Freelance NSA Spies Private Conversations

NSA Spies

NSA Spies

Thanks to Edward Snowden, we know that the National Security Agency collects the phone records of every American in order to keep the country safe from terrorism. But for the past eight months a group of artists claiming to work for the NSA on “a freelance, pro bono basis” have been recording people’s private conversations in popular bars, restaurants, and gyms in Lower Manhattan to ensure that no actionable intelligence falls through the cracks.

“We’re looking for terrorism, we’re looking for signs of plots and schemes that could put the homeland at risk,” one of the group’s “agents” tells us.

The project’s website, We Are Always Listening, includes snippets of actual conversations recorded by tiny, hidden tape recorders placed in The Brindle Room, Café Mogador, and the Crunch Gym in Union Square, among other popular public spaces.

In the recordings, a group of men talk about how a friend is “trying too hard to be one of us,” a woman complains about paying more than $2,000/month in rent, and a man describes a former boyfriend’s fetish: “He wanted me to like, fake double over in pain. Like we’re doing a scene from Batman Returns.”

None of the recordings contain any last names or other forms of information that would allow the people in the recordings to be directly identified, but first names flow freely.

“The reason we broadcast small, small, small, fractions of what we’ve gathered is because we’ve also heard members of the American public say they want a more transparent window into how data is collected,” said the “agent,” who asked to speak anonymously because New York State law requires the consent of at least one party in order to record a conversation (as Governor Cuomo famously discovered).

“Our agents would dispute that having a conversation at a restaurant or a gym is private. There should not be an assumption of privacy.”

The Manhattan DA’s office declined to comment on the group’s activities.

The project is seemingly designed to shake Americans (and, based on the locations the group placed their recorders, the Downtown bourgeoisie) out of their torpor with respect to how the NSA collects data and the federal government’s reliance on millions of independent contractors with security clearances.

“We imagine people are fine with this type of surveillance,” the “agent” said, tongue firmly in cheek. “The general public has mostly spoken in a unified voice saying, well, it’s just what you need to do to keep the country safe.”

For those who believe that posting audio of private conversations online is wrong, or that it surpasses what even the NSA considers appropriate, a button marked “Angry?” on the group’s website directs users to the ACLU’s website that allows you to contact your federal representatives and urge them to kill the portion of the Patriot Act that allows for the NSA’s blanket surveillance (the Senate recently voted to block a bill from the House designed to curtail the government’s collection of phone data).

The “agent” told us that New Yorkers should expect more leaked conversations. If you’ve hung out at 61 Local in Cobble Hill recently, you might want to keep your eye on the group’s website: a tape recorder has been listening there for some time.

 

Source:  gothamist.com

FBI’s Secretive Surveillance Unit Can Spy on Skype Communications

FBI’s New Secretive Surveillance Unit Can Spy on Skype and Wireless Communications:

 

FBI’s New Secretive Surveillance Unit Can Spy on Skype and Wireless Communicationsq

FBI’s New Secretive Surveillance Unit Can Spy on Skype and Wireless Communications

 

 

The FBI has recently formed a secretive surveillance unit with an ambitious goal: to invent technology that will let police more readily eavesdrop on Internet and wireless communications.

The establishment of the Quantico, VA-based unit, which is also staffed by agents from the U.S. Marshals Service and the Drug Enforcement Agency, is a response to technological developments that FBI officials believe outpace law enforcement’s ability to listen in on private communications.

While the FBI has been tight-lipped about the creation of its Domestic Communications Assistance Center, or DCAC — it declined to respond to requests made two days ago about who’s running it, for instance — CNET has pieced together information about its operations through interviews and a review of internal government documents.

DCAC’s mandate is broad, covering everything from trying to intercept and decode Skype conversations to building custom wiretap hardware or analyzing the gigabytes of data that a wireless provider or social network might turn over in response to a court order…

Congress doesn’t know how NSA works

Congress NSA doesn't works

Congress NSA doesn’t works

While the president and the intelligence community cling to “Congressional oversight” as a justficiation for the pervasive intelligence-gathering programs in place within the US, members of Congress theselves are saying that they don’t have the information they need to exercise real authority over the NSA. A recent report in The Guardian quotes two House members, Morgan Griffith (R-VA) and Alan Grayson (D-FL), who have both requested information about the agency and its programs from the House Intelligence Committee, only to be rebuffed.

In a June 25th request, Rep. Griffith asked the committee for the “classified FISA court order(s)” discussed on Meet the Press the previous weekend — a 2011 opinion holding that many of the NSA’s programs under the FISA Amendments Act were unconstitutitional. Weeks later he requested additional information surrounding Yahoo’s legal challenge to the NSA’s PRISM program and Verizon’s supplying of customer metadata to government intelligence agencies. More than six weeks since the first letter, Griffith still hasn’t received a response.

In Rep. Grayson’s case, the committee did sometimes respond to his requests for information. “The transcript is classified,” read one such reply to a request for the text from a vote — itself a decision to refuse an earlier request for information. So far, neither Griffith nor Grayson have received the information they requested.

Adding to the overall lack of oversight, media reports containing classified information are similarly barred from Congress. Last month, Grayson attempted to circulate slides published by The Guardian only to be told that he could face sanctions because the material they contained was still classified, echoing the Obama administration’s 2010 decision to ban the WikiLeaks website from federal computers while the diplomatic cables it sought to block access to were being published in major newspapers. Expressing frustration at the House Intelligence Committee, Rep. Griffith said, “my oath is to make informed decisions, and I can’t do my job when I can’t get even the most basic information about these programs.”

NSA

Facebook Tell’s Users They Are Being Spied On

Facebook to Tell Users They Are Being Tracked

Facebook to Tell Users They Are Being Tracked

Facebook to Tell Users They Are Being Tracked

Facebook has agreed to be transparent about, well, the obvious: You are being tracked so advertisers can better aim at you, and you can opt out if you make the effort. The announcement came Monday as part of the company’s agreement with the Council of Better Business Bureau. The agreement applies to ads that are shown to Facebook users, based on what else they have browsed on the Web. Let’s say you have looked at little girls’ party dresses on an unrelated e-commerce site. When you log on to Facebook, you could be tempted with a dress that you didn’t quite buy; it might even nudge you to make the purchase “for your darling daughter.” Now, if you hover over one of those ads with your mouse, a grey-blue icon will pop up alerting you to the fact that you’re being tracked. It remains unclear whether this notification would satisfy either privacy advocates or government regulators who are pressing Web companies to make it easier for users to avoid being tracked by marketers. Jeffrey Chester of the Washington-based Center for Digital Democracy panned the new initiative as inadequate. “It’s time for Facebook to face up to informing users in clear black-and-white — not grey — about how it harvests its user information,” he said in an e-mail. You can opt out of being tracked, one ad-serving company at a time. Facebook joins with several third parties to serve you those ads, on behalf of brands. The company declined to say how many such companies it joined with, only that there were in the dozens. You can also choose to hide ads from a particular brand. Facebook has always allowed users to do this; the only change is that it will henceforth nudge you with a new icon. “At Facebook, we work hard to build transparency and control into each of our products, including our advertising offerings,” the company said in an e-mailed statement attributable to its chief privacy officer, Erin Egan. Advertising is the bread-and-butter of all Web services, including Facebook. Faced with pressure to gin up profits for its public investors, Facebook has in recent months refined its aimed advertising efforts. The company earned $5 billion in advertising revenue last year. The online ad industry wants a system of self-regulation rather than by government fiat.

WIKILEAKS: Surveillance Cameras Around Country Used As Huge Spy Network

WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network:

WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network

WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network

 

The U.S. cable networks won’t be covering this one tonight (not accurately, anyway), but Trapwire is making the rounds on social media today—it reportedly became a Trending hashtag on Twitter earlier in the day. Trapwire is the name of a program revealed in the latest Wikileaks bonanza—it is the mother of all leaks, by the way. Trapwire would make something like disclosure of UFO contact or imminent failure of a major U.S. bank fairly boring news by comparison. And someone out there seems to be quite disappointed that word is getting out so swiftly; the Wikileaks web site is reportedly sustaining 10GB worth of DDoS attacks each second, which is massive. Anyway, here’s what Trapwire is, according to Russian-state owned media network RT (apologies for citing “foreign media”… if we had a free press, I’d be citing something published here by an American media conglomerate): “Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology—and have installed it across the U.S. under the radar of most Americans, according to emails hacked by Anonymous. Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented. The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.” So: those spooky new “circular” dark globe cameras installed in your neighborhood park, town, or city—they aren’t just passively monitoring. They’re plugged into Trapwire and they are potentially monitoring every single person via facial recognition. In related news, the Obama administration is fighting in federal court this week for the ability to imprison American citizens under NDAA’s indefinite detention provisions—and anyone else—without charge or trial, on suspicion alone. So we have a widespread network of surveillance cameras across America monitoring us and reporting suspicious activity back to a centralized analysis center, mixed in with the ability to imprison people via military force on the basis of suspicious activity alone. I don’t see how that could possibly go wrong. Nope, not at all. We all know the government, and algorithmic computer programs, never make mistakes. Here’s what is also so disturbing about this whole NDAA business, according to Tangerine Bolen’s piece in the Guardian: “This past week’s hearing was even more terrifying. Government attorneys again, in this hearing, presented no evidence to support their position and brought forth no witnesses. Most incredibly, Obama’s attorneys refused to assure the court, when questioned, that the NDAA’s section 1021 – the provision that permits reporters and others who have not committed crimes to be detained without trial – has not been applied by the U.S. government anywhere in the world after Judge Forrest’s injunction. In other words, they were telling a U.S. federal judge that they could not, or would not, state whether Obama’s government had complied with the legal injunction that she had laid down before them. To this, Judge Forrest responded that if the provision had indeed been applied, the United States government would be in contempt of court.”

Ultimate spy machine for the U.S. Government

Hard Drives in computers the Ultimate Spying Machine that can be used against you:

Hard Drives in computers the Ultimate Spying Machine that can be used against you

Hard Drives in computers the Ultimate Spying Machine that can be used against you

You can be a newbie to computers or a advanced IT Expert, Technician or even a hacker but many don’t even realize that their computers are already an ultimate spy machine for the U.S. Government, State Governments and their forensics departments (SBI, FBI, CIA, Private Intelligence Agencies). Who needs to plant bugs or GPS tracking devices when you have the suspects hard drives from their computer by using a search and seizure raid on just something as simple as being accused of a computer crime or even downloading illegal material whether it’s true or not. Even after the Virginia Tech Shooting and other major criminal incidents, the police or FBI or even the SBI always talk about wanting to come for the suspects computer equipment and hard drives to send to forensics to investigate their entire life history through the usage of the computer with the hard drive used for data storage. It’s all there!!! Hard Drives are basically a High Density magnetic medium using tiny bits to encode and decode information, for simpler terms it is like writing files and reading files from a computer unit. Every hard drive doesn’t give you access to it’s full memory but holds off a fraction that is not user accessible which also likely holds data on our digital activities. In addition the hard drives use a form of magnetic to where no matter how many overwrites you use on a hard drive to coverup confidential and sensitive, embarrassing, or even material that you don’t want the world to know you have whatever the reason may be, the data can still be recovered at a forensics lab or even some expensive Data recovery company that is hell bent on obtaining personal information knowing they can blackmail people for profits. Well whats the problem, what do you have to hide? It does sound like it is over the top paranoid in this article but the experts such as Peter Gutmann admit that hard drives that are wiped with certain methods can always have it’s Data recovered using certain magnetic analyzing technology. All the police have to do is claim you committed a “computer crime” and they will have the legal ability to use forensic recovery units to find all your lifes history, any embarrassing photos and videos you taken with your boyfriend or girlfriend and yes that also includes cell phones so any horny young teenage guy or girl could become the next bust for child pornography, top secret and confidential legal attorney/client documents and that also includes top secret government and military documents, and even your entire web history and can even move on to what organizations you belong to and chatter with. The question is why does the government want us all to have computers, to spy on us and keep tabs on our entire Internet and computer history. Since people stupidly chat on Twitter and Facebook about all the things they do such as cooking to partying, all their activities are being archived and cataloged to each individual and since most profiles are public anybody can archive your information to use against you later on. It is even discovered through attending a autism meeting that many autistic people including children accidentally get into pornography when the parents installed no filter and end up getting caught on pornography charges (Laws prohibiting people under the age of 18 and in some cases the age of 21 from viewing adult pornography) which are very hard to drop in court which means juvenile prison. More teenagers and children to be brought up and raised under the Juvenile Prison Industrial Complex!!!! Whoever thought people can be arrested over what we do privately with their boyfriends and girlfriends and in some cases looking at a few digital photos is all it takes to go to the slammer whether there is a harmful intent or not. That is why it is a popular method of setting somebody up and that is setting somebody up for child pornography charges because it is nearly impossible to get out of them and ruins their life and reputation. All of our activities whether it is posting photos of your family on Flickr, emails you receive and send, whatever documents and other files you create, being involved with non-mainstream religions whatever your beliefs are, being involved with hack tools, being involved with file-sharing or even downloading warez material, and any other digital activity ever conducted is all stored on the hard drive and impossible to completely erase by normal conventional erasing software. First method that can be used by the forensics team is simple software and MFT Data recovery tools to find all the files both deleted under the MFT and even data that is lost due to MFT corruption by seeking out the file type signature, every file type ever made has a distinct signature or header that identifies the file type, and recovering the data based on the signature. Second method that forensic technicians use is Magnetic Force Microscopy (MFM) and even Scanning Probe Microscopy (SPM) or even Magnetic Tunneling Microscopy (STM). No matter what method of recovery, magnetic recovery is the far worst privacy invasion since the leaks of classified government documents via Wikileaks. Peter Gutmann, the same Computer Science expert that created the Gutmann erasing method (35 passes overwrite) that is used in almost every hard drive erasing software not limited to Active@ Killdisk erasing tool, conducted a study and whitepaper titled “Secure Deletion of Data from Magnetic and Solid-State Memory” (PDF) which concluded that “it is effectively impossible to sanitize storage locations by simple overwriting them, no matter how many overwrite passes are made or what data patterns are written. However by using the relatively simple methods presented in this paper the task of an attacker can be made significantly more difficult, if not prohibitively expensive.” Of course with the SBI and FBI fueled with the need to be champions of justice they will spend lots of money to recover the erased data no matter how expensive it is since they can just take more and more tax payers money through the IRS thugs. Reminds me of that movie “No Way Out!” where a Pentagon high-up had a photo taken I think with some Russian spy and the photo was ruined but the Pentagon had a forensics method of restoring the photograph as evidence then used to prosecute him for possible espionage. I even heard that when the authorities take computers by a court order, they say that they can find anything on it, time stamps, your life history, all of your life ever on a computer, can be examined by the State Bureau of Investigation or even the Federal Bureau of Investigation via their crime labs. They can even plant material on the hard drive since it is pretty easy to manipulate the timestamps, hack somebodies password protected or even public Wifi, mix somebodies DNA with a rape and/or murder victim sample for analysis which the charges can only be thrown out with a very good alibi or getting the forensics expert to admit to setting somebody up which will never happen of course, and internet histories can be fabricated by altering the hex data and even with computer virtualization technologies such as VMWare and other tools. Heck look what they did to Brandon Raub for the crime of making 9/11 inside job and other political statements on his Facebook profile. People saying anything that possibly sounds like some threat against the US President warrants a secret service visit and could maybe even a hard drive seizure if they desire it. People should be concerned at the fact that hard drives, RAM Cards, and other memory storage devices were on purposely created to not only store your data but to also violate your privacy with a backdoor that can allow deleted and even erased (DOD, Russian Ghost, Gutmann, One Pass Zeros, One Pass Random, other erasing methods) data to be recovered and accessible. If that is not apart of a major spying surveillance system being set-up then what is? Windows saves all file accesses and program histories with MRU, and possible other file access histories of files opened up. Every web page visited whether encrypted or not saves information which piles up overtime when not deleted which can be impossible to get rid of without overwriting it in the exact same data spot with conventional files to overcome the MFM’s ability to recover data erased by conventional hard drive erasing procedures. The solution really is to be careful on anything you do in your computer and cell phone, be careful when your political because somebody from forensics can set you up for computer crimes or even of murder, and when erasing be aware that you have to copy all your normal everyday files into the hard drive after erasure for a best chance at destroying any chance of recovery of what data you were hoping to erase if that is even possible. Be aware that when your hard drive stores your personal information even after deletion and erasure then it is meant to keep your computer history stored for any police or government agency to look at will especially under the Patriot Act. Even when you delete you are not deleting the data but just a MFT reference to the file along with the timestamps. Of course when you erase with any pattern all the forensic has to do is figure out what erasing pattern you used and then start the recovering process through magnetic imaging of the drive disk platters. If anything when you first buy a computer your better off first-hand encrypting the entire hard drive with TrueCrypt’s System/Partition Encryption and use a very complex password so that on every bootup you can use a operating system that is more secure and when data is deleted or even erased it will be impossible to recover since MFM usually relies on unencrypted RAW Data and even if they tried to break the password to use forensics to find the deleted/erased file, it was erased on the encryption side which means just the encrypted data changes a bit and since that happens it didn’t disappear on the outside using a normal overwrite procedure so it is no doubt that having your entire operating system and hard drive encrypted would be the best practice to data security. As for your autistic children please for goodness sake use a filter software to block all forms of pornography so that your child doesn’t get caught then forced to go through hell just for getting a little too curious. As for any teenagers you raise in your family, please keep tabs on their cell phone so if they take any photos of themselves you can delete them to prevent your son and daughter from ending up on a sex offender registry. As for the average computer user this article serves as a warning to all of you that anything you do on your computer can be accessed and data profiles and histories are set up on everybody especially with Facebook and Twitter.

Microsoft spy’s on you reports to Government

A patent filed by Microsoft reveals the company has voluntarily created software that provides the Government and other agencies seeking to spy on you:

Microsoft

A patent filed by Microsoft reveals the company has voluntarily created software that provides the Government and other agencies seeking to spy on you.

A patent filed by Microsoft seeks to give the company exclusive rights to intercept personal electronic communications and resend them directly to the Government and other agencies who may be seeking to spy on you.  By filing the patent, Microsoft clearly shows they have voluntarily created the software,  instead of waiting for a Government mandate to do so. The patent states that “the  government or one of its agencies may need to monitor communications” and software acts as a “recording agent” that is able to silently record the communication”.  The patent specifically names certain types of communications, such as Skype calls, instant messaging, video conferencing software, and even meeting software but does not stop there. Instead it goes on to label just about all electronic devices you can think of as a computer and requests for a patent to be able to intercept digital communications from those devices, and even access data stored in a variety of other storage mediums, and forward the to the Government.  A Gizmodo article on the patent points out that Microsoft appears to trying to patent Skype spying,  which is specifically named within the patent,  but the scope of patent goes far beyond the ability to just spy on Skype calls.  Only by digging into the patent can you see the deceptiveness in Microsoft’s the labeling of certain technologies and realize the true scope of what the software company is trying to provide the Government easy access to spy on.  For example, the label all packet-based communication as VoIP, which clearly nothing is further from the truth. All data that can be sent over the internet is a “packet-based communication”.

[…] the term VoIP is used to refer to standard VoIP as well as any other form of packet-based communication that may be used to transmit audio over a wireless and/or wired network. For example, VoIP may include audio messages transmitted via gaming systems, instant messaging protocols that transmit audio, Skype and Skype-like applications, meeting software, video conferencing software, and the like.

The patent goes on and deceptively labels all digital electronic devices as computers, say that everything from computers, to printers, gaming devices, automobile systems, even printers, home appliances and all other mobile based electronics are computers. The patent even applies to microcontroller which are often the brain of electronic devices and used in products ranging from automobile engine control systems, implantable medical devices, remote controls, office machines, appliances, power tools, and even toys.

A computer may include any electronic device that is capable of executing an instruction[…]

Examples of well known computing systems, environments, or configurations that may be suitable for use [include] personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microcontroller-based systems, set-top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, personal digital assistants (PDAs), smartphones, gaming devices, printers, appliances including set-top, media center, or other appliances, automobile-embedded or attached computing devices, other mobile devices, distributed computing environments that include any of the above systems or devices, and the like.

The patent also doesn’t stop with computers or even communications for that matter. It targets a variety of offline mediums that can used to store data and even computer programs themselves.

[…] a variety of computer-readable media [including] any available media that can be accessed by the computer  removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data.

Computer storage media includes RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVDs) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer.

The patent further reveals that the software’s capability includes the ability to intercept all digital communications regardless of the medium, or whether they are online or offline, bluntly including the ability to intercept all modulated data signals.

Communication media typically embodies computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.

 

N.S.A. copies all American Emails

   Former NSA Mathematician Says He Believes the Agency Stores Copies of All Emails Transmitted in America:

NSA Agent

NSA Agent

While most of the N.S.A. was reeling on September 11th, inside SARC the horror unfolded “almost like an ‘I-told-you-so’ moment,” according to J. Kirk Wiebe, an intelligence analyst who worked there. “We knew we weren’t keeping up.” SARC was led by a crypto-mathematician named Bill Binney, whom Wiebe describes as “one of the best analysts in history.” Binney and a team of some twenty others believed that they had pinpointed the N.S.A.’s biggest problem—data overload—and then solved it. But the agency’s management hadn’t agreed.  Binney, who is six feet three, is a bespectacled sixty-seven-year-old man with wisps of dark hair; he has the quiet, tense air of a preoccupied intellectual. Now retired and suffering gravely from diabetes, which has already claimed his left leg, he agreed recently to speak publicly for the first time about the Drake case. When we met, at a restaurant near N.S.A. headquarters, he leaned crutches against an extra chair. “This is too serious not to talk about,” he said.  Binney expressed terrible remorse over the way some of his algorithms were used after 9/11. ThinThread, the “little program” that he invented to track enemies outside the U.S., “got twisted,” and was used for both foreign and domestic spying: “I should apologize to the American people. It’s violated everyone’s rights. It can be used to eavesdrop on the whole world.” According to Binney, Drake took his side against the N.S.A.’s management and, as a result, became a political target within the agency.  Binney, for his part, believes that the agency now stores copies of all e-mails transmitted in America, in case the government wants to retrieve the details later. In the past few years, the N.S.A. has built enormous electronic-storage facilities in Texas and Utah. Binney says that an N.S.A. E-mail database can be searched with “dictionary selection,” in the manner of Google. After 9/11, he says, “General Hayden reassured everyone that the N.S.A. didn’t put out dragnets, and that was true. It had no need—it was getting every fish in the sea.”  Binney considers himself a conservative, and, as an opponent of big government, he worries that the N.S.A.’s data-mining program is so extensive that it could help “create an Orwellian state.” Whereas wiretap surveillance requires trained human operators, data mining is automated, meaning that the entire country can be watched. Conceivably, U.S. officials could “monitor the Tea Party, or reporters, whatever group or organization you want to target,” he says. “It’s exactly what the Founding Fathers never wanted.”

Former NSA Genius Apologizes for His Super Spying Software (Gizmodo):

Long before 9/11, brilliant NSA crypto-mathematician Bill Binney had developed an algorithm to make sense of the unbelievably massive amounts of data American spies were pulling in—he called it ThinThread. And then it went very, very wrong.

Thin Thread, the New Yorker reports, proved to be too good: designed to track foreign enemies via their electronic footprints, Binney was horrified to find that the powerful software processed mammoth amounts of American communications as well. Without a warrant—illegally. Binney implemented an encryption scheme that blurred out American chatter unless it was flagged by a judge, but his system was discarded by the NSA for being too invasive.

NSA building

NSA building