“There’s A New Santa Claus”: The National Security Agency Is Doing What Google Does
An old journalism saw goes like this: Dog bites man, no story. Man bites dog, story. Allow me to update it. Government monitors e-mail and telephone calls for national security, no story. Government doesn’t do anything of the kind — now, that’s a story.
Clearly some awfully good newspapers and some awfully good reporters disagree. In the past week, it’s been raining stories about what the busybody government has been up to. The National Security Agency has been monitoring telephone calls and e-mails — and even social media stuff of the sort you shouldn’t have been doing anyway. To this, a whole lot of people have expressed shock. Oaths to the Fourth Amendment have filled the air. Unreasonable searches are simply unconstitutional, they assert — without asserting that anything has in fact been searched or seized. It has merely been noted and, if suspicious, referred to a court for the appropriate warrant.
The programs certainly can be abused. (So can local police powers.) But oddly enough, proof that this has not happened comes from the self-proclaimed martyr for our civil liberties, Edward Snowden, late of Booz Allen Hamilton, the government contractor that ever-so-recently employed him. (I assume he’ll be summoned to HR.)
In a remarkably overwrought interview conducted by the vainglorious Glenn Greenwald of the Guardian, Snowden cited not one example of the programs being abused. Greenwald wrote that Snowden “lines the door of his hotel room with pillows to prevent eavesdropping” and that “he puts a large red hood over his head and laptop when entering his passwords to prevent any hidden cameras from detecting them.” Greenwald said that “Snowden will go down in history as one of America’s most consequential whistleblowers.” I think he’ll go down as a cross-dressing Little Red Riding Hood.
Greenwald likens Snowden to Daniel Ellsberg, who revealed the Pentagon Papers to The Post and the New York Times more than four decades ago. Not quite. The Pentagon Papers proved that a succession of U.S. presidents had lied about their intentions regarding Vietnam — Lyndon Johnson above all. In 1964, he had campaigned against Barry Goldwater for the presidency as virtually the peace candidate while actually planning to widen the war. As the Times put it in a 1996 story, the Pentagon Papers “demonstrated, among other things, that the Johnson administration had systematically lied, not only to the public but also to Congress, about a subject of transcendent national interest and significance.”
In contrast, no one lied about the various programs disclosed last week. They were secret, yes, but members of Congress were informed — and they approved. Safeguards were built in. If, for instance, the omniscient computers picked up a pattern of phone calls from Mr. X to Suspected Terrorist Y, the government had to go to court to find out what was said. The Foreign Intelligence Surveillance Act established a court consisting of 11 rotating federal judges. These judges are the same ones who rule on warrants the government seeks in domestic criminal cases. If we trust them for that, why would we not trust them for other things as well?
Whenever I see “Hello, Richard” on my computer screen, I realize what’s happened: It knows me. It knows what I bought and when I bought it and where I was at the time. It knows my sizes and my credit card number, and if it knows all that, it knows pretty much everything. I long ago sacrificed a measure of privacy for convenience. One click will do it.
I also made the same sort of deal for security. I assumed the government was doing at least what Google was doing — and Google, I’m convinced, is the new Santa Claus: It sees you when you’re sleeping, it knows when you’re awake. It knows when you’ve been bad or good, so be good for goodness’ sake. In 2009, Google’s Eric Schmidt put us all at ease by telling CNBC’s Maria Bartiromo, “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.” See, not all billionaires are so smart.
Everything about Edward Snowden is ridiculously cinematic. He is not paranoiac; he is merely narcissistic. He jettisoned a girlfriend, a career and, undoubtedly, his personal freedom to expose programs that were known to our elected officials and could have been deduced by anyone who has ever Googled anything. History will not record him as “one of America’s most consequential whistleblowers.” History is more likely to forget him. Soon, you can Google that.
By: Richard Cohen, Opinion Writer, The Washington Post, June 10, 2013
“Edward Snowden Is No Hero”: He Is, Rather, A Grandiose Narcissist Who Deserves To Be In Prison
Edward Snowden, a twenty-nine-year-old former C.I.A. employee and current government contractor, has leaked news of National Security Agency programs that collect vast amounts of information about the telephone calls made by millions of Americans, as well as e-mails and other files of foreign targets and their American connections. For this, some, including my colleague John Cassidy, are hailing him as a hero and a whistle-blower. He is neither. He is, rather, a grandiose narcissist who deserves to be in prison.
Snowden provided information to the Washington Post and the Guardian, which also posted a video interview with him. In it, he describes himself as appalled by the government he served:
The N.S.A. has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your e-mails or your wife’s phone, all I have to do is use intercepts. I can get your e-mails, passwords, phone records, credit cards.
I don’t want to live in a society that does these sort of things… I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under.
What, one wonders, did Snowden think the N.S.A. did? Any marginally attentive citizen, much less N.S.A. employee or contractor, knows that the entire mission of the agency is to intercept electronic communications. Perhaps he thought that the N.S.A. operated only outside the United States; in that case, he hadn’t been paying very close attention. In any event, Snowden decided that he does not “want to live in a society” that intercepts private communications. His latter-day conversion is dubious.
And what of his decision to leak the documents? Doing so was, as he more or less acknowledges, a crime. Any government employee or contractor is warned repeatedly that the unauthorized disclosure of classified information is a crime. But Snowden, apparently, was answering to a higher calling. “When you see everything you realize that some of these things are abusive,” he said. “The awareness of wrongdoing builds up. There was not one morning when I woke up. It was a natural process.” These were legally authorized programs; in the case of Verizon Business’s phone records, Snowden certainly knew this, because he leaked the very court order that approved the continuation of the project. So he wasn’t blowing the whistle on anything illegal; he was exposing something that failed to meet his own standards of propriety. The question, of course, is whether the government can function when all of its employees (and contractors) can take it upon themselves to sabotage the programs they don’t like. That’s what Snowden has done.
What makes leak cases difficult is that some leaking—some interaction between reporters and sources who have access to classified information—is normal, even indispensable, in a society with a free press. It’s not easy to draw the line between those kinds of healthy encounters and the wholesale, reckless dumping of classified information by the likes of Snowden or Bradley Manning. Indeed, Snowden was so irresponsible in what he gave the Guardian and the Post that even these institutions thought some of it should not be disseminated to the public. The Post decided to publish only four of the forty-one slides that Snowden provided. Its exercise of judgment suggests the absence of Snowden’s.
Snowden fled to Hong Kong when he knew publication of his leaks was imminent. In his interview, he said he went there because “they have a spirited commitment to free speech and the right of political dissent.” This may be true, in some limited way, but the overriding fact is that Hong Kong is part of China, which is, as Snowden knows, a stalwart adversary of the United States in intelligence matters. (Evan Osnos has more on that.) Snowden is now at the mercy of the Chinese leaders who run Hong Kong. As a result, all of Snowden’s secrets may wind up in the hands of the Chinese government—which has no commitment at all to free speech or the right to political dissent. And that makes Snowden a hero?
The American government, and its democracy, are flawed institutions. But our system offers legal options to disgruntled government employees and contractors. They can take advantage of federal whistle-blower laws; they can bring their complaints to Congress; they can try to protest within the institutions where they work. But Snowden did none of this. Instead, in an act that speaks more to his ego than his conscience, he threw the secrets he knew up in the air—and trusted, somehow, that good would come of it. We all now have to hope that he’s right.
By: Jeffrey Toobin, The New Yorker, June 10, 2013
“Privacy? We Gave That Away Already”: You Might Want To Rethink Your Relationship With Technology
All the President’s Men, the movie made from the book that inspired my career in journalism, was on (very) late night TV the other night. What’s strikingly anachronistic about the film is not the sideburns and bug-eye glasses, but the rudimentary journalistic tactics of the reporters who broke the Watergate story.
They weren’t on Google, searching for information that may or may not be accurate, and using a research technique that is so easily tracked that pop-up ads related to the search will begin appearing almost immediately. They didn’t drive through toll booths with a convenient electronic device on the windshield that can (and do) track their movements and the specific time of the movements. They didn’t do email interviews, cell phone interviews or even many hardline phone interviews that could leave an electronic trail.
The movie shows the real, unglamorous shoe-leather work of being a reporter. It’s one scene after another of Bob Woodward and Carl Bernstein driving to a neighborhood, parking blocks away to avoid detection and then knocking on people’s doors, sweet-talking their way into living rooms for interviews. It’s Woodward finding ways to meet his source, “Deep Throat” – not by thumb-typing a text, but by signals that involved the moving of a plant on a balcony. This was how the duo managed to get people to talk to them – sometimes at great personal risk – and how Woodward managed to keep Mark Felt’s identity a secret until Felt’s family disclosed his role in 2005.
Journalists are concerned at the surveillance of their phone records. And many are also jarred by the disclosure that federal authorities have been monitoring certain activity on the web and collecting phone call data. But where would anyone get the idea that any communication attached to technology and electronic’s is really private?
We have a new Facebook generation which is remarkably willing to give up its collective privacy by posting their embarrassing photos and travel plans and insignificant “status” updates on what is the biggest billboard in the cyber-sky. And yet the same people live in the delusion that no one is monitoring it? That a potential burglar isn’t tipped off by someone’s Pinterest photos of the family currently on vacation, a sign that the house is unattended? That a potential employer might see a photo of an applicant with someone doing shots off his chest and think, “maybe this isn’t someone we want working here?”
True, the idea government surveillance has a different quality to it, from both sides. We expect our government to respect our privacy. The government, meanwhile, knows it is also expected to track the bad guys. The balance of those two goals will surely be debated yet again after the recent disclosure of surveillance techniques. But in the meantime, Americans might want to rethink our relationship with technology and the privacy we lose by using it.
This applies exponentially to journalists, who might want to get back to basics – especially when reporting sensitive stories. When I was reporting in Eastern Europe in the 1990s, almost no one would be interviewed on the phone. They had just ousted a communist regime, and they were convinced, still, that their phones were being tapped. They didn’t even talk openly on the subway, so well-trained they were to be discreet. It made it harder to report, but it also promoted some better work tactics. I had to actually go meet someone somewhere and do interviews in person. I was less likely to misinterpret, and came back with more information than I would have gotten in a quick phone conversation. Woodward and Bernstein did it. So should the rest of us.
By: Susan Milligan, Washington Whispers, U. S. News and World Report, June 10. 2013
“A Misleading Media Picture”: Why The National Security Agency’s PRISM Program Is Nothing To Fear
It has been revealed that the National Security Agency has been employing PRISM, a $20-million-per-year program that monitors the movement of individuals through digital data, for roughly six years. PRISM has gained access to private information and online correspondence through nine technology companies here in the U.S. The USA PATRIOT Act and the Protect America Act of 2007 (PAA) opened the door for this surveillance program to take shape.
President Obama and the NSA have been criticized for a lack of transparency and the program’s assumed targeting of American citizens. The president said during a press conference on Friday that PRISM does not target American citizens or those living in the U.S., stating, “Nobody is listening to your telephone calls” and “They are not looking at people’s names and they are not looking at content.” The surveillance program was structured to exclusively monitor correspondence between foreign individuals—solely the lines of communication between these individuals that pass through the U.S.
PRISM may not be the top-secret program of government overreach that many are trying to portray it as. The program is lawful (as long as American citizens and individuals in the U.S. are not monitored) under PAA, and for six years the entire program was fully recognized by Congress and the Foreign Intelligence Surveillance Court. The NSA still must have a reasonable cause for intercepting communications, appeal to a federal court and gain permission to monitor any correspondence—all of which include Congressional oversight.
The NSA recently declassified a slideshow that outlines PRISM on a very basic level. This is what is currently known about the surveillance program: There were a total of nine technology companies included in PRISM—Microsoft in September, 2007, Yahoo in March, 2008, Google, Facebook, and PalTalk in 2009, YouTube in September, 2010, Skype and AOL in early 2011, and Apple in October of 2012.
While officials from AOL, PalTalk, Facebook, Yahoo, and Apple have all denied any knowledge of PRISM or working with the U.S. government on such a program, the NSA would still be within legal parameters if they monitored any data from these companies with a court order.
According to the PRISM slideshow, the types of materials they seek are email, video and voice chat, videos, photos, stored data, VoIP (phone calls made over the internet), file transfers, video conferencing, log-ins, time stamps, and any information provided on social networking sites.
The NSA slideshow makes three points defining the necessity of such a program: “Much of the world’s communications flow through the U.S.,” “A target’s phone call, email or chat will take the cheapest path, not the physically most direct path—you can’t always predict the path,” and “Your target’s communications could easily be flowing into and through the U.S.”
Basically, what we’ve learned about the NSA and PRISM is nothing new. Senator Saxby Chambliss (R-GA) said of PRISM, “Every member of the United States Senate has been advised of this, and to my knowledge we have not had any citizen who has registered a complaint relative to the gathering of this information.” In other words, these actions have been lawfully taking place for six years and were approved by Congress with the effortless passages of the PATRIOT Act in 2001 and the Protect America Act in 2007.
The picture that is being painted of PRISM—a secretive surveillance program that unlawfully delves into the average American’s private life—is misleading. PRISM, if carried out properly, is only used to monitor suspicious patterns of communications abroad. If individuals choose to use means of communication that are based here in the U.S., the U.S. government, with the proper court approval, is entirely within its rights to seek out information it deems necessary for national security purpose—as long as Congress continues to authorize the laws that allow such programs.
By: Allison Brito, The National Memo, June 7, 2013
“Time For Issa To Put Up Or Shut Up”: Proof That White House Was Not Involved In IRS Tea Party Targeting Finally Exposed
Appearing this morning on CNN’s “State of the Union” and “CBS Sunday Morning”, Rep. Elijah Cummings, the ranking Democrat on the House Oversight Committee chaired by Rep. Darrell Issa, revealed that the manager responsible for the Cincinnati screening team involved in the 501(c)(4) investigations of conservative tea party groups—and the man that apparently first referred the issue to IRS technical office in Washington—has now weighed in on the controversy.
The Cincinnati based manager—a long-time employee of the IRS who self-identifies as a “conservative Republican”—was interviewed on Thursday by the staff of the Oversight Committee. What he had to say might well be the beginning of the end of Darrell Issa’s campaign to lay the blame for the IRS fiasco at the White House doorstep.
According to the transcript of the interview, the still unnamed supervisor was asked, “Do you have any reason to believe that anyone in the White House was involved in the decision to screen tea party cases?”
The manager’s response? “I have no reason to believe that.”
The gentleman is in a unique position to know what actually happened as he was the supervisor who, in 2010, sent the matter to the IRS technical office in Washington for further guidance after an IRS screener under his supervision identified an applicant for 501 (c)(4) status as a “high profile’” conservative organization. According to the manager, he forwarded the case to the Washington based technical folks for their guidance so that the matter could be treated “with consistency”.
What this tells us is that this was not a case of Washington instructing the Cincinnati office to target Tea Party applicants but rather it was the Cincinnati office that first sought guidance from the IRS in Washington as to how to handle the matter. This is a far cry, indeed, from what Chairman Issa has been trying to sell to the American public through his constant—yet fully unsubstantiated—claims that the targeting originated in White House.
According to the transcripts, the manager is now on record saying that there was no political motivation or instruction originating in the White House or anywhere else in the nation’s capital, noting “I do not believe that the screening of these cases had anything to do other than consistency and identifying issues that needed to have further development.”
In response to the interview with the Cincinnati supervisor, Representative Cummings suggested this morning that “Based upon everything I’ve seen the case is solved, and if it were me, I would wrap this case up and move on to be frank with you.”
Of course, Cummings desire to put the matter to bed is unlikely to happen. Certainly, any hope that the tide can be turned on the full-scale GOP attack on the President will require that the public gets a look at the actual transcripts to see the full interview—a matter that has, in and of itself, been chock full of controversy.
While Chairman Issa made news last week by promising to release full transcripts in support of his still unsupported claims in this matter, he has failed to release a word of testimony despite numerous requests from various reporters and columnists, including myself.
It was during Issa’s own “State of the Union” appearance last Sunday when he stated that interviews with workers in the Cincinnati IRS office indicated that targeting Tea Party applicants was “a problem that was coordinated in all likelihood right out of Washington headquarters – and we’re getting to proving it. My gut tells me that too many people knew this wrongdoing was going on before the election, and at least by some sort of convenient, benign neglect, allowed it to go on through the election. I’m not making any allegations as to motive, that they set out to do it, but certainly people knew it was happening.”
Despite Issa’s indication that the transcripts of interviews with the Cincinnati employees would be forthcoming, the transcripts have not been released including the transcript with the manager providing the testimony that would appear to clear the White House.
Representative Cummings is now demanding that all of the transcripts be released for review.
Speaking to Candy Crowley on this morning’s edition of “State of The Union”, Cummings said:
“I wrote Chairman Issa on Thursday and I wrote to him this morning. I want those transcripts to be released,” Cummings said. “I’m willing to come on your show next week with the chairman with the transcripts if he agrees to do that. If he doesn’t, I’ll release them by the end of the week.”
Good.
It’s far past time for Issa to back up his over-the-top allegations with some evidence–evidence that even conservative Republican Senator Lindsey Graham acknowledges has not been forthcoming.
While there is no reason to imagine that the anti-Obama forces will actually allow the truth to get in the way of their political narrative—nor will there be any shortage of Americans who will be more than willing to ignore the testimony of the one man in the Cincinnati who actually knows what happened—the truth may serve to accomplish one real benefit for which we can all be grateful—
Just maybe, Darrell Issa’s fifteen minutes of truly illegitimate and undeserved fame may finally be over.
Hallelujah.
By: Rick Ungar, Op-Ed Contributor, Forbes, June 9, 2013