Snowden’s Father Calls Out Obama On Nuremberg Crimes

Kurt Nimmo
Infowars.com
August 1, 2013

wantyou2

Predictably, the corporate media, the official propaganda outlet for the establishment, has refused to post or publish an open letter sent to Obama by Lon Snowden, the father of Edward Snowden. This callous refusal should finally convince any who may have had any doubt that the United States is anything but a tyrannical national security state with a state-run media no different than the one in Cuba, China or Iran.

Edward Snowden’s unwarranted persecution and vilification by the globalist propaganda media is part of a larger campaign to snuff out investigative media.

Glenn Greenwald eluded to this during a conversation about the persecution of Pfc. Bradley Manning with CIA operative Anderson Cooper and CNN legal analyst and establishment insider Jeffrey Toobin. In response to Toobin’s defense of Manning’s unjust persecution and probable life sentence, Greenwald said the former Harvard Review editor  was arguing “for the end of investigative journalism.”

As the indisputable assassination of investigative journalist Michael Hastings makes painfully obvious, the government is not merely attempting to persecute journalists who refuse to act as stenographers for the national security state, but is actively killing them. The United States is now on par with Mexico, Iran, Colombia, and Russia, countries that stand accused of murdering journalists.

The letter penned by constitutional lawyer Bruce Fein and sent by Lon Snowden to Obama follows. Below it is a video of the exchange between Greenwald and the apologist for a vindictive and murderous state, Jeffrey Toobin, who counts as his close friend Supreme Court justice Elena Kagan.

July 26, 2013
President Barack Obama
The White House
1600 Pennsylvania Avenue, N.W.
Washington, D.C. 20500

Re: Civil Disobedience, Edward J. Snowden, and the Constitution

Dear Mr. President:

You are acutely aware that the history of liberty is a history of civil disobedience to unjust laws or practices. As Edmund Burke sermonized, “All that is necessary for the triumph of evil is that good men do nothing.”

Civil disobedience is not the first, but the last option. Henry David Thoreau wrote with profound restraint in Civil Disobedience: “If the injustice is part of the necessary friction of the machine of government, let it go, let it go: perchance it will wear smooth certainly the machine will wear out. If the injustice has a spring, or a pulley, or a rope, or a crank, exclusively for itself, then perhaps you may consider whether the remedy will not be worse than the evil; but if it is of such a nature that it requires you to be the agent of injustice to another, then, I say, break the law. Let your life be a counter friction to stop the machine.”

Thoreau’s moral philosophy found expression during the Nuremburg trials in which “following orders” was rejected as a defense. Indeed, military law requires disobedience to clearly illegal orders.

A dark chapter in America’s World War II history would not have been written if the then United States Attorney General had resigned rather than participate in racist concentration camps imprisoning 120,000 Japanese American citizens and resident aliens.

Civil disobedience to the Fugitive Slave Act and Jim Crow laws provoked the end of slavery and the modern civil rights revolution.

We submit that Edward J. Snowden’s disclosures of dragnet surveillance of Americans under § 215 of the Patriot Act, § 702 of the Foreign Intelligence Surveillance Act Amendments, or otherwise were sanctioned by Thoreau’s time-honored moral philosophy and justifications for civil disobedience. Since 2005, Mr. Snowden had been employed by the intelligence community. He found himself complicit in secret, indiscriminate spying on millions of innocent citizens contrary to the spirit if not the letter of the First and Fourth Amendments and the transparency indispensable to self-government. Members of Congress entrusted with oversight remained silent or Delphic. Mr. Snowden confronted a choice between civic duty and passivity. He may have recalled the injunction of Martin Luther King, Jr.: “He who passively accepts evil is as much involved in it as he who helps to perpetrate it.” Mr. Snowden chose duty. Your administration vindictively responded with a criminal complaint alleging violations of the Espionage Act.

From the commencement of your administration, your secrecy of the National Security Agency’s Orwellian surveillance programs had frustrated a national conversation over their legality, necessity, or morality. That secrecy (combined with congressional nonfeasance) provoked Edward’s disclosures, which sparked a national conversation which you have belatedly and cynically embraced. Legislation has been introduced in both the House of Representatives and Senate to curtail or terminate the NSA’s programs, and the American people are being educated to the public policy choices at hand. A commanding majority now voice concerns over the dragnet surveillance of Americans that Edward exposed and you concealed. It seems mystifying to us that you are prosecuting Edward for accomplishing what you have said urgently needed to be done!

The right to be left alone from government snooping–the most cherished right among civilized people—is the cornerstone of liberty. Supreme Court Justice Robert Jackson served as Chief Prosecutor at Nuremburg. He came to learn of the dynamics of the Third Reich that crushed a free society, and which have lessons for the United States today.

Writing in Brinegar v. United States, Justice Jackson elaborated:

The Fourth Amendment states: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing
the place to be searched, and the persons or things to be seized.”

These, I protest, are not mere second-class rights but belong in the catalog of indispensable freedoms. Among deprivations of rights, none is so effective in cowing a population, crushing the spirit of the individual and putting terror in every heart. Uncontrolled search and seizure is one of the first and most effective weapons in the arsenal of every arbitrary government. And one need only briefly to have dwelt and worked among a people possessed of many admirable qualities but deprived of these rights to know that the human personality deteriorates and dignity and self-reliance
disappear where homes, persons and possessions are subject at any hour to unheralded search and seizure by the police.

We thus find your administration’s zeal to punish Mr. Snowden’s discharge of civic duty to protect democratic processes and to safeguard liberty to be unconscionable and indefensible.

We are also appalled at your administration’s scorn for due process, the rule of law, fairness, and the presumption of innocence as regards Edward.

On June 27, 2013, Mr. Fein wrote a letter to the Attorney General stating that Edward’s father was substantially convinced that he would return to the United States to confront the charges that have been lodged against him if three cornerstones of due process were guaranteed. The letter was not an ultimatum, but an invitation to discuss fair trial imperatives. The Attorney General has sneered at the overture with studied silence.

We thus suspect your administration wishes to avoid a trial because of constitutional doubts about application of the Espionage Act in these circumstances, and obligations to disclose to the public potentially embarrassing classified information under the Classified Information Procedures Act.

Your decision to force down a civilian airliner carrying Bolivian President Eva Morales in hopes of kidnapping Edward also does not inspire confidence that you are committed to providing him a fair trial. Neither does your refusal to remind the American people and prominent Democrats and Republicans in the House and Senate like House Speaker John Boehner, Congresswoman Nancy Pelosi, Congresswoman Michele Bachmann,and Senator Dianne Feinstein that Edward enjoys a presumption of innocence. He should not be convicted before trial. Yet Speaker Boehner has denounced Edward as a “traitor.”

Ms. Pelosi has pontificated that Edward “did violate the law in terms of releasing those documents.” Ms. Bachmann has pronounced that, “This was not the act of a patriot; this was an act of a traitor.” And Ms. Feinstein has decreed that Edward was guilty of “treason,” which is defined in Article III of the Constitution as “levying war” against the United States, “or in adhering to their enemies, giving them aid and comfort.”

You have let those quadruple affronts to due process pass unrebuked, while you have disparaged Edward as a “hacker” to cast aspersion on his motivations and talents. Have you forgotten the Supreme Court’s gospel in Berger v. United States that the interests of the government “in a criminal prosecution is not that it shall win a case, but that justice shall be done?”

We also find reprehensible your administration’s Espionage Act prosecution of Edward for disclosures indistinguishable from those which routinely find their way into the public domain via your high level appointees for partisan political advantage. Classified details of your predator drone protocols, for instance, were shared with the New York Times with impunity to bolster your national security credentials. Justice Jackson observed in Railway Express Agency, Inc. v. New York: “The framers of the Constitution knew, and we should not forget today, that there is no more effective practical guaranty against arbitrary and unreasonable government than to require that the principles of law which officials would impose upon a minority must be imposed generally.”

In light of the circumstances amplified above, we urge you to order the Attorney General to move to dismiss the outstanding criminal complaint against Edward, and to support legislation to remedy the NSA surveillance abuses he revealed. Such presidential directives would mark your finest constitutional and moral hour.

Sincerely,
Bruce Fein
Counsel for Lon Snowden
Lon Snowden

 

Advertisements

NSA tool exposed: XKeyscore sees ‘nearly EVERYTHING you do online’

The cover has been blown on an NSA program which collects data on “nearly everything a user does on the internet” even as the debate rages over the secretive US agency’s mass surveillance of innocent people.

The XKeyscore program covers emails, social media activity and browsing history and is accessible to NSA analysts with little or no prior authorisation, according to aleaked presentation published by The Guardian yesterday.

The slide deck, disclosed by NSA whistleblower Edward Snowden and published alongside an accompanying story, was released just hours before NSA director General Keith Alexander was due to deliver an eagerly anticipated keynote presentation at the Black Hat security conference in Las Vegas.

where-is-xkeyscore-640x353

If you were shocked by the NSA’s Prism program, hold onto your Black Hat: The NSA also operates another system, called XKeyscore, which gives the US intelligence community (and probably most of the US’s Western allies) full access to your email, IMs, browsing history, and social media activity. To view almost everything that you do online, an NSA analyst simply has to enter your email or IP address into XKeyscore. No formal authorization or warrant is required; the analyst just has to type in a “justification” and press Enter. To provide such functionality, the NSA collects, in its own words, “nearly everything a typical user does on the internet.” Perhaps most importantly, though, it appears that HTTPS and SSL might not protect your communications from being snooped on by the NSA.

This information comes from Edward Snowden, the NSA whistleblower who leaked some information and slides to the Guardian newspaper. The NSA has confirmed that XKeyscore exists, but insists that “multiple technical, manual and supervisory checks and balances” prevent the system from being abused. Snowden says, however, that ”it’s very rare to be questioned on our searches, and even when we are, it’s usually along the lines of: ‘let’s bulk up the justification’.” Whether you are more inclined to believe Snowden or the NSA, that’s up to you.

XKeyscore data sources

XKeyscore itself consists of 700 servers (running Linux!) situated at 150 different sites around the world, which are constantly scanning and indexing intelligence accrued by NSA’s data gathering tools (which are separate from XKeyscore). As far as we can tell, the data gathering tools are themselves a massive network of servers that are located in data centers around the world. These servers intercept and analyze data that traverses the internet and other communications networks. The bulk of what a typical user does on the internet is transmitted via HTTP (hypertext transfer protocol), and it’s relatively trivial to scoop out the interesting data from a packet of HTTP data. When you send an IM on Facebook, XKeyscore will have no problem working out who the sender and recipient are, and the body of the message. Likewise, when you use a webmail client like Gmail or Hotmail, the sender, recipient, CC, BCC, subject, and body are all easily accessible via HTTP packet sniffing.

As for where the NSA gets this data from, there are three sources: F6 (aka the Special Collection Service), FORNSAT (foreign satellite collection), and SSO (the Special Source Operations division). F6 places eavesdropping equipment in foreign embassies, data centers, and other important communications hubs; FORNSAT intercepts data from foreign satellite links; and SSO deals with everything else, from such as cable and microwave taps.

How XKeyscore extracts information from HTTP sessions

How XKeyscore extracts information from HTTP sessions

Combined, these three sources harvest an almost-incomprehensible amount of data. According to the leaked slides, some sites produce so much data (20+ terabytes) that they only have space to store it for 24 hours. (Most of these slides are from 2008, though, so they may have upgraded their storage capacity since then.) As of 2012, there were 41 billion records available for analysis by XKeyscore within any given 30-day window.

To use the XKeyscore (XKS) system, an NSA analyst taps in a few search parameters, a “justification” (i.e no formal warrant is required), and presses Enter. XKS can be indexed by email or IP address, name, telephone number, keyword, language, or even the type of web browser. If the search returns an email or IM hit, the analyst can instantly view the contents of that message. Presumably there are other tools/viewers for other kinds of data. Because there’s so much data available, the NSA slides recommend that analysts narrow down their search results using the metadata first.

The slides say that, as of 2008, 300 terrorists had been caught with intelligence from XKS. In 2008, the slides also said that “future” capabilities will include VoIP and EXIF parsing (EXIF being the metadata associated with images, which can contain geolocation data).

What about HTTPS?

To be entirely honest, it isn’t all that surprising that XKS exists. Given the way the internet and its protocols work, it’s relatively easy to eavesdrop on most internet-based communications, and eavesdropping is essentially what the NSA was created for. It is also highly likely, as with Prism, other Western nations have access to XKS — or their own XKS-like systems.

Has XKeyscore broken PGP/VPN encryption?

What is surprising is that the slides seem to suggest that VPNs and encrypted links may not be secure. “Show me all PGP usage in Iran” and “Show me all VPN startups in country X, and give me the data so I can decrypt and discover users” seem to be functions available to analysts using XKS. This isn’t a direct admission they’ve broken ciphers such as AES-256 and 3DES, but it would seem that they’ve found some exploitable weaknesses.

This leads us to another important question: Can the NSA eavesdrop on HTTPS traffic? In recent years, many web services have moved to HTTPS as standard (such as Gmail), and in theory the encryption should keep your data safe from prying eyes. As of 2012, though, despite the widespread adoption of HTTPS, XKS still seems to be working as intended. Has the NSA cracked HTTPS? Has the NSA somehow obtained the root SSL certificates from the likes of Symantec and Comodo, so that it can perform man-in-the-middle (MITM) attacks on any website that uses HTTPS?

If HTTPS, PGP, and VPNs have been compromised, and if the NSA really has its insidious tentacles hooked into fiber-optic cables, microwave links, and foreign satellite links, there is almost no way of using the internet or any other communications network without the American and other Western governments snooping on you.

EDITORS NOTE: Big data and ability to correlate is not about crime, but about the influence of money. Nearly all government departments are corrupted by revolving-door jobs and money from corporations – the FDA being about the worst. Let’s say you create a huge public fight against an insurance company that has friends in government. Suddenly, emails where you revealed some odd sexual predilections surface. You lose your job because of it and are too busy surviving to continue the fight. BTW, although it’s supposed to be illegal, US military intelligence does sometimes go to bat for big companies. I found that out through experience.

The Guardian reports that the top secret National Security Agency program allows analysts to search through a database “containing emails, online chats and the browsing histories of millions of individuals”. In the leaked documents, the NSA describes XKeyscore as its “widest-reaching” internet intelligence system.

Targets data in transit

The release is arguably the most significant disclosure about the NSA’s web surveillance operations since the first revelations about the spy agency’s controversial PRISM web data mining program, which collects data from email, chat and VoIP. That program harvests information from users of services provided by Google, Facebook, Apple, Yahoo! and AOL, and was said to have been carried out with the indirect assistance of those companies.

While PRISM involves stored data, XKeyscore appears to involve mining through data in transit, either from the premises of a telco or through a fibre-optic tap. Leaked training materials explain how analysts fill in a simple online form before gaining access to data sorted by identifiers, such as target email addresses. Only a broad justification of the reason for a request, which is reportedly not subject to a review by any court or senior NSA personnel, is needed.

The Guardian reports that the leaked files provide substance to Snowden’s claims that while working as an NSA contractor he “could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

He made those claims in a video interview in early June soon after he outed himself as the source of leaks about the NSA’s secret surveillance programmes.

Analysts can combine XKeyscore with data from other NSA systems to obtain “real-time” interception of a target’s internet activity, said the paper.

“XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant,” said The Guardian‘s Glenn Greenwald.

They don’t even need to know who you are to track you down

According to the slides, spooks can query the system by name, telephone number, IP address and keywords as well as email address. Just searching by email address alone will not give a target’s full range of activities on the net, but a range of carefully selected queries are needed to prevent analysts being swamped with an unmanageable dump of information to sort through.

Spooks are advised to use metadata also stored in XKeyscore in order to narrow down their queries. Queries can be mixed and matched in order to try to pin down a group of suspects without even knowing targeting information, such as email addresses.

One example cited in the training document says that XKeyscore can be used to search for someone whose language is out of place in a region, or who is using encryption and “searching the web for suspicious stuff”. Another example states that XKeyscore is the only system that allows analysts to directly target traffic from “VPN startups in country X” to “give me the data so I can decrypt and discover the users”.

“No other system performs this on raw unselected bulk traffic,” the 2008 vintage training manual (marked “Top Secret” and apparently shared only with the NSA’s peers in the UK, Australia, Canada and New Zealand) explains.

XKeyscore also provides a means to index exploitable computers in a specified country, as well as a way of obtaining the email address of persons of interest using Google Earth.

One leaked document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”. XKeyscore also also allows analysts to pull together logs of the IP addresses of visitors to specified websites.

An NSA tool called DNI Presenter is used to read the content of harvested emails. The same tool enables analysts to read the content of Facebook private messages.

Content remains on the system for only three to five days, while metadata is stored for 30 days. One leaked document states: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”

However, NSA systems allow flagged data on Xkeyscore to be moved onto other databases such as Pinwale, where material can be stored for for up to five years.

Despite the short shelf life of data stored on XKeyscore in one month last year, the system collected at least 41 billion total records.

NSA training manuals state that 300 terrorists have been captured using intelligence from XKeyscore before 2008, a claim that will doubtless be used to justify the program and criticise its exposure.

In a statement to The Guardian, the NSA said: “NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.

New Statement from Edward Snowden

In a statement issued through WikiLeaks, Snowden claims that President Obama revoking his passport without a judicial order, leaving him a stateless person. The following has been posted on Wikileaks by Edward Snowden:

One week ago I left Hong Kong after it became clear that my freedom and safety were under threat for revealing the truth. My continued liberty has been owed to the efforts of friends new and old, family, and others who I have never met and probably never will. I trusted them with my life and they returned that trust with a faith in me for which I will always be thankful.

On Thursday, President Obama declared before the world that he would not permit any diplomatic “wheeling and dealing” over my case. Yet now it is being reported that after promising not to do so, the President ordered his Vice President to pressure the leaders of nations from which I have requested protection to deny my asylum petitions.

This kind of deception from a world leader is not justice, and neither is the extralegal penalty of exile. These are the old, bad tools of political aggression. Their purpose is to frighten, not me, but those who would come after me.

For decades the United States of America have been one of the strongest defenders of the human right to seek asylum. Sadly, this right, laid out and voted for by the U.S. in Article 14 of the Universal Declaration of Human Rights, is now being rejected by the current government of my country. The Obama administration has now adopted the strategy of using citizenship as a weapon. Although I am convicted of nothing, it has unilaterally revoked my passport, leaving me a stateless person. Without any judicial order, the administration now seeks to stop me exercising a basic right. A right that belongs to everybody. The right to seek asylum.

In the end the Obama administration is not afraid of whistleblowers like me, Bradley Manning or Thomas Drake. We are stateless, imprisoned, or powerless. No, the Obama administration is afraid of you. It is afraid of an informed, angry public demanding the constitutional government it was promised — and it should be.

I am unbowed in my convictions and impressed at the efforts taken by so many.

Edward Joseph Snowden

Monday 1st July 2013


Appearing on Fox and Friends Tuesday, Greenwald told Eric Bolling that more revelations are forthcoming regarding “vast programs of both domestic and international spying that the world will be shocked to learn about that the NSA is engaged in without democratic accountability.”

“You’re going to have to wait along with everybody else until our stories are published,” Greenwald said. Although he did not provide an exact timeframe, Greenwald added “just wait a little bit and you’ll have it.”

The reporter also accused the President of making an example out of Snowden in order to deter potential future whistleblowers.

“I think what the Obama administration wants, and has been trying to establish for the last almost five years now with the unprecedented war on whistleblowers that it is waging, and to make it so that everybody is petrified of coming forward with information about what our political officials are doing in the dark that is deceitful, illegal or corrupt,” Greenwald said.

“They don’t care about Edward Snowden at this point. He can no longer do anything that he hasn’t already done. What they care about is making an extremely negative example out of him to intimidate future whistleblowers because they think they’ll end up like him.” the reporter added.

While revealing that he had not had contact with Snowden since he left Hong Kong, Greenwald insisted that the leaker was eager to remain part of the debate surrounding government surveillance.

“Obviously he wants to stay out of the clutches of the U.S. government given the way that they’ve persecuted whistleblowers. He’s obviously trying to find a place where he can do that but his real goal is to continue to try to be part of the conversation about why he did why he did, what it is that he saw in the NSA, how these spying powers were being abused and to continue to make people around the world and his fellow citizens aware of what his government is doing,” said Greenwald.

Addressing claims from other so called journalists that he should be prosecuted for his role in outing Snowden’s secrets, Greenwald cited Thomas Jefferson.

“Jefferson, 250 years ago, said those who most fear investigations are the ones who attack free press first,” Greenwald said. “This is what journalism is about, shining a light on what the most powerful people in the country are doing to them in the dark. So we’re going to continue to do that no matter what David Gregory and his friends say.”

According to the latest reports, Ed Snowden is still stuck in “no man’s land” as it were in Moscow. After applying to 21 countries for political asylum, only 11 remain possibilities, with Venezuela looking the most sympathetic to his plight.

“[Snowden] deserves the world’s protection.” Venezuela’s new president Máduro told Reuters during a visit to Moscow.

“We think this young person has done something very important for humanity, has done a favour to humanity, has spoken great truths to deconstruct a world that is controlled by an imperialist American elite.” Máduro added.

Is Edward Snowden a Double Agent?

Several prominent voices in the alternative media are speculating that former CIA analyst and NSA whistleblower Edward Snowden could be a double agent whose revelations are only serving to distract from the much bigger issue of the imminent escalation of the war in Syria.

 

Edward Snowden reading a newspaper about...Edward Snowden.

Edward Snowden reading a newspaper about…Edward Snowden.

Congress Moves to Create New Surveillance Agency Under NDAA 2014

Seen on UnSpy – For Liberty!
images

Congress is ready to add another layer to Stasi surveillance state.

“In other words, the proposed NDAA “enhancement” would further extend the reach of the surveillance state into the private affairs of the American people, a reach significantly more expansive than previous documented, due largely to the recent revelations of whistleblower Edward Snowden.” ~infowars.com

unspy‘s insight:

When is it going to finally dawn on people…. they aren’t setting up new agencies. They’re setting up.. a NEW government….and soft-form of continuous and unending Martal Law… this is now a NEW fundamentally changed country! Welcome to East Germany USSA.

Earlier this year, the House Subcommittee on Intelligence, Emerging Threats and Capabilities, one of several Armed Services Committees, discussed the National Defense Authorization Act (NDAA) for Fiscal Year 2014.

“The main subject of the hearing was Sec. 1061, otherwise known as Enhancement of Capacity of the United States Government to Analyze Captured Records,” writes Stephen Benavides. “This enhancement provision of NDAA 2014 would effectively create a new intelligence agency, one with the authority to analyze information gained under the Patriot Act, FISA, and known spying programs such as PRISM.”


Government continues to insist NSA cannot listen to your phone calls or read your email.

Sec. 1061 authorizes the establishment of a Conflict Records Research Center by the Secretary of Defense. The Center would create a “digital research database” with the ability to “translate” and facilitate research on “records captured from countries, organizations and individuals, now or once hostile to the United States.” Additionally, the Center will engage in research to “increase the understanding of factors related to international relations, counterterrorism and conventional and unconventional warfare, and ultimately, enhance national security.”

In order to work effectively, the Center will require collaboration with the Director of National Intelligence in the coordination of “information exchanges important to the leadership of the United States Government.”

Benavides writes:

That coordination would require participation of all 16 member agencies and departments of the U.S. Intelligence Community. This would leave James Clapper, the man accused of lying to Congress about the National Security Agency’s domestic spying program known as PRISM, in de facto direction of another federal surveillance and data analysis agency. And while the Center would be officially directed and overseen by the Secretary of Defense, without unfettered access to secret and top secret information, the Center would be completely ineffective. These information exchanges would most likely include data and records generated by the mass surveillance of everyday people under PRISM, as well as surveillance of those identified as “potential terrorists” or “high value targets” by any one of those 16 intelligence agencies now in operation.

Benavides notes that because the war on terror is now borderless and permanent – due primarily to the 2001 Authorization to Use Military Force (AUMF) – any “captured record” may be used by this new agency, including records collected under the sprawling NSA Stasi surveillance state now firmly in place and a prominent feature of the national security state.

if-we-dont-nullify-ndaa1

“Thus, any captured document, audio file, video file, or other material could potentially be submitted to this new intelligence agency for research and analysis, all in the name of national security and counterterrorism, as deemed appropriate by a swelling government surveillance class,” Benavides explains.

In other words, the proposed NDAA “enhancement” would further extend the reach of the surveillance state into the private affairs of the American people, a reach significantly more expansive than previous documented, due largely to the recent revelations of whistleblower Edward Snowden.

“While the National Security Agency swears that no citizen was spied on under PRISM, the very fact that cell phone metadata and online activity was gathered from millions of individuals guarantees that information was taken illegally from innocent people,” Benavides concludes. “We’re told that the government is attempting to minimize the amount of information captured from Americans, and that all of that information is being kept in specialized and restricted servers in order to protect our constitutional rights. But that’s difficult to believe when the Department of Justice is currently fighting the release of a secret FISA Court opinion that detailsunconstitutional government surveillance.”

More accurately, the government – including Congress with Dianne Feinstein, Mike Rogers, Lindsey Graham and Saxby Chambliss leading the pack – is lying to the American people and attempting to dismiss and cover up the NSA surveillance apparatus. Most of our supposed “representatives” are fully on board with the effort to turn the United States into the most effective police state ever imagined.

The goal here is obvious – the government has systematically designed and constructed a surveillance apparatus intended to subvert the Constitution and the Fourth Amendment under the bogus pretext of responding to the attacks of September 11, 2001 and engaging in a boundless and open-ended war on terrorism that does not threaten the United States and, as the evidence reveals, is largely nonexistent, but puts forward the policy objectives of the ruling elite.

The end game is not the eradication of al-Qaeda or the protection of the American people from the hyped-up ravages of terrorism, but the installation of a high-tech surveillance mechanism that will effectively result in apanopticon where political opposition to the establishment and the ruling elite will be virtually impossible.