Nsa Quotes

We've searched our database for all the quotes and captions related to Nsa. Here they are! All 100 of them:

Foaly: Anyone see you come in here? Holly: The FBI, CIA, NSA, DEA, MI6. Oh, and the EIB. Foaly: The EIB? Holly: (smirking) Everyone in the building.
Eoin Colfer (Artemis Fowl Band 1-3)
As she had done when she introduced the US president in Berlin, she addressed him publicly with the informal du for the first time since the NSA controversy in 2013.
Claudia Clark (Dear Barack: The Extraordinary Partnership of Barack Obama and Angela Merkel)
Under observation, we act less free, which means we effectively are less free.
Edward Snowden
Ultimately, saying that you don't care about privacy because you have nothing to hide is no different from saying you don't care about freedom of speech because you have nothing to say.
Edward Snowden (Permanent Record)
No bird ever looked at a plane in envy
Iain S. Thomas (25 Love Poems for the NSA)
These programs were never about terrorism: they're about economic spying, social control, and diplomatic manipulation. They're about power.
Edward Snowden
The way things are supposed to work is that we're supposed to know virtually everything about what they [the government] do: that's why they're called public servants. They're supposed to know virtually nothing about what we do: that's why we're called private individuals.
Glenn Greenwald
Transparency is for those who carry out public duties and exercise public power. Privacy is for everyone else.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The NSA?" "Yeah, they called and offered to help out. Same software they use for enhancing spy satellite imagery." Venkat shrugged. "It's amazing how much red tape gets cut when everyone's rooting for one man to survive.
Andy Weir (The Martian)
But the true measure of a society’s freedom is how it treats its dissidents and other marginalized groups, not how it treats good loyalists.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The true measurement of a person’s worth isn’t what they say they believe in, but what they do in defense of those beliefs,” he said. “If you’re not acting on your beliefs, then they probably aren’t real.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
You can't get on Facebook and complain about the NSA's data mining operation - On Facebook - the most invasive, privacy harmful institution on the planet. It's like whining about a paper cut while swimming in a shark tank.
T. Rafael Cimino (Mid Ocean)
How hard do you think it'd be to hack into the database of a major research university?" Mac hesitated. "Since you're asking me on a cell phone, in front of God and the NSA- impossible.
Rob Thomas
Well, it is a photo taken from orbit,” Mindy said. “The NSA enhanced the image with the best software they have.” “Wait, what?” Venkat stammered. “The NSA?” “Yeah, they called and offered to help out.
Andy Weir (The Martian)
Like a black hole, NSA pulls in every signal that comes near, but no electron is ever allowed to escape.
James Bamford (The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America)
There are scores of people who have never recovered, or been recovered, from an FSB interrogation. They’re a hard organization to describe because nothing like the FSB exists in the USA. To get even remotely close, you’d have to ask the CIA to birth a seven-headed hydra with the faces of the FBI, DEA, NSA, Immigration, Border Patrol, Coast Guard, and the Navy Seals with a hangover and a grudge.
Tanya Thompson (Red Russia)
Democracy requires accountability and consent of the governed, which is only possible if citizens know what is being done in their name.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.
Edward Snowden
The true measurement of a person’s worth isn’t what they say they believe in, but what they do in defense of those beliefs,
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
CIA. NSA. FBI. DEA. ICE. Cartels. Mafia. Yakuza. Bratva
Meghan March (Ruthless King (Mount Trilogy, #1))
One of the most surreal aspects of the NSA stories based on the Snowden documents is how they made even the most paranoid conspiracy theorists seem like paragons of reason and common sense.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
The lesson for me was clear: national security officials do not like the light. They act abusively and thuggishly only when they believe they are safe, in the dark. Secrecy is the linchpin of abuse of power, we discovered, its enabling force. Transparency is the only real antidote.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The many pro-surveillance advocates I have debated since Snowden blew the whistle have been quick to echo Eric Schmidt’s view that privacy is for people who have something to hide. But none of them would willingly give me the passwords to their email accounts, or allow video cameras in their homes.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
We all instinctively understand that the private realm is where we can act, think, speak, write, experiment, and choose how to be, away from the judgmental eyes of others. Privacy is a core condition of being a free person.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
I was right outside the NSA [on 9/11], so I remember the tension on that day. I remember hearing on the radio, 'the plane's hitting,' and I remember thinking my grandfather, who worked for the FBI at the time, was in the Pentagon when the plane hit it...I take the threat of terrorism seriously, and I think we all do. And I think it's really disingenuous for the government to invoke and sort-of scandalize our memories to sort-of exploit the national trauma that we all suffered together and worked so hard to come through -- and to justify programs that have never been shown to keep us safe, but cost us liberties and freedoms that we don't need to give up, and that our Constitution says we should not give up.
Edward Snowden
the NSA lived by its motto: Everything is possible. The impossible just takes longer.
Dan Brown (Digital Fortress)
As former NSA general counsel Stewart Baker said, “Metadata absolutely tells you everything about somebody’s life. If you have enough metadata you don’t really need content.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
mass surveillance is a universal temptation for any unscrupulous power.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Being a patriot doesn't mean prioritizing service to government above all else. Being a patriot means knowing when to protect your country, knowing when to protect your Constitution, knowing when to protect your countrymen, from the violations of and encroachments of adversaries. And those adversaries don't have to be foreign countries.
Edward Snowden
Your nerve endings I know their plot To attack My never endings Until we fall asleep In each other’s arms
Iain S. Thomas (25 Love Poems for the NSA)
The NSA is correct, 1984 is now.
Michael Gurnow (The Edward Snowden Affair: Exposing the Politics and Media Behind the NSA Scandal)
Of course. NSA is rumored to tape record every transatlantic telephone conversation. Maybe they’d recorded this session.
Clifford Stoll (The Cuckoo's Egg)
In 2014, former NSA and CIA director Michael Hayden remarked, “We kill people based on metadata.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Children sniff out secrets better than the NSA.
Victor LaValle (The Changeling)
To permit surveillance to take root on the Internet would mean subjecting virtually all forms of human interaction, planning, and even thought itself to comprehensive state examination.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Jabba resembled a giant tadpole, like the cinematic creature for whom he was nicknamed, the man was a hairless spheroid. As resident guardian angel of all NSA computer systems, Jabba marched from department to department, tweaking, soldering, and reaffirming his credo that prevention was the best medicine. No NSA computer had ever been infected under Jabba's reign; he intended to keep it that way.
Dan Brown (Digital Fortress)
Even though we don't know which companies the NSA has compromised – or by what means – knowing that they could have compromised any of them is enough to make us mistrustful of all of them. This is going to make it hard for large companies like Google and Microsoft to get back the trust they lost. Even if they succeed in limiting government surveillance. Even if they succeed in improving their own internal security. The best they'll be able to say is: "We have secured ourselves from the NSA, except for the parts that we either don't know about or can't talk about.
Bruce Schneier
Almost as an article of faith, some individuals believe that conspiracies are either kooky fantasies or unimportant aberrations. To be sure, wacko conspiracy theories do exist. There are people who believe that the United States has been invaded by a secret United Nations army equipped with black helicopters, or that the country is secretly controlled by Jews or gays or feminists or black nationalists or communists or extraterrestrial aliens. But it does not logically follow that all conspiracies are imaginary. Conspiracy is a legitimate concept in law: the collusion of two or more people pursuing illegal means to effect some illegal or immoral end. People go to jail for committing conspiratorial acts. Conspiracies are a matter of public record, and some are of real political significance. The Watergate break-in was a conspiracy, as was the Watergate cover-up, which led to Nixon’s downfall. Iran-contra was a conspiracy of immense scope, much of it still uncovered. The savings and loan scandal was described by the Justice Department as “a thousand conspiracies of fraud, theft, and bribery,” the greatest financial crime in history. Often the term “conspiracy” is applied dismissively whenever one suggests that people who occupy positions of political and economic power are consciously dedicated to advancing their elite interests. Even when they openly profess their designs, there are those who deny that intent is involved. In 1994, the officers of the Federal Reserve announced they would pursue monetary policies designed to maintain a high level of unemployment in order to safeguard against “overheating” the economy. Like any creditor class, they preferred a deflationary course. When an acquaintance of mine mentioned this to friends, he was greeted skeptically, “Do you think the Fed bankers are deliberately trying to keep people unemployed?” In fact, not only did he think it, it was announced on the financial pages of the press. Still, his friends assumed he was imagining a conspiracy because he ascribed self-interested collusion to powerful people. At a World Affairs Council meeting in San Francisco, I remarked to a participant that U.S. leaders were pushing hard for the reinstatement of capitalism in the former communist countries. He said, “Do you really think they carry it to that level of conscious intent?” I pointed out it was not a conjecture on my part. They have repeatedly announced their commitment to seeing that “free-market reforms” are introduced in Eastern Europe. Their economic aid is channeled almost exclusively into the private sector. The same policy holds for the monies intended for other countries. Thus, as of the end of 1995, “more than $4.5 million U.S. aid to Haiti has been put on hold because the Aristide government has failed to make progress on a program to privatize state-owned companies” (New York Times 11/25/95). Those who suffer from conspiracy phobia are fond of saying: “Do you actually think there’s a group of people sitting around in a room plotting things?” For some reason that image is assumed to be so patently absurd as to invite only disclaimers. But where else would people of power get together – on park benches or carousels? Indeed, they meet in rooms: corporate boardrooms, Pentagon command rooms, at the Bohemian Grove, in the choice dining rooms at the best restaurants, resorts, hotels, and estates, in the many conference rooms at the White House, the NSA, the CIA, or wherever. And, yes, they consciously plot – though they call it “planning” and “strategizing” – and they do so in great secrecy, often resisting all efforts at public disclosure. No one confabulates and plans more than political and corporate elites and their hired specialists. To make the world safe for those who own it, politically active elements of the owning class have created a national security state that expends billions of dollars and enlists the efforts of vast numbers of people.
Michael Parenti (Dirty Truths)
The National Security Agency’s capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If a dictator ever took over, the N.S.A. could enable it to impose total tyranny, and there would be no way to fight back.
Frank Church
There is now the capacity to make tyranny total in America. Only law ensures that we never fall into that abyss—the abyss from which there is no return.
James Bamford (The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America)
I have been to the darkest corners of government, and what they fear is light.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA and the Surveillance State)
I'm sure I've had my phone tapped for years, I don't think it's a crime against humanity they just ought to quit doing it, god damn it.
Cornel West
Hat dich jemand reinkommen sehen?" "Ja, das FBI, die CIA, die NSA, die DEA und das MI6. Ach ja, und die GPB." "Die GPB?" "Gesamte Polizeibelegschaft.
Eoin Colfer (Artemis Fowl (Artemis Fowl, #1))
Never in his life had he hit a girl, nor would he. But, right now, he wanted to kick that NSA cutie in the ass cheek.
Shane Scollins (SAVIOR FREQUENCY (Frequency Series #1))
I think this mass surveillance by the NSA was never about terrorism: It's all about economic spying & social control. It's all about POWER.
Ziad K. Abdelnour
I inhaled slowly and thought about making a joke about how the NSA doesn’t really need to call anyone; they just interrupt while you’re already on the phone.
Penny Reid (Love Hacked (Knitting in the City, #3))
Cliff, I’d like to take over, but our charter prevents it. NSA can’t engage in domestic monitoring, even if we’re asked. That’s prison term stuff.
Clifford Stoll (The Cuckoo's Egg)
I feel like the NSA agent reading these emails has the wrong impression of us, Marianne wrote once. They probably don’t know about the time you didn’t invite me to the Debs.
Sally Rooney (Normal People)
The NSA employs more mathematicians, buys more computer hardware, and intercepts more messages than any other organization in the world.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Founded by President Truman at 12:01 A.M. on November 4, 1952, the NSA had been the most clandestine intelligence agency in the world for almost fifty years. The NSA's seven-page inception doctrine laid out a very concise agenda: to protect U.S. government communications and to intercept the communications of foreign powers. "The roof of the NSA's main operations building was littered with over five hundred antennas, including two large radomes that looked like enormous golf balls. The building itself was mammoth--over two million square feet, twice the size of CIA headquarters. Inside were eight million feet of telephone wire and eighty thousand square feet of permanently sealed windows.
Dan Brown
Marcia Wilson was a good example of Omega’s core strategy for creating a New World Order. It involved placing their people, or moles, in positions of power within the CIA, the NSA, the Pentagon, the White House and global organizations like the UN, the IMF and the World Bank. This enabled Omega to pull some of the strings of these organizations and to direct American, and world politics, to an extent.
James Morcan (The Ninth Orphan (The Orphan Trilogy, #1))
Converting the Internet into a system of surveillance thus guts it of its core potential. Worse, it turns the Internet into a tool of repression, threatening to produce the most extreme and oppressive weapon of state intrusion human history has ever seen.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
No matter the specific techniques involved, historically mass surveillance has had several constant attributes. Initially, it is always the country’s dissidents and marginalized who bear the brunt of the surveillance, leading those who support the government or are merely apathetic to mistakenly believe they are immune. And history shows that the mere existence of a mass surveillance apparatus, regardless of how it is used, is in itself sufficient to stifle dissent. A citizenry that is aware of always being watched quickly becomes a compliant and fearful one.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
When the NSA’s surveillance program was exposed by Edward Snowden’s revelations, high officials claimed that it had prevented fifty-four terrorist acts. On inquiry, that was whittled down to a dozen. A high-level government panel then discovered that there was actually only one case: someone had sent $8,500 to Somalia. That was the total yield of the huge assault on the Constitution and, of course, on others throughout the world.
Noam Chomsky (Who Rules the World? (American Empire Project))
While that thing was on, we ran a ridiculous amount of data through our servers.” “How much?” I asked. He looked exasperated. “Enough that I could make up some kind of strained analogy involving the contents of the Library of Congress and the number of pixels in all of the Lord of the Rings movies put together and how many phone calls the NSA intercepts in a single day and you would be like, ‘Holy shit, that’s a lot.’” “Holy shit, that’s a lot!” I exclaimed dutifully.
Neal Stephenson (The Rise and Fall of D.O.D.O. (D.O.D.O. #1))
the job of the press is to disprove the falsehoods that power invariably disseminates to protect itself.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Expose the Jesuit order and learn about the global genocide. Speak out, even when what you have to say is not popular.
John Reynaga
And in every instance, the motive is the same: suppressing dissent and mandating compliance.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Rich, famous, insider journalists do not want to subvert the status quo that so lavishly rewards them. Like all courtiers, they are eager to defend the system that vests them with their privileges and contemptuous of anyone who challenges that system.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
No matter the specific techniques involved, historically mass surveillance has had several constant attributes. Initially, it is always the country’s dissidents and marginalized who bear the brunt of the surveillance, leading those who support the government or are merely apathetic to mistakenly believe they are immune.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Those of us who fought the crypto wars, as we call them, thought we had won them in the 1990s. What the Snowden documents have shown us is that instead of dropping the notion of getting backdoor government access, the NSA and FBI just kept doing it in secret.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Through a carefully cultivated display of intimidation to anyone who contemplated a meaningful challenge, the government had striven to show people around the world that its power was constrained by neither law nor ethics, neither morality nor the Constitution: look what we can do and will do to those who impede our agenda.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
He and Marianne can only talk about it over email, using the same communication technologies they now know are under surveillance, and it feels at times like their relationship has been captured in a complex network of state power, that the network is a form of intelligence in itself, containing them both, and containing their feelings for one another. I feel like the NSA agent reading these emails has the wrong impression of us, Marianne wrote once. They probably don't know about the time you didn't invite me to the Debs.
Sally Rooney (Normal People)
Taken in its entirety, the Snowden archive led to an ultimately simple conclusion: the US government had built a system that has as its goal the complete elimination of electronic privacy worldwide. Far from hyperbole, that is the literal, explicitly stated aim of the surveillance state: to collect, store, monitor, and analyze all electronic communication by all people around the globe. The agency is devoted to one overarching mission: to prevent the slightest piece of electronic communication from evading its systemic grasp.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Objectivity” means nothing more than reflecting the biases and serving the interests of entrenched Washington. Opinions are problematic only when they deviate from the acceptable range of Washington orthodoxy.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA and the Surveillance State)
Nen flamujt e melankolise Ne vendin tone kudo valojne flamujt e nje melankolie te trishtueshme... ...dhe askush s'mund te thote se ketu rron nje popull qe nderton dicka te re. Aty ketu ne hijet e flamujve mund te shifet nje mund, nje perpjekje e madhe permbi vdekje per te pjelle dicka te madhe, per te qite ne drite nje xhind! Por,(o ironi) nga ajo perpjekje lind vetem nje mi. Dhe keshtu kjo komedi na plas diellin e gazit, nsa prej marazit pelcasim. Ne prakun e cdo banese ku ka ndonj shenj jetese valon nga nje flamur melankolie te trishtueshme.
Migjeni
Thanks to Edward Snowden and others, the great threat from the NSA surveillance is now more clearly understood. Current attacks on our liberties very greatly infringe the freedoms meant to be protected by the First and Fourth Amendments. If a whistle-blower reveals the truth about wrongful government actions, calls arise to charge him with treason for hating America. Allies become enemies when it becomes known that we spy on them as well, as it has now been revealed.
Ron Paul (Swords into Plowshares: A Life in Wartime and a Future of Peace and Prosperity)
the presumption is that the government, with rare exception, will not know anything that law-abiding citizens are doing. That is why we are called private individuals, functioning in our private capacity. Transparency is for those who carry out public duties and exercise public power. Privacy is for everyone else.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
For years, well before consumer tracking became the norm, Radio Shack stores would routinely ask their customers for their addresses and phone numbers. For a while I just refused, but that was socially awkward. Instead, I got in the habit of replying with “9800 Savage Road, Columbia, MD, 20755”: the address of the NSA.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Every time I do an interview people ask similar questions, such as "What is the most significant story that you have revealed?" […] There really is only one overarching point that all of these stories have revealed, and that is–and I say this without the slightest bit of hyperbole or melodrama; it's not metaphorical and it's not figurative; it is literally true–that the goal of the NSA and it's five eyes partners in the English speaking world–Canada, New Zealand, Australia and especially the UK–is to eliminate privacy globally, to ensure that there could be no human communications that occur electronically, that evades their surveillance net; they want to make sure that all forms of human communications by telephone or by Internet, and all online activities are collected, monitored, stored and analyzed by that agency and by their allies. That means, to describe that is to describe a ubiquitous surveillance state; you don't need hyperbole to make that claim, and you do not need to believe me when I say that that's their goal. Document after document within the archive that Edward Snowden provided us declare that to be their goal. They are obsessed with searching out any small little premise of the planet where some form of communications might take place without they being able to invade it.
Glenn Greenwald
Quinns always come at half price, about half the time, and half-naked, even during the colder half of winter. A Quinn is like a queen, but draggier, and cheaper to buy and use for personal gain, unless you’re suspicious that you’re poor and illiterate like Jarod Kintz, in which case Quinns could be the spirits of your dead relatives, come to haunt you until you gather a massive fortune through selling books on the internet, to send some back in time through a portal you bought from the NSA, so they would have lived better lives without having to move a finger for their fortune. Oh, yah, and since they aren’t - they’re blue, like smurfs, yet they turn purple whenever tickled on the belly, which is something they seem to rather dislike, since they start biting and scratching when it happens, for no good reason, I might add.
Will Advise (Nothing is here...)
A citizenry that is aware of always being watched quickly becomes a compliant and fearful one.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Privacy is a core condition of being a free person.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Once I was decapited a black out in an avalanche I went from human to animal please turn me back
pleasefindthis (25 Love Poems for the NSA)
The Internet “is a TV that watches you,” he said, a technology “governments are abusing … to extend their powers beyond what is necessary and appropriate.
The Washington Post (NSA Secrets: Government Spying in the Internet Age)
US journalists, for years overwhelmingly enamored of Barack Obama, were now commonly speaking of him in these terms: as some sort of grave menace to press freedoms, the most repressive leader in this regard since Richard Nixon. That was quite a remarkable turn for a politician who was ushered into power vowing “the most transparent administration in US history.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Somewhere across the interstate Exposure to the drug trade of emotions And the tsunami and typhoon of feelings Has made us all cops and robbers Of what we keep in the cavities In our chests
Iain S. Thomas (25 Love Poems for the NSA)
The Obama administration, which has brought more prosecutions against leakers than all prior presidencies combined, has sought to create a climate of fear that would stifle any attempts at whistle-blowing. But Snowden destroyed that template. He has managed to remain free, outside the grasp of the United States; what's more, he has refused to remain in hiding but proudly came forward and identified himself. As a result, the public image of him is not a convict in orange jumpsuit and shackles but and independent, articulate figure who can speak for himself, explaining what he did and why.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Above even our physical well-being, a central value is keeping the state out of the private realm—our “persons, houses, papers, and effects,” as the Fourth Amendment puts it. We do so precisely because that realm is the crucible of so many of the attributes typically associated with the quality of life—creativity, exploration, intimacy.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The NSA may be spying on our every word, but to judge by the repeated failures of American foreign policy, nobody in Washington knows what to do with all the data. Never in history did a government know so much about what’s going on in the world – yet few empires have botched things up as clumsily as the contemporary United States. It’s like a poker player who knows what cards his opponents hold, yet somehow still manages to lose round after round.
Yuval Noah Harari (Homo Deus: A Brief History of Tomorrow)
A couple of years ago, I ran into someone at a trade show who was representing the NSA (National Security Agency). He mentioned to someone else in passing that he'd written a filter program in Perl, so without telling him who I was, I asked him if I could tell people that the NSA uses Perl. His response was, "Doesn't everyone?" So now I don't tell people the NSA uses Perl. I merely tell people the NSA thinks everyone uses Perl. They should know, after all.
Larry Wall
The NSA had enormous resources and used a vast network in order to capture a large number of mobile conversations in a certain region simultaneously . Each individual call was separated and processed digitally by computers programmed to react to certain words, such as terrorist or Kalashnikov. If such a word occurred, the computer automatically sent an alarm, which meant that some operator would go in manually and listen to the conversation to decide whether it was of interest or not.
Stieg Larsson (The Girl Who Kicked the Hornet's Nest (Millennium, #3))
Under a $652-million clandestine program code named GENIE, the NSA, CIA, and special military operatives have planted covert digital bugs in tens of thousands of computers, routers, and firewalls around the world to conduct computer network exploitation, or CNE. Some are planted remotely, but others require physical access to install through so-called interdiction—the CIA or FBI intercepts shipments of hardware from manufacturers and retailers in order to plant malware in them or install doctored chips before they reach the customer.
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
While I pray that public awareness and debate will lead to reform, bear in mind that the policies of men change in time, and even the Constitution is subverted when the appetites of power demand it. In words from history: Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography. I instantly recognized the last sentence as a play on a Thomas Jefferson quote from 1798 that I often cited in my writing: “In questions of power, then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
He shook his head no and said, “It is now among us.” Roark also pressed him on the limits of the program, and Hayden suggested that the only real limit had been imposed by Rep. Nancy Pelosi in exchange for going along with the program and maintaining her silence about it. Hayden told Roark that “Pelosi had repeatedly warned him not to go beyond the CT [counterterrorism] target, and for now they were adhering to that.” In other words, the Bush administration and NSA eventually wanted to use the domestic spying program for purposes that had nothing to do with the global war on terror.
James Risen (Pay Any Price: Greed, Power, and Endless War)
How did the American people ever reach this point where they believe that US aggression in the Middle East will make us safe when it does the opposite? How did the American people ever reach the point where they believe that fighting unconstitutional wars is required to protect our freedoms and our Constitution? Why do we allow the NSA, CIA, FBI, TSA, etc. to destroy our liberty at home, as part of the Global War on Terror, with a pretext that they are preserving our liberty? Why are the lying politicians reelected and allowed to bankrupt our country, destroy our money, and enter wars without the proper consent? Why do the American people suffer in silence and not scream “Enough is enough!”? We’ve had enough of the “humanitarian do-gooders” and the proponents of “American exceptionalism” who give us nothing but war, economic suffering, and less freedom. This can and must be stopped.
Ron Paul (Swords into Plowshares: A Life in Wartime and a Future of Peace and Prosperity)
It’s crucial to understand that ordinarily the FBI applies for a wiretap separately from the National Security Agency. The NSA had tapped my phones for years, going back to the 1993 World Trade Center attack. But those wire taps would not automatically get shared with the FBI, unless the Intelligence Community referred my activities for a criminal investigation. The FBI took no such action. Instead—by coincidence I’m sure, the FBI started its phone taps exactly when the Senate Foreign Relations Committee planned a series of hearings on Iraq in late July, 2002.212 That timing suggests the FBI wanted to monitor what Congress would learn about the realities of Pre-War Intelligence, which contradicted everything the White House was preaching on FOX News and CNN. In which case, the Justice Department discovered that I told Congress a lot—and Congress rewarded the White House by pretending that I had not said a word. But phone taps don’t lie. Numerous phone conversations with Congressional offices show that I identified myself as one of the few Assets covering Iraq.213 Some of my calls described the peace framework, assuring Congressional staffers that diplomacy could achieve the full scope of results sought by U.S policymakers.
Susan Lindauer (EXTREME PREJUDICE: The Terrifying Story of the Patriot Act and the Cover Ups of 9/11 and Iraq)
Americans now considered the danger of surveillance of greater concern than the danger of terrorism: Overall, 47% say their greater concern about government anti-terrorism policies is that they have gone too far in restricting the average person’s civil liberties, while 35% say they are more concerned that policies have not gone far enough to protect the country. This is the first time in Pew Research polling that more have expressed concern over civil liberties than protection from terrorism since the question was first asked in 2004.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The ability to eavesdrop on people's communications vests immense power in those who do it. And unless such power is held in check by rigorous oversight and accountability, it is almost certain to be abused. Expecting the US government to operate a massive surveillance machine in complete secrecy without falling prey to its temptations runs counter to every historical example and all available evidence about human nature.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
The transition from foreign enemies to domestic enemies is a natural sequence when safety is emphasized over liberty. It involves the FISA court, PATRIOT Act authority, out of control NSA surveillance, and enthusiastic presidential use of the Espionage Act of 1917 to suppress and intimidate truth-tellers and whistle-blowers. We have an FBI that participates in and encourages the process by breaking laws in its sting operations and entrapments. Plus, there are illegal seizures of property at all levels of government. Property confiscated is not turned over to general government revenue. Instead, it automatically is put in the treasury of the policing organization that did the confiscating. This process is dangerous; it systematically undermines our liberty while providing funding and perverse incentives for organizations that do the policing. This brings to mind the CIA using drug money to finance secret activities during Iran-Contra.
Ron Paul (Swords into Plowshares: A Life in Wartime and a Future of Peace and Prosperity)
The answer was Stellar Wind. The NSA would eavesdrop freely against Americans and aliens in the United States without probable cause or search warrants. It would mine and assay the electronic records of millions of telephone conversations—both callers and receivers—and the subject lines of e-mails, including names and Internet addresses. Then it would send the refined intelligence to the Bureau for action. Stellar Wind resurrected Cold War tactics with twenty-first-century technology. It let the FBI work with the NSA outside of the limits of the law. As Cheney knew from his days at the White House in the wake of Watergate, the NSA and the FBI had worked that way up until 1972, when the Supreme Court unanimously outlawed warrantless wiretaps. Stellar Wind blew past the Supreme Court on the authority of a dubious opinion sent to the White House the week that the Patriot Act became law. It came from John Yoo, a thirty-four-year-old lawyer in the Justice Department’s Office of Legal Counsel who had clerked for Justice Clarence Thomas. Yoo wrote that the Constitution’s protections against warrantless searches and seizures did not apply to military operations in the United States. The NSA was a military agency; Congress had authorized Bush to use military force; therefore he had the power to use the NSA against anyone anywhere in America. The president was “free from the constraints of the Fourth Amendment,” Yoo wrote. So the FBI would be free as well.
Tim Weiner (Enemies: A History of the FBI)
All of the evidence highlights the implicit bargain that is offered to citizens: pose no challenge and you have nothing to worry about. Mind your own business, and support or at least tolerate what we do, and you’ll be fine. Put differently, you must refrain from provoking the authority that wields surveillance powers if you wish to be deemed free of wrongdoing. This is a deal that invites passivity, obedience, and conformity. The safest course, the way to ensure being “left alone,” is to remain quiet, unthreatening, and compliant.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Depending on the contemporary mood, Orwell oscillates from Saint George to George the Seer to George the Sage. What other thinker has been both so fervidly claimed and derided by both the left and right? Who else except Kafka do we credit with having seen the sinister future? When the NSA spying scandal broke in June, Amazon sales of Orwell’s Nineteen Eighty-Four vaulted more than 6000 percent. The connection of Big Brother with the NSA might have been hysterical and spurious, but it was also testament to our sentimental, kneejerk affection for Orwell, to the fact that he remains the default scribe whenever our paranoia is fondled by the ominous machinations of realpolitik. The utter clarity and goodness of his intellect seem something of a miracle when one considers how many of his fellow writers botched the most pressing moral and political tests of their time. He could smell bullshit and blood a continent away: When a passel of leftist intellectuals was hailing the Soviet Union as humankind’s only hope, Orwell was persistent in pointing out that Stalin was a monocratic lunatic.
William Giraldi
Even more confused than before, I started backing up. I’d go around and get in through the kitchen; David and Raquel had to know what was going on. Unfortunately for all of us, that was when Lend came out the front door, immediately collapsed with a thunk that made me cringe, and—perfect—went completely transparent. The police officers stopped fighting, every eye glued on my boyfriend, now essentially invisible other than this T-shirt and flannel pajama pants. “Okay,” I said, putting my hands on my hips. “No. This is unacceptable. I don’t care what the bleep is going on, we’re going to get it settled immediately or I swear I will give you all to the Dark Queen and let her feed on your dreams for the rest of eternity.” Every head turned my direction, their faces a portrait of shock and disbelief. “What, you’ve never seen a boy made of water before? Yawn. Go down to the pond—it’ll really blow your mind.” One close to the front—barrel-chested, middle-aged man with salt-and-pepper hair and a thick mustache—shook his head as though trying to clear it. “Are you Evelyn Green?” “Sort of. Mostly. I mean, legally. Again, sort of.” He tried to look at me, but his eyes kept drifting back to Lend. “You’re under—We’re here to—Could you please come with us?” I rolled my eyes. “No, I couldn’t. You’re last place in a very long line of people who want me right now. Besides, I haven’t done anything.” “Actually,” said a painfully tall and thin officer with a voice that struggled between tenor and bass but really sounded like a dog with something caught in its throat, “you’re wanted for terrorism.” He shrugged apologetically. “We’re supposed to take you into NSA headquarters.” “I think you have the wrong acronym there,” I said. This had Anne-Whatever Whatever written all over it.
Kiersten White (Endlessly (Paranormalcy, #3))
Roosevelt fought hard for the United States to host the opening session [of the United Nations]; it seemed a magnanimous gesture to most of the delegates. But the real reason was to better enable the United States to eavesdrop on its guests. Coded messages between the foreign delegations and their distant capitals passed through U.S. telegraph lines in San Francisco. With wartime censorship laws still in effect, Western Union and the other commercial telegraph companies were required to pass on both coded and uncoded telegrams to U.S. Army codebreakers. Once the signals were captured, a specially designed time-delay device activated to allow recorders to be switched on. Devices were also developed to divert a single signal to several receivers. The intercepts were then forwarded to Arlington Hall, headquarters of the Army codebreakers, over forty-six special secure teletype lines. By the summer of 1945 the average number of daily messages had grown to 289,802, from only 46,865 in February 1943. The same soldiers who only a few weeks earlier had been deciphering German battle plans were now unraveling the codes and ciphers wound tightly around Argentine negotiating points. During the San Francisco Conference, for example, American codebreakers were reading messages sent to and from the French delegation, which was using the Hagelin M-209, a complex six-wheel cipher machine broken by the Army Security Agency during the war. The decrypts revealed how desperate France had become to maintain its image as a major world power after the war. On April 29, for example, Fouques Duparc, the secretary general of the French delegation, complained in an encrypted note to General Charles de Gaulle in Paris that France was not chosen to be one of the "inviting powers" to the conference. "Our inclusion among the sponsoring powers," he wrote, "would have signified, in the eyes of all, our return to our traditional place in the world." In charge of the San Francisco eavesdropping and codebreaking operation was Lieutenant Colonel Frank B. Rowlett, the protégé of William F. Friedman. Rowlett was relieved when the conference finally ended, and he considered it a great success. "Pressure of work due to the San Francisco Conference has at last abated," he wrote, "and the 24-hour day has been shortened. The feeling in the Branch is that the success of the Conference may owe a great deal to its contribution." The San Francisco Conference served as an important demonstration of the usefulness of peacetime signals intelligence. Impressive was not just the volume of messages intercepted but also the wide range of countries whose secrets could be read. Messages from Colombia provided details on quiet disagreements between Russia and its satellite nations as well as on "Russia's prejudice toward the Latin American countries." Spanish decrypts indicated that their diplomats in San Francisco were warned to oppose a number of Russian moves: "Red maneuver . . . must be stopped at once," said one. A Czechoslovakian message indicated that nation's opposition to the admission of Argentina to the UN. From the very moment of its birth, the United Nations was a microcosm of East-West spying. Just as with the founding conference, the United States pushed hard to locate the organization on American soil, largely to accommodate the eavesdroppers and codebreakers of NSA and its predecessors.
James Bamford (Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century)
Following someone covertly, either on foot or by car, costs around $175,000 per month—primarily for the salary of the agents doing the following. But if the police can place a tracker in the suspect’s car, or use a fake cell tower device to fool the suspect’s cell phone into giving up its location information, the cost drops to about $70,000 per month, because it only requires one agent. And if the police can hide a GPS receiver in the suspect’s car, suddenly the price drops to about $150 per month—mostly for the surreptitious installation of the device. Getting location information from the suspect’s cell provider is even cheaper: Sprint charges law enforcement only $30 per month. The difference is between fixed and marginal costs. If a police department performs surveillance on foot, following two people costs twice as much as following one person. But with GPS or cell phone surveillance, the cost is primarily for setting up the system. Once it is in place, the additional marginal cost of following one, ten, or a thousand more people is minimal. Or, once someone spends the money designing and building a telephone eavesdropping system that collects and analyzes all the voice calls in Afghanistan, as the NSA did to help defend US soldiers from improvised explosive devices, it’s cheap and easy to deploy that same technology against the telephone networks of other countries.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Lavabit was an e-mail service that offered more security privacy than the large corporate e-mail services most of us use. It was a small company, owned and operated by a programmer named Ladar Levison, and it was popular among the tech-savvy. It had half a million users, Edward Snowden amongst them. Soon after Snowden fled to Hong Kong in 2013, Levison received a National Security Letter demanding that the company turn over the master encryption key that protected all of Lavabit’s users—and then not tell any of its customers that they could be monitored. Levison fought this order in court, and when it became clear that he had lost, he shut down his service rather than deceive and compromise his customers. The moral is clear. If you run a business, and the FBI or the NSA wants to turn it into a mass surveillance tool, it believes that it is entitled to do so, solely on its own authority. The agency can force you to modify your system. It can do it all in secret and then force your business to keep that secret. Once it does that, you no longer control that part of your business. If you’re a large company, you can’t shut it down. You can’t realistically terminate part of your service. In a very real sense, it is not your business anymore. It has become an arm of the vast US surveillance apparatus, and if your interest conflicts with the agency’s, the agency wins. Your business has been commandeered.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Most people remember COINTELPRO from the days of the Black Panthers, Yippies, and other revolutionary groups who threatened our government during the civil rights movement and the Vietnam war. Sensing that these groups might incite American citizens into radical action, the FBI sent in agents to agitate members of these various groups, often pitting them against each other through various forms of subterfuge, such as blackmail. It appears that the CIA, FBI, and NSA are now sending their goons into the metaphysical marketplace, making sure that people who think they are aspiring to higher and positively transformative things are, in reality, only becoming more self-indulgent, disconnected, and confused. The biggest influx of these agents occurred during the blossoming of the "human potential" movement in the early '70s, through such institutions as Esalen. Legions of people threw away their protest banners and followed their bliss during a time when directly addressing the socio-political problems of the day was imperative. Since then, the emphasis on personal development - and more recently, the You Create Your Own Reality movement - a significant segment of the population has been brainwashed into disdaining all socio-political issues. For what better way to disempower people than to have them focus on their personal evolution at the expense of their families, communities, and the countries they live in?
David Icke
By tracing the early history of USCYBERCOM it is possible to understand some of the reasons why the military has focused almost completely on network defense and cyber attack while being unaware of the need to address the vulnerabilities in systems that could be exploited in future conflicts against technologically capable adversaries. It is a problem mirrored in most organizations. The network security staff are separate from the endpoint security staff who manage desktops through patch and vulnerability management tools and ensure that software and anti-virus signatures are up to date. Meanwhile, the development teams that create new applications, web services, and digital business ventures, work completely on their own with little concern for security. The analogous behavior observed in the military is the creation of new weapons systems, ISR platforms, precision targeting, and C2 capabilities without ensuring that they are resistant to the types of attacks that USCYBERCOM and the NSA have been researching and deploying. USCYBERCOM had its genesis in NCW thinking. First the military worked to participate in the information revolution by joining their networks together. Then it recognized the need for protecting those networks, now deemed cyberspace. The concept that a strong defense requires a strong offense, carried over from missile defense and Cold War strategies, led to a focus on network attack and less emphasis on improving resiliency of computing platforms and weapons systems.
Richard Stiennon (There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar)
Hinzu kommt der Ton, in dem die Medien des Establishments über Fehlverhalten der Regierung berichten. Die journalistische Kultur in den USA gebietet es, dass Reporter jegliche eindeutige oder konkrete Aussage vermeiden und auch noch so fragwürdige Behauptungen der Regierung in ihrer Berichterstattung berücksichtigen. Stattdessen benutzen sie eine Sprache, die der eigene Kolumnist der Washington Post, Erik Wemple, als "politisch schwer gemäßigt" verspottet: niemals etwas Eindeutiges sagen, sondern sowohl die Rechtfertigungen der Regierung als auch die konkreten Tatsachen in der gleichen Glaubwürdigkeit darstellen, was insgesamt den Effekt hat, dass Enthüllungen verwässert und zu einem häufig ebenso zusammenhang- wie belanglosen Brei verquirlt werden. Vor allem messen sie Behauptungen von offizieller Seite stets großes Gewicht bei, selbst wenn diese schlicht unwahr oder absichtlich falsch sind. Ebendieser ängstliche, servile Journalismus war es, der die Times, die Post und viele andere Medien veranlasste, in ihren Berichten über die Verhörmethoden während der Regierung Bush das Wort "Folter" tunlichst zu vermeiden, obwohl sie nicht das geringste Problem damit hatten, wenn die Regierung eines anderen Staates auf der Welt exakt die gleichen Methoden einsetzte.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)