access to information about regimes opposed to Western interests. Madsen believes the NSA spied on Diana because of her human rights work; he says that “undisclosed material held in US government files on Princess Diana was collected because of her work with the international campaign to ban landmines.” Mark Thatcher was monitored in the 1980s because of his work on the huge al-Yamamah arms contract being negotiated between Britain and Saudi Arabia. The NSA also monitored conversations by officials of the Panavia consortium, which builds the Tornado fighter plane. British Aerospace is a major partner in the consortium. “I just think of Echelon as a great vacuum cleaner in the sky which sucks everything up,” says former Canadian intelligence officer Mike Frost. “We just get to look at the goodies.” Former US computer software manager Margaret Newsham, who worked during the 1980s at the Menwith Hill listening station in Yorkshire, says, “I was aware that massive security violations were taking place. If these systems were for combating drugs or terrorism, that would be fine. But not for use in spying on individuals.” Newsham recalls being shocked when she overheard conversations by then-US senator Strom Thurmond (see April, 1988). “It was evident American constitutional laws had been broken,” she says. [London Times, 2/27/2000]

February 9-21, 2001: NSA Supposedly Mapped, Disrupted, and Monitored Bin Laden’s Network
In a series of articles for UPI, journalist Richard Sale reveals many details about the NSA’s electronic surveillance of al-Qaeda. “The United States has scored notable successes in an information war against the organization of terrorist suspect Osama bin Laden. US hackers have gone into foreign bank accounts and deleted or transferred money and jammed or blocked the group’s cell or satellite phones.” It is also mentioned that “Bin Laden is surrounded by US listening posts.” The articles discuss the extent to which the NSA’s Echelon satellite network is monitoring al-Qaeda, and even seems to make an oblique reference to monitoring the al-Qaeda safe house in Yemen that enabled the NSA to discover valuable information on hijackers Nawaf Alhazmi and Khalid Almihdhar (see December 29, 1999). The articles also reveal that since 1995, bin Laden tried to protect his communications with a “full suite of tools,” but “codes were broken.” An expert adds that “you don’t use your highest level of secure communications all the time. It’s too burdensome, and it exposes it to other types of exploitation.” The articles also imply that Echelon is used in illegal ways. An anonymous former senior US intelligence official says, “This isn’t about legality. This is about trying to protect American lives.” [United Press International, 2/9/2001; United Press International, 2/13/2001; United Press International, 2/21/2001] While bin Laden’s communications were certainly thoroughly monitored before 9/11 (see November 1996-Late August 1998), no evidence has come to light since 9/11 that the US was hacking into bank accounts or jamming signals.

April 4, 2001: Bugging Techniques Reach New Heights
The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

[b]June 2001: Germans Warn of Plan to Use Aircraft as Missiles on US and Israeli Symbols
German intelligence warns the CIA, Britain’s intelligence agency, and Israel’s Mossad that Middle Eastern militants are planning to hijack commercial aircraft to use as weapons to attack “American and Israeli symbols, which stand out.” A later article quotes unnamed German intelligence sources who state the information was coming from Echelon surveillance technology, and that British intelligence had access to the same warnings. However, there were other informational sources, including specific information and hints given to, but not reported by, Western and Near Eastern news media six months before 9/11. [Frankfurter Allgemeine Zeitung (Frankfurt), 9/11/2001; Washington Post, 9/14/2001; Fox News, 5/17/2002]

Before September 11, 2001: Echelon Intelligence Network Used on Al-Qaeda
By the 1980s, a high-tech global electronic surveillance network shared between the US, Britain, Canada, Australia, and New Zealand is gathering intelligence all over the world. The BBC describes Echelon’s power as “astounding,” and elaborates: “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.” One major focus for Echelon before 9/11 is al-Qaeda. For instance, one account mentions Echelon intercepting al-Qaeda communications in Southeast Asia in 1996 (see Before September 11, 2001). A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.” However, he and other critics will claim one reason why US intelligence failed to stop terrorism before 9/11 was because there was too much of a focus on electronic intelligence gathering and not enough focus on human interpretation of that vast data collection. [Toronto Star, 2/2/2002]

[b]February 2003: British Translator Leaks Word of NSA’s Wiretapping of UN to British Press
Katharine Gun, a 29-year old translator for British intelligence’s Government Communications Headquarters (GCHQ), leaks the National Security Agency memo documenting the NSA’s electronic and physical surveillance of numerous UN delegates to the Security Council (see January 31, 2003). Gun will be arrested on March 8 and charged with violating the Official Secrets Act (see March 9, 2003). Gun leaks the memo, written by the NSA’s Frank Koza and sent to several US allies via its ECHELON global surveillance system, to Britain’s Observer, which spends weeks verifying the document’s veracity before running the story on March 2. Former NSA intelligence officer Wayne Madsen, now of the Electronic Privacy Information Center, says the leak illustrates the deep unhappiness among several US allies’ intelligence agencies over US and British attempts to allege ties between Iraq and al-Qaeda. “My feeling is that this was an authorized leak,” Madsen says. “I’ve been hearing for months of people in the US and British intelligence community who are deeply concerned about their governments ‘cooking’ intelligence to link Iraq to al-Qaeda.’ While surveillance of delegates and other officials at the UN is a violation of the Vienna Convention on Diplomatic Relations, [Observer, 3/9/2003] intelligence experts acknowledge that the US and other nations routinely conduct at least some sort of surveillance on UN members. “One would have to have the innocence of an unborn child to believe that espionage doesn’t go on every day at the United Nations,” says one such expert, Loch Johnson. “From a purist point of view, it’s unfortunate in a way, because after all, we’re the host nation for the United Nations. But the reality is, Europeans and everyone else engages in espionage in New York City, much of it focused on the United Nations.” Experts say what is unprecedented is the leak itself, especially in its timeliness and detail. [Baltimore Sun, 3/4/2003]

Vietnam-era whistleblower Daniel Ellsberg, who leaked the so-called “Pentagon Papers” to the New York Times, writes in January 2004, “I can only admire the more timely, courageous action of Katherine Gun…who risked her career and freedom to expose an illegal plan to win official and public support for an illegal war, before that war had started. Her revelation of a classified document urging British intelligence to help the US bug the phones of all the members of the UN security council to manipulate their votes on the war may have been critical in denying the invasion a false cloak of legitimacy.…She did what she could, in time for it to make a difference, as indeed others should have done, and still can. I have no doubt that there are thousands of pages of documents in safes in London and Washington right now—the Pentagon Papers of Iraq—whose unauthorized revelation would drastically alter the public discourse on whether we should continue sending our children to die in Iraq.…Exposing governmental lies carries a heavy personal risk, even in our democracies. But that risk can be worthwhile when a war’s-worth of lives is at stake.” [Guardian, 1/27/2004]
[b]December 25, 2005: National Security Expert Challenges Legal Basis for Domestic Surveillance Program
Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:

The argument that FISC is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s ECHELON program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” [Washington Post, 12/25/2005]

simuvac
11-29-2007, 01:19 PM
Thanks, Jon. Although I had read about Echelon years ago, I did not realize the connection with 9/11. This is very interesting.

A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.”

Stuff like this makes it more difficult to accept the "failure of intelligence" claim.

dMole
11-29-2007, 01:49 PM
People might be interested to read about PROMIS, Ptech, and CARNIVORE systems as well.

Electronic Freedom Foundation [not links for above subjects]
http://w2.eff.org/br/

http://www.eff.org/cases/att

I posted this Google/Gmail information on another board and it made a few quite nervous apparently.

---------BEGIN QUOTED
Here are a few things many don't know about Google and Gmail.

I have heard reports that Google and Gmail are linked to CIA and/or NSA, and that Keyhole Corporation was actually an intelligence front.

http://www.news.com/2100-1032_3-5428685.html

http://www.theregister.co.uk/2004/04/03/google_mail_is_evil_privacy/

http://gmail-is-too-creepy.com/

http://www.theregister.co.uk/2007/01/08/msn_bans_scroogle/

http://www.spacetoday.org/Satellites/YugoWarSats.html

http://www.globalsecurity.org/space/systems/kh-12.htm

http://scroogle.org/

Next time you use Google maps and Google Earth, look for the "downloading from kh0, kh1, kh2," etc. in your browser's status bar.

The toolbar is just creepy [in a virusy sort of way] IMHO, but I'm no stranger to IT. I prefer Metacrawler, Dogpile, momma.com, or scroogle, and I won't use Microsoft Internet Explorer (Firefox/mozilla are probably best now that AOL owns Netscape).

Gold9472
11-29-2007, 01:50 PM
I just think it's funny that everyone is so concerned about the illegal wiretaps, when Echelon listens to everyone.

simuvac
11-29-2007, 03:44 PM
I just think it's funny that everyone is so concerned about the illegal wiretaps, when Echelon listens to everyone.

Yes, you've nailed it.

The media obsess over domestic laws concerning surveillance, but for years the intelligence communities have been sharing information across borders (re: Echelon). Lotta back scratching to supercede domestic laws.

Gold9472
11-29-2007, 03:59 PM
My uncle worked for the NSA for 30 years. When I first heard of Echelon, I asked him about it. He was very back-offish. He didn't even want to acknowledge the word.

dMole
11-29-2007, 05:54 PM
2 more very good, related books:

The Puzzle Palace

Body of Secrets

both by James Bamford

http://en.wikipedia.org/wiki/James_Bamford

simuvac
11-29-2007, 06:18 PM
2 more very good, related books:

The Puzzle Palace

Body of Secrets

both by James Bamford

http://en.wikipedia.org/wiki/James_Bamford

Thanks. You know a great deal about these things. Maybe too much....

From the Amazon page for Puzzle Palace:

Bamford quotes U.S. Senator Frank Church: "If this government ever became a tyranny ... the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government ... is within the reach of the government to know."