Oh Yes This Happened and Did YOU Hear About It ?
No Doubt you are now wondering just how this fracas shown above started ? Read this and get ready for the reality of skullduggery in US government.
A quick primer: ALEC is an organization that fosters relationships between state legislators, conservative think tanks, and large corporations. ALEC says they are just allowing lawmakers to exchange ideas, but they are also drafting legislation, called “model bills” – with a great deal of input from the corporations themselves – to distribute and pass in the various states.
ALEC has succeeded for decades in part by operating under the radar. The last 18 months, however, have been different.
Several high profile and widely-criticized pieces of legislation have been traced back to their original source. Arizona’s SB 1070, the controversial “papers please” immigration law, had its birth in an ALEC committee. The recent union-busting bills in Wisconsin pushed by Gov. Scott Walker are also ALEC-inspired, and Walker himself was an ALEC member.
Most significantly, the Stand Your Ground/Shoot First laws, which gave legal protection to George Zimmerman when he shot and killed Trayvon Martin, were concocted by National Rifle Association lobbyists and ratified by an ALEC committee.
In the wake of the controversy around these and other laws, the public became increasingly aware of ALEC and the dramatic influence corporations have in the writing of our state laws.
Has ALEC now been exposed? This week definitely showed they are on the ropes. Jay Riestenberg of the AFL-CIO compiled a collection of press clips from the last few days on ALEC and the Chicago protest.
(end of clipping)
Some of you may not be up to speed on ALEC so we have this report from Bill Moyers which gives you the thorough workings of the organization and it’s true purpose.
ALEC might not yet be a household name, but their nefarious corporate-driven travesty of lawmaking is finally seeing some sunlight.
Associated Press, Conservative conference draws lawmakers, picketers
Free Speech Radio News, Records show ALEC used secretive fund to finance junkets for legislators
The Huffington Post, How the ALEC Agenda Forced Chicago’s School Closings
The Nation, ALEC Convention Met With Protests in Chicago
The Nation, ALEC’s Illegal Past?
The Nation (blog), An Exposed ALEC Faces Mass Protests and Calls for Scrutiny
In These Times, Labor and Civil Rights Groups Descend on ALEC Conference
Public News Service, ALEC’s 40th Birthday Draws Protests
St. Louis Post-Dispatch, Legislators head to Chicago for ALEC retreat
Cleveland Plain Dealer, Ohio AFL-CIO head said he will protest at Chicago meeting of group that sought to limit unions
News & Observer, Few ALEC bills passed NC legislature, watch dog group finds
Capital Times, Morning briefing: ALEC takes beating
Mint Press News, Do Lavish Trips Funded By ALEC Count As ‘Lobbying’ — Or Bribery?
Riverfront Times (blog), Stand Your Ground: Dick Durbin Pressures Anheuser-Busch, Corporate Backers of ALEC
Wisconsin Gazette, ‘Die-in’ staged at ALEC conference to protest Stand Your Ground laws
Wall Street Journal, Durbin Wants a List
Bless this post. ALEC is literally the corporate monster hiding under your bed. More people should know about their shit. In fact, here’s some more shit ALEC’s been behind that you should know about, because they are funded by all 3 of the biggest private prison contractors (CCA, GEO, MTC) and many members of their board go on to be politicians in conservative states pushing immigration “reform” bills to fill their incredibly profitable private prisons:
The Nation, The Hidden History of ALEC and Prison Labor
Prison Legal News, Private Prison Companies Behind the Scenes of Arizona’s Immigration Law
Republic Report, The Five Most Despicable Laws Passed by Corporate Front Group ALEC
(end of clipping)
This is the news from this weekend so you can get caught up on what’s not being talked about; that effects you.
DOJ: There’s No Expectation Of Privacy In Your Phone Records Because People Don’t Like Terrorists http://bit.ly/137zKbM
And Then We Have This – Which should be just about enough to put waves in your Doo
Charlie Savage of The New York Times confirmed this week what we have been warning about for years, including to the Supreme Court last fall: The National Security Agency (NSA) is “searching the contents of vast amounts of Americans’ e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance … .” The rub: If you’ve sent an international email or text since 2008, chances are the government has looked inside of it. In other words, the same NSA surveillance dragnet that government officials have consistently dismissed as speculative and far-fetched is very, very real.
The Times‘s front-page story raises questions akin to those advanced by a report in The Guardian last week revealing that under a program codenamed “XKeyScore,” NSA analysts use dropdown menus and filters — just like the ones we all use every single day on the web — to gain instant access to “nearly everything a typical user does on the Internet.” Essentially, XKeyScore is the NSA’s very own, very powerful surveillance search engine.
These reports are particularly alarming in light of government officials’ emphatic public statements denying that the NSA ever peeks inside the contents of Americans’ communications without a warrant. We’ve explained why those disavowals have been misleading; now, we know they’re simply untrue.
There are important details about these programs that still need to be filled in. But a large amount of information is already in the public domain. What follows is an attempt to tie together many of the threads of the last two months’ worth of disclosures, in order to get a big-picture look at what the NSA is doing, and how.
Prism or Upstream (or both)?
As a starting point, it’s useful to review the various ways in which the government is watching us.
In early June, The Guardian and The Washington Post reported the existence of “Prism,” a program authorized under the FISA Amendments Act (FAA), now located in Section 702 of the FISA, that allows the NSA to receive data directly from U.S. companies like Google and Facebook and thereby collect the contents of foreign targets’ emails, text and video chats, photographs, and more. As we’ve explained, Prism sweeps up the communications of many Americans in the process.
But another component of the government’s omnipresent surveillance of global communications that has escaped sustained attention — until this week’s Times bombshell — is likely even more extensive. In The Guardian‘s first follow-up report on Prism, it published a slide that identified “Two Types of Collection” under the FAA: Prism, and Upstream. In contrast to Prism, “Upstream” collection involves the collection of communications — both their metadata and their content — as they pass through undersea fiber-optic cables. According to renowned surveillance journalist James Bamford, Prism was designed to fill“gaps in the coverage” provided by the NSA’s Upstream collection. Those gaps exist both because certain communications are not available through Upstream, and because Prism collection avoids encryption that may protect certain upstream-collected communications. (A new story in The Guardian reveals that once the government has this data, it can search through it for individual Americans’ communications without a warrant.)
The NSA’s data collection from undersea cables is not entirely new. Since the 1970s, at least, the NSA has been tapping cables on foreign soil to conduct surveillance abroad. But over the past ten years, that changed.
In 2005, The New York Times reported on a vast expansion of the NSA’s role in intelligence gathering at home. First, James Risen and Eric Lichtblau disclosed a secret program of warrantless eavesdropping targeted at communications inside the United States. One week later, the same reporters revealed that the NSA had also been capturing American communications on a much broader scale by “tapping directly into some of the American telecommunication system’s main arteries” with the cooperation of U.S. telecommunications companies. (The NSA’s access to U.S.-based fiber-optic cables was recently revisited by theAssociated Press and The Washington Post.)
The “Upstream” interception of domestic cables — which, Bamford says, carry “about 80 percent” of the world’s telecommunications — allows the government to conduct pattern analysis on a huge trove of metadata, and to eavesdrop on foreign-to-foreign communications that travel over U.S. networks. But it also has another serious and inevitable consequence: the warrantless acquisition of metadata and content concerning purely American communications.
Savage’s story in the Times advances the ball by explaining, at least in part, what the government does with the things it’s accessing via U.S.-based cables. Intelligence officials told the Times that the spy agency casts a net that ensnares virtually every electronic and text communication passing through U.S. borders (in either direction) over fiber-optic networks. The government makes a copy ofeverything; it then searches inside every message and retrieves, for longer-term storage, any message that includes content matches to “selectors,” or approved “targets” under Section 702 of the Foreign Intelligence Surveillance Act.
But the government’s dragnet is not confined to the fiber-optic cables running across domestic boundaries. Recent reporting by Brazil’s O Globo, Germany’sDer Spiegel, and Australia’s Sydney Morning Herald — all based on documents obtained from Edward Snowden — paint a picture of an interconnected network of communications cables and facilities across the world to which the United States has access. (Globally, roughly 99 percent of the world’s communications travel over undersea fiber-optic cables.) The government apparently gains that access through its own taps, arrangements between American and foreign telecommunications companies, or agreements with foreign intelligence services. When NSA Director Gen. Keith Alexander says he intends for the agency to “collect it all,” this is exactly what he means.
How does XKeyScore fit in?
The bottom line: However it does it, the United States is accumulating an almost incomprehensibly massive trove of information, in the form of both metadata and content. But the sheer comprehensiveness of that data also presents the government with a confounding practical problem: If you’re looking for the proverbial needle in the most colossal digital haystack the world has ever known, how do you even begin to go about finding it?
One way, as Savage’s reporting tells us, is by “copying and then sifting through the contents of” the communications that pass over U.S. borders, and then marking some of those messages for longer-term storage in the government’s content databases.
But another — though perhaps related — way to sort the world’s data is, apparently, by using XKeyScore.
In typical Fort Meade-ese, the agency’s training presentation defines XKeyScore as an “Exploitation System/Analytic Framework” that “[p]rovides real-time target activity.” In plainer English, XKeyScore is an integrated set of software interfaces, databases, and servers that allows analysts to find and access the online activities of anyone in the world, in real time. As Marc Ambinder — who has previously written about XKeyScore — explains, it “is not a thing that doescollecting,” but a cohesive system that lets the NSA sift and sort through the enormous pile of data the agency is vacuuming up every minute around the world.
In other words, XKeyScore is something like a search engine.
Of course, it’s a uniquely powerful one; a slide published by The Guardianindicates that it can both search deeper into data and process it faster than the NSA’s other tools. In part, that’s because XKeyScore involves the use of 700 servers deployed at approximately 150 sites around the world—mostly U.S. and allied military and intelligence facilities, as well as U.S. embassies and consulates. Servers at each site permit the retention of one months’ worth of metadata and three-to-five days’ worth of content at a time. Ambinder writes that XKeyScore is “useful because it gets the ‘front end full take feeds’ from the various NSA collection points around the world and importantly, knows what to do with it to make it responsive to search queries.”
Thus, XKeyScore is a sort of clearinghouse for data collected around the world, as well as an interface for homing in on particular information. (The worldwide server network receives this data from various sources: the Upstream-collecting undersea cables, government-satellite collection, and the Prism program. How all of the NSA’s sources of information relate to how and where they are stored is a very important hole in what is already publicly known.) Data flows into XKeyScore collection sites; it is stored on the system’s servers, with content remaining there for between three and five days, and metadata for as long as a month; and NSA analysts search those servers to identify the communications of its targets.
Who exactly is the NSA targeting?
But XKeyScore is not just a practical solution to the problem of collecting all of the world’s data. It’s also supposed to implement restrictions on whose data the NSA is lawfully permitted to examine; effectively, it is the NSA’s proxy for the full protection of constitutional privacy rights to which American citizens are entitled.
Since the FAA prohibits the targeting of U.S. persons, or even foreign persons inside the United States, the NSA is not supposed to be able to indiscriminately seek out data in its streams. Thus, as The Guardian‘s slides reveal, NSA analysts must select “foreign factors” in order to conduct searches through XKeyScore. The NSA’s XKeyScore “foreign factors” appear to be the same as those disclosed in an earlier Guardian story about NSA targeting procedures, that impose limited rules on the government’s warrantless surveillance authority under the FAA.
As our explainer from last month details, those procedures seriously threaten Americans’ privacy—even if they are being properly followed by everyone in the NSA—because the protections for American are weak, and riddled with exceptions. Moreover, the prohibition on “targeting” Americans has only limited purchase when it comes to ensuring that Americans’ communications will not be swept up in the NSA’s global dragnet. Indeed, as my colleague Patrick Toomeydiscussed last month, “there is nothing inadvertent or accidental” about the size of these loopholes; they were written into the law for the very purpose of allowing the government to gain access to Americans’ communications.
And this week’s Times story confirms yet another reason that the NSA’s procedures are inadequate. The new revelations make clear that the government’s use of Section 702 goes far beyond what it has previously confirmed to the public — that its foreign-intelligence surveillance only captures the communications of U.S persons or others inside the United States who are in direct contact with the NSA’s targets. Instead, the NSA can search the communications of everyone for information “about” its targets — at least when those communications travel across American borders. Capturing communications “about” approved targets means that no matter who you are or who you talk to, the content of your emails and texts are fair game for NSA surveillance.
Greenwald’s reporting presents a different threat as well. The XKeyScore slides show us how an analyst might have the technical capability to breeze past targeting limitations by clicking through filters the way we all search for the lunch we want to order.
According to the slides released by The Guardian and Greenwald’s reporting, XKeyScore allows analysts to search the metadata and content residing on any XKeyScore server by different selectors — name, email address, telephone number, IP address, keywords, and even language or type of Internet browser — “without prior authorization.” Searches might either turn up content — which analysts can then view or listen to — or help an analyst identify an anonymous user who is, for example, searching for “suspicious stuff” or speaking a language “out of place” for a given region. Some slides also suggest that the XKeyScore searches can also query data stored in other NSA databases. And Ambinder insinuates that anything targeted through XKeyScore can be directed into one of the government’s more permanent metadata and content databases, some of which the Post‘s Barton Gellman described in June.
In an online video shortly after the revelations began, Snowden claimed that “sitting at [his] desk,” he could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if [he] had a personal email.” The government’s reaction was both harsh and emphatic. Gen. Alexander went so far as to testify to the Senate Appropriations Committee not only that Snowden’s claim was “false,” but that “I know of no way to do that.”
The Guardian slides give us good reason to believe that Snowden was telling the truth, and that Alexander was being coy. Greenwald reports that Snowden has stated that supervisors often find ways to circumvent the very targeting procedures that are meant to confine the NSA’s searches: “It’s very rare to be questioned on our searches,” he said, “and even when we are, it’s usually along the lines of: ‘let’s bulk up the justification.’” As far back as 2009, members of Congress were raising alarms about the NSA’s collection under the FAA, including Rep. Rush Holt’s ominous warning that “[s]ome actions are so flagrant that they can’t be accidental.”
* * *
We’ll have to wait for additional revelations — or, preferably, official disclosures by the government — to fully understand how XKeyScore, and the government’s other FAA surveillance capabilities, actually work, and how much power NSA analysts have to circumvent the agency’s own procedures. But what we already do know gives us plenty of important reasons to reject it as a model for surveillance that is compatible with the Constitution.
Can the Chuuch Finally Say AMEN, Because Enough Is Enough. Jesus Please Take The Wheel