NSA Reform and ISIL

SPECTRE1

SE for CI, Terrorism, Revenge, Extortion
Registered
attachment.php


As a targeted victim of government and corporate surveillance, I was disheartened to see the latest bill fail in Congress to limit surveillance capability and bulk collection by the government. After further analysis, the American people is being manipulated, so that our government can continue to spy on us with impunity in secret rooms of surveillance.

Edward Snowden exposed the abuses and capabilities that our government has in watching citizens. Our government took its time to bring a bill for vote to reform these practices. It stalled for an incident by possibly manipulating jihadist groups to behead American citizens. After being attacked through the air and having no U.S. military troops on the ground to kill, they logically resorted to beheadings. This manufactured terror by our government gave it the ammunition it needed to kill reform of this Stasi capability it desperately wants to hold over the population.

It seems corrupt Harry Reid and other members Congress masterfully manipulated the public in trouncing NSA reform. Our government timed its voting for NSA reform with the recent patterns of videos and recent beheading of Peter Kassig by ISIS. This allowed our government to use the excuse that some continuing threat exists to the homeland by using this horrific death.

attachment.php


What does this tell us about the government?

It looks like our government wants to be able to spy on citizen behind closed doors without going to another independent entity. It wants a court to rubber stamp broad surveillance request without an opposing advocate. It wants to bulk collect yotabytes of data in Utah so that it can bring up anybody telephone, email, internet, and other activities upon request in secret. When Apple and Google decided to automatically encrypt their phones, the FBI invoked images of children dying and pedophiles being able to harm children. Where was the FBI when Jerry Sandusky was raping young boys? This same tactic is being used by the NSA through masterful manipulation and cunning.

The government and the phone companies can easily build an interface allowing it to retrieve records on demand that can be watched. Why does it need to divert traffic into these secret rooms?

attachment.php


We can’t let beheadings and nuisance terror attacks scare us into giving up our rights to privacy.

attachment.php


I believe technologically our rights to privacy can be guaranteed; however, we need to have legal protections afforded by law. Don’t let these clowns in government scare or manipulate us into being passive. They are abusing these powers for their own gain and to suppress dissent that we desperately need.

The police used to be able to go into any telephone room at will and hook up an alligator clip phones to listen any conversation it wanted. It was issued along with their uniform! Citizens fought to get rid of this secret room surveillance and won which the government vigorously fought. However, now it has crept back under the rubric of national security and collecting intelligence, rather than fighting criminals.
 
Last edited:

Blaming Snowden for Paris


Friday’s attacks are reopening the debate on whether intelligence leaks
and encryption have made it too easy for terrorists to hide online.




90

No evidence has surfaced yet that Snowden's revelations made a difference in this case, or that the
perpetrators of Friday’s attacks used encrypted communications to conceal their activities. | AP Photo


By David Perera

11/16/15 07:37 P


Even as the hunt continues for suspects in the Paris terror bombings, some Western intelligence officials have already identified their culprit: Edward Snowden.

London Mayor Boris Johnson says the former National Security Agency contractor, who two years ago outed the U.S. government’s program of telephone and Internet surveillance, effectively taught terrorists “how to avoid being caught.” CIA Director John Brennan complained Monday that “a number of unauthorized disclosures” in recent years about the extent of federal snooping has made tracking terrorists “much more challenging.” Snowden also drew a borderline-profane slam on Twitter over the weekend from former George W. Bush press secretary Dana Perino.

No evidence has surfaced yet that Snowden's revelations made a difference in this case, or that the perpetrators of Friday’s attacks used encrypted communications to conceal their activities. Many private-sector computer specialists surveyed by POLITICO were skeptical about those arguments, which if true would mesh with more than a year of warnings from intelligence officials about the growing ability of terrorists and criminals to hide their tracks online.

Still, there’s no denying the political context. The criticism of Snowden comes as intelligence officials seek to reopen a debate over the balance between security and privacy — a balance that seemed, before the deaths of 129 individuals in Paris, to have been settled firmly in favor of civil liberties. U.S. intelligence and law enforcement officials have complained publicly that encryption tools — in iPhones, laptops and mobile software like Facebook-owned WhatsApp — allow terrorists, drug dealers and other criminals to “go dark” and avoid monitoring.


“We’ve had a public debate. That debate was defined by Edward Snowden, right, and the concern about privacy,” former CIA Deputy Director Michael Morell said Sunday on “Face the Nation.” “I think we're now going to have another debate about that. It's going to be defined by what happened in Paris.”

In his memoirs earlier this year, Morell said Snowden's revelations had a near-immediate effect on intelligence gathering: Within weeks, “communications sources dried up, tactics were changed."

The charges are echoing on the campaign trail, where former Florida Gov. Jeb Bush called Monday for restoring the NSA’s ability to vacuum up telephone and Internet records, which Congress eliminated in a June rewrite of the 2001 PATRIOT Act.

Still, a push by some in the Obama administration to put limits on encryption have run aground amid opposition from the tech industry and privacy advocates in Congress. Just last month, FBI Director James Comey told lawmakers that the administration was abandoning its hopes for legislation that would compel companies to leave a “back door” allowing the authorities access. Companies in the cross-hairs — such as Apple and Google — oppose such measures, saying they would leave their products vulnerable to hackers as well as law enforcement.

Federal prosecutors have also run into resistance in the courts, most recently in a Brooklyn case in which a judge has expressed skepticism about the government's ability to force Apple to unlock the iPhone of an accused meth distributor.

For now, the debate isn’t waiting for the facts. European officials have suggested that the terrorists used encrypted messaging software to plan Friday’s murders, without pinpointing a particular app, but media speculation quickly focused on a Sony video game system based on a statement one Belgian official had made three days before the attacks. "The most difficult communication between these terrorists is via PlayStation 4," Interior Minister Jan Jambon said during a policy discussion last week hosted by POLITICO Europe. "It’s very, very difficult for our services — not only Belgian services but international services — to decrypt the communication that is done via PlayStation 4.”

In fact, investigators have released no information on the communications channels used by the attackers in Paris to communicate with Islamic State commanders in Syria. And Joe Tartaro, a senior security consultant for Seattle-based cybersecurity firm IOActive, said it's highly unlikely that Sony or other video game makers encrypt their systems.

The main use of PlayStation messaging channels is for “13-year-old kids to yell at each other,” he said. “Nobody is monitoring it.”

But it is true that strong encryption tools that can defeat government spying are available like never before, including one free software package called Tor that the U.S. has funded with the aim of helping activists and political dissidents elude spying by oppressive governments. Snowden has championed the same tool as a way to bypass NSA surveillance.

Sen. Dianne Feinstein of California, the top Democrat on the Senate Intelligence Committee, said Monday that she has "never been more concerned" about the threat of the Islamic State. She pointed to the terrorist group's use of "apps to communicate on that cannot be pierced, even with a court order."

ISIL leaders are "sophisticated," Feinstein said during an interview on MSNBC, and are using encrypted technologies that give them a "secret way of being able to conduct operations and operational planning."

Not everyone is convinced. Journalist Glenn Greenwald, a Snowden ally, argued in The Intercept that U.S. officials had complained of difficulty tracking terrorist communications long before the NSA whistleblower emerged.

Bruce Schneier, a renowned cryptologist, dismissed out of hand the possibility that terrorists have put themselves beyond the reach of surveillance.

“No, of course not. That’s dumb,” he said. “It’s the golden age of surveillance, because there are hundreds of ways to surveil people.”

The emergence of popular encrypted messaging apps makes intercepting the content of communications harder, but anyone using the Internet still leaves a conspicuous digital trail — so-called metadata, the routing information that network devices need to make sure messages get to their destination. The metadata “can't be encrypted, by definition,” Schneier said.

Metadata, because it’s already structured to be easily read by computers, can be even more useful for intelligence purposes than actual content — but in June, Congress passed the USA Freedom Act, which ended the NSA’s authority to collect and hold customers' telephone metadata.

Jeb Bush criticized that restriction during an MSNBC interview. “I think we need to restore the metadata program which was part of the PATRIOT Act,” he said. “I think that was a useful tool to keep us safe and to also protect civil liberties."

Amid the rush to blame Snowden — whom former CIA Director James Woolsey accused of having “blood on his hands" — for a possible intelligence failure in Paris, some experts urged caution.

“I would hope that most people in this discussion would wait until we have the facts,” said Ari Schwartz, until recently a senior director for cybersecurity on the National Security Council staff. “We don’t know what they used.”​


Read more: http://www.politico.com/story/2015/11/blaming-edward-snowden-for-paris-215954#ixzz3ri2rszw0


 

Ex-NSA chief: ISIS fight
"under-resourced and over-regulated"​



<embed src="http://www.cbsnews.com/common/video/cbsnews_video.swf" scale="noscale" salign="lt" type="application/x-shockwave-flash" background="#000000" width="620" height="387" allowFullScreen="true" allowScriptAccess="always" FlashVars="pType=embed&si=254&pid=r_rFbTa_LlOh&uuid=12b19699-c3e4-4515-b647-f1f546220bc1&url=http://www.cbsnews.com/videos/ex-cia-nsa-director-fight-against-isis-under-resourced" /><div class='cbs-resources'><span class='cbs-more'>View More: </span><a href='http://www.cbsnews.com/politics/' class='cbs-link'>Politics News</a><span class='cbs-pipe'>|</span><a href='http://www.cbsnews.com/live/' class='cbs-link'>Live News</a><span class='cbs-pipe'>|</span><a href='http://www.cbsnews.com/videos/' class='cbs-link'>More News Videos</a></div><style type='text/css'>.cbs-link {color:#4B5054;text-decoration:none; font: normal 12px Arial;}.cbs-link:hover {color:#A7COFF;text-decoration:none; font: normal 12px Arial;}.cbs-pipe {color:#303435;padding: 0 2px;}.cbs-resources {height:24px; background-color:#000; padding: 0 0 0 8px; width: 612px;}.cbs-more {font: normal 12px Arial; color: #4B5054; padding-right:2px;}</style>​



The fight against ISIS in Syria and Iraq is "under-resourced and over-regulated," former National Security Agency and CIA director Michael Hayden said, the latest veteran among the U.S. intelligence community to weigh in on the series of terror attacks in Beirut and Paris.

"We need to commit more to the fight and we need to loosen our rules of engagement," he said Tuesday on "CBS This Morning."

"A classic case in point: About 36 hours ago, American air power destroyed over 100 tanker trucks in Syria. They were being used to literally fuel the treasury of the Islamic State," Hayden added. "We could have done that on Thursday, but we only decided to do it on Sunday. I think there are a whole host of decisions like that, that if we loosen the rules of engagement, we can actually more strongly take the fight to the Islamic State."

The retired general, who now works with global risk management firm Chertoff Group, also said he "absolutely" agreed with CIA director John Brennan's comments Monday on how U.S. intelligence capacities have been damaged.

"In the past several years, because of the number of unauthorized disclosures and a lot of hand-wringing over the government's role in the effort to try to uncover these terrorists, there have been policy and other legal changes that make our ability to collectively find these terrorists much more challenging," Brennan had said at the Center for Strategic & International Studies' Global Security Forum.

Hayden cited the timeline of the "past two and a half years," alluding to June 2013 when Edward Snowden leaked details of NSA's surveillance programs that gathered domestic phone and Internet usage data to detect suspicious behaviors linked to terrorism.

"Suddenly, that big stack of meta data doesn't look like the scariest thing in the room, does it?" Hayden said with a tight-lipped smile.

Former CIA official: Obama's ISIS strategy has failed

While the Obama administration is being criticized for its strategy against ISIS, with questions raised on whether the U.S. is underestimating the terror group or whether America needs boots on the ground, President Obama defended his administration's tactics Monday at the G-20 Summit in Antalya, Turkey.

For one, Mr. Obama said he and his closest military and civilian advisers think a larger ground force in Iraq and Syria would be a mistake.

"Not because our military could not march into Mosul or Raqqa or Ramadi and temporarily clear out ISIL, but because we would see a repetition of what we've seen before -- which is if you do not have local populations that are committed to inclusive governance and who are pushing back against ideological extremes, that they resurface," Mr. Obama said.

Hayden acknowledged local Kurdish Peshmerga fighters have seen success, as evidenced by the Iraqi-Kurdish troops' recent efforts to take back Sinjar from ISIS, but said the Kurds can be "self-limiting."

"They've been very powerful in and near Kurdish areas, but for them to go much further into Arab lands, their usefulness begins to reduce," Hayden said. "We need Arab allies on the ground stiffened -- stiffened, assisted, enabled -- by a larger American footprint. But no one is calling for American maneuver units to return to the deserts of Iraq or enter the deserts of Syria."

While reducing ISIS' capabilities is first in the process of defeating ISIS, Hayden pointed to the ideological warfare in the fight against ISIS.

"This is a fight where the ideological struggle, the motivation, is tightly tied to their success on the battle field," Hayden said. "Look, these guys are claiming they're enacting the will of God and they are the hand of God. And the more they are successful, the more they look inevitable, the more they motivate the kind of people [who are willing to die for the ISIS cause]. And so if we can break this narrative, we actually begin to break their ideological foundation."

All in all, Hayden stressed that the U.S. would be a tougher target than its European allies because of the distance, differing demographics, cultural assimilation and -- "because we're actually pretty good at this."


http://www.cbsnews.com/news/former-cia-nsa-director-michael-hayden-isis-fight-under-resourced/


 
<iframe width="640" height="360" src="https://www.youtube.com/embed/MQDRGrA9I7A" frameborder="0" allowfullscreen></iframe>

<iframe width="640" height="360" src="https://www.youtube.com/embed/VX5igFy5P58" frameborder="0" allowfullscreen></iframe>


He laid out a good argument on how the Snowden disclosures did not hamper the efforts of the government to prevent these attacks. A simple terrorist attack using easy to obtain weaponry would be nearly impossible. A machine gun has many uses that can be legal or illegal.

<iframe width="640" height="360" src="https://www.youtube.com/embed/hqeMEKy4Y3c" frameborder="0" allowfullscreen></iframe>

If you stop one method, another undetected method can be used such as knife attacks. We need to analyze after these atrocities whether there was any clues that could have tipped off somebody.

At the time, it just looked funny to have this weak reform of the NSA timed when this guy was killed. Based on my experience this surveillance capability is being used for other nefarious purposes such as economic espionage of U.S. citizens and foreigners to transfer technology and know how to large multinationals such as my work on the financial crisis. Many of these companies want to avoid paying licensing fees and other costs to obtain your work.

 
Based on my experience this surveillance capability is being used for other nefarious purposes such as economic espionage of U.S. citizens and foreigners to transfer technology and know how to large multinationals such as my work on the financial crisis. Many of these companies want to avoid paying licensing fees and other costs to obtain your work.



What exactly is your experience, i.e., what facts/observances are you relying upon to show other nefarious purposes ???


 
https://en.wikipedia.org/wiki/Sinjar_massacre

Here is how it went down, after getting caught bulk collecting our telephone records using these secret courts, working with the private sector that willingly provided backdoor access to their products, collecting Internet traffic in secret rooms at the telecoms; finally having no justifiable purposes for these illegal acts. No major terrorist acts were stopped or thwarted.

The totalitarian government faced losing all this capability to suppress dissent. The tech companies lost billions in revenue and were blocked in lucrative markets. Many U.S. tech companies are being pushed out by domestic comp that openly advertise that they are not based in the U.S. Many are facing data localization laws which they fought that hamper their efforts to compile data back in the U.S.

The government had to manufacture terror by attacking ISIL with airstrikes in Iraq. The U.S. could have provided equipment and training to defend their territory.

As predicted they responded with beheadings which the government used to push through weak reforms. France believing this was a legitimate operation attacked this groups which resulted in their massacre. In response to the presence of the U.S. attacking an ally, the Russians got involved resulting in an airline getting blown up.

All of this can be traced back to his document dump by Edward Snowden, there is a strong link.
 
Last edited:


This reminds me of Benghazi with the government claiming the attacks were due to a video. Now as predicted the Russians have their blown up airline and beheadings after airstrikes. Are people this gullible to believe this crap?

Technologically, we can reform the Internet to allow greater privacy which would defeat or limit government surveillance.
 
Last edited:


An Islamic State-affiliated news service called the two San Bernardino terror attack suspects "supporters" of their Islamist cause, but the group did not claim responsibility for the mass shooting.

He is doubling down on this failed strategy whether Vietnam or the Middle East. There was no link or directive by ISIS to launch an attack.

He finally got his provoked terrorist attack after getting caught spying on Americans.
 
Back
Top