Category Archives: Privacy

Edward Snowden to Speak at SXSW Interactive Via Videoconference

Monday, March 10: Edward Snowden to Speak at SXSW Interactive Via Videoconference

By Hugh Forrest
SXSW: March 4, 2014

Surveillance and online privacy look to be one of the biggest topics of conversation at the 2014 SXSW Interactive Festival. The number of sessions on this topic reflect the importance of this issue to the digital creatives who converge in Austin each March. As organizers, SXSW agrees that a healthy debate with regards to the limits of surveillance is vital to the future of the online ecosystem.

On Monday, March 10 at 11:00 am, join us for a conversation between Edward Snowden and Christopher Soghoian, the principal technologist of the American Civil Liberties Union. The conversation will be focused on the impact of the NSA’s spying efforts on the technology community, and the ways in which technology can help to protect us from mass surveillance. Hear directly from Snowden about his beliefs on what the tech community can and must do to secure the private data of the billions of people who rely on the tools and services that we build.

This session will be moderated by Ben Wizner, who is director of the ACLU’s Speech, Privacy & Technology Project and Edward Snowden’s legal advisor. Audience members will have the opportunity to ask questions.

“A Virtual Conversation with Edward Snowden” occurs in Exhibit Hall 5 on the first floor of the Austin Convention Center. The session will also be simulcast in two other large rooms in the Austin Convention Center — in Ballroom D (on the top floor of the building, near the SX Bookstore) and in Ballrooms BC (on the first floor of the building, at the southeast corner near Waller Creek). You must have an Interactive, Gold or Platinum badge to attend this session. Entry to “A Virtual Conversation with Edward Snowden” will be allowed on a first come / first served basis — we strongly encourage you to arrive early to Exhibit Hall 5 (or Ballroom D or Ballroom BC) to make sure that you get a seat.

However, if you cannot be at SXSW Interactive on Monday, March 10 at 11:00 am CST, then you can watch a free livestream of the session courtesy of The Texas Tribune. Based in Austin, the Texas Tribune is a nonpartisan, nonprofit media organization that promotes civic engagement and discourse on public policy, politics, government and other matters of statewide and national concern.

Beginning Monday afternoon, March 10, a recording of the “Virtual Conversation with Edward Snowden” will be available for free replay via the ACLU website.

Source:SXSW

Texas Tribune
ACLU replay

—-
Alternative Free Press -fair use-

Police Hide Warrantless Phone Tracking From Courts

Police Hide Use of Cell Phone Tracker From Courts Because Manufacturer Asked

By Nathan Freed Wessler
ACLU: March 3, 2014

It appears that at least one police department in Florida has failed to tell judges about its use of a cell phone tracking device because the department got the device on loan and promised the manufacturer to keep it all under wraps. But when police use invasive surveillance equipment to surreptitiously sweep up information about the locations and communications of large numbers of people, court oversight and public debate are essential. The devices, likely made by the Florida-based Harris Corporation, are called “stingrays,” and unfortunately this is not the first time the government has tried to hide their use.

So the ACLU and ACLU of Florida have teamed up to break through the veil of secrecy surrounding stingray use by law enforcement in the Sunshine State, last week filing a motion for public access to sealed records in state court, and submitting public records requests to nearly 30 police and sheriffs’ departments across Florida seeking information about their acquisition and use of stingrays (examples here and here).

Also known as “cell site simulators,” stingrays impersonate cell phone towers, prompting phones within range to reveal their precise locations and information about all of the calls and text messages they send and receive. When in use, stingrays sweep up information about innocent people and criminal suspects alike.

The power of stingrays, and the lengths to which police will go to conceal their use, are demonstrated by an ongoing case in Florida, State v. Thomas. As revealed in a recent opinion of a Florida appeals court, Tallahassee police used an unnamed device — almost certainly a stingray — to track a stolen cell phone to a suspect’s apartment. (The case’s association with stingrays was first pointed out by CNET’s Declan McCullagh in January). They then knocked on the door, asked permission to enter and, when the suspect’s girlfriend refused, forced their way inside, conducted a search, and arrested the suspect in his home. Police opted not to get warrants authorizing either their use of the stingray or the apartment search. Incredibly, this was apparently because they had signed a nondisclosure agreement with the company that gave them the device. The police seem to have interpreted the agreement to bar them even from revealing their use of stingrays to judges, who we usually rely on to provide oversight of police investigations.

When the suspect’s lawyer tried to ask police how they tracked the phone to his client’s house, the government refused to answer. A judge eventually forced the government to explain its conduct to the lawyer, but only after closing the courtroom to the public and sealing the transcript of the proceedings so the public and the press could never read it. Only later, when the case was heard on appeal, did the most jaw-dropping fact leak out. As two judges noted during the oral argument, as of 2010 the Tallahassee Police Department had used stingrays a staggering 200 times without ever disclosing their use to a judge to get a warrant.

Potentially unconstitutional government surveillance on this scale should not remain hidden from the public just because a private corporation desires secrecy. And it certainly should not be concealed from judges.

(read the full article at ACLU)

—-
Alternative Free Press -fair use-

Webcam images from millions of users intercepted by GCHQ

In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.

Yahoo webcam images from millions of users intercepted by GCHQ

By Spencer Ackerman and James Ball
The Guardian: February 27, 2014

Britain’s surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.

GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.

In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.

Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of “a whole new level of violation of our users’ privacy”.

GCHQ does not have the technical means to make sure no images of UK or US citizens are collected and stored by the system, and there are no restrictions under UK law to prevent Americans’ images being accessed by British analysts without an individual warrant.

The documents also chronicle GCHQ’s sustained struggle to keep the large store of sexually explicit imagery collected by Optic Nerve away from the eyes of its staff, though there is little discussion about the privacy implications of storing this material in the first place.

Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.

The system, eerily reminiscent of the telescreens evoked in George Orwell’s 1984, was used for experiments in automated facial recognition, to monitor GCHQ’s existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs.

Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users’ feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ’s servers. The documents describe these users as “unselected” – intelligence agency parlance for bulk rather than targeted collection.

One document even likened the program’s “bulk access to Yahoo webcam images/events” to a massive digital police mugbook of previously arrested individuals.

“Face detection has the potential to aid selection of useful images for ‘mugshots’ or even for face recognition by assessing the angle of the face,” it reads. “The best images are ones where the person is facing the camera with their face upright.”

The agency did make efforts to limit analysts’ ability to see webcam images, restricting bulk searches to metadata only.

However, analysts were shown the faces of people with similar usernames to surveillance targets, potentially dragging in large numbers of innocent people. One document tells agency staff they were allowed to display “webcam images associated with similar Yahoo identifiers to your known target”.

Optic Nerve was based on collecting information from GCHQ’s huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA’s XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo’s webcam traffic.

(Read the full report at The Guardian)

—-
Alternative Free Press -fair use-

Gates Foundation Collecting Private Info on 11 Million Students

Gates Foundation Launches Giant Database on School Children ‘inBloom’

By Trey Sanchez
Truth Revolt: February 24, 2014

Private information for over 11 million students is being collected

The Bill and Melinda Gates Foundation gave $100 million to fund a giant database to collect private information of American school children starting in early education and extending all the way through high school.

Promoted as a technological tool to help teachers tailor education to the individual needs of students, inBloom is a database that stores student’s scores, attendance, special needs, disabilities, etc. The intent is to exploit the technology that is available today to replace antiquated paper records.

Launched in February of 2013, inBloom is working with nine states representing over 11 million students. The nonprofit organization was launched to help educators keep up with the ever changing standards of state Common Core education.

So far, the states include Colorado, Delaware, Georgia, Illinois, Kentucky, Louisiana, Massachusetts, New York and North Carolina.

(Read the full article at Truth Revolt)

—-
Alternative Free Press -fair use-

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

By Glenn Greenwald
The Intercept: February, 24, 2014

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations”.

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world”, including “information ops (influence or disruption)”.

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell”, devoted to “online human intelligence” and “strategic influence and disruption”:

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack”, while dissecting how human being can be manipulated using “leaders”, “trust, “obedience” and “compliance”:

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

(Read the full report at The Intercept)

Full Source Documents: HERE
—-
Alternative Free Press -fair use-

Cyber-Security Experts Ask If Apple “Flaw” Was Really NSA Backdoor

Security hole appeared just one month before NSA bragged it had penetrated Apple servers

By Steve Watson
Infowars: February 24, 2014

Following an admission by Apple that a “bug” in its operating system had left devices open to potential hacking, experts are questioning whether the security hole was intentional, in order to allow the NSA backdoor access as part of its mass spying program.

On Friday Apple acknowledged that a “goto fail” command in the company’s SecureTansport protocol had left iPhones, iPads, and MacBooks vulnerable to data intercept on networks and wireless connections. Anyone who had knowledge of the security flaw, could have accessed secure data, Apple noted, declaring that ” a software fix will be released very soon.”

Johns Hopkins University cryptography professor Matthew Green told Reuters that the flaw (see below) was “as bad as you could imagine.”

Several coding experts are now raising their eyebrows over the matter, noting that the timeline of the inception of the security flaw matches up with leaked NSA slides that document how the spy agency had managed to gain access to Apple’s severs.

According to coder and App developer Jeffrey Grossman, who has studied the code in question, the flaw only appeared in iOS 6.0 and was not present in iOS 5.11.

Immediately, tech experts began to note that iOS 6.0 was released in September 2012, just one month before Apple was added to the NSA’s list of penetrated servers, according to slides leaked by Edward Snowden.

Noting that while the evidence is circumstantial, blogger John Gruber, a computer scientist, says that “the shoe fits” where the NSA’s Apple breakthrough is concerned.

“Sure would be interesting to know who added that spurious line of code to the file,” he notes. “Conspiratorially, one could suppose the NSA planted the bug, through an employee mole, perhaps. Innocuously, the Occam’s Razor explanation would be that this was an inadvertent error on the part of an Apple engineer. It looks like the sort of bug that could result from a merge gone bad, duplicating the goto fail; line.”

Gruber has laid out five potential scenarios, personally leaning toward number three:

1. Nothing. The NSA was not aware of this vulnerability.
2. The NSA knew about it, but never exploited it.
3. The NSA knew about it, and exploited it.
4. NSA itself planted it surreptitiously.
5. Apple, complicit with the NSA, added it.

“…once the bug was in place, the NSA wouldn’t even have needed to find the bug by manually reading the source code. All they would need are automated tests using spoofed certificates that they run against each new release of every OS.” Gruber states.

“Apple releases iOS, the NSA’s automated spoofed certificate testing finds the vulnerability, and boom, Apple gets “added” to PRISM. ([It] wasn’t even necessarily a fast turnaround — the NSA could have discovered the vulnerability over the summer, while iOS 6 was in developer program beta testing.)” Gruber concludes.

Other tech bloggers concur that it is strange how such a major flaw wasn’t spotted or fixed sooner. “The timing is rather odd, and it makes you wonder how such a serious bug went undiscovered for over a year.” writes Cody Lee of iDownloadblog.

Ashkan Soltani, another security expert has compiled a list of current Apple applications that he believes are vulnerable to security hole that is still open on the current version of OS X for the Mac. The list includes basic apps such as mail, safari, twitter, facetime and calender. These apps transmit and store exactly the type of information NSA has targeted.

Just one month ago, a new Snowden leak revealed that the NSA had infiltrated iPhones with a program known as DROPOUT JEEP, which allowed the agency access to text messages, voicemails and other personal data.

(Read more at Infowars)

—-
Alternative Free Press -fair use-

NSA increases spying on government aids

No spying on friends: NSA bugs Merkel aides instead of chancellor

RT: February 24, 2014

In the wake of President Obama’s promise to stop spying on German Chancellor Angela Merkel, the US intelligence has switched its attention to her top government officials, a German newspaper reported.

Washington’s relations with Germany were strained last year after revelations that the US National Security Agency (NSA) was conducting mass surveillance in Germany and even tapped the mobile phone of Chancellor Merkel.

Facing the German outrage, President Barack Obama pledged that the US would stop spying on the leader of the European country, which is among the closest and most powerful allies of America.

After the promise was made, the NSA has stepped up surveillance of senior German officials, German newspaper Bild am Sonntag (BamS) reported on Sunday.

“We have had the order not to miss out on any information now that we are no longer able to monitor the chancellor’s communication directly,” it quoted a top NSA employee in Germany as saying.

BamS said the NSA had 297 employees stationed in Germany and was surveying 320 key individuals, most of them German decision-makers involved in politics and business.

(Read more at RT)

—-
Alternative Free Press -fair use-

Attorney for Edward Snowden Interrogated at U.K. Airport, Placed on “Inhibited Persons List”

Democracy Now: December 18, 2014

Four journalists who revealed the National Security Agency’s vast web of spying have been awarded the 2013 George Polk Awards in Journalism. Glenn Greenwald, Laura Poitras, Ewen MacAskill of The Guardian and Barton Gellman of The Washington Post were among the winners announced on Sunday. Even as the journalists who broke the stories based on Edward Snowden’s leaks were awarded one of journalism’s highest honors, a lawyer who represents Snowden was recently detained while going through customs at London’s Heathrow Airport. Jesselyn Radack joins us today to tell her story. Radack says she was subjected to “very hostile questioning” about Snowden and her trips to Russia. Radack also learned she might be on an “inhibited persons list,” a designation reportedly used by the U.S. Department of Homeland Security to require further vetting of certain passengers. Radack is just one of a growing number of people who are being stopped, harassed and interrogated for their work around Snowden, WikiLeaks and National Security Agency documents. Radack is the director of National Security & Human Rights at the Government Accountability Project, the nation’s leading whistleblower support organization.

Transcript
This is a rush transcript. Copy may not be in its final form.

NERMEEN SHAIKH: Four journalists who revealed the National Security Agency’s vast web of spying have been awarded the 2013 George Polk Awards in Journalism. Glenn Greenwald, Laura Poitras, Ewen MacAskill of The Guardian and Barton Gellman of The Washington Post were among the winners announced on Sunday. Even as the journalists who broke the stories based on Snowden’s leaks were awarded one of journalism’s highest honors, a lawyer who represents Snowden was detained while going through customs at London’s Heathrow Airport. Jesselyn Radack told Firedoglake she was subjected to, quote, “very hostile questioning” about Snowden and her trips to Russia. Radack also learned she might be on an inhibited persons list, a designation reportedly used by the U.S. Department of Homeland Security to require further vetting of certain passengers. After the Polk Awards were announced, Glenn Greenwald tweeted, quote, “In the UK government, this is known as the George Polk Award for Excellence in Terrorism.”

Jesselyn Radack is just one of a growing number of people who are being stopped, harassed and interrogated for their work around Edward Snowden, WikiLeaks and National Security Agency documents. In this clip, we hear from journalist Laura Poitras, computer security researcher Jacob Appelbaum, and then journalist Glenn Greenwald’s partner David Miranda, who have all been stopped and interrogated in airports.

LAURA POITRAS: I’ve actually lost count of how many times I’ve been detained at the border, but it’s, I think, around 40 times. And on this particular trip, lately they’ve been actually sending someone from the Department of Homeland Security to question me in the departing city, so I was questioned in London about what I was doing. I told them I was a journalist and that, you know, my work is protected, and I wasn’t going to discuss it.

JACOB APPELBAUM: I was targeted by the U.S. government and essentially, until the last four times that I’ve flown, I was detained basically every time. Sometimes men would meet me at the jetway, similarly, with guns.

DAVID MIRANDA: [translated] I stayed in a room with three different agents that were entering and exiting. They spoke to me, asking me questions about my whole life. They took my computer, my video game, cellphone, everything.

AMY GOODMAN: That was journalist Glenn Greenwald’s partner David Miranda; before him, computer security researcher Jacob Appelbaum and journalist Laura Poitras. You can go to our website to see our interview with Jacob Appelbaum and Laura Poitras at democracynow.org. But all of them have been interrogated at airports, as has most recently Jesselyn Radack, the attorney representing Edward Snowden, joining us from London. She is a former ethics adviser to the U.S. Department of Justice under George W. Bush, currently director of National Security & Human Rights at the Government Accountability Project, the nation’s leading whistleblower organization.

(read the full transcript at Democracy Now)

Source: http://www.democracynow.org/2014/2/18/attorney_for_edward_snowden_interrogated_at

….
Alternative Free Press -fair use-

NSA Vows To Spy Even More

NSA Weighs Retaining Data for Suits

Rule That Evidence Can’t Be Destroyed Would Lead to Expansion of Controversial Phone Program

By Devlin Barrett and Siobhan Gorman
WSJ: February 19, 2014

The government is considering enlarging the National Security Agency’s controversial collection of Americans’ phone records—an unintended consequence of lawsuits seeking to stop the surveillance program, according to officials.

A number of government lawyers involved in lawsuits over the NSA phone-records program believe federal-court rules on preserving evidence related to lawsuits require the agency to stop routinely destroying older phone records, according to people familiar with the discussions. As a result, the government would expand the database beyond its original intent, at least while the lawsuits are active.

No final decision has been made to preserve the data, officials said, and one official said that even if a decision is made to retain the information, it would be held only for the purpose of litigation and not be subject to searches. The government currently collects phone records on millions of Americans in a vast database that it can mine for links to terror suspects. The database includes records of who called whom, when they called and for how long.

President Barack Obama has ordered senior officials to end the government storage of such data and find another place to store the records—possibly with the phone companies who log the calls. Under the goals outlined by Mr. Obama last month, the government would still be able to search the call logs with a court order, but would no longer possess and control them.

National Security Agency Director Keith Alexander has said the program, if it had existed in 2001, would have uncovered the Sept. 11 plot. Critics of the program, including the American Civil Liberties Union and the Electronic Frontier Foundation, have sued the government, saying the program violates the Constitution’s Fourth Amendment protections against unreasonable searches.

Patrick Toomey, an ACLU lawyer, said no one in the government has raised with his group the possibility the lawsuits may actually expand the database they call unconstitutional. “It’s difficult to understand why the government would consider taking this position, when the relief we’ve requested in the lawsuit is a purge of our data,” he said.

Cindy Cohn, legal director at the Electronic Frontier Foundation, which also is suing over the program, said the government should save the phone records, as long as they aren’t still searchable under the program. “If they’re destroying evidence, that would be a crime,” she said.

Ms. Cohn also questioned why the government was only now considering this move, even though the EFF filed a lawsuit over NSA data collection in 2008.

In that case, a judge ordered evidence preserved related to claims brought by AT&T Inc. customers. What the government is considering now is far broader.

“I think they’re looking for any way to throw rocks at the litigation,” added Ms. Cohn. “To the extent this is a serious concern, we should have had this discussion in 2008.”

Another person who has filed a class-action suit over the program is Sen. Rand Paul (R., Ky.). Mr. Paul’s lawyer, former Virginia Attorney General Ken Cuccinelli, called the approach under consideration “just silly.” He said he was sure his clients would be happy to agree to the destruction of their phone records held by the government, without demanding those records in pretrial discovery.

(read the full report at WSJ)

Source: http://online.wsj.com/news/articles/SB10001424052702303636404579393413176249186

….
Alternative Free Press -fair use-

Maryland Legislators Move To Kill NSA Headquarters

Maryland Legislators Move To Kill NSA Headquarters

By Michael Lotfi
BenSwann.com

ANNAPOLIS, Md., February 10, 2014– It’s lights out for the National Security Agency (NSA). State lawmakers in Maryland have filed emergency status legislation that seeks to cut the NSA’s Ft. Meade headquarters off from all material support stemming from the state.

“Maryland has almost become a political subdivision of the NSA,” Tenth Amendment Center Executive Director Michael Boldin said in a statement. “The agency relies heavily on state and local help. This bill bans all of it.”

House Bill 1074 (HB1074) would ban the NSA facility from all public state utilities, ban the use of NSA collected evidence in court, ban universities from partnering with the NSA and ban all political subdivisions from assisting the NSA from within the state.

Any state entity, employee or contractor refusing to comply with the law would be immediately fired and banned from all future contracts within the state.

The bill has eight Republican sponsors and has been referred to the House Judiciary Committee.

Multiple states join Maryland in their attempt to enforce anti-commandeering legislative measures against the NSA. Tennessee, Arizona, California and Washington have all filed legislation. Utah is expected to file legislation within the coming weeks.

(read the full report at BenSwann.com)

Source: http://benswann.com/breaking-maryland-legislators-move-to-kill-nsa-headquarters/

….
AlternativeFreePress.com -fair use-