Showing posts with label NATIONAL SECURITY STATE. Show all posts
Showing posts with label NATIONAL SECURITY STATE. Show all posts

August 12, 2013

Threats Test Obama’s Balancing Act on Surveillance


Obama


N.Y. TIMES

President Obama on Friday sought to take control of the roiling debate over the National Security Agency’s surveillance practices, releasing a more detailed legal justification for domestic spying and calling for more openness and scrutiny of the N.S.A.’s programs to reassure a skeptical public that its privacy is not being violated.

“It’s right to ask questions about surveillance, particularly as technology is reshaping every aspect of our lives,” Mr. Obama said, adding: “It’s not enough for me, as president, to have confidence in these programs. The American people need to have confidence in them as well.”
But at a time when leaks by the former N.S.A. contractor Edward J. Snowden have exposed the agency’s expansive spying both inside the United States and abroad to an unprecedented degree of scrutiny, Mr. Obama showed no inclination to curtail secret surveillance efforts. Rather, he conceded only a need for greater openness and safeguards to make the public “comfortable” with them.
----
 
A police aerial surveillance drone
An aerial surveillance drone. Photograph: John Giles/PA
 
 
President Obama...said he wants eventually to scale back drone strikes and steer the country away from a single-minded focus on counterterrorism.
 
But in response to a vague yet ominous terror warning in recent days, his administration shut down nearly two dozen American embassies and consulates and waged an intense drone campaign in Yemen.
 
American officials speak of the need for vigorous debate about controversial National Security Agency programs revealed by Edward J. Snowden, and Mr. Obama on Friday promised greater accountability to keep the surveillance state in check. Yet his underlying message was clear: the expansive monitoring of telephone and electronic communications would continue because the safety of the country depended on it.
America’s war on terrorism may one day end, as Mr. Obama said in a speech in May, but until that happens the president has given every indication that it will be fought in much the same way it has for nearly 12 years. Even Mr. Obama’s promise of more transparency appeared to fail an instant test during his Friday news conference. Asked about the flurry of American drone strikes in Yemen, which have been reported by every news outlet, Mr. Obama demurred.
“I will not have a discussion about operational issues,” he said.

Mr. Obama, who ran for office in 2008 against what he described as the excesses of counterterrorism under President George W. Bush, has occasionally expressed ambivalence about drone strikes and aggressive surveillance. But with Republicans ever ready to pounce with accusations that he has made the country less safe, he has declined to abandon any of the tools used by his predecessor, with the sole exception of the brutal interrogation methods once used by the C.I.A.
The government’s striking response to the reported terror threat in recent days has coincided with a wave of unprecedented skepticism about the N.S.A.’s sweeping surveillance programs since Mr. Snowden’s disclosures.
When Mr. Snowden began releasing secret documents two months ago, Mr. Obama said he welcomed a debate on the trade-offs of N.S.A. surveillance and privacy. But the debate has grown far larger than administration officials anticipated, with lawmakers of both parties in Congress and half of Americans in polls calling for curbs on the agency.
------
Mr. Snowden’s disclosures have had a continuing, even escalating impact as journalists have continued to pore over them. On Thursday, for instance, The New York Times wrote that the N.S.A. was examining all e-mail messages in and out of the country and searching them for clues associated with terrorism or foreign intelligence.
On Friday, The Guardian, the British newspaper that has published many of Mr. Snowden’s revelations, wrote about a clause in N.S.A. rules that permits the agency to search for Americans’ names and identifying information in data about foreign targets gathered from large Internet companies.
In his remarks on Friday, Mr. Obama said he was satisfied that the N.S.A. programs were both necessary and respectful of Americans’ privacy.
 
 
 
MICHAEL TOMASKY DAILY BEAST

Predictably, everyone is unimpressed by the measures Barack Obama has announced to bring a little ray of transparency to America’s surveillance programs. The New York Times editorialized that the president’s proposed changes “only tinker around the edges” of our “abusive” surveillance programs. I wouldn’t argue that the proposals will fundamentally remake the surveillance state. But nevertheless, I think it’s pretty remarkable that a president, any president, announced, without absolutely being forced to, a series of steps that relinquish some degree of executive power. Of course he’ll get no credit for that, because civil libertarians tend to be absolutists and other liberals tend to be afraid or even terrified of their wrath. Why this is so tells us some important things about contemporary liberalism.

First, what Obama said. Don’t get me wrong. I’m hardly jumping up and down that the National Security Agency is going to have a full-time civil liberties and privacy officer. But two of Obama’s other recommendations might have some bite. Reforming Section 215 of the Patriot Act, depending on the definition of the word “reform” that Congress settles on—frightening, as we know—is potentially a big deal. Section 215, which vastly expanded the FBI’s ability to spy on American citizens in a number of ways, has long been the section of the act, or at least one of the sections, of greatest concern to the civil-liberties lobby. It’s under 215 that the government is collecting all those telephone records. Obama wasn’t terribly specific in his remarks on Friday; he just said he’ll work with Congress “to put in place greater oversight, greater transparency, and constraints on the use of this authority.” Even so, it would be the first narrowing of the Patriot Act since its passage.
The idea for having an adversarial presence at Foreign Intelligence Surveillance Court hearings is potentially even a bigger deal. A special court system set up in the United States of America in which the judge hears only the government’s side of the story, FISC has always been a case where a bright line was crossed. It’s. There’s just no way that’s acceptable, and correcting it would end a blatantly (to me) unconstitutional practice.

As I was listening to these remarks, I kept thinking to myself about this paradox. No, they were not “bold and sweeping” proposals. At the same time, it sure seemed to me like this was the first time in my adult life I’d ever heard a sitting president propose checks on his administration that he didn’t have to offer. And Obama didn’t have to offer these. He was facing some political pressure, but polls have been pretty consistent in showing that a solid majority of the American public comes down on the side of what we might call controlled surveillance.
There was no mortal threat to his presidency here. Yet even so, he took a couple steps away from the imperial presidency. I think that’s the first time since the presidency became imperial—after World War II, more or less—such a thing has happened. And Obama was, as he claimed Friday, headed down this course before the Snowden leaks. Those began on June 5. But on May 23, he gave a speech at the National Defense University in which he foreshadowed the moves he just announced. Combine all this with John Kerry’s recent announcement that we have a plan for ending drone strikes in Pakistan, and you might have thought liberals would be cheering.

I suppose some liberals are. I am. But not civil libertarians. With them, it’s all or nothing. If you’re not signed on to the whole program, you might as well be Joe McCarthy. Environmentalists and tax reformers and campaigners for the poor and those fighting for greater consumer protections and even civil rights advocates understand that the political process is about compromise and getting what you can, and they acknowledge that there are such things in this world as competing compelling interests. But you are well advised not to try to mention such things to a civil libertarian.
The reason for their intransigence is that we (liberals) are trained to think of these liberties as being absolute and utterly nonnegotiable. But our history and our civic life shows that they are negotiated all the time. For all the “when one person loses his civil liberties, we all lose them” rhetoric, historically that’s simply not the case. As with anything, there are degrees.....
-----
Obama has public opinion to think about. And of course he has keeping the country safe to worry about, and no one at the ACLU is sitting in on those intel briefings and learning the things the president is learning every day about threats to the nation, and no one at the ACLU will be responsible if our wall of security is breached. Obama is responsible, and I think mere willingness of the man in that position to have this conversation, let alone take some concrete steps, does him enormous credit.

 

June 11, 2013

A SECOND OPINION: THE NSA DOES WHAT GOOGLE DOES.









RICHARD COHEN WASHINGTON POST

An old journalism saw goes like this: Dog bites man, no story. Man bites dog, story. Allow me to update it. Government monitors e-mail and telephone calls for national security, no story. Government doesn’t do anything of the kind — now, that’s a story.
Clearly some awfully good newspapers and some awfully good reporters disagree. In the past week, it’s been raining stories about what the busybody government has been up to. The National Security Agency has been monitoring telephone calls and e-mails — and even social media stuff of the sort you shouldn’t have been doing anyway. To this, a whole lot of people have expressed shock. Oaths to the Fourth Amendment have filled the air. Unreasonable searches are simply unconstitutional, they assert — without asserting that anything has in fact been searched or seized. It has merely been noted and, if suspicious, referred to a court for the appropriate warrant

The programs certainly can be abused. (So can local police powers.) But oddly enough, proof that this has not happened comes from the self-proclaimed martyr for our civil liberties, Edward Snowden, late of Booz Allen Hamilton, the government contractor that ever-so-recently employed him. (I assume he’ll be summoned to HR.)
In a remarkably overwrought interview conducted by the vainglorious Glenn Greenwald of the Guardian, Snowden cited not one example of the programs being abused. Greenwald wrote that Snowden “lines the door of his hotel room with pillows to prevent eavesdropping” and that “he puts a large red hood over his head and laptop when entering his passwords to prevent any hidden cameras from detecting them.” Greenwald said that “Snowden will go down in history as one of America’s most consequential whistleblowers.” I think he’ll go down as a cross-dressing Little Red Riding Hood.

Greenwald likens Snowden to Daniel Ellsberg, who revealed the Pentagon Papers to The Post and the New York Times more than four decades ago. Not quite. The Pentagon Papers proved that a succession of U.S. presidents had lied about their intentions regarding Vietnam — Lyndon Johnson above all. In 1964, he had campaigned against Barry Goldwater for the presidency as virtually the peace candidate while actually planning to widen the war. As the Times put it in a 1996 story, the Pentagon Papers “demonstrated, among other things, that the Johnson administration had systematically lied, not only to the public but also to Congress, about a subject of transcendent national interest and significance.”

In contrast, no one lied about the various programs disclosed last week. They were secret, yes, but members of Congress were informed — and they approved. Safeguards were built in. If, for instance, the omniscient computers picked up a pattern of phone calls from Mr. X to Suspected Terrorist Y, the government had to go to court to find out what was said. The Foreign Intelligence Surveillance Act established a court consisting of 11 rotating federal judges. These judges are the same ones who rule on warrants the government seeks in domestic criminal cases. If we trust them for that, why would we not trust them for other things as well?

Whenever I see “Hello, Richard” on my computer screen, I realize what’s happened: It knows me. It knows what I bought and when I bought it and where I was at the time. It knows my sizes and my credit card number, and if it knows all that, it knows pretty much everything. I long ago sacrificed a measure of privacy for convenience. One click will do it.
I also made the same sort of deal for security. I assumed the government was doing at least what Google was doing — and Google, I’m convinced, is the new Santa Claus: It sees you when you’re sleeping, it knows when you’re awake. It knows when you’ve been bad or good, so be good for goodness’ sake. In 2009, Google’s Eric Schmidt put us all at ease by telling CNBC’s Maria Bartiromo, “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.” See, not all billionaires are so smart.
Everything about Edward Snowden is ridiculously cinematic. He is not paranoiac; he is merely narcissistic. He jettisoned a girlfriend, a career and, undoubtedly, his personal freedom to expose programs that were known to our elected officials and could have been deduced by anyone who has ever Googled anything. History will not record him as “one of America’s most consequential whistleblowers.” History is more likely to forget him. Soon, you can Google that.

MARC THIESSEN, WASHINGTON POST

Why does the NSA need to collect all that data? One former national security official explained it to me this way: If you want to connect the dots and stop the next attack, you need to have a “field of dots.” That is what the NSA is collecting. But it doesn’t dip into that field unless it comes up with a new “dot” — for example, a new terrorist phone number found on a cellphone captured in a raid. It will then plug that new “dot” into the “field of dots” to find out which dots are connected to the new number. If you are not communicating with that terrorist, your dot is not touched. But the NSA needs to have the entire field of dots so it can unravel the network connected to that terrorist.