August 1, 2013


Filed under: news — jaspar @ 8:51 am








08 01 13 Superpower Death Watch














An Overview of Intelligence Collection




Thursday, July 18, 2013






Robert S. Litt, ODNI [Office of the Director of National Intelligence] General Counsel

Remarks as Prepared for Delivery

Brookings Institution, Washington, DC

July 19, 2013




And this leads me to what I consider to be *the key question*.  Why is it that people are willing to expose large quantities of information to private parties but don


t want the Government to have the same information?  Why, for example, dont we care if the telephone company keeps records of all of our phone calls on its servers, but we feel very differently about the prospect of the same information being on NSA servers?  This does not seem to me to be a difficult question: we care because of what the Government could [and does] do with the information.


Unlike a phone company, the Government has the power to audit our tax returns, to prosecute and imprison us, to grant or deny licenses to do business, and many other things.  And there  is  an
entirely understandable concern that the Government may abuse this power.  I don


t mean to say that private companies dont have a lot of power over us.  Indeed, the growth of corporate privacy policies, and the strong public reaction to the inadvertent release or commercial use of personal information, reinforces my belief that our primary privacy concern today is less with who has information than with what they do with it.  But there is no question that the Government, because of its powers, is properly viewed in *a different light*.


One approach to protecting privacy would be to limit the Intelligence Community to a targeted, focused query looking for specific information about an identified individual based on probable cause.  But from the national security perspective, that would not be sufficient.  The [World Tyrant’s] business of foreign intelligence has always been *fundamentally different* from the business of criminal investigation.  Rather than attempting to solve crimes that have happened already, we are trying to find out *what is going to happen before it happens*.  We *may* have only fragmentary information about someone who is plotting a terrorist attack, and need to find him and stop him.   We *may* get information that is useless to us without a store of data to match it against, such as when we get the telephone number of a terrorist and want to find out who he has been in touch with.  Or we *may* learn about a plot that we were previously unaware of, causing us to revisit old information and find connections that we didn


t notice before –and that we would never know about if we hadnt collected the information and kept it for some period of time.  We worry all the time about what we are missing in our daily effort to protect the Nation [The World Tyrant] and our allies.




So on the one hand there are vast amounts of data that contains intelligence needed to protect us [The World Tyrant] not only from terrorism [resistance to World Tyrant terrorism], but from cyber attacks, weapons of mass destruction, and good old-fashioned espionage.




And on the other hand, giving the Intelligence Community [The World Tyrant] access to this data has obvious privacy implications.




We achieve both security and privacy protection in this context in large part by




a framework that establishes appropriate controls on what the Government can do with the information it lawfully collects, and




appropriate oversight to ensure that it respects those controls.






The protections depend on such factors as the type of information we collect, where we collect it, the scope of the collection, and *the use the Government [The World Tyrant] intends to make of the information*.




In this way we can allow the Intelligence Community [The World Tyrant] to acquire necessary foreign intelligence, while providing privacy protections that take account of modern technology.  [Voila!]




The leaders of our Nation [The World Tyrant] tell the Intelligence Community [The World Tyrant] what information they need in the service of the Nation [The World Tyrant], its citizens and its interests,




and we [The World Tyrant] collect information in support of those priorities.  [Voila!]




We do not use our intelligence collection for the purpose of repressing the citizens of any country because of their political, religious or other beliefs.




We collect *metadata


information* about communications more broadly than we collect the *actual content* of communications,




because it is less intrusive than collecting content and




[because it] in fact can provide us information that helps us more narrowly focus our collection of content on appropriate targets.




But it simply is not true that the United States [The World Tyrant] Government is listening to everything said by every citizen of any country.








Instead. The World Tyrant invents whatever content may serve the “leaders of our Nation” and their World Tyrant interests.








From a subscriber


s point of view, as I said before, the difference between a telephone company keeping records of his phone calls and the Intelligence Community keeping the same information is what the Government could do with the records.  Thats an entirely legitimate concern.  We deal with it by limiting what the Intelligence Community is allowed do with the information we get under this program –limitations that are approved by the FISA [Foreign Intelligence Surveillance Act] Court:


First, we put this information in secure databases.




Second, the only intelligence purpose for which this information can be used is counterterrorism.




Third, we allow only a limited number of specially trained analysts to search these databases.




Fourth, even those trained analysts are allowed to search the database only when they have a reasonable and articulable suspicion that a particular telephone number is associated with particular foreign terrorist organizations that have been identified to the Court.  The basis for that suspicion has to be documented in writing and approved by a supervisor.




Fifth, they


re allowed to use this information only in a limited way, to map a network of telephone numbers calling other telephone numbers.




Sixth, because the database contains only metadata, even if the analyst finds a previously unknown telephone number that warrants further investigation, all she can do is disseminate the telephone number.  She doesn


t even know whose number it is.  Any further investigation of that number has to be done pursuant to other lawful means, and in particular, any collection of the contents of communications would have to be done using another valid legal authority, such as a traditional [pre-1998] FISA.




Finally, the information is destroyed after five years.






Revealed: NSA program [XKeyscore] collects ‘nearly everything a user does on the internet’




XKeyscore gives ‘widest-reaching’ collection of online data


*NSA analysts require no prior authorization for searches*


Sweeps up emails, social media activity and browsing history






Wednesday 31 July 2013 08.56 EDT














A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.




The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.








XKeyscore presentation from 2008


read in full




Training materials for the XKeyscore program detail how analysts can *use* it and other systems to mine enormous agency databases and develop [invent] intelligence from the web














Pro-Morsi rallies no longer acceptable: Egyptian cabinet


Cabinet extends mandate to interior ministry to confront ‘acts of terrorism and road-blocking’, says pro-Morsi sit-ins at Rabaa and Nahda Square ‘threat to national security’




Wednesday 31 Jul 2013














Egypt’s cabinet says it will take “all legal measures necessary to confront acts of terrorism and road-blocking” in an apparent warning to supporters of deposed Islamist [Muslim Brotherhood] president Mohamed Morsi who have been camping out in two Cairo sit-ins since the president’s ouster.




“Based on the mandate given by the people to the state, and in preservation of the country’s higher interest, the cabinet has delegated the interior ministry to proceed with all legal measures to confront acts of terrorism and road-blocking,” said…information minister Dorreya Sharaf El-Din in a cabinet statement Wednesday evening.




“The cabinet has reviewed the country’s security situation and has concluded that the dangerous situation in Rabaa and Nahda Squares, including the terrorist acts and road-blocking that has occurred, is no longer acceptable as it constitutes a threat to the country’s national security,” El-Din added.
























America died




AUGUST 6, 1945




while giving birth to








which immediately began writing –in blood– its








Asterisks indicate my emphasis.








PRIVACY, TECHNOLOGY AND NATIONAL SECURITY: An Overview of Intelligence Collection






Revealed: NSA program [XKeyscore] collects ‘nearly everything a user does on the internet’ / XKeyscore gives ‘widest-reaching’ collection of online data




3 Pro-Morsi rallies no longer acceptable: Egyptian cabinet / Cabinet extends mandate to interior ministry to confront ‘acts of terrorism and road-blocking’, says pro-Morsi sit-ins at Rabaa and Nahda Square ‘threat to national security’



















Blog at WordPress.com.

%d bloggers like this: