Nsa Quotes

We've searched our database for all the quotes and captions related to Nsa. Here they are! All 200 of them:

Foaly: Anyone see you come in here? Holly: The FBI, CIA, NSA, DEA, MI6. Oh, and the EIB. Foaly: The EIB? Holly: (smirking) Everyone in the building.
Eoin Colfer (Artemis Fowl Band 1-3)
Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.
Edward Snowden
Under observation, we act less free, which means we effectively are less free.
Edward Snowden
No bird ever looked at a plane in envy
Iain Thomas (25 Love Poems for the NSA)
Transparency is for those who carry out public duties and exercise public power. Privacy is for everyone else.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
These programs were never about terrorism: they're about economic spying, social control, and diplomatic manipulation. They're about power.
Edward Snowden
The way things are supposed to work is that we're supposed to know virtually everything about what they [the government] do: that's why they're called public servants. They're supposed to know virtually nothing about what we do: that's why we're called private individuals.
Glenn Greenwald
The NSA?" "Yeah, they called and offered to help out. Same software they use for enhancing spy satellite imagery." Venkat shrugged. "It's amazing how much red tape gets cut when everyone's rooting for one man to survive.
Andy Weir (The Martian)
There are scores of people who have never recovered, or been recovered, from an FSB interrogation. They’re a hard organization to describe because nothing like the FSB exists in the USA. To get even remotely close, you’d have to ask the CIA to birth a seven-headed hydra with the faces of the FBI, DEA, NSA, Immigration, Border Patrol, Coast Guard, and the Navy Seals with a hangover and a grudge.
Tanya Thompson (Red Russia)
But the true measure of a society’s freedom is how it treats its dissidents and other marginalized groups, not how it treats good loyalists.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The true measurement of a person’s worth isn’t what they say they believe in, but what they do in defense of those beliefs,” he said. “If you’re not acting on your beliefs, then they probably aren’t real.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Democracy requires accountability and consent of the governed, which is only possible if citizens know what is being done in their name.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
How hard do you think it'd be to hack into the database of a major research university?" Mac hesitated. "Since you're asking me on a cell phone, in front of God and the NSA- impossible.
Rob Thomas
Like a black hole, NSA pulls in every signal that comes near, but no electron is ever allowed to escape.
James Bamford (The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America)
Well, it is a photo taken from orbit,” Mindy said. “The NSA enhanced the image with the best software they have.” “Wait, what?” Venkat stammered. “The NSA?” “Yeah, they called and offered to help out.
Andy Weir (The Martian)
The true measurement of a person’s worth isn’t what they say they believe in, but what they do in defense of those beliefs,
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.
Edward Snowden
You can't get on Facebook and complain about the NSA's data mining operation - On Facebook - the most invasive, privacy harmful institution on the planet. It's like whining about a paper cut while swimming in a shark tank.
T. Rafael Cimino (Mid Ocean)
The lesson for me was clear: national security officials do not like the light. They act abusively and thuggishly only when they believe they are safe, in the dark. Secrecy is the linchpin of abuse of power, we discovered, its enabling force. Transparency is the only real antidote.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The many pro-surveillance advocates I have debated since Snowden blew the whistle have been quick to echo Eric Schmidt’s view that privacy is for people who have something to hide. But none of them would willingly give me the passwords to their email accounts, or allow video cameras in their homes.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
One of the most surreal aspects of the NSA stories based on the Snowden documents is how they made even the most paranoid conspiracy theorists seem like paragons of reason and common sense.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
We all instinctively understand that the private realm is where we can act, think, speak, write, experiment, and choose how to be, away from the judgmental eyes of others. Privacy is a core condition of being a free person.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
the NSA lived by its motto: Everything is possible. The impossible just takes longer.
Dan Brown (Digital Fortress)
As former NSA general counsel Stewart Baker said, “Metadata absolutely tells you everything about somebody’s life. If you have enough metadata you don’t really need content.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
mass surveillance is a universal temptation for any unscrupulous power.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
I was right outside the NSA [on 9/11], so I remember the tension on that day. I remember hearing on the radio, 'the plane's hitting,' and I remember thinking my grandfather, who worked for the FBI at the time, was in the Pentagon when the plane hit it...I take the threat of terrorism seriously, and I think we all do. And I think it's really disingenuous for the government to invoke and sort-of scandalize our memories to sort-of exploit the national trauma that we all suffered together and worked so hard to come through -- and to justify programs that have never been shown to keep us safe, but cost us liberties and freedoms that we don't need to give up, and that our Constitution says we should not give up.
Edward Snowden
Your nerve endings I know their plot To attack My never endings Until we fall asleep In each other’s arms
Iain S. Thomas (25 Love Poems for the NSA)
The NSA is correct, 1984 is now.
Michael Gurnow (The Edward Snowden Affair: Exposing the Politics and Media Behind the NSA Scandal)
CIA. NSA. FBI. DEA. ICE. Cartels. Mafia. Yakuza. Bratva
Meghan March (Ruthless King (Mount Trilogy, #1))
In 2014, former NSA and CIA director Michael Hayden remarked, “We kill people based on metadata.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
I inhaled slowly and thought about making a joke about how the NSA doesn’t really need to call anyone; they just interrupt while you’re already on the phone.
Penny Reid (Love Hacked (Knitting in the City, #3))
To permit surveillance to take root on the Internet would mean subjecting virtually all forms of human interaction, planning, and even thought itself to comprehensive state examination.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Jabba resembled a giant tadpole, like the cinematic creature for whom he was nicknamed, the man was a hairless spheroid. As resident guardian angel of all NSA computer systems, Jabba marched from department to department, tweaking, soldering, and reaffirming his credo that prevention was the best medicine. No NSA computer had ever been infected under Jabba's reign; he intended to keep it that way.
Dan Brown (Digital Fortress)
Even though we don't know which companies the NSA has compromised – or by what means – knowing that they could have compromised any of them is enough to make us mistrustful of all of them. This is going to make it hard for large companies like Google and Microsoft to get back the trust they lost. Even if they succeed in limiting government surveillance. Even if they succeed in improving their own internal security. The best they'll be able to say is: "We have secured ourselves from the NSA, except for the parts that we either don't know about or can't talk about.
Bruce Schneier
Converting the Internet into a system of surveillance thus guts it of its core potential. Worse, it turns the Internet into a tool of repression, threatening to produce the most extreme and oppressive weapon of state intrusion human history has ever seen.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The National Security Agency’s capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If a dictator ever took over, the N.S.A. could enable it to impose total tyranny, and there would be no way to fight back.
Frank Church
I'm sure I've had my phone tapped for years, I don't think it's a crime against humanity they just ought to quit doing it, god damn it.
Cornel West
I have been to the darkest corners of government, and what they fear is light.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA and the Surveillance State)
There is now the capacity to make tyranny total in America. Only law ensures that we never fall into that abyss—the abyss from which there is no return.
James Bamford (The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America)
Never in his life had he hit a girl, nor would he. But, right now, he wanted to kick that NSA cutie in the ass cheek.
Shane Scollins (SAVIOR FREQUENCY (Frequency Series #1))
Cliff, I’d like to take over, but our charter prevents it. NSA can’t engage in domestic monitoring, even if we’re asked. That’s prison term stuff.
Clifford Stoll (The Cuckoo's Egg)
Of course. NSA is rumored to tape record every transatlantic telephone conversation. Maybe they’d recorded this session.
Clifford Stoll (The Cuckoo's Egg)
I think this mass surveillance by the NSA was never about terrorism: It's all about economic spying & social control. It's all about POWER.
Ziad K. Abdelnour
Hat dich jemand reinkommen sehen?" "Ja, das FBI, die CIA, die NSA, die DEA und das MI6. Ach ja, und die GPB." "Die GPB?" "Gesamte Polizeibelegschaft.
Eoin Colfer (Artemis Fowl (Artemis Fowl, #1))
Founded by President Truman at 12:01 A.M. on November 4, 1952, the NSA had been the most clandestine intelligence agency in the world for almost fifty years. The NSA's seven-page inception doctrine laid out a very concise agenda: to protect U.S. government communications and to intercept the communications of foreign powers. "The roof of the NSA's main operations building was littered with over five hundred antennas, including two large radomes that looked like enormous golf balls. The building itself was mammoth--over two million square feet, twice the size of CIA headquarters. Inside were eight million feet of telephone wire and eighty thousand square feet of permanently sealed windows.
Dan Brown
Marcia Wilson was a good example of Omega’s core strategy for creating a New World Order. It involved placing their people, or moles, in positions of power within the CIA, the NSA, the Pentagon, the White House and global organizations like the UN, the IMF and the World Bank. This enabled Omega to pull some of the strings of these organizations and to direct American, and world politics, to an extent.
James Morcan (The Ninth Orphan (The Orphan Trilogy, #1))
No matter the specific techniques involved, historically mass surveillance has had several constant attributes. Initially, it is always the country’s dissidents and marginalized who bear the brunt of the surveillance, leading those who support the government or are merely apathetic to mistakenly believe they are immune. And history shows that the mere existence of a mass surveillance apparatus, regardless of how it is used, is in itself sufficient to stifle dissent. A citizenry that is aware of always being watched quickly becomes a compliant and fearful one.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
the job of the press is to disprove the falsehoods that power invariably disseminates to protect itself.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
A citizenry that is aware of always being watched quickly becomes a compliant and fearful one.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Expose the Jesuit order and learn about the global genocide. Speak out, even when what you have to say is not popular.
John Reynaga
And in every instance, the motive is the same: suppressing dissent and mandating compliance.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The NSA had enormous resources and used a vast network in order to capture a large number of mobile conversations in a certain region simultaneously . Each individual call was separated and processed digitally by computers programmed to react to certain words, such as terrorist or Kalashnikov. If such a word occurred, the computer automatically sent an alarm, which meant that some operator would go in manually and listen to the conversation to decide whether it was of interest or not.
Stieg Larsson (The Girl Who Kicked the Hornet's Nest (Millennium, #3))
Rich, famous, insider journalists do not want to subvert the status quo that so lavishly rewards them. Like all courtiers, they are eager to defend the system that vests them with their privileges and contemptuous of anyone who challenges that system.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
No matter the specific techniques involved, historically mass surveillance has had several constant attributes. Initially, it is always the country’s dissidents and marginalized who bear the brunt of the surveillance, leading those who support the government or are merely apathetic to mistakenly believe they are immune.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Those of us who fought the crypto wars, as we call them, thought we had won them in the 1990s. What the Snowden documents have shown us is that instead of dropping the notion of getting backdoor government access, the NSA and FBI just kept doing it in secret.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Through a carefully cultivated display of intimidation to anyone who contemplated a meaningful challenge, the government had striven to show people around the world that its power was constrained by neither law nor ethics, neither morality nor the Constitution: look what we can do and will do to those who impede our agenda.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Taken in its entirety, the Snowden archive led to an ultimately simple conclusion: the US government had built a system that has as its goal the complete elimination of electronic privacy worldwide. Far from hyperbole, that is the literal, explicitly stated aim of the surveillance state: to collect, store, monitor, and analyze all electronic communication by all people around the globe. The agency is devoted to one overarching mission: to prevent the slightest piece of electronic communication from evading its systemic grasp.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Objectivity” means nothing more than reflecting the biases and serving the interests of entrenched Washington. Opinions are problematic only when they deviate from the acceptable range of Washington orthodoxy.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA and the Surveillance State)
Nen flamujt e melankolise Ne vendin tone kudo valojne flamujt e nje melankolie te trishtueshme... ...dhe askush s'mund te thote se ketu rron nje popull qe nderton dicka te re. Aty ketu ne hijet e flamujve mund te shifet nje mund, nje perpjekje e madhe permbi vdekje per te pjelle dicka te madhe, per te qite ne drite nje xhind! Por,(o ironi) nga ajo perpjekje lind vetem nje mi. Dhe keshtu kjo komedi na plas diellin e gazit, nsa prej marazit pelcasim. Ne prakun e cdo banese ku ka ndonj shenj jetese valon nga nje flamur melankolie te trishtueshme.
Millosh Gjergj Nikolla (Migjeni)
When the NSA’s surveillance program was exposed by Edward Snowden’s revelations, high officials claimed that it had prevented fifty-four terrorist acts. On inquiry, that was whittled down to a dozen. A high-level government panel then discovered that there was actually only one case: someone had sent $8,500 to Somalia. That was the total yield of the huge assault on the Constitution and, of course, on others throughout the world.
Noam Chomsky (Who Rules the World?)
Almost as an article of faith, some individuals believe that conspiracies are either kooky fantasies or unimportant aberrations. To be sure, wacko conspiracy theories do exist. There are people who believe that the United States has been invaded by a secret United Nations army equipped with black helicopters, or that the country is secretly controlled by Jews or gays or feminists or black nationalists or communists or extraterrestrial aliens. But it does not logically follow that all conspiracies are imaginary. Conspiracy is a legitimate concept in law: the collusion of two or more people pursuing illegal means to effect some illegal or immoral end. People go to jail for committing conspiratorial acts. Conspiracies are a matter of public record, and some are of real political significance. The Watergate break-in was a conspiracy, as was the Watergate cover-up, which led to Nixon’s downfall. Iran-contra was a conspiracy of immense scope, much of it still uncovered. The savings and loan scandal was described by the Justice Department as “a thousand conspiracies of fraud, theft, and bribery,” the greatest financial crime in history. Often the term “conspiracy” is applied dismissively whenever one suggests that people who occupy positions of political and economic power are consciously dedicated to advancing their elite interests. Even when they openly profess their designs, there are those who deny that intent is involved. In 1994, the officers of the Federal Reserve announced they would pursue monetary policies designed to maintain a high level of unemployment in order to safeguard against “overheating” the economy. Like any creditor class, they preferred a deflationary course. When an acquaintance of mine mentioned this to friends, he was greeted skeptically, “Do you think the Fed bankers are deliberately trying to keep people unemployed?” In fact, not only did he think it, it was announced on the financial pages of the press. Still, his friends assumed he was imagining a conspiracy because he ascribed self-interested collusion to powerful people. At a World Affairs Council meeting in San Francisco, I remarked to a participant that U.S. leaders were pushing hard for the reinstatement of capitalism in the former communist countries. He said, “Do you really think they carry it to that level of conscious intent?” I pointed out it was not a conjecture on my part. They have repeatedly announced their commitment to seeing that “free-market reforms” are introduced in Eastern Europe. Their economic aid is channeled almost exclusively into the private sector. The same policy holds for the monies intended for other countries. Thus, as of the end of 1995, “more than $4.5 million U.S. aid to Haiti has been put on hold because the Aristide government has failed to make progress on a program to privatize state-owned companies” (New York Times 11/25/95). Those who suffer from conspiracy phobia are fond of saying: “Do you actually think there’s a group of people sitting around in a room plotting things?” For some reason that image is assumed to be so patently absurd as to invite only disclaimers. But where else would people of power get together – on park benches or carousels? Indeed, they meet in rooms: corporate boardrooms, Pentagon command rooms, at the Bohemian Grove, in the choice dining rooms at the best restaurants, resorts, hotels, and estates, in the many conference rooms at the White House, the NSA, the CIA, or wherever. And, yes, they consciously plot – though they call it “planning” and “strategizing” – and they do so in great secrecy, often resisting all efforts at public disclosure. No one confabulates and plans more than political and corporate elites and their hired specialists. To make the world safe for those who own it, politically active elements of the owning class have created a national security state that expends billions of dollars and enlists the efforts of vast numbers of people.
Michael Parenti (Dirty Truths)
Thanks to Edward Snowden and others, the great threat from the NSA surveillance is now more clearly understood. Current attacks on our liberties very greatly infringe the freedoms meant to be protected by the First and Fourth Amendments. If a whistle-blower reveals the truth about wrongful government actions, calls arise to charge him with treason for hating America. Allies become enemies when it becomes known that we spy on them as well, as it has now been revealed.
Ron Paul (Swords into Plowshares: A Life in Wartime and a Future of Peace and Prosperity)
the presumption is that the government, with rare exception, will not know anything that law-abiding citizens are doing. That is why we are called private individuals, functioning in our private capacity. Transparency is for those who carry out public duties and exercise public power. Privacy is for everyone else.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
For years, well before consumer tracking became the norm, Radio Shack stores would routinely ask their customers for their addresses and phone numbers. For a while I just refused, but that was socially awkward. Instead, I got in the habit of replying with “9800 Savage Road, Columbia, MD, 20755”: the address of the NSA.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Every time I do an interview people ask similar questions, such as "What is the most significant story that you have revealed?" […] There really is only one overarching point that all of these stories have revealed, and that is–and I say this without the slightest bit of hyperbole or melodrama; it's not metaphorical and it's not figurative; it is literally true–that the goal of the NSA and it's five eyes partners in the English speaking world–Canada, New Zealand, Australia and especially the UK–is to eliminate privacy globally, to ensure that there could be no human communications that occur electronically, that evades their surveillance net; they want to make sure that all forms of human communications by telephone or by Internet, and all online activities are collected, monitored, stored and analyzed by that agency and by their allies. That means, to describe that is to describe a ubiquitous surveillance state; you don't need hyperbole to make that claim, and you do not need to believe me when I say that that's their goal. Document after document within the archive that Edward Snowden provided us declare that to be their goal. They are obsessed with searching out any small little premise of the planet where some form of communications might take place without they being able to invade it.
Glenn Greenwald
Being a patriot doesn't mean prioritizing service to government above all else. Being a patriot means knowing when to protect your country, knowing when to protect your Constitution, knowing when to protect your countrymen, from the violations of and encroachments of adversaries. And those adversaries don't have to be foreign countries.
Edward Snowden
Privacy is a core condition of being a free person.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The Internet “is a TV that watches you,” he said, a technology “governments are abusing … to extend their powers beyond what is necessary and appropriate.
The Washington Post (NSA Secrets: Government Spying in the Internet Age)
Once I was decapited a black out in an avalanche I went from human to animal please turn me back
pleasefindthis (25 Love Poems for the NSA)
Paradoxically, in its quest to make Americans more secure, the NSA has made American communications less secure; it has undermined the safety of the entire internet.
Luke Harding (The Snowden Files: The Inside Story of the World's Most Wanted Man (Vintage))
We need to contact NSA, CIA, anybody using initials... and the President!
J.C. Allen
True. We both could. One of these days our search history is going to tip off the NSA and then we’re going to be in trouble.” It was a valid worry for a writer.
Chelsea M. Cameron (UnWritten)
Under the new policy, any time the NSA discovers a major flaw in software, it must disclose the vulnerability to vendors and others so the flaw can be patched.
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
A blanket could be used as a smothering agent, sort of like an employee of the NSA.

Jarod Kintz (Brick and Blanket Test in Brick City (Ocala) Florida)
Like a maniac, she’d threatened the director of the NSA with bodily harm—very descriptively—if he didn’t help her.
Katie Reus (Targeted (Deadly Ops, #1))
I wish every envelope enclosed a love letter. It’s this hope that leads me to open strangers’ mail. So you see, I’m a romantic, not an NSA employee.

Jarod Kintz (Love quotes for the ages. Specifically ages 18-81.)
The NSA is looking for terrorists. They’re not getting psychosexual pleasure out of their schadenfreude about you.”—
Jon Ronson
The world now knows that US telcos give the NSA access to the Internet backbone and that US cloud providers give it access to user accounts.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
The NSA employs more mathematicians, buys more computer hardware, and intercepts more messages than any other organization in the world.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
NSA analyst touches something in the database,
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
US journalists, for years overwhelmingly enamored of Barack Obama, were now commonly speaking of him in these terms: as some sort of grave menace to press freedoms, the most repressive leader in this regard since Richard Nixon. That was quite a remarkable turn for a politician who was ushered into power vowing “the most transparent administration in US history.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Somewhere across the interstate Exposure to the drug trade of emotions And the tsunami and typhoon of feelings Has made us all cops and robbers Of what we keep in the cavities In our chests
Iain S. Thomas (25 Love Poems for the NSA)
The Obama administration, which has brought more prosecutions against leakers than all prior presidencies combined, has sought to create a climate of fear that would stifle any attempts at whistle-blowing. But Snowden destroyed that template. He has managed to remain free, outside the grasp of the United States; what's more, he has refused to remain in hiding but proudly came forward and identified himself. As a result, the public image of him is not a convict in orange jumpsuit and shackles but and independent, articulate figure who can speak for himself, explaining what he did and why.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Quinns always come at half price, about half the time, and half-naked, even during the colder half of winter. A Quinn is like a queen, but draggier, and cheaper to buy and use for personal gain, unless you’re suspicious that you’re poor and illiterate like Jarod Kintz, in which case Quinns could be the spirits of your dead relatives, come to haunt you until you gather a massive fortune through selling books on the internet, to send some back in time through a portal you bought from the NSA, so they would have lived better lives without having to move a finger for their fortune. Oh, yah, and since they aren’t - they’re blue, like smurfs, yet they turn purple whenever tickled on the belly, which is something they seem to rather dislike, since they start biting and scratching when it happens, for no good reason, I might add.
Will Advise (Nothing is here...)
Above even our physical well-being, a central value is keeping the state out of the private realm—our “persons, houses, papers, and effects,” as the Fourth Amendment puts it. We do so precisely because that realm is the crucible of so many of the attributes typically associated with the quality of life—creativity, exploration, intimacy.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
A couple of years ago, I ran into someone at a trade show who was representing the NSA (National Security Agency). He mentioned to someone else in passing that he'd written a filter program in Perl, so without telling him who I was, I asked him if I could tell people that the NSA uses Perl. His response was, "Doesn't everyone?" So now I don't tell people the NSA uses Perl. I merely tell people the NSA thinks everyone uses Perl. They should know, after all.
Larry Wall
While that thing was on, we ran a ridiculous amount of data through our servers.” “How much?” I asked. He looked exasperated. “Enough that I could make up some kind of strained analogy involving the contents of the Library of Congress and the number of pixels in all of the Lord of the Rings movies put together and how many phone calls the NSA intercepts in a single day and you would be like, ‘Holy shit, that’s a lot.’” “Holy shit, that’s a lot!” I exclaimed dutifully.
Neal Stephenson (The Rise and Fall of D.O.D.O. (D.O.D.O. #1))
Murdered? Somebody murdered him?” Palmer was agog. A thin, soft man with a pitted nose and a bald, bumpy egg-shaped head dotted with dime-sized freckles, he was wearing jeans and a T-shirt that said, “NSA, Our Customer Service Pledge: You Talk, We Listen.
John Sandford (Extreme Prey (Lucas Davenport, #26))
Snowden put it like this in an online Q&A in 2013: “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
He and Marianne can only talk about it over email, using the same communication technologies they now know are under surveillance, and it feels at times like their relationship has been captured in a complex network of state power, that the network is a form of intelligence in itself, containing them both, and containing their feelings for one another. I feel like the NSA agent reading these emails has the wrong impression of us, Marianne wrote once. They probably don't know about the time you didn't invite me to the Debs.
Sally Rooney (Normal People)
Under a $652-million clandestine program code named GENIE, the NSA, CIA, and special military operatives have planted covert digital bugs in tens of thousands of computers, routers, and firewalls around the world to conduct computer network exploitation, or CNE. Some are planted remotely, but others require physical access to install through so-called interdiction—the CIA or FBI intercepts shipments of hardware from manufacturers and retailers in order to plant malware in them or install doctored chips before they reach the customer.
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
former NSA director Michael Hayden: “Give me the box you will allow me to operate in. I’m going to play to the very edges of that box. . . . You, the American people, through your elected representatives, give me the field of play and I will play very aggressively in it.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Two of the NSA’s internal databases, code-named HAPPYFOOT and FASCIA, contain comprehensive location information of devices worldwide. The NSA uses the databases to track people’s movements, identify people who associate with people of interest, and target drone strikes.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Everybody should have their own personal logo. Mine is a smiley face that’s winking, as if I’m passing on secret knowledge. But it’s not like I tell just anybody. My secrets are so sought after that the NSA is always whispering at me to try to get me to give them something, anything.
Jarod Kintz (This Book is Not for Sale)
Really? I love this place. We draw more power in this room than the average small town in Maryland. The spinning servers down there actually generate enough friction to reduce our heating bill by forty percent in the winter.” He spread his arms and smiled. “See? Even the NSA is going green!
Andrew Warren (Red Phoenix (Thomas Caine #2))
While I pray that public awareness and debate will lead to reform, bear in mind that the policies of men change in time, and even the Constitution is subverted when the appetites of power demand it. In words from history: Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography. I instantly recognized the last sentence as a play on a Thomas Jefferson quote from 1798 that I often cited in my writing: “In questions of power, then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
He shook his head no and said, “It is now among us.” Roark also pressed him on the limits of the program, and Hayden suggested that the only real limit had been imposed by Rep. Nancy Pelosi in exchange for going along with the program and maintaining her silence about it. Hayden told Roark that “Pelosi had repeatedly warned him not to go beyond the CT [counterterrorism] target, and for now they were adhering to that.” In other words, the Bush administration and NSA eventually wanted to use the domestic spying program for purposes that had nothing to do with the global war on terror.
James Risen (Pay Any Price: Greed, Power, and Endless War)
How did the American people ever reach this point where they believe that US aggression in the Middle East will make us safe when it does the opposite? How did the American people ever reach the point where they believe that fighting unconstitutional wars is required to protect our freedoms and our Constitution? Why do we allow the NSA, CIA, FBI, TSA, etc. to destroy our liberty at home, as part of the Global War on Terror, with a pretext that they are preserving our liberty? Why are the lying politicians reelected and allowed to bankrupt our country, destroy our money, and enter wars without the proper consent? Why do the American people suffer in silence and not scream “Enough is enough!”? We’ve had enough of the “humanitarian do-gooders” and the proponents of “American exceptionalism” who give us nothing but war, economic suffering, and less freedom. This can and must be stopped.
Ron Paul (Swords into Plowshares: A Life in Wartime and a Future of Peace and Prosperity)
Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.
The Washington Post (NSA Secrets: Government Spying in the Internet Age)
It’s crucial to understand that ordinarily the FBI applies for a wiretap separately from the National Security Agency. The NSA had tapped my phones for years, going back to the 1993 World Trade Center attack. But those wire taps would not automatically get shared with the FBI, unless the Intelligence Community referred my activities for a criminal investigation. The FBI took no such action. Instead—by coincidence I’m sure, the FBI started its phone taps exactly when the Senate Foreign Relations Committee planned a series of hearings on Iraq in late July, 2002.212 That timing suggests the FBI wanted to monitor what Congress would learn about the realities of Pre-War Intelligence, which contradicted everything the White House was preaching on FOX News and CNN. In which case, the Justice Department discovered that I told Congress a lot—and Congress rewarded the White House by pretending that I had not said a word. But phone taps don’t lie. Numerous phone conversations with Congressional offices show that I identified myself as one of the few Assets covering Iraq.213 Some of my calls described the peace framework, assuring Congressional staffers that diplomacy could achieve the full scope of results sought by U.S policymakers.
Susan Lindauer (EXTREME PREJUDICE: The Terrifying Story of the Patriot Act and the Cover Ups of 9/11 and Iraq)
But eavesdropping acquired a new, and more intense, life after the terrorist attacks of 9/11. “Never again” was an impossible mandate, of course, but the only way to have any hope of preventing something from happening is to know everything that is happening. That led the NSA to put the entire planet under surveillance.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Pride isn't the thing that hurts us, it's the humility that pop's our bubble.
N.S.A Search for the Truth
Your personal life is now known as Facebook’s data. Its CEO’s personal life is now known as mind your own business.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Brash souls made jokes about what must be mountains of unread spy-eye data stored who knew where and how.
James Tiptree Jr. (Her Smoke Rose Up Forever)
Lots of data gets collected through the latest technology today, and not all of it is about people's consumer preferences.
Lisa Randall (Dark Matter and the Dinosaurs: The Astounding Interconnectedness of the Universe)
Americans now considered the danger of surveillance of greater concern than the danger of terrorism: Overall, 47% say their greater concern about government anti-terrorism policies is that they have gone too far in restricting the average person’s civil liberties, while 35% say they are more concerned that policies have not gone far enough to protect the country. This is the first time in Pew Research polling that more have expressed concern over civil liberties than protection from terrorism since the question was first asked in 2004.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
At the Pentagon, for instance, in the NMCC’s secure Emergency Actions room, military officials could find anyone in the Constitution’s line of succession by checking the screen of a dedicated Zenith Z-150 Central Locator System computer. The CLS computers are protected by a special NSA protocol known as TEMPEST that shields them from electromagnetic snooping. II
Garrett M. Graff (Raven Rock: The Story of the U.S. Government's Secret Plan to Save Itself--While the Rest of Us Die)
Edward Snowden made an audacious claim: “I, sitting at my desk, could wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Few would question the would be fate of Snowden had he stayed in America once he took action to share with his country the illegal excesses of the NSA. Instead of being a whistle-blower, as he was being imprisoned, he would have been cloaked in charges of espionage and treated as a spy. That is, if he had not been killed in some “incidental” way trying to escape. But
James C. Horak (Siege in the Davis Mountains)
We shouldn’t have to be faithful loyalists of the powerful to feel safe from state surveillance. Nor should the price of immunity be refraining from controversial or provocative dissent.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
I'm an oracle of the past. I can accurately predict up to 1 minute in the future, by thoroughly investigating the last 2 years of your life. Also, I look like an old database – flat and full of useless info.
Will Advise (Nothing is here...)
The ability to eavesdrop on people's communications vests immense power in those who do it. And unless such power is held in check by rigorous oversight and accountability, it is almost certain to be abused. Expecting the US government to operate a massive surveillance machine in complete secrecy without falling prey to its temptations runs counter to every historical example and all available evidence about human nature.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
What keeps a person passive and compliant,” he explained, “is fear of repercussions, but once you let go of your attachment to things that don’t ultimately matter—money, career, physical safety—you can overcome that fear.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The NSA may be spying on our every word, but to judge by the repeated failures of American foreign policy, nobody in Washington knows what to do with all the data. Never in history did a government know so much about what’s going on in the world – yet few empires have botched things up as clumsily as the contemporary United States. It’s like a poker player who knows what cards his opponents hold, yet somehow still manages to lose round after round.
Yuval Noah Harari (Homo Deus: A Brief History of Tomorrow)
Given Germany’s totalitarian backstory – the Nazis then communists – it was hardly surprising that Snowden’s revelations caused outrage. In fact, a newish noun was used to capture German indignation at US spying: der Shitstorm. The Anglicism entered the German dictionary Duden in July 2013, as the NSA affair blew around the world. Der Shitstorm refers to widespread and vociferous outrage expressed on the internet, especially on social media platforms.
Luke Harding (The Snowden Files: The Inside Story of the World's Most Wanted Man (Vintage))
The transition from foreign enemies to domestic enemies is a natural sequence when safety is emphasized over liberty. It involves the FISA court, PATRIOT Act authority, out of control NSA surveillance, and enthusiastic presidential use of the Espionage Act of 1917 to suppress and intimidate truth-tellers and whistle-blowers. We have an FBI that participates in and encourages the process by breaking laws in its sting operations and entrapments. Plus, there are illegal seizures of property at all levels of government. Property confiscated is not turned over to general government revenue. Instead, it automatically is put in the treasury of the policing organization that did the confiscating. This process is dangerous; it systematically undermines our liberty while providing funding and perverse incentives for organizations that do the policing. This brings to mind the CIA using drug money to finance secret activities during Iran-Contra.
Ron Paul (Swords into Plowshares: A Life in Wartime and a Future of Peace and Prosperity)
The answer was Stellar Wind. The NSA would eavesdrop freely against Americans and aliens in the United States without probable cause or search warrants. It would mine and assay the electronic records of millions of telephone conversations—both callers and receivers—and the subject lines of e-mails, including names and Internet addresses. Then it would send the refined intelligence to the Bureau for action. Stellar Wind resurrected Cold War tactics with twenty-first-century technology. It let the FBI work with the NSA outside of the limits of the law. As Cheney knew from his days at the White House in the wake of Watergate, the NSA and the FBI had worked that way up until 1972, when the Supreme Court unanimously outlawed warrantless wiretaps. Stellar Wind blew past the Supreme Court on the authority of a dubious opinion sent to the White House the week that the Patriot Act became law. It came from John Yoo, a thirty-four-year-old lawyer in the Justice Department’s Office of Legal Counsel who had clerked for Justice Clarence Thomas. Yoo wrote that the Constitution’s protections against warrantless searches and seizures did not apply to military operations in the United States. The NSA was a military agency; Congress had authorized Bush to use military force; therefore he had the power to use the NSA against anyone anywhere in America. The president was “free from the constraints of the Fourth Amendment,” Yoo wrote. So the FBI would be free as well.
Tim Weiner (Enemies: A History of the FBI)
Post-9/11 surveillance has caused writers to self-censor. They avoid writing about and researching certain subjects; they’re careful about communicating with sources, colleagues, or friends abroad. A Pew Research Center study conducted just after the first Snowden articles were published found that people didn’t want to talk about the NSA online. A broader Harris poll found that nearly half of Americans have changed what they research, talk about, and write about because of NSA surveillance.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Some privacy advocates favor payments to companies when they comply with surveillance efforts because the costs can be a brake on overly broad requests by government officials. Invoices also can provide a paper trail to help expose the extent of spying.
The Washington Post (NSA Secrets: Government Spying in the Internet Age)
Jacobson had been told to remove the Fourth Amendment protections from an experimental surveillance system, one of the most powerful spying programs the NSA had ever developed. The advanced system was still just a pilot project, but top NSA officials wanted to make it operational immediately—and use it to collect data on Americans. They had ordered Jacobson to strip away the carefully calibrated restrictions built into the system, which were designed to prevent it from illegally collecting information on U.S. citizens.
James Risen (Pay Any Price: Greed, Power, and Endless War)
Finally, Snowden gave me an answer that felt vibrant and real. “The true measurement of a person’s worth isn’t what they say they believe in, but what they do in defense of those beliefs,” he said. “If you’re not acting on your beliefs, then they probably aren’t real.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Depending on the contemporary mood, Orwell oscillates from Saint George to George the Seer to George the Sage. What other thinker has been both so fervidly claimed and derided by both the left and right? Who else except Kafka do we credit with having seen the sinister future? When the NSA spying scandal broke in June, Amazon sales of Orwell’s Nineteen Eighty-Four vaulted more than 6000 percent. The connection of Big Brother with the NSA might have been hysterical and spurious, but it was also testament to our sentimental, kneejerk affection for Orwell, to the fact that he remains the default scribe whenever our paranoia is fondled by the ominous machinations of realpolitik. The utter clarity and goodness of his intellect seem something of a miracle when one considers how many of his fellow writers botched the most pressing moral and political tests of their time. He could smell bullshit and blood a continent away: When a passel of leftist intellectuals was hailing the Soviet Union as humankind’s only hope, Orwell was persistent in pointing out that Stalin was a monocratic lunatic.
William Giraldi
The fourth article, which ran as planned on Saturday, was about BOUNDLESS INFORMANT, the NSA’s data-tracking program, and it described the reports showing that the NSA was collecting, analyzing, and storing billions of telephone calls and emails sent across the American telecommunications infrastructure. It also raised the question of whether NSA officials had lied to Congress when they had refused to answer senators about the number of domestic communications intercepted, claiming that they did not keep such records and could not assemble such data. After
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
AMBRY  (A'MBRY)   n.s.[a word corrupted from almonry.]1. The place where the almoner lives, or where alms are distributed.2. The place where plate, and utensils for housekeeping, are kept; also a cupboard for keeping cold victuals:a word still used in the northern counties, and in Scotland.
Samuel Johnson (A Dictionary of the English Language (Complete and Unabridged in Two Volumes), Volume One)
Once the NSA embraced the Internet and a drift-net style of data collection, the agency was transformed. The bulk collection of phone and e-mail metadata, both inside the United States and around the world, has now become one of the NSA’s core missions. The agency’s analysts have discovered that they can learn far more about people by tracking their daily digital footprints through their metadata than they could ever learn from actually eavesdropping on their conversations. What’s more, phone and e-mail logging data comes with few legal protections, making it easy for the NSA to access.
James Risen (Pay Any Price: Greed, Power, and Endless War)
Even more confused than before, I started backing up. I’d go around and get in through the kitchen; David and Raquel had to know what was going on. Unfortunately for all of us, that was when Lend came out the front door, immediately collapsed with a thunk that made me cringe, and—perfect—went completely transparent. The police officers stopped fighting, every eye glued on my boyfriend, now essentially invisible other than this T-shirt and flannel pajama pants. “Okay,” I said, putting my hands on my hips. “No. This is unacceptable. I don’t care what the bleep is going on, we’re going to get it settled immediately or I swear I will give you all to the Dark Queen and let her feed on your dreams for the rest of eternity.” Every head turned my direction, their faces a portrait of shock and disbelief. “What, you’ve never seen a boy made of water before? Yawn. Go down to the pond—it’ll really blow your mind.” One close to the front—barrel-chested, middle-aged man with salt-and-pepper hair and a thick mustache—shook his head as though trying to clear it. “Are you Evelyn Green?” “Sort of. Mostly. I mean, legally. Again, sort of.” He tried to look at me, but his eyes kept drifting back to Lend. “You’re under—We’re here to—Could you please come with us?” I rolled my eyes. “No, I couldn’t. You’re last place in a very long line of people who want me right now. Besides, I haven’t done anything.” “Actually,” said a painfully tall and thin officer with a voice that struggled between tenor and bass but really sounded like a dog with something caught in its throat, “you’re wanted for terrorism.” He shrugged apologetically. “We’re supposed to take you into NSA headquarters.” “I think you have the wrong acronym there,” I said. This had Anne-Whatever Whatever written all over it.
Kiersten White (Endlessly (Paranormalcy, #3))
The cliché that “everything leaks; it all comes out in the New York Times eventually” is emphatically not true, above all for sensitive compartmented information. It’s a cover story, designed both to hide and sustain the effectiveness of the overall secrecy system. (Edward Snowden was the first ever to expose a large amount of SCI, including massively unconstitutional and criminal dragnet surveillance of American citizens and others in the world without probable cause for suspicion. Many thousands of NSA employees had known for a decade of that mass surveillance and its criminality. Not one other had disclosed it. Snowden is currently in exile, probably for life.)
Daniel Ellsberg (The Doomsday Machine: Confessions of a Nuclear War Planner)
Roosevelt fought hard for the United States to host the opening session [of the United Nations]; it seemed a magnanimous gesture to most of the delegates. But the real reason was to better enable the United States to eavesdrop on its guests. Coded messages between the foreign delegations and their distant capitals passed through U.S. telegraph lines in San Francisco. With wartime censorship laws still in effect, Western Union and the other commercial telegraph companies were required to pass on both coded and uncoded telegrams to U.S. Army codebreakers. Once the signals were captured, a specially designed time-delay device activated to allow recorders to be switched on. Devices were also developed to divert a single signal to several receivers. The intercepts were then forwarded to Arlington Hall, headquarters of the Army codebreakers, over forty-six special secure teletype lines. By the summer of 1945 the average number of daily messages had grown to 289,802, from only 46,865 in February 1943. The same soldiers who only a few weeks earlier had been deciphering German battle plans were now unraveling the codes and ciphers wound tightly around Argentine negotiating points. During the San Francisco Conference, for example, American codebreakers were reading messages sent to and from the French delegation, which was using the Hagelin M-209, a complex six-wheel cipher machine broken by the Army Security Agency during the war. The decrypts revealed how desperate France had become to maintain its image as a major world power after the war. On April 29, for example, Fouques Duparc, the secretary general of the French delegation, complained in an encrypted note to General Charles de Gaulle in Paris that France was not chosen to be one of the "inviting powers" to the conference. "Our inclusion among the sponsoring powers," he wrote, "would have signified, in the eyes of all, our return to our traditional place in the world." In charge of the San Francisco eavesdropping and codebreaking operation was Lieutenant Colonel Frank B. Rowlett, the protégé of William F. Friedman. Rowlett was relieved when the conference finally ended, and he considered it a great success. "Pressure of work due to the San Francisco Conference has at last abated," he wrote, "and the 24-hour day has been shortened. The feeling in the Branch is that the success of the Conference may owe a great deal to its contribution." The San Francisco Conference served as an important demonstration of the usefulness of peacetime signals intelligence. Impressive was not just the volume of messages intercepted but also the wide range of countries whose secrets could be read. Messages from Colombia provided details on quiet disagreements between Russia and its satellite nations as well as on "Russia's prejudice toward the Latin American countries." Spanish decrypts indicated that their diplomats in San Francisco were warned to oppose a number of Russian moves: "Red maneuver . . . must be stopped at once," said one. A Czechoslovakian message indicated that nation's opposition to the admission of Argentina to the UN. From the very moment of its birth, the United Nations was a microcosm of East-West spying. Just as with the founding conference, the United States pushed hard to locate the organization on American soil, largely to accommodate the eavesdroppers and codebreakers of NSA and its predecessors.
James Bamford (Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century)
Following someone covertly, either on foot or by car, costs around $175,000 per month—primarily for the salary of the agents doing the following. But if the police can place a tracker in the suspect’s car, or use a fake cell tower device to fool the suspect’s cell phone into giving up its location information, the cost drops to about $70,000 per month, because it only requires one agent. And if the police can hide a GPS receiver in the suspect’s car, suddenly the price drops to about $150 per month—mostly for the surreptitious installation of the device. Getting location information from the suspect’s cell provider is even cheaper: Sprint charges law enforcement only $30 per month. The difference is between fixed and marginal costs. If a police department performs surveillance on foot, following two people costs twice as much as following one person. But with GPS or cell phone surveillance, the cost is primarily for setting up the system. Once it is in place, the additional marginal cost of following one, ten, or a thousand more people is minimal. Or, once someone spends the money designing and building a telephone eavesdropping system that collects and analyzes all the voice calls in Afghanistan, as the NSA did to help defend US soldiers from improvised explosive devices, it’s cheap and easy to deploy that same technology against the telephone networks of other countries.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Lavabit was an e-mail service that offered more security privacy than the large corporate e-mail services most of us use. It was a small company, owned and operated by a programmer named Ladar Levison, and it was popular among the tech-savvy. It had half a million users, Edward Snowden amongst them. Soon after Snowden fled to Hong Kong in 2013, Levison received a National Security Letter demanding that the company turn over the master encryption key that protected all of Lavabit’s users—and then not tell any of its customers that they could be monitored. Levison fought this order in court, and when it became clear that he had lost, he shut down his service rather than deceive and compromise his customers. The moral is clear. If you run a business, and the FBI or the NSA wants to turn it into a mass surveillance tool, it believes that it is entitled to do so, solely on its own authority. The agency can force you to modify your system. It can do it all in secret and then force your business to keep that secret. Once it does that, you no longer control that part of your business. If you’re a large company, you can’t shut it down. You can’t realistically terminate part of your service. In a very real sense, it is not your business anymore. It has become an arm of the vast US surveillance apparatus, and if your interest conflicts with the agency’s, the agency wins. Your business has been commandeered.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Most people remember COINTELPRO from the days of the Black Panthers, Yippies, and other revolutionary groups who threatened our government during the civil rights movement and the Vietnam war. Sensing that these groups might incite American citizens into radical action, the FBI sent in agents to agitate members of these various groups, often pitting them against each other through various forms of subterfuge, such as blackmail. It appears that the CIA, FBI, and NSA are now sending their goons into the metaphysical marketplace, making sure that people who think they are aspiring to higher and positively transformative things are, in reality, only becoming more self-indulgent, disconnected, and confused. The biggest influx of these agents occurred during the blossoming of the "human potential" movement in the early '70s, through such institutions as Esalen. Legions of people threw away their protest banners and followed their bliss during a time when directly addressing the socio-political problems of the day was imperative. Since then, the emphasis on personal development - and more recently, the You Create Your Own Reality movement - a significant segment of the population has been brainwashed into disdaining all socio-political issues. For what better way to disempower people than to have them focus on their personal evolution at the expense of their families, communities, and the countries they live in?
David Icke
An imaginary friend once asked me why Americans can't stand Russia. The answer was cold, deadly, silent, and, well expected. It’s because in Soviet Russia nothing happens anymore, because it doesn’t exist anymore. And Americans are all about happenings. If there isn’t one – they don’t go where it isn’t, because there isn’t anything to happen to them there.
Will Advise (Nothing is here...)
Im Grunde, erkannte sie, stimmt es gar nicht, dass man als Mensch freie Entscheidungen trifft. Wenn es um wichtige Dinge geht, dann wählt man nicht "frei", sondern man wählt die Option, die man für die bessere hält - und das Problem ist, dass man das meistens nicht weiß. Also entscheidet man eigentlich nicht, sondern man rät, und das mit mehr oder weniger Glück.
Andreas Eschbach (NSA - Nationales Sicherheits-Amt)
By tracing the early history of USCYBERCOM it is possible to understand some of the reasons why the military has focused almost completely on network defense and cyber attack while being unaware of the need to address the vulnerabilities in systems that could be exploited in future conflicts against technologically capable adversaries. It is a problem mirrored in most organizations. The network security staff are separate from the endpoint security staff who manage desktops through patch and vulnerability management tools and ensure that software and anti-virus signatures are up to date. Meanwhile, the development teams that create new applications, web services, and digital business ventures, work completely on their own with little concern for security. The analogous behavior observed in the military is the creation of new weapons systems, ISR platforms, precision targeting, and C2 capabilities without ensuring that they are resistant to the types of attacks that USCYBERCOM and the NSA have been researching and deploying. USCYBERCOM had its genesis in NCW thinking. First the military worked to participate in the information revolution by joining their networks together. Then it recognized the need for protecting those networks, now deemed cyberspace. The concept that a strong defense requires a strong offense, carried over from missile defense and Cold War strategies, led to a focus on network attack and less emphasis on improving resiliency of computing platforms and weapons systems.
Richard Stiennon (There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar)
Moving satellites, the term for testing and tracking the source, or sources, of originating signals, was rarely done. However, there didn’t seem to be a choice in this case. They could not figure out with whom Gaines was talking, and even more problematic was his method of communication. Jaeger jumped rope while waiting for the results. He knew the NSA had some exposure during the maneuvers, namely the loss of surveillance, but it would just be a few minutes of darkness. Then they’d have an answer. In a solar-powered bunker located on the same Taos property where he’d met Gale, Booker sucked down a yerba mate power smoothie filled with one of his special blend of herbs. He needed to stay up all night, and this would do it. Two aides assisted him in handling the fast-breaking situations.
Brandt Legg (Cosega Shift (The Cosega Sequence, #3))
Snowden called the NSA ‘self-certifying’. In the debate over who ruled the internet, the NSA provided a dismaying answer: ‘We do.’ The slides, given to Poitras and published by Der Spiegel magazine, show that the NSA had developed techniques to hack into iPhones. The agency assigned specialised teams to work on other smartphones too, such as Android. It targeted BlackBerry, previously regarded as the impregnable device of choice for White House aides. The NSA can hoover up photos and voicemail. It can hack Facebook, Google Earth and Yahoo Messenger. Particularly useful is geo-data, which locates where a target has been and when. The agency collects billions of records a day showing the location of mobile phone users across the world. It sifts them – using powerful analytics – to discover ‘co-travellers’. These are previously unknown associates of a target. Another
Luke Harding (The Snowden Files: The Inside Story of the World's Most Wanted Man (Vintage))
Many of the NSA’s ISTJs were eclectic geeks just this side of Rain Man. One was known to park his car in exactly the same spot in the agency parking lot every day—no matter whether the lot was empty—and then walk precisely the same steps from that parking spot to his office. Another would buy secondhand pants, wear them every day to work for two weeks, and then throw them out and buy another pair, so that he never had to do laundry. In addition to this disarming weirdness, there was a dark side to the predominance of this singular personality type within the agency. The introverts at the NSA never questioned authority. They kept to themselves and remained silent about the agency’s secrets, for good or ill. Many NSA employees were married to other NSA employees, and often their children came to work there as well, reinforcing the agency’s insular nature, enhanced by its geographic isolation at Fort Meade in suburban Maryland, far from the rest of official Washington.
James Risen (Pay Any Price: Greed, Power, and Endless War)
Many countries have a long history of spying on foreign corporations for their own military and commercial advantage. The US claims that it does not engage in commercial espionage, meaning that it does not hack foreign corporate networks and pass that information on to US competitors for commercial advantage. But it does engage in economic espionage, by hacking into foreign corporate networks and using that information in government trade negotiations that directly benefit US corporate interests. Recent examples are the Brazilian oil company Petrobras and the European SWIFT international bank payment system. In fact, a 1996 government report boasted that the NSA claimed that the economic benefits of one of its programs to US industry “totaled tens of billions of dollars over the last several years.” You may or may not see a substantive difference between the two types of espionage. China, without so clean a separation between its government and its industries, does not.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
All of the evidence highlights the implicit bargain that is offered to citizens: pose no challenge and you have nothing to worry about. Mind your own business, and support or at least tolerate what we do, and you’ll be fine. Put differently, you must refrain from provoking the authority that wields surveillance powers if you wish to be deemed free of wrongdoing. This is a deal that invites passivity, obedience, and conformity. The safest course, the way to ensure being “left alone,” is to remain quiet, unthreatening, and compliant.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The word “collect” has a very special definition, according to the Department of Defense. It doesn’t mean collect; it means that a person looks at, or analyzes, the data. In 2013, Director of National Intelligence James Clapper likened the NSA’s trove of accumulated data to a library. All those books are stored on the shelves, but very few are actually read. “So the task for us in the interest of preserving security and preserving civil liberties and privacy is to be as precise as we possibly can be when we go in that library and look for the books that we need to open up and actually read.” Think of that friend of yours who has thousands of books in his house. According to this ridiculous definition, the only books he can claim to have collected are the ones he’s read. This is why Clapper asserts he didn’t lie in a Senate hearing when he replied “no” to the question “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?” From the military’s perspective, it’s not surveillance until a human being looks at the data, even if algorithms developed and implemented by defense personnel or contractors have analyzed it many times over.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
It is our policy not to negotiate with terrorists." I stared at the phone, my eyes wide. I was speechless and very, very angry. "Are you still there?" The voice belonged to an unnamed official in the NSA. Perston‐Smythe introduced him as one of Cox's supervisors. "What the fuck do you mean by that?" "It is the policy of this government not to negotiate with terrorists." "Do you mean to tell me that you consider me a terrorist?" He sounded almost prim. "Certainly. You've taken a hostage." "Terrorists," I said, gritting my teeth, "attack the innocent to achieve their goals. If you're about to tell me that you consider Cox an innocent bystander, then this conversation is over." "Terrorists are—" "Oh, fuck it! You want a terrorist action so you can consider me a terrorist? There's no way you can keep me out of your nuclear arsenals. Where do you want the first one to go off? The Pentagon? The White House? The Capitol building? How about Moscow or Kiev? Wouldn't that be interesting? Do you think they'd launch?" His voice was a lot less prim. "You wouldn't do that." "Well, as a matter of fact, I wouldn't. BECAUSE I'M NOT A TERRORIST!" I slammed the phone down on the hook and jumped.
Steven Gould
We knew that some guys that looked as though they were al-Qaeda-associated were traveling to KL,” said a senior CIA official, referring to Kuala Lumpur. “We didn’t know what they were going to do there. We were trying to find that. And we were concerned that there might be an attack, because it wasn’t just Mihdhar and Hazmi, it was also ‘eleven young guys’—which was a term that was used for operatives traveling. We didn’t have the names of the others, and on Hazmi we only had his first name, ‘Nawaf.’ So the concern was: What are they doing? Is this a prelude to an attack in KL—what’s happening here?
James Bamford (The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America)
Hinzu kommt der Ton, in dem die Medien des Establishments über Fehlverhalten der Regierung berichten. Die journalistische Kultur in den USA gebietet es, dass Reporter jegliche eindeutige oder konkrete Aussage vermeiden und auch noch so fragwürdige Behauptungen der Regierung in ihrer Berichterstattung berücksichtigen. Stattdessen benutzen sie eine Sprache, die der eigene Kolumnist der Washington Post, Erik Wemple, als "politisch schwer gemäßigt" verspottet: niemals etwas Eindeutiges sagen, sondern sowohl die Rechtfertigungen der Regierung als auch die konkreten Tatsachen in der gleichen Glaubwürdigkeit darstellen, was insgesamt den Effekt hat, dass Enthüllungen verwässert und zu einem häufig ebenso zusammenhang- wie belanglosen Brei verquirlt werden. Vor allem messen sie Behauptungen von offizieller Seite stets großes Gewicht bei, selbst wenn diese schlicht unwahr oder absichtlich falsch sind. Ebendieser ängstliche, servile Journalismus war es, der die Times, die Post und viele andere Medien veranlasste, in ihren Berichten über die Verhörmethoden während der Regierung Bush das Wort "Folter" tunlichst zu vermeiden, obwohl sie nicht das geringste Problem damit hatten, wenn die Regierung eines anderen Staates auf der Welt exakt die gleichen Methoden einsetzte.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Mbas tryezës Kështu ne të rinjve na kalon nata: Pranë tryezës meremer-falso, me gotë të plotë a boshe, me kujdes të madh ndejun (si e lyp dans-edukata), të ngrehun, të ngrimë, të stolisun e ftyrash të qindisun me pudër, karmin... jo? - por me përshtypje të mirë që na e sjell zojusha e bukur dhe me hir tu' na buzqeshë ambël, buzësh të kuqe si gjaku, nsa gjit' i majen, dridhen - ftyra kuqet, zbehet... e në secilin prej nesh në fund ka një shpresë këndedhet dhe na shtrëngon laku... - Qashtu ndejë, tu' e vrejtun, çojmë biseda të ndryshme serioze, t'urta, por ma shpesh të dyshueshme, me gjuhë të bukur, të zgjedhun, mbi ngjarje të ra flasim e prej një dëshirës pa mshirë të gjithë pëlsasim. Ngushllim! - se zonjusha na i din mirëi hallet, prandej aq me andje, bukur, kërcen vallet. Jonet muzikore derdhen, rrkaj derdhen, lëmojnë ata që në valle sjellen, në hare sjellen, lëmojnë tryezën, gotat, veshjet tona, ndjenjat e fantazis sonë, i hapen ylber-velat... Por befas, të njëjones së panjoftun tingllimi, së cilës asht te hyu i bukuris trillimi, krahnorët n'i përkdheli dhe n'i piskoi zemrat, gjatë korrizit të thennët zbresin fill te themr; - Qashtu vuejmë, dëfrejmë... Jetën adhurojmë, nsa drita shkëlqejnë zojushën shikojmë dhe n'andrrim vallzojmë... Rishtas, me plot dashje, vallet ndiqen, ndiqen Vash e djalë përputhen mbrend dy zemra digjen, por me u puthë - nuk puthen!
Millosh Gjergj Nikolla (Migjeni)
Support for Miller’s concerns came from an unlikely source in the person of Matt Taibbi, a veteran journalist who had written two best-selling anti-Trump books. In an article published five days after Miller’s interview and titled “We’re in a Permanent Coup,” he warned of the threat to America’s democratic order posed by the deep-state conspiracy: “The Trump presidency is the first to reveal a full-blown schism between the intelligence community and the White House. Senior figures in the CIA, NSA, FBI and other agencies made an open break from their would-be boss before Trump’s inauguration, commencing a public war of leaks that has not stopped. “My discomfort in the last few years, first with Russiagate and now with Ukrainegate and impeachment, stems from the belief that the people pushing hardest for Trump’s early removal are more dangerous than Trump. Many Americans don’t see this because they’re not used to waking up in a country where you’re not sure who the president will be by nightfall. They don’t understand that this predicament is worse than having a bad president.”213 This warning from Taibbi was echoed by another liberal critic of Trump—Harvard law professor Alan Dershowitz. In a talk show appearance on New York’s AM 970 radio on Sunday, November 10, 2019, Dershowitz said, “Whether you’re a Democrat or a Republican, whether you’re from New York or the middle of the country, you should be frightened by efforts to try to create crimes out of nothing. . . . It reminds me of what Lavrentiy Beria, the head of the KGB, said to Stalin. He said, ‘Show me the man, and I’ll find you the crime,’ by which he really meant, ‘I’ll make up the crime.’ And so the Democrats are now making up crimes.
David Horowitz (BLITZ: Trump Will Smash the Left and Win)
September 1995: Mark and I had our well documented book entitled TRANCE Formation of America published, complete with irrefutable graphic details which are in themselves evidence to present to Congress, all factions of law enforcement including the FBI, CIA, DIA, DEA, TBI, NSA, etc., all major news media groups, national and international human rights advocates, both American Psychological and Psychiatric Associations, the National Institute of Mental Health, and more… to no avail. TRANCE thoroughly exposes many of the perpe-TRAITORS and their agenda replete with names, which raises the question “why haven't we been sued?” The obvious answer is that the same “National Security Act” that continues to block our access to all avenues of justice and public exposure also prevents these criminals from inevitably bringing mind control to light through court procedures, an opportunity we would welcome. Meanwhile, as reported by both APAs, survivors of U.S. Government sponsored mind control began to surface all across our nation. The first to encounter the vast number of survivors were law enforcement and mental health professionals, and these professionals began to ask questions. in other countries, answers are being provided through somewhat less controlled media, reflecting the CIA's involvement in Project MK Ultra human rights atrocities. A television documentary entitled The Sleep Room aired across Canada by the Canadian Broadcast Corp. in the spring of 1998. Dr. Martin Orne, an associate boasted by Dr. William Mitchell M.D., Ph.D. who thrust Kelly into Vanderbilt's cover-up attempt (re: p.14), is named as an accomplice to Dr. Ewing Cameron's MK Ultra 'experiments' in Montreal, Quebec. Additionally, it should be known that Dr. Cameron went on to found the American Psychiatric Association, which has helped to maintain America's mental health profession in the dark ages of information control.
Cathy O'Brien (TRANCE Formation of America: True life story of a mind control slave)
To this point, Sen. Rand Paul of Kentucky has been the Republican flavor of the year. Events from the IRS scandal to NSA revelations to the Obamacare train wreck have corroborated libertarian suspicions of federal power. And Paul has shown serious populist skills in cultivating those fears for his political benefit. For a while, he succeeded in a difficult maneuver: Accepting the inheritance of his father's movement while distancing himself from the loonier aspects of his father's ideology. But now Rand Paul has fallen spectacularly off the tightrope. It turns out that a senior member of his Senate staff, Jack Hunter, has a history of neo-Confederate radio rants. And Paul has come to the defense of his aide. . . . This would not be the first time that Paul has heard secessionist talk in his circle of confederates--I mean, associates. His father has attacked Lincoln for causing a "senseless" war and ruling with an "iron fist." Others allied with Paulism in various think tanks and websites have accused Lincoln of mass murder and treason. For Rand Paul to categorically repudiate such views and all who hold them would be to excommunicate a good portion of his father's movement. This disdain for Lincoln is not a quirk or a coincidence. Paulism involves more than the repeal of Obamacare. It is a form of libertarianism that categorically objects to 150 years of expanding federal power. . . . Not all libertarians, of course, view Appomattox as a temporary setback. A libertarian debate on the topic: "Lincoln: Hero or Despot?" would be two-sided, lively and well attended. But Paulism is more than the political expression of the Austrian school of economics. It is a wildly ambitious ideology in which Hunter's neo-Confederate views are not uncommon. What does this mean for the GOP? It is a reminder that, however reassuring his manner, it is impossible for Rand Paul to join the Republican mainstream. The triumph of his ideas and movement would fundamentally shift the mainstream and demolish a century and a half of Republican political history. The GOP could no longer be the party of Reagan's internationalism or of Lincoln's belief in a strong union dedicated to civil rights.
Michael Gerson
This theme, this moral construct for evaluating one’s identity and worth, was one he repeatedly encountered on his intellectual path, including, he explained with a hint of embarrassment, from video games. The lesson Snowden had learned from immersion in video games, he said, was that just one person, even the most powerless, can confront great injustice. “The protagonist is often an ordinary person, who finds himself faced with grave injustices from powerful forces and has the choice to flee in fear or to fight for his beliefs. And history also shows that seemingly ordinary people who are sufficiently resolute about justice can triumph over the most formidable adversaries.” He wasn’t the first person I’d heard claiming video games had been instrumental in shaping their worldview. Years earlier, I might have scoffed, but I’d come to accept that, for Snowden’s generation, they played no less serious a role in molding political consciousness, moral reasoning, and an understanding of one’s place in the world than literature, television, and film. They, too, often present complex moral dilemmas and provoke contemplation, especially for people beginning to question what they’ve been taught. Snowden
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The National Security Agency is currently collecting the telephone records of millions of US customers of Verizon, one of America’s largest telecom providers, under a top secret court order issued in April. The order, a copy of which has been obtained by the Guardian, requires Verizon on an “ongoing, daily basis” to give the NSA information on all telephone calls in its systems, both within the US and between the US and other countries. The document shows for the first time that under the Obama administration the communication records of millions of US citizens are being collected indiscriminately and in bulk—regardless of whether they are suspected of any wrongdoing.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The goal was a U.S. Gestapo. Senator Ervin described the espionage squad inside the White House as a “gestapo mentality.” J. Edgar Hoover refused any part of the gestapo, saying the secret Domestic Intelligence operations “denied our civil liberties.” The Inter-Agency Group (IAG) on Domestic Intelligence and Internal Security includes members from the FBI, CIA, DIA, NSA, Counter-Intelligence agencies of the Army, Air Force, Navy and Police Departments.
Mae Brussell (The Essential Mae Brussell: Investigations of Fascism in America)
in the face of severe injustice, a refusal to dissent is the sign of a character flaw or moral failure.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
This key will give me access to two and a half thousand nuclear missiles. These are American missiles and they are on hair-trigger alert—meaning that they can be launched at a moment‟s notice. It is my intention to override the NSA‟s system and to fire twenty-five of those missiles at targets I have carefully chosen around the globe.
Anonymous
The NSA is the only branch of the government that actually listens to people.
Ziad K. Abdelnour
DB: That’s interesting. Because I work for a company that lives by the mantra of customer obsession.    AB: Yeah, but they know. DB: Do they? AB: Amazon? They know more than the NSA. The NSA is not permitted by law to know anything close to what Amazon knows. “Judging by your past purchases, we think you’d like….” You’re right! Oh my God!
David Blum (Anthony Bourdain: The Kindle Singles Interview (Kindle Single))
The hacking practice is quite widespread in its own right: one NSA document indicates that the agency has succeeded in infecting at least fifty thousand individual computers with a type of malware called “Quantum Insertion.” One map shows the places where such operations have been performed and the number of successful insertions:
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Not only was all this collaboration conducted with no transparency, but it contradicted public statements made by Skype. ACLU technology expert Chris Soghoian said the revelations would surprise many Skype customers. “In the past, Skype made affirmative promises to users about their inability to perform wiretaps,” he said. “It’s hard to square Microsoft’s secret collaboration with the NSA with its high-profile efforts to compete on privacy with Google.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
One NSA slide details PRISM’s special surveillance powers:
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Much of the Snowden archive revealed what can only be called economic espionage: eavesdropping and email interception aimed at the Brazilian oil giant Petrobras, economic conferences in Latin America, energy companies in Venezuela and Mexico, and spying by the NSA’s allies—including Canada, Norway, and Sweden—on the Brazilian Ministry of Mines and Energy and energy companies in several other countries.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Certain documents, such as the FISA court order allowing collection of telephone records and Obama’s presidential directive to prepare offensive cyber-operations, were among the US government’s most closely held secrets. Deciphering the archive and the NSA’s language
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The current administration’s legal “Czar” who goes by the name Cass Sunstein was recently appointed to serve on the “NSA Oversight Panel” despite the fact that two words “NSA” and “oversight” rarely if ever fit together. He also wrote a book called Conspiracy Theories and Other Dangerous Ideas to make sure that the academics and the American public dismiss so-called conspiracy theories about the JFK assassination and other American events of a largely fascist nature. Cass Sunstein claims that this sort of reportage only leads to discontented Americans who turn violent with their distrust.
Mae Brussell (The Essential Mae Brussell: Investigations of Fascism in America)
NSA has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
for a thirty-day period ending in February 2013, one unit of the NSA collected more than three billion pieces of communication data from US communication systems
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Contrary to the accepted premise—that radical dissent demonstrates a personality disorder—the opposite could be true: in the face of severe injustice, a refusal to dissent is the sign of a character
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The government tried to justify the secret NSA program by invoking exactly the kind of extreme theory of executive power that had motivated me to begin writing: the notion that the threat of terrorism vested the president with virtually unlimited authority to do anything to “keep the nation safe,” including the authority to break the law.
Anonymous
I realized,” he said, “that they were building a system whose goal was the elimination of all privacy, globally. To make it so that no one could communicate electronically without the NSA being able to collect, store, and analyze the communication.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
federal government is the third largest user of the polygraph test to detect lying. In 1982 22,597 tests were reported by various federal agencies.* Most were given to investigate a crime, except for the polygraph tests given by the National Security Agency (NSA) and the Central Intelligence Agency (CIA). These agencies use the polygraph for intelligence and counterintelligence investigations.
Paul Ekman (Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage (Revised Edition))
being debated by the UN that involved imposing new sanctions on Iran. A similar surveillance document from August 2010 reveals that the United States spied on eight members of
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
adviser, repeatedly requested that the NSA spy on the internal discussions of key member states to learn their negotiation strategies. A May 2010 SSO report
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA and the Surveillance State)
citizens, had been targeted as well. Still, the sheer scale of diplomatic surveillance the NSA has practiced is unusual and noteworthy. In addition to foreign
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The NSA is the definitive rogue agency: empowered to do whatever it wants with very little control, transparency, or accountability.
Anonymous
Agent Tanner sagte, dass die NSA sich etwas einfallen lasseb will. Anselm und Hannah haben sich eben spontan entschlossen, auf Weltreise zu gehen. Postkarten, E-mails, ja, sogar Telefonate von unterwegs sind kein Problem.
Martina André (Das Rätsel der Templer)
Mass surveillance by the state is therefore inherently repressive, even in the unlikely case that it is not abused by vindictive officials to do things like gain private information about political opponents. Regardless of how surveillance is used or abused, the limits it imposes on freedom are intrinsic to its existence.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The free press guarantee does not only protect corporate reporters but anyone engaged in journalism, whether employed or not.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
At least there is calm at home? Hardly: food, gas, and electricity prices are at near all-time highs; a stagnant economy in “recovery” that for most people outside of Wall Street remains recessionary; government soon to be run by executive orders; the end of any idea of national sovereignty or a southern border; the Ferguson riots and racial explosions revealing an America more divided than at any time since the 1970s; the buffoonish Missouri governor Nixon playing the Katrina role of a now imprisoned Ray Nagin. The alphabet soup of unresolved IRS, VA, NSA, and AP scandals; revolutionary, extra-legal justice meted out to Rick Perry; Benghazi coming back into the news; the little reported on drip-by-drip practical dissolution of Obamacare. 1979–80 seem calm in comparison. The chaos arises from a variety of causes, but one common denominator is that President Obama has not a clue how to deal with these crises.
Anonymous
the true measure of a society’s freedom is how it treats its dissidents and other marginalized groups, not how it treats good loyalists.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The collect-it-all system did nothing to detect, let alone disrupt, the 2012 Boston Marathon bombing. It did not detect the attempted Christmas-day bombing of a jetliner over Detroit, or the plan to blow up Times Square, or the plot to attack the New York City subway system—all of which were stopped by alert bystanders or traditional police powers.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Among other devices, the agency intercepts and tampers with routers and servers manufactured by Cisco to direct large amounts of Internet traffic back to the NSA’s repositories.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The Obama administration had waged what people across the political spectrum were calling an unprecedented war on whistle-blowers. The president, who had campaigned on a vow to have the “most transparent administration in history,” specifically pledging to protect whistleblowers, whom he hailed as “noble” and “courageous,” had done exactly the opposite. Obama’s administration has prosecuted more government leakers under the Espionage Act of 1917—a total of seven—than all previous administrations in US history combined: in fact, more than double that total.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
We are now shocked at the current spate of alphabetic scandals — IRS, AP, NSA, VA. But why are we surprised, given that Obama never told the truth about his relationships with the old terrorist Bill Ayers and former PLO ad hoc spokesman Rashid Khalidi, or about the creepy land deal with the crook Tony Rezko? If the Obama White House demonized the Tea Party as tea-baggers, or compared the Republican House opposition to terrorists and arsonists, why should we be astonished, given how he was elected to the U.S. Senate? Quite mysteriously, his primary opponent, Blair Hull, and his general-election opponent, Jack Ryan, both of whom were favored to win, had their confidential divorce records leaked. Their campaigns subsequently imploded.
Anonymous
If anything, the revelations about NSA spying on foreign leaders are less significant than the agency’s warrantless mass surveillance of whole populations. Countries have spied on heads of state for centuries, including allies. This is unremarkable, despite the great outcry that ensued when, for example, the world discovered that the NSA had for many years targeted the personal cell phone of German chancellor Angela Merkel. More remarkable is the fact that in country after country, revelations that the NSA was spying on hundreds of millions of their citizens produced little more than muted objections from their political leadership. True indignation came gushing forward only once those leaders understood that they, and not just their citizens, had been targeted as well.
Anonymous
Snowden had been clear from our first conversation about his rationale for distrusting the establishment media with his story, repeatedly referring to the New York Times’s concealment of NSA eavesdropping. He had come to believe that the paper’s concealment of that information may very well have changed the outcome of the 2004 election. “Hiding that story changed history,” he said.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Bush DOJ lawyer Jack Goldsmith hailed what he called “an underappreciated phenomenon: the patriotism of the American press,” meaning that the domestic media tend to show loyalty to their government’s agenda. He quoted Bush CIA and NSA director Michael Hayden, who noted that American journalists display “a willingness to work with us,” but with the foreign press, he added, “it’s very, very difficult.
Anonymous
To the extent that you have aided and abetted Snowden, even in his current movements, why shouldn’t you, Mr. Greenwald, be charged with a crime?
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
now I would almost arrest Glenn Greenwald, who’s the journalist who seems to want to help him get to Ecuador.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Time magazine’s Jay Carney and Richard Stengel are now in government while Obama aides David Axelrod and Robert Gibbs are commentators on MSNBC.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The email began: “The security of people’s communications is very important to me,
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The United States government has perfected a technological capability that enables us to monitor the messages that go through the air.… That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything—telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. —Senator Frank Church, Chair, Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, 1975
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA and the Surveillance State)
He had come to believe that the paper’s concealment of that information may very well have changed the outcome of the 2004 election. “Hiding that story changed history,” he said.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The agency regards itself as needing no specific justification to collect any particular electronic communication,
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
From its inception, FISA has been the ultimate rubber stamp. In its first twenty-four years, from 1978 to 2002, the court rejected a total of zero government applications while approving many thousands. In the subsequent decade, through 2012, the court has rejected just eleven government applications.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Taken in its entirety, the Snowden archive led to an ultimately simple conclusion: the US government had built a system that has as its goal the complete elimination of electronic privacy worldwide. Far from hyperbole, that is the literal, explicitly stated aim of the surveillance state: to collect, store, monitor, and analyze all electronic communication
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Encryption matters, and it is not just for spies and philanderers.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Expecting the US government to operate a massive surveillance machine in complete secrecy without falling prey to its temptations runs counter to every historical example and all available evidence about human nature.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
More remarkable is the fact that in country after country, revelations that the NSA was spying on hundreds of millions of their citizens produced little more than muted objections from their political leadership. True indignation came gushing forward only once those leaders understood that they, and not just their citizens, had been targeted as well.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
there is no check or limit on the NSA’s bulk collection of metadata, thanks to the government’s interpretation of the Patriot Act—an interpretation so broad that even the law’s original authors were shocked to learn how it was being used.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
was a full-throated harangue, a typical performance when American officials speak about a regime not aligned with the United States.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
the powerful and the powerless.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
While the NSA is officially a public agency, it has countless overlapping partnerships with private sector corporations, and many of its core functions have been outsourced.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
As the New Yorker’s Ryan Lizza put it in a December 2013 article, instead of providing oversight, the Senate committee more often “treats senior intelligence officials like matinée idols.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)