mykeystrokes.com

"Do or Do not. There is no try."

“This Is Not The18th Century”: Fourth Amendment Purists Are Living In A Dream World

Spy work holds deep allure for many people. My own career as a secret agent began as an outgrowth of training beagle hunting dogs. See, I needed new antennas for the little radio transmitters in the animal’s collars—which combined with a directional antenna and multi-channel receiver helped me bring the little rascals home alive at day’s end.

You wouldn’t believe some of the scrapes those dogs could get into. One time, we found three beagles inside a beaver dam fighting a cornered raccoon. Had we not intervened, he’d probably have drowned them.

So anyway, I called customer service at Wildlife Materials, Inc. to order the antennas. Ever the subversive, I made a joke about buckling a tracking collar to the bumper of my wife’s car.

Long, painful silence.

“Um, air, we’re not supposed to talk about that.”

Oh well.

Of course these days, that technology’s way out of date for marital espionage. You can’t make a beagle carry a cellphone, but most wives cling to theirs 24/7. With the right software and a wi-fi connection, you can track her whereabouts in real time from your friendly neighborhood tavern, and even message her at the No-Tell Motel to say you’re stuck at the office.

Unless she’s also tracking you, in which case all bets are off.

Of course, my own wife’s phone is lost half the time. I sometimes wish the National Security Agency weren’t too busy monitoring guys calling 1-900-HotVirgins over in Yemen to help her find it.

But let’s get halfway serious about this NSA business. First, where has everybody been since 2006, when USA Today first revealed the existence of large scale NSA telephone data mining? That was objectionable in two big ways: the Bush White House acted unilaterally, without the court supervision required by law, and it was also indulging in warrantless wiretaps.

Congress fixed that in 2008, permitting statistical analysis of telephone traffic, but requiring both ongoing FISA Court oversight and search warrants for actual eavesdropping. After his customary tap-dancing, Sen. Barack Obama supported the bill. Hearing no announcement that the Obama White House had canceled the program, a person would have to be awfully naïve to imagine NSA had gone out of business.

The court order produced with a great flourish by Glenn Greenwald and The Guardian mainly confirmed that the system appears to be working as designed. So why the hyperventilating? The way some people are carrying on, you’d think the KGB or East German Stasi had set up shop in the White House—which definitely isn’t how people would act if they really feared tyranny.

Greenwald himself rather specializes in hyperventilation. It’s a rare terrorist attack that isn’t immediately followed by a Greenwald essay pointing out that Norwegian civilians or off-duty British soldiers  are no less legitimate targets than Pakistani children — true enough in an abstract moral sense, but of vanishing political usefulness.

However, when a reporter begins a profile by praising his own work as “one of the most significant leaks in US political history,” a skeptic is apt to wince. Maybe it’s just me, but I wouldn’t have taken Edward Snowden (or any single source) at face value. There are plenty of clues even in The Guardian hagiography that not everything may be exactly as it seems. Running to China seeking freedom?

China?

Then there’s this: Any NSA analyst “at any time can target anyone, any selector, anywhere,” Snowden said. “I, sitting at my desk, certainly had the authorities to wiretap anyone from you or your accountant to a federal judge to even the president if I had a personal email.”

Now me, I don’t think NSA computer tech can wiretap a Federal judge any more than I think a bank teller can transfer the judge’s bank account to her boyfriend without getting caught. Sure enough, Robert Dietz, a former CIA and NSA lawyer, told the Los Angeles Times the claim was “complete and utter” falsehood.

“First of all, it’s illegal,” he said. “There is enormous oversight. They have keystroke auditing. There are, from time to time, cases in which some analyst is [angry] at his ex-wife and looks at the wrong thing and he is caught and fired.”

Which is basically where we came in. Fourth Amendment purists are living in a dream world. Neither cellphones nor lunatics using airliners as weapons existed in Ben Franklin’s day. If you want privacy as defined in the 18th century, it’s easy: no phones, no Internet (and certainly no Facebook or Twitter) no credit cards or bank accounts, no EZ-Pass, no nothing.

But if you want government to have any chance to defeat mass-casualty terror attacks, surrendering raw phone data isn’t much of a concession. Besides, there are far more efficient ways of targeting enemies of the state than trying to make something of who they’ve talked to on the phone.

 

By: Gene Lyons, The National Memo, June 12, 2013

June 15, 2013 Posted by | National Security | , , , , , , , , | Leave a comment

“There’s A New Santa Claus”: The National Security Agency Is Doing What Google Does

An old journalism saw goes like this: Dog bites man, no story. Man bites dog, story. Allow me to update it. Government monitors e-mail and telephone calls for national security, no story. Government doesn’t do anything of the kind — now, that’s a story.

Clearly some awfully good newspapers and some awfully good reporters disagree. In the past week, it’s been raining stories about what the busybody government has been up to. The National Security Agency has been monitoring telephone calls and e-mails — and even social media stuff of the sort you shouldn’t have been doing anyway. To this, a whole lot of people have expressed shock. Oaths to the Fourth Amendment have filled the air. Unreasonable searches are simply unconstitutional, they assert — without asserting that anything has in fact been searched or seized. It has merely been noted and, if suspicious, referred to a court for the appropriate warrant.

The programs certainly can be abused. (So can local police powers.) But oddly enough, proof that this has not happened comes from the self-proclaimed martyr for our civil liberties, Edward Snowden, late of Booz Allen Hamilton, the government contractor that ever-so-recently employed him. (I assume he’ll be summoned to HR.)

In a remarkably overwrought interview conducted by the vainglorious Glenn Greenwald of the Guardian, Snowden cited not one example of the programs being abused. Greenwald wrote that Snowden “lines the door of his hotel room with pillows to prevent eavesdropping” and that “he puts a large red hood over his head and laptop when entering his passwords to prevent any hidden cameras from detecting them.” Greenwald said that “Snowden will go down in history as one of America’s most consequential whistleblowers.” I think he’ll go down as a cross-dressing Little Red Riding Hood.

Greenwald likens Snowden to Daniel Ellsberg, who revealed the Pentagon Papers to The Post and the New York Times more than four decades ago. Not quite. The Pentagon Papers proved that a succession of U.S. presidents had lied about their intentions regarding Vietnam — Lyndon Johnson above all. In 1964, he had campaigned against Barry Goldwater for the presidency as virtually the peace candidate while actually planning to widen the war. As the Times put it in a 1996 story, the Pentagon Papers “demonstrated, among other things, that the Johnson administration had systematically lied, not only to the public but also to Congress, about a subject of transcendent national interest and significance.”

In contrast, no one lied about the various programs disclosed last week. They were secret, yes, but members of Congress were informed — and they approved. Safeguards were built in. If, for instance, the omniscient computers picked up a pattern of phone calls from Mr. X to Suspected Terrorist Y, the government had to go to court to find out what was said. The Foreign Intelligence Surveillance Act established a court consisting of 11 rotating federal judges. These judges are the same ones who rule on warrants the government seeks in domestic criminal cases. If we trust them for that, why would we not trust them for other things as well?

Whenever I see “Hello, Richard” on my computer screen, I realize what’s happened: It knows me. It knows what I bought and when I bought it and where I was at the time. It knows my sizes and my credit card number, and if it knows all that, it knows pretty much everything. I long ago sacrificed a measure of privacy for convenience. One click will do it.

I also made the same sort of deal for security. I assumed the government was doing at least what Google was doing — and Google, I’m convinced, is the new Santa Claus: It sees you when you’re sleeping, it knows when you’re awake. It knows when you’ve been bad or good, so be good for goodness’ sake. In 2009, Google’s Eric Schmidt put us all at ease by telling CNBC’s Maria Bartiromo, “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.” See, not all billionaires are so smart.

Everything about Edward Snowden is ridiculously cinematic. He is not paranoiac; he is merely narcissistic. He jettisoned a girlfriend, a career and, undoubtedly, his personal freedom to expose programs that were known to our elected officials and could have been deduced by anyone who has ever Googled anything. History will not record him as “one of America’s most consequential whistleblowers.” History is more likely to forget him. Soon, you can Google that.

 

By: Richard Cohen, Opinion Writer, The Washington Post, June 10, 2013

June 12, 2013 Posted by | National Security | , , , , , , , , | Leave a comment