Tucker: NSA planned to leak my emails to media outlets https://nypost.com/2021/07/07/tucker-carlson-claims-he-was-unmasked-by-nsa-f... https://www.youtube.com/watch?v=U9bKEPWviEU Tucker: NSA Disclosed My Emails https://www.youtube.com/watch?v=QlitOLX8KtU SpyVeillance: People are Concerned https://www.youtube.com/watch?v=e-2n7lEi--M NSA Spying on US Citizens https://video.foxnews.com/v/6262789335001/ Glenn Greenwald on NSA https://www.youtube.com/watch?v=bll9mmodikM Styx's Pussy Responds
Tucker: NSA planned to leak my emails to media outlets
Now the NSA and its inbred OIG, both of which report to Democrat bosses, is investigating itself for what will likely yet again turn out to be yet another Democrat scheme of Govt spy wrongdoing to slander and shutdown the very popular opposition voice in Carlson... NSA's Inspector General Opens Probe Into Allegations Of Illegal Spying On Tucker Carlson https://greenwald.substack.com/p/the-nsas-inspector-general-opens https://oig.nsa.gov/Portals/71/Reports/Announcements/NSAOIG_Review_Alleged_T... https://therecord.media/nsa-review-finds-that-tucker-carlsons-communications... https://www.axios.com/tucker-carlson-putin-interview-surveillance-c9952d7c-3... The independent watchdog agency which investigates potential wrongdoing by the National Security Agency (NSA) announced on Tuesday morning that it has opened an investigation into “recent allegations that the NSA improperly targeted the communications of a member of the U.S. news media.” Though the oversight unit, the NSA’s Office of the Inspector General, did not specify the journalist in question, the statement leaves no doubt that the investigation pertains to news reports that the identity of Fox News host Tucker Carlson had been improperly “unmasked” and illegally revealed within the intelligence community. The full statement from the Inspector General reads: SUBJECT: Review Related to Alleged NSA Targeting of a Member of the U.S. Media The National Security Agency Office of the Inspector General (OIG) announced that it is conducting a review related to recent allegations that the NSA improperly targeted the communications of a member of the U.S. news media. The OIG is examining NSA’s compliance with applicable legal authorities and Agency policies and procedures regarding collection, analysis, reporting, and dissemination activities, including unmasking procedures, and whether any such actions were based upon improper considerations. If circumstances warrant, the OIG will consider other issues that may arise during the review. The NSA’s Inspector General, Robert P. Storch, is a long-time Executive Branch functionary. He was first appointed to this position by President Obama in 2016 but failed to receive Senate confirmation. He was then re-appointed by President Trump in 2018 and the Senate then confirmed him. A widely respected bureaucrat in Washington, he also previously served as deputy Inspector General in Obama’s Justice Department, and, prior to that, was a federal prosecutor. It is, to put it mildly, difficult to imagine him opening an investigation into frivolous allegations. The scandal began when Carlson announced on his show in late June that he had heard from a source inside the government that the NSA was in possession of his communications, as proven by their knowledge of what he was doing. The NSA then issued a meaningless non-denial denial, insisting that the Fox host “has never been an intelligence target of the Agency.” Even Fox’s critics acknowledge the irrelevance of that claim: there are many ways for the NSA to spy on an American citizen without having them be a formal “target” of the agency. In a follow-up interview on Fox, Carlson said he was told by a second source that the NSA had discovered his attempts to interview Russian President Vladimir Putin and viewed leaking of that information as potentially damaging to his reputation. Corporate media outlets largely sided with the NSA, mocking Carlson for being conspiratorial and even accusing him of fabricating a story. One might think that journalists would have more interest in finding out whether the NSA was abusing their powers to discredit a journalist than cheering the security state for partisan reasons, but one would be wrong. Disdain for Carlson’s claims were widespread in media circles. But Carlson’s concerns appeared to be at least partially corroborated when Axios’ Jonathan Swan reported that “U.S. government officials learned about Carlson's efforts to secure the Putin interview.” Though Swan emphasized that none of this meant that the NSA was targeting Carlson for surveillance or even that his communications had been “incidentally” collected — meaning that the NSA read his emails or heard his conversations because he was communicating with one of their targets — their knowledge of Carlson’s activities raised the question of whether Carlson’s identity had been “unmasked” by the agency. As Swan wrote: In order to know that the texts and emails were Carlson's, a U.S. government official would likely have to request his identity be unmasked, something that's only permitted if the unmasking is necessary to understand the intelligence. When the NSA learns about the communications or activities of an American citizen without having a warrant from the FISA court to spy on that person, they are required by law to engage in “minimization” efforts to protect the privacy of that citizen. In particular, when preparing reports involving such spying, they are required to conceal — to “mask” — the identity of the American about whom they learned information, referring to them only by a generic title sufficient to describe their work or status without revealing their specific identity (e.g., “an American journalist” or “a business executive”). But in late July, the story appeared to take a sinister turn when a news outlet called The Record, run by a private security firm, revealed that two separate NSA sources admitted that Carlson’s identity had indeed been unmasked. Specifically, the site reported, while these sources insisted that Carlson had never been targeted for spying, and that his communications had not been incidentally intercepted, the NSA “found that Carlson was mentioned in communications between third parties and his name was subsequently revealed through ‘unmasking,’ a process in which relevant government officials can request the identities of American citizens in intelligence reports to be divulged provided there is an official reason.” The site did not specify which government officials requested the unmasking or what justification they cited. It is extremely difficult to imagine any legitimate reason the NSA or any other intelligence agency would have for seeking to “unmask” the identity of a journalist who was merely seeking to interview the leader of a foreign country. There is, manifestly, nothing suspicious or even uncommon about seeking such an interview; indeed, doing so is fundamental to the work of any journalist. That the NSA attempted to discover which journalist was talking to Kremlin-linked sources in order to arrange this interview bolstered Carlson’s original suspicion that the NSA was seeking to leak damaging information about him. While it is true that interviewing foreign leaders should be regarded as benign for any journalist, it is clearly the case that in the political climate cultivated over the last five years in the U.S. — especially for conservative public figures — any communications with Russians or Kremlin-linked figures has been treated as nefarious and evidence of likely wrongdoing. It is this unmasking which is what appears to have prompted the IG’s decision to investigate the NSA’s activities regarding Carlson. Indeed, the IG’s statement explicitly describes the scope of the investigation as “examining NSA’s compliance with applicable legal authorities and Agency policies and procedures regarding collection, analysis, reporting, and dissemination activities, including unmasking procedures” (emphasis added). The standards governing unmasking are somewhat vague: yet another reason the NSA’s powers to spy domestically are so excessive. But some legitimate reason must be supplied to negate the suspicion that the agency knew it was likely Carlson seeking this interview and purposely unmasked his identity with the intent to weaponize the intelligence against him, knowing that any communications between a Fox News host and Russians could and would be used by liberal politicians and their media allies to imply a nefarious motive. Tucker Carlson vs NSA... https://www.youtube.com/watch?v=Or4n5j7HQEA Tucker vs NSA https://video.foxnews.com/v/6262817736001/ Tucker vs NSA https://www.youtube.com/watch?v=IYkh05F4LAQ Tucker vs NSA
https://news.yahoo.com/government-secretly-orders-google-track-151000879.htm... https://www.businessinsider.com/google-police-keyword-warrant-provide-search...
Remember... the news you see is only a TINY fraction the scope of story that exists... there are thousands of these illegal and immoral blanket trolling "warrants" spyveillancing everyone on the planet every day... it's not to catch or stop anything, else they would have trot out all their wins they claim to be getting since decades, but they have none of real note... it's really FUD, a way for their money, power, political, influence, manipulation, control, enslavement, jailing dissidents and the entirety of humanity seeking freedom from such power. Fight back. https://www.forbes.com/sites/thomasbrewster/2021/10/04/google-keyword-warran... https://www.documentcloud.org/documents/21077351-google-keyword-warrant-in-a... https://www.documentcloud.org/documents/21077350-google-keyword-warrant-2-in... https://www.documentcloud.org/documents/21077355-google-keyword-search-austi... https://www.documentcloud.org/documents/21077356-microsoft-keyword-warrant-i... https://www.documentcloud.org/documents/21077357-yahoo-keyword-warrant-austi... "Keyword Warrants" - Feds Secretly Ordered Google To Identify Anyone Searching Certain Information An accidentally unsealed court document reveals that the federal government secretly ordered Google to provide data on people searching specific search words or phrases, otherwise known as "keyword warrants," according to Forbes. According to the report, the Justice Department inadvertently unsealed the documents in September (which were promptly re-sealed), which were reviewed by Forbes. In several instances, law enforcement investigators asked Google to identify anyone searching for specific keywords. The first case was in 2019 when federal investigators were on the hunt for men they believed sex-trafficked a minor. According to a search warrant, the minor went missing but reappeared a year later and claimed to have been kidnapped and sexually assaulted. Investigators asked Google if anyone had searched the minor's name. The tech giant responded and provided law enforcement agents with Google accounts and IP addresses of those who made the searches. There have been other rare examples of so-called keyword warrants, such as in 2020 when police asked Google if anyone searched for the address of an arson victim in the government's racketeering case against singer R Kelly. Then in 2017, a Minnesota judge requested Google to provide information on anyone who searched for a fraud victim's name. Forbes also added this update post-publication: After publication, Jennifer Lynch, surveillance litigation director at the Electronic Frontier Foundation (EFF), highlighted three other Google keyword warrants that were used in the investigation into serial Austin bombings in 2018, which resulted in the deaths of two people. Not widely discussed at the time, the orders appear even broader than the one above, asking for IP addresses and Google account information of individuals who searched for various addresses and some terms associated with bomb making, such as “low explosives” and “pipe bomb.” Similar orders were served on Microsoft and Yahoo for their respective search engines. As for what data the tech companies gave to investigators, that information remains under seal. You can read the orders on Google here, here and here. The Microsoft and Yahoo orders can be found here and here. Every year, Google responds to thousands of warrant orders, but the latest keyword warrant is an entirely new strategy by government investigators and is becoming increasingly controversial. "Trawling through Google's search history database enables police to identify people merely based on what they might have been thinking about, for whatever reason, at some point in the past," Jennifer Granick, surveillance and cybersecurity counsel at the American Civil Liberties Union, told Forbes. "This never-before-possible technique threatens First Amendment interests and will inevitably sweep up innocent people, especially if the keyword terms are not unique and the time frame not precise. To make matters worse, police are currently doing this in secret, which insulates the practice from public debate and regulation," she added. Google responded news about secret keyword warrants and defended its decision: "As with all law enforcement requests, we have a rigorous process that is designed to protect the privacy of our users while supporting the important work of law enforcement," a Google spokesperson said. Court records reviewed by Forbes show Google has given away data on people who searched for specific keywords, which is more evidence the US is transforming into an authoritarian state of monitoring and surveillance of online activities just like China's.
Neighbor spats around globe setting case law... https://www.bbc.co.uk/news/technology-58911296 https://www.judiciary.uk/wp-content/uploads/2021/10/Fairhurst-v-Woodard-Judg... A judge has ruled that security cameras and a Ring doorbell installed in a house in Oxfordshire "unjustifiably invaded" the privacy of a neighbour, in a case that could have implications for home surveillance devices. Dr Mary Fairhurst claimed that the devices installed on the house of neighbour Jon Woodard broke data laws and contributed to harassment. The judge upheld both these claims. Mr Woodard now faces a substantial fine. He claimed he installed the devices in good faith as a deterrent against burglars. The origin of the row stems from an invitation from Mr Woodard to his neighbour Dr Fairhurst to have a tour of his home renovations, during which she claimed he showed off his new security system. The judgement reads that Dr Fairhurst was "alarmed and appalled" to notice that he had a camera mounted on his shed and that footage from it was sent to his smartphone. A series of disputes about the cameras followed, which resulted in Dr Fairhurst moving out of her home. In the judgement it was found that the Ring doorbell captured images of the claimant's house and garden, while the shed camera covered almost the whole of her garden and her parking space.
https://www.bloomberg.com/news/articles/2021-12-22/amazon-s-voice-controlled... "Alexa, You're Fired" - A Quarter Of Users Abandon Spying Devices Within 2 Weeks Anyone with an Amazon Alexa device has likely noticed that the smart speaker has tried to upsell them while asking about the weather in the last few months. This is because Amazon understands there is fading interest in its money-losing Alexa voice-controlled smart speaker division. According to internal data obtained by Bloomberg, 15% to 25% of new Alexa users during 2018 through 2021 completely abandoned the device in the second week of ownership. Amazon concluded that the market for smart speakers had "passed its growth phase" last year and would only grow 1.2% annually moving forward. The company lost $5 on average per Alexa device sold, and by 2028 expects to halve that number. Generating revenue through the Alexa devices has been challenging, hence why Alexa now has features that tell you what to wear when asking about the weather and even suggest buying those clothes on Amazon. These statistics don't paint an excellent outlook for Amazon's money-losing Alexa division that employs more than 10,000 people with fixed costs of around $4.2 billion in 2021. Even though Amazon has focused on new ways to regain user retention, maybe people are just tired of Alexa smart devices spying on them. There have been countless complaints, 75,000 and counting, of Amazon users fed up with the company's surveillance capitalism tactics to harvest their data with the core purpose of profit-making. This has spawned into at least three class-action suits alleging that Amazon devices recorded people without permission. The always-on microphone has sparked controversy with privacy advocates, and their calls to drop the devices have grown louder. Perhaps people are figuring out that having a corporation monitoring their conversations is too intrusive and why user retention is sinking.
https://www.blacklocks.ca/feds-admit-cell-surveillance/ https://nationalpost.com/news/canada/canadas-public-health-agency-admits-it-... https://www.telus.com/en/about/privacy/data-for-good Canada Admits To Secretly Tracking 33 Million Phones During Covid-19 Lockdown Canada - which has a population of 38 million - has admitted to secretly tracking 33 million phones during the Covid-19 lockown, according to the National Post, citing Blacklock's Reporter which first noted the disclosure. The country's Public Health Agency (PHAC) did so to assess "the public’s responsiveness during lockdown measures," according to the report. In March, the Agency awarded a contract to the Telus Data For Good program to provide “de-identified and aggregated data” of movement trends in Canada. The contract expired in October, and PHAC no longer has access to the location data, the spokesperson said. -National Post "Evidence is coming in from many sources, from countries around the world, that what was seen as a huge surveillance surge — post 9/11 — is now completely upstaged by pandemic surveillance," according to "Pandemic Surveillance" author David Lyon, the former director of the Surveillance Studies Centre and Queen's University in Ontario. "I think that the Canadian public will find out about many other such unauthorized surveillance initiatives before the pandemic is over—and afterwards." Location and movement data was purchased from Canadian telecom giant Telus in order to "understand possible links between the movement of populations within Canada and the spread of COVID-19," according to an agency spokesperson, who said that the mobility data analysis "helps to advance public health objectives." Privacy advocates say public health monitoring jeopradizes user privacy. (via National Post) Meanwhile, PHAC intends to continue tracking population movement for at least the next five years to monitor behavior concerning "other infectious diseases, chronic disease prevention and mental health," the spokesperson added. In a notice posted earlier this week, the agency called for contractors with access to “cell-tower/operator location data in the response to the COVID-19 pandemic and for other public health applications.” It asks for “de-identified cell-tower based location data from across Canada” beginning from from Jan. 2019 until the end of the contract period on May 31, 2023, with possibility of three one-year extensions. The contractor must provide anonymized data to PHAC and ensure its users have the ability to easily opt-out of mobility data sharing programs, the agency says. PHAC’s privacy management division conducted an assessment and “determined that since no personal information is being acquired through this contract, there are no concerns under the Privacy Act,” the spokesperson said. -National Post According to Lyon, PHAC is using "the same kinds of 'reassuring' language as national security agencies use, for instance not mentioning possibilities for re-identifying data that has been 'de-identified.'" "In principle, of course, cell data can be used for tracking," he added. "The pandemic has created opportunities for a massive surveillance surge on many levels—not only for public health, but also for monitoring those working, shopping and learning from home."
Globalist Elites Give Privacy Options to Themselves but NONE FOR YOU! Musk whines about opensource ADS-B twitter tracker. Cops Judges Politicians Pharma and GovCorp all get the priviledged Secrecy Treatment. Apple Maps And Google Maps Blur Tim Cook's House After He Wins Restraining Order Against Stalker https://www.cultofmac.com/764740/apple-maps-hides-tim-cook-house/ Apple Maps doesn't seem to mind showing the whole world your neighborhood and your house, but when it comes to the privacy of CEO Tim Cook - well, that's a whole 'nother issue. The company's Maps app has erected a giant digital wall in Palo Alto, where Tim Cook lives in a "modern, four-bedroom condo," according to Cult of Mac. Google Maps has also followed suit. The change took place after Apple was granted a temporary restraining order against an alleged stalker, the report says. The stalker claimed to be Cook's wife (who wants to tell her?), had threatened Apple's boss and was also caught trespassing on his property. Court documents filed in Santa Clara County show "a temporary restraining order against an alleged stalker [that] contained copies of emails sent to Cook," which included his home address. His stalker once wrote to Microsoft CEO Satya Nadella and Tim Cook on Twitter: “I notify you both unfollow each other. I can smell, see, and feel both of you. Tim Cook is my bed man. My husband, my twins’ daddy. Stop doing that shit!” Google offered a similar service to Billie Eilish’s primary residence after she was also granted a TRO last year due to a stalker that kept showing up at her home.
Musk whines about opensource ADS-B twitter tracker.
FAA Grants FOIA Request To College Kid Who Tracks Elon Musk's Private Jet https://twitter.com/ElonJet https://twitter.com/JxckSweeney https://grndcntrl.net/falconlanding/docs/ https://twitter.com/JxckSweeney/status/1489845771130310656 The college kid who created a proprietary Twitter bot that tracks Elon Musk's private jet announced an FAA FOIA request "went through" and now can track three SpaceX jets. 19-year-old Jack Sweeney, the mad genius behind the Twitter account "Elon Musk's Jet," announced early Saturday morning that his "FAA FOIA request went thru, Now I have all the registration and airworthiness documents for all the SpaceX jets." My FAA FOIA request went thru, Now I have all the registration and airworthiness documents for all the SpaceX jets. https://t.co/znXWAqCQ9T — Jack Sweeney (@JxckSweeney) February 5, 2022 Elon Musk's Jet uses public flight data to track not just Musk's private jet but two others. Sweeney uploaded registration and airworthiness documents of three SpaceX jets (including Musk's Gulfstream G650 and two other Gulfstream G550s). Days ago, Musk blocked Sweeney on Twitter after the billionaire became annoyed that Elon Musk's Jet account has hundreds of thousands of followers tracking his location. Musk offered the kid a lousy $5k to delete the account last month. Sweeney responded to the billionaire and asked for $50k or a Tesla Model 3. Musk didn't comply and told him that he was concerned about "crazy people" tracking his location. Tracking corporate jets of dealmakers is nothing new. Quandl, a flight monitoring company that sells flight data, uncovered a Warren Buffett deal before it happened after a big shot in the oil and gas industry flew to Omaha, Nebraska. As we've said numerous times, Sweeney should offload his bots to hedge funds before Musk finds a way to nuke the account. "Elon might not be interested in my offer, but I'm sure hedge funds that already use flight data to track corporate execs will find my flight tracking software one of the best out there. It's because I'm working with the most extensive open network ADS-B Exchange which is practically the best coverage for flight tracking that doesn't block any corporate execs. We all know FlightAware and FlightRadar24, but they censor many flights of corporate execs. My software doesn't. The rapid increase in Twitter followers proves hundreds of thousands of people who want this data," Sweeney told us. A question we have for Sweeney: What's your endgame? Instead of asking for a Model 3, shoot for the stars and ask for a Plaid.
Zuboff describes in The Age of Surveillance Capitalism Zuboffs book and another called Black Box Society
Zuboff describes in The Age of Surveillance Capitalism Zuboffs book and another called Black Box Society
https://www.technologyreview.com/2022/03/03/1046676/police-surveillance-minn... The secret police: Cops built a shadowy surveillance machine in Minnesota after George Floyd’s murder An investigation by MIT Technology Review reveals a sprawling, technologically sophisticated system in Minnesota designed for closely monitoring protesters. By Tate Ryan-Mosley Sam Richards March 3, 2022 Law enforcement agencies in Minnesota have been carrying out a secretive, long-running surveillance program targeting civil rights activists and journalists in the aftermath of the murder of George Floyd in May 2020. Run under a consortium known as Operation Safety Net, the program was set up a year ago, ostensibly to maintain public order as Minneapolis police officer Derek Chauvin went on trial for Floyd’s murder. But an investigation by MIT Technology Review reveals that the initiative expanded far beyond its publicly announced scope to include expansive use of tools to scour social media, track cell phones, and amass detailed images of people’s faces. Documents obtained via public records requests show that the operation persisted long after Chauvin’s trial concluded. What’s more, they show that police used the extensive investigative powers they’d been afforded under the operation to monitor individuals who weren’t suspected of any crime. MIT Technology Review’s investigation includes thousands of documents and more than two dozen interviews with Minnesota state employees, policing experts, and activists. Taken together, they paint a picture of a state operation intent on identifying participants through secretive surveillance operations. Though it was undertaken by nonmilitary governmental agencies using public funds, large swaths of its inner workings have gone undisclosed. We found evidence of a complex engine of surveillance tailor-made for keeping close tabs on protesters and sharing that information among local and federal agencies, regardless of whether the subjects were suspected of any wrongdoing. Operation Safety Net (OSN) was announced in February 2021, a month before Chauvin’s trial was set to begin. At a press conference also attended by Hennepin County sheriff David Hutchinson, Medaria Arradondo, then Minneapolis’s police chief, described the effort as a unified command that would enable law enforcement officials to mount a regional response in case protests turned violent. Publicly, OSN acknowledged that federal agencies would assist in monitoring for threats of violence and activity by out-of-state extremist groups, and that an “intel team” would be established to help share information surrounding these threats. Our investigation shows that federal support for OSN was in fact extensive, involving the US Department of Homeland Security and the Federal Bureau of Investigation. At least six FBI agents served in executive and intelligence roles for the program. According to OSN’s website, which was shut down on January 19, the program’s mission was to “preserve and protect lawful First Amendment nonviolent protests and demonstrations before, during, and after the trial of Chauvin, who was charged in George Floyd’s death.” The site added, “Operation Safety Net is also dedicated to preventing violent civil disturbances, assaultive actions, property damage, fires, and looting to government buildings, businesses, and critical infrastructure.” OSN hasn’t tweeted, posted on Facebook, or held a press conference since the week Derek Chauvin’s guilty verdict was issued in April 2021. At that time, officials told the public that the program was “ramping down,” apart from weekly coordination meetings and preparations for future trials. “We are already starting to maneuver, move people off of property protection details,” Major General Shawn Manke of the Minnesota National Guard said at the time. “We’re preparing those soldiers and airmen to leave the Twin Cities metro area and head back to their locations.” In an email to MIT Technology Review in October 2021, spokesperson Doug Neville wrote that OSN is “not an ongoing operation.” However, according to emails obtained and reviewed as part of our investigation, the operation does appear to be actively ongoing, with regular planning meetings of the executive and intelligence teams—where it has been referred to as “OSN 2.0”—and sharing of intelligence documents. No information about the goals or extent of the new engagement has been publicly disclosed and officials contacted about the program denied it had been formally renewed. Documents unearthed as part of this investigation shine a light on secretive surveillance programs, new technology vendors, murky supply chains used to arm riot police, and several watch lists, as well as other previously unreported information. Taken together, they reveal how advanced surveillance techniques and technologies employed by the state, sometimes in an extra-legal fashion, have changed the nature of protest in the United States, effectively bringing an end to Americans’ ability to exercise their First Amendment rights anonymously in public spaces. The Supreme Court has consistently upheld the right to anonymous free speech as a core tenet of the First Amendment, particularly when it comes to unpopular speech. An email to reporter Sam Richards on October 25, 2021 from spokesperson Doug Neville asserting that OSN is not an ongoing operation. The operation When Operation Safety Net was announced on February 17, 2021, Chauvin’s trial was looming. It had been nine months since the Minneapolis Police Department’s third precinct headquarters had been burned down amid tumultuous protest, and many feared that tensions could flare again. During the press conference—flanked by local and state law enforcement leadership, including the National Guard—Chief Arradondo laid out the program’s plan. He explained, “The focus and concentration will be in and around our downtown plaza corridor … This will be a unified command. It will allow all of us to be able to respond metro and region-wide if needed.” At the same press conference, Sheriff David Hutchinson of Hennepin County, which includes Minneapolis, spoke about how he would use county resources to protect the courthouse where Chauvin’s trial would be held. Hutchinson explained the main role of the sheriff’s office: “Court security. Our job is to ensure the integrity of the court proceedings and the safety of everybody who’s a part of it … I’m confident together we can ensure the court proceedings take place with no disruptions.” Each law enforcement leader who spoke promised that protests would be allowed. Some claimed they were encouraged. John Harrington, commissioner of the Department of Public Safety, said: “We are going to protect people’s constitutional rights and we are going to protect people’s property.” The city of Minneapolis also planned to pay local influencers to communicate on the city’s behalf in an effort to “de-escalate” and “fight misinformation.” After much criticism, these plans were later canceled. To support MIT Technology Review's journalism, please consider becoming a subscriber. Operation Safety Net was designed to have four phases, according to police officials. According to slides from the initial press conference, phase one involved preliminary planning, and phase two was meant for any protests that arose during jury selection. Chauvin’s trial began on March 29, 2021, in Minneapolis. Phase three was to start when the trial reached the closing arguments and a verdict, and Arradondo told residents to expect a “visual” ramp-up of police presence at that point. According to the operational plan outlined in the first press conference, this phase was to usher in the “full deployment of law enforcement and the national guard.” Armored vehicles, flash-bang grenades, rubber bullets, pepper spray and tear gas, as well as drones and other aircraft, were all features of phase three. Colonel Matthew Langer at the kickoff press conference. “This is a joint effort between the city of Minneapolis, Hennepin County, and the state of Minnesota, as well as the Metro Transit, Ramsey County, and other local jurisdictions. Agencies that are part of the effort include Minneapolis Police, Metro Transit Police, Hennepin County Sheriff’s Office, Ramsey County Sheriff’s Office, the Minnesota State Patrol, the Minnesota National Guard, and other entities.” The FBI and DHS were also key partners in the program. But Operation Safety Net would enter phase three on the morning of April 12—a week before closing arguments and eight days before the verdict in Chauvin’s case was delivered. Its focus would turn from the trial to protests in Brooklyn Center, a suburb north of Minneapolis, where a police officer had shot and killed 20-year-old Daunte Wright during a traffic stop the day before. The night of April 11, activists gathered outside the Brooklyn Center Police Department in defiance of a curfew. The police station was quickly fortified by fencing and barriers. Police made liberal use of tear gas over several nights of protests; it wafted into apartment buildings surrounding the police station and injured several residents. The lights on the station were turned off in an effort to make it harder for protesters to see and target officers. News reports estimated that 100 protesters encountered hundreds of police officers, as well as approximately 100 National Guard members. Around 30 arrests were made. Related Story Inside the rise of police department real-time crime centers Police departments want to know as much as they legally can. But does ever-greater surveillance technology serve the public interest? The next day, school was canceled. In response to the chaos of the previous night, the Brooklyn Center City Council hurried to pass a resolution banning aggressive police tactics such as rubber bullets, tear gas, and “kettling,” in which groups of protesters are blocked into a confined space. A curfew was also put into effect from 7 p.m. to 6 a.m. The council’s resolution went into effect by nightfall on the 12th, but police continued using the banned tactics and munitions. That night, approximately 20 businesses in the area were broken into. As part of the operation, Minneapolis Police also summoned helicopters from Customs and Border Protection (part of the US Department of Homeland Security). The presence of circling aircraft would become a hallmark of Operation Safety Net. During the peak of the protests, the helicopters came and went from a difficult-to-access industrial area near the Mississippi River between Brooklyn Center and Minneapolis, flying at high altitudes to avoid detection. On at least two nights during the height of the protests, which spanned nearly 10 days, law enforcement briefly detained and took detailed photographs of credentialed members of the press who were covering the events. The ACLU of Minnesota, along with pro bono lawyers from private law firms Fredrikson & Byron P.A., the law office of Kevin Riach and Apollo Law, recently settled a class action lawsuit against the Minnesota State Patrol over its treatment of journalists during the protests. The settlement requires the State Patrol to pay $825,000 to injured journalists, and a federal judge ordered an injunction lasting six years that prohibits the State Patrol and jointly responding agencies from attacking and arresting journalists, or ordering them to disperse from the scene of a protest. (Similar allegations are still being pursued against the city of Minneapolis and several officials.) On April 15, more than 75 community organizations, including the ACLU, issued a joint statement calling for the state to end OSN. “The state’s use of force against Minnesotans exercising their First Amendment rights in Brooklyn Center and militarization of our cities in response to police violence is wrong, traumatizing, and adding to the public health crisis of COVID, police brutality, and systemic racism,” the statement read. It called out the “continued use of militaristic tools of oppression to intimidate and halt peaceful, if justifiably angry, protest.” The NAACP also called for a stop to Operation Safety Net via Twitter. The Minneapolis Legislative Delegation, a group of state legislators, sent a letter to Minnesota governor Tim Walz condemning OSN and asking for a “reevaluation of tactics.” Congresswoman Ilhan Omar also criticized OSN, likening it to “a military occupation” and calling on Walz and Minneapolis mayor Jacob Frey to “stop terrorizing people who are protesting the brutality of state sanctioned violence.” On April 22, the US Department of Justice announced an investigation into the Minneapolis Police Department, citing a possible pattern of excessive use of force including in response to protests. The investigation is ongoing. All told, the operation cost tens of millions of public dollars, paid by the participating agencies. The Minnesota State Patrol alone paid $1,048,946.57, according to an email sent to MIT Technology Review, and the Minnesota National Guard estimated that its role cost at least $25 million. Despite the public costs, the detentions, and the criticism, however, most details of OSN’s attempts to surveil the public remained secret. Surveillance tools As part of our investigation, MIT Technology Review obtained a watch list used by the agencies in the operation that includes photos and personal information identifying journalists and other people “doing nothing more than exercising their constitutional rights,” Leita Walker, a lawyer representing journalists arrested in the protests who has examined the list, wrote in court documents. It was compiled by the Criminal Intelligence Division of the Hennepin County Sheriff’s Office—one of the groups participating in OSN—and included people arrested by the Minnesota State Patrol, another participant. The Minnesota State Patrol and Minneapolis Police Department both told MIT Technology Review in an email that they were not aware of the document and Hennepin County Sheriff’s Office did not reply to multiple requests for comment. OSN also used a real-time data-sharing tool called Intrepid Response, which is sold on a subscription basis by AT&T. It’s much like a Slack for SWAT: at the press of a button, images, video (including footage captured by drones), geolocations of team members and targets, and other data can be instantly shared between field teams and command center staff. Credentialed members of the press who were covering the unrest in Brooklyn Center were temporarily detained and photographed, and those photos were uploaded into the Intrepid Response system. Although the State Patrol denied numerous records requests from MIT Technology Review regarding the detention and photographing of journalists, photojournalist J.D. Duggan was able to obtain his personal file—a total of three pages of material. The information Duggan obtained illuminates the extent of law enforcement’s efforts to track individuals in real time: the pages include photos of his face, body, and press badge, surrounded by time stamps and maps showing the location of his brief detention. An image from the website of Intrepid Response, a data-sharing tool that OSN used to store photos of protesters and journalists. Previous reporting has shown that policing agencies participating in OSN also had access to many other technological surveillance tools, including a face recognition system made by the controversial firm Clearview AI, cell site simulators for cell-phone surveillance, license plate readers, and drones. Extensive social media intelligence gathering was a core part of OSN as well. Drones were also used during the earlier protests following Floyd’s murder, when a Predator operated by US Customs and Border Patrol—a technology typically used to monitor battlefields in Afghanistan, Iraq, and elsewhere—was spotted flying over the city. Interestingly, the drone flight and two National Guard spy plane flights revealed that the aerial surveillance technology the police already owned was actually superior. In a report, the inspector general of the US Air Force said, “Minnesota State Police transmitted their helicopter images … and noted the police imagery was much better quality” than that provided by the RC-26 spy planes the military operated over Minneapolis in the first week of June 2020. Police also issued a warrant to obtain Google geolocation information of people involved in the protests in May 2020. The intelligence teams In total, OSN would require officers from nine agencies in Minnesota, 120 out-of-state supporting officers, and at least 3,000 National Guard soldiers. The surveillance tools were managed by several different intelligence groups that collaborated throughout the operation. The structure of these intelligence teams, the personnel, and the extent of the involvement of federal agencies have not previously been reported. In the same area where helicopters from federal agencies were surreptitiously taking off and landing is a facility known as the Strategic Information Center. The SIC, as it’s called, was a central planning site for Operation Safety Net and also functions as an intelligence analysis hub, known as a “fusion center,” for the Minneapolis Police Department. The facility contains the latest technology and is plugged into citywide camera feeds and data-sharing systems. The SIC featured prominently in documents reviewed for this investigation and was used routinely by OSN leaders to coordinate field operations and intelligence work. Emails obtained through public records requests shed light on an “intel team” within Operation Safety Net. It was made up of at least 12 people from agencies including the Minneapolis and St. Paul police, the Hennepin County sheriff, the Minnesota Department of Public Safety and Metro Transit, and the FBI. The intel team used the Homeland Security Information Network (HSIN), run by the US Department of Homeland Security, to share information and appears to have met regularly through at least October 2021. The network offers access to facial recognition technology, though Bruce Gordon, director of communications at the Minnesota Department of Public Safety, told MIT Technology Review in an email that the state Bureau of Criminal Apprehension’s (BCA) fusion center “does not own or use facial recognition technology.” Our investigation shows clear and substantial involvement of federal agencies at the highest level of Operation Safety Net, with four FBI agents included in the executive team of operation in addition to the two on the intel team. Federal agents had also been deployed to several cities, including New York and Seattle, during the 2020 Black Lives Matter protests. In Portland, Oregon, the FBI launched a months-long surveillance operation which involved covertly filming activists. On June 2, 2020, the deputy director of the FBI David Bowdich released a memo encouraging aggressive surveillance of the activists, calling the protest movement “a national crisis.” The Department of Homeland Security also deployed around 200 personnel to cities around the US, with most reporting to Portland. Kyle Rudnitski, listed as an operations manager at the BCA fusion center in his email signature, acted as the administrator of HSIN for the intel team and the host for planning meetings. Rudnitski appeared to also be responsible for managing account permissions for the team. An email regarding the "OSN - Intel Team" monthly check-in sent from the operations manager at the BCA fusion center with access to the Homeland Security Information Network. Obtained via public records request. The BCA’s fusion center is the primary data-sharing center for Minnesota, but there are several operated by other law enforcement entities throughout the state. The facility is staffed by criminal intelligence analysts and others who run a constellation of intelligence-gathering tools and reporting networks. Fusion centers are intelligence-sharing and analysis hubs, spread throughout the country, that bring together intelligence from local, state, federal, and other sources. These centers were widely set up in the wake of the 9/11 terror attacks to consolidate intelligence and more rapidly assess threats to national security. According to the Department of Homeland Security’s website, these centers are intended to “increase collaboration” between agencies through data sharing. The centers are staffed by multiple police agencies, federal law enforcement and National Guard personnel, and sometimes contractors. The proliferation of these centers has come under intense scrutiny for raising the risk of abusive policing practices. “Instead of looking for terrorist threats, fusion centers were monitoring lawful political and religious activity. The Virginia Fusion Center described a Muslim get-out–the-vote campaign as ‘subversive,’” reads a 2012 report from the Brennan Center, a law and policy think tank. “In 2009, the North Central Texas Fusion Center identified lobbying by Muslim groups as a possible threat. The DHS dismissed these as isolated episodes, but a two-year Senate investigation found that such tactics were hardly rare. It concluded that fusion centers routinely produce ‘irrelevant, useless, or inappropriate’ intelligence that endangers civil liberties.” “Anonymity is a shield” In February 2022, policing in Minnesota again became a focus for protests after Minneapolis police shot and killed Amir Locke, a 22-year-old Black man who appeared to be sleeping on a couch when officers executed a no-knock warrant as part of a homicide investigation. Locke was not a suspect in the homicide, as initial police press releases about the incidents falsely claimed. Despite public statements that OSN was in “phase four” as of April 22, 2021—the final phase, in which the operation would “demobilize,” according to statements given during the initial press conference—it appears that the program was still ongoing when Locke was killed. Documents obtained by MIT Technology Review show that regular planning meetings, secured chat rooms, and the sharing and updating of operation documents remained in effect through at least October. The emails also contained details about a meeting on October 26, 2021, for the “OSN 2.0 Executive Team” that included among its agenda items “Potter Trial,” referencing the trial of Kim Potter in December, and “March 2022.” The FBI was included in the OSN 2.0 Executive Team emails. This agenda for "OSN 2.0 Executive Team Meeting" was attached to an email sent by the executive assistant to the chief of Minneapolis police. The email, obtained via public records request, was sent to over 30 people across OSN member groups, including federal agencies. “There never has been, nor is there now, an ‘OSN 2.0,’” Gordon told MIT Technology Review in email. “Any reference was an informal way of notifying state, local and federal partners that planning would take place … the Minnesota Fusion Center continues to share threat assessment information with law enforcement agencies in keeping with its mission. This was not unique to the time during which OSN existed.” Gordon also disputed the characterization that OSN itself amounted to large-scale surveillance activity. On Thursday, February 24, the three other officers on the scene when Chauvin murdered George Floyd were found guilty of federal crimes for a violating Floyd’s civil rights, though they still await a state trial. The events in Minnesota have ushered in a new era of protest policing. Protests that were intended to call attention to the injustices committed by police effectively served as an opportunity for those police forces to consolidate power, bolster their inventories, solidify relationships with federal forces, and update their technology and training to achieve a far more powerful, interconnected surveillance apparatus. Entirely new titles and positions were created within the Minneapolis Police Department and the aviation section of the Minnesota State Patrol that leverage new surveillance technologies and methods, which will be explained in detail in this investigative series. Anonymity is an important though muddy tenet of free speech. In a landmark 1995 Supreme Court case, McIntyre v. Ohio, the court declared that “anonymity is a shield from the tyranny of the majority.” Clare Garvie, a senior associate with the Georgetown Law Center on Privacy & Technology, says the case established that “to hold an unpopular speech and to be free to express that necessarily requires a degree of anonymity.” Though police do have the right to do things like take photographs at protests, Garvie says, “law enforcement does not have the right to walk through a protest and demand that everybody show their ID.” But a wild proliferation of technologies and tools have recently made such anonymous free speech nearly impossible in the United States. This story is the first in a series that will provide a rare glimpse behind the curtain during a transformative time for policing and public demonstration in the US. Correction: The original version of this story said that the ACLU had settled a lawsuit against the city of Minneapolis. The settlement was against Minnesota State Patrol. A similar action against the city is still ongoing.
https://www.vice.com/en/article/7kbbey/prison-phone-companies-are-recording-... Prison Phone Companies Are Recording Attorney-Client Calls Across the US Lawyers say their conversations with incarcerated people are being recorded and analyzed by private companies in at least nine US states. But their harm doesn't stop at fleecing incarcerated people, formerly incarcerated people, and their families. Securus also has some invasive and even illegal surveillance practices, like creating voiceprint databases and recording attorney-client calls. https://www.nbcnews.com/tech/tech-news/incarcerated-home-rise-ankle-monitors... Electronic monitoring is not an alt to incarceration, it's e-carceration and expanding the system. As advocate @waazn1 once told me, "electronic monitors turn your home into a cell and your family into guards." Also, EM often comes with a fee. Incarcerated at home: The rise of ankle monitors and house arrest during the pandemic Researchers who study recidivism say the surveillance devices hurt people trying to get their life on track after prison and that there’s no evidence the technology is rehabilitative. Private prison corps are not subject to open records laws, such as the Freedom of Information Act, like public correctional agencies. Accordingly, their actions, communications, and subcontracts are shielded from public oversight. Companies are constantly promising to cover the world in sensors as a utopian project but it’s actually a threat.
Report Shows FBI Spied On 3.3 Million Americans Without A Warrant, GOP Demands Answers https://www.theepochtimes.com/report-shows-fbi-spied-on-3-3-million-american... https://republicans-judiciary.house.gov/wp-content/uploads/2022/05/2022-05-2... Top House Republicans are demanding answers from the FBI after court-ordered information came to light showing that the federal agency had collected the information of over 3 million Americans without a warrant. Republican Representative from Ohio Jim Jordan speaks during the House Judiciary Committee hearing on Policing Practices and Law Enforcement Accountability at the U.S. Capitol in Washington, D.C. on June 10, 2020. (Michael Reynolds/Pool/Getty Images) In a May 25 letter to FBI Director Christopher Wray, Reps. Jim Jordan (R-Ohio) and Mike Turner (R-Ohio) asked Wray to explain why his agency had wiretapped and gathered personal information on over 3.3 million Americans without a warrant (pdf). Limited authority to gather foreign intelligence information is granted by the Foreign Intelligence Surveillance Act (FISA). Specifically, section 702 of the bill says: “the Attorney General (AG) and the Director of National Intelligence (DNI) may jointly authorize the targeting of (i) non-U.S. persons (ii) who are reasonably believed to be outside of the United States (iii) to acquire foreign intelligence information.” However, this power can grant an expanding circle of possible searches to the FBI and other intel agencies, who can use the same power against American citizens who had any interaction with targeted foreigners. Historically, insight into how FISA has been used against American citizens has been limited and hidden behind classified reports. However, a November 2020 decision by the Foreign Intelligence Surveillance Court (FISC)—which serves as a watchdog for U.S. intelligence agencies—required that the Office of the Director of National Intelligence (ODNI) report “the number of U.S. person queries run by the FBI against Section 702-acquired information.” In accordance with these new requirements, ODNI’s recently-released Annual Statistical Transparency Report included data on how often the FBI gathered information on American citizens using section 702 in 2021. In total, queries against U.S. citizens came out to a jaw-dropping 3,394,053 searches. By comparison, only 1,324,057 such queries were made in 2020, representing around a 250 percent increase during President Joe Biden’s first year in office. According to ODNI more than half of these queries—approximately 1.9 million—were part of the larger investigation of alleged Russian attempts to target or weaken U.S. critical infrastructure. The ODNI report also admitted that on at least four occasions, the FBI failed to get FISC approval before accessing the contents of information collected under section 702. This is not the first time the FBI has been caught red-handed overstepping its legal authority under section 702. In November 2020, the FISC announced that “the government … reported numerous incidents” in which the FBI reviewed information gathered under section 702 without obtaining proper permission from the court. On other occasions, the FISC noted, the FBI used section 702 for issues entirely unrelated to foreign intelligence. These included queries for criminal investigations about healthcare fraud, transnational organized crime, violent gangs, domestic terrorism involving racially motivated violent extremists, as well as investigations relating to public corruption and bribery.” “None of these queries was related to national security, and they returned numerous Section 702-acquired products in response,” the FISC noted. “Rigorous Congressional oversight of the FBI’s Section 702-related activities is essential given FBI’s track record utilizing its FISA authorities,” Jordan and Turner ruled in view of the FBI’s past overreach. FBI Director Christopher Wray testifies before the Senate Judiciary Committee on Capitol Hill, in Washington, on March 2, 2021. (Mandel Ngan-Pool/Getty Images) In their letter to Wray, Jordan and Turner laid out a laundry list of questions about the report, demanding further transparency and explanations on the revelation that the FBI has often overstepped its legal authority to spy on American citizens. Among other questions, they requested a full accounting of all 3,394,053 citizens who showed up in FBI queries and “[the] number of preliminary or full investigations into any U.S. citizens the FBI has initiated as a result of information obtained through any of these U.S. person queries, and the nature of the predication for each such investigation.” They also asked for information on the 1.9 million Americans queried over alleged Russian efforts to compromise U.S. critical infrastructure. Specifically, they asked for, “The rationale for why these queries were found to be compliant with the FBI’s Section 702 querying procedures [and the] total number of U.S. citizens the FBI identified as victims of these compromises(s) pursuant to these queries.” In addition, they demanded “A detailed statement about the FBI’s investigation, including the status of the investigation and any information uncovered about the identity of the Russian actors and their involvement with or connection to the Russian government, if any.” Additionally, they asked for information gathered under FISA rules in the years between 2015 and 2020, as well as for an explanation of the FBI’s overreach of authority on various occasions. The letter demands that Wray provide a written response by no later than 5 p.m. on June 7. FISA Section 702 was last authorized by Congress for a six-year period in 2018 and will be up for reauthorization in 2024.
https://www.usaspending.gov/agency/department-of-defense?fy=2022 https://en.wikipedia.org/wiki/ARGUS-IS https://www.aclu.org/news/national-security/drone-nightmare-scenario-now-has... https://www.baesystems.com/en/product/autonomous-realtime-ground-ubiquitous-... http://video.pbs.org/video/2326108547 https://www.youtube.com/watch?v=0p4BQ1XzwDg https://www.bloomberg.com/features/2016-baltimore-secret-surveillance/ https://www.flightglobal.com/civil-uavs/sierra-nevada-fields-argus-is-upgrad... https://www.extremetech.com/mobile/184597-stingray-the-fake-cell-phone-tower... https://radiolab.org/episodes/eye-sky https://radiolab.org/episodes/update-eye-sky https://phys.org/news/2013-01-pbs-gigapixel-drone-imaging.html https://www.forbes.com/sites/jonathanocallaghan/2019/09/01/trump-accidentall... https://en.wikipedia.org/wiki/Laser\_microphone https://phys.org/news/2008-02-pentagon-lasers-voices.html https://futurism.com/the-byte/watch-invisibility-cloak-military-use https://www.youtube.com/watch?v=fGZzNZnYIHo https://www.nytimes.com/2020/06/19/us/politics/george-floyd-protests-surveil...
Google is the CIA's best TOP-SECRET friend. 1984. "Users Have A Right To Know": Class Action Lawsuit Sheds Light Onto Google's Opaque Data-Mining Practices https://www.marketwatch.com/story/i-dont-have-the-faintest-idea-what-google-... It turns out that big tech companies may not be as committed to your privacy as their PR departments would have you believe - go figure. The latest example of this reality appears to be Google, who was revealed last week by MarketWatch to have data-mining practices that employees say that they sometimes “don’t understand and can’t describe”. The report cited a class action lawsuit alleging that Google "violated promises not to collect data of those using the browser without signing into their Google accounts". Documents recently became unsealed in the case, offering a look into how privacy is discussed internally at Google. In the lawsuit, one unnamed employee seemed to make it clear that Google's privacy policies are opaque, stating: “I don’t have the faintest idea what Google has on me. The fact what we can’t explain what we have […] on users is probably our biggest challenge." “Users have a right to know,” one employee said. Another commented: "The reasons we provide are so high level and abstract that they don’t make sense to people.” A third employee said: “Consent is no longer consent if you think of ads as a product." Additional employees seemed to solidify the ethos within the company. A former employee who recently left the company said: “I am more than willing to believe this is how executives talked to each other." “Even people I was organizationally close to, knew well, and respected, were finding ways to justify that stuff to themselves,” they said about the company's privacy teams. “The individual contributors [on Google’s privacy teams] are always idealistic people. Some of these quotes [from the case] look to me like things that idealistic people would say; others look like things management would say when the idealistic people aren’t around.” When asked by MarketWatch, Google responded to the report by stating that “privacy controls have long been built into our services and we encourage our teams to constantly discuss or consider ideas to improve them.” As the report notes, ads are a material revenue generator for Google, making up $209.5 billion in sales for the company in its 2021 fiscal year.
Democrats Pelosi Obama Biden Kept Immoral Unconstitutional NSA CIA FBI Domestic Ops Running Edward Snowden @Snowden 3h After the last couple years, hard to ignore the feeling that the CIA's Color Revolutions are coming home. We may come to regret spending decades normalizing the practice of disregarding elections, the precedent for ousting presidents. 258 1,333 77 6,334 Edward Snowden retweeted LindyMan @PaulSkallas Jan 5 I don't know what's going on over there. But I hope everyone is ok 181 411 107 4,130 Show this thread Edward Snowden @Snowden Jan 7 skim milk is a crime 2,998 2,289 459 32,983 Edward Snowden @Snowden Jan 7 look it had to be said 226 116 7 4,005 Edward Snowden retweeted Edward Snowden @Snowden 18 Jul 2022 people are like "I'm not going to eat the crickets." oh you're gonna eat the crickets, brother. they're gonna be everywhere. they're gonna put em in Hot Pockets. your kids are gonna be like "mom! i want the pizza crickets!" 2,165 5,803 1,302 36,068 Edward Snowden @Snowden Jan 7 delivering a sermon on the dangers of "seed oils" as he washes down his Whopper™ with a liter of Mountain Dew™ 409 658 73 11,048 Edward Snowden retweeted Glenn Greenwald @ggreenwald Jan 5 The reason this matters - beyond the key role Obama and Pelosi played in preserving NSA domestic spying - is that a handful of establishment leaders in both parties agree on most things, and rule the country together as a club. Most members have no power: Joshua Reed Eakle @JoshEakle Jan 4 Replying to @JoshEakle "The fundamental problem in Congress is the centralization of power... As speaker, I'd decentralize and open up the process." @justinamash Show this thread 59 520 26 1,981 Show this thread Edward Snowden retweeted Glenn Greenwald @ggreenwald Jan 5 The incident Amash is referencing is amazing. In the wake of the Snowden reporting, there was huge bipartisan support for reining in the NSA's domestic spying. Amash and John Conyers co-wrote a bill poised to pass. Then Obama got Nancy Peolsi to whip enough Dem votes to sink it👇 49 754 27 2,489 Show this thread Edward Snowden retweeted Glenn Greenwald @ggreenwald Jan 5 Listen to this @justinamash clip, putting his finger on something vital: Joshua Reed Eakle @JoshEakle Jan 4 Replying to @JoshEakle "In Congress, there are basically 3, 4, or 5 people deciding everything right now." @justinamash Show this thread 84 811 48 3,039 Show this thread Edward Snowden retweeted Glenn Greenwald @ggreenwald Jan 4 Adam Schiff is (for now) the Chair of the House Intelligence Committee - with immense power over Big Tech and FBI/CIA - so when he "requests" that Big Tech platforms ban journalists who are his critics, it's inherently coercive and, in any event, completely improper: Matt Taibbi @mtaibbi Jan 3 Replying to @mtaibbi 27.They also received an astonishing variety of requests from officials asking for individuals they didn’t like to be banned. Here, the office for Democrat and House Intel Committee chief Adam Schiff asks Twitter to ban journalist Paul Sperry: Show this thread 154 1,780 66 5,622 Show this thread Edward Snowden @Snowden Jan 4 This was more than 15 years ago now, but at the actual CIA, the default password used by the systems engineering team for *all kinds* of things was basically "password1234". Not a joke. Sam Bankman-Fraud @bankman_fraud Jan 4 Replying to @Snowden Was the password to the file "password" 577 2,552 246 20,302 Edward Snowden @Snowden Jan 4 The other ones were kept on the desktop in a spreadsheet called "passwords.xls" 300 527 28 7,501 Edward Snowden @Snowden Jan 4 The US gov, through the FBI, had the censorship units at major internet platforms on speed dial. Public figures that claimed such a year ago were cast out of polite society as lunatics. When it is now established to be true, the same polite people now shrug: "Trust the ruler." Matt Taibbi @mtaibbi Jan 3 Replying to @mtaibbi 24.They eventually settled on an industry call via Signal. In an impressive display of operational security, Chan circulated private numbers of each company’s chief moderation officer in a Word Doc marked “Signal Phone Numbers,” subject-lined, “List of Numbers.” Show this thread 230 3,221 117 11,864 Edward Snowden @Snowden Jan 4 There is the faintest sense of deja vu with this one. 92 334 11 4,088 Edward Snowden retweeted Matt Taibbi @mtaibbi Jan 3 12.Roth saw GEC’s move as an attempt by the GEC to use intel from other agencies to “insert themselves” into the content moderation club that included Twitter, Facebook, the FBI, DHS, and others: 55 1,991 48 9,942 Show this thread Edward Snowden retweeted Matt Taibbi @mtaibbi Jan 3 25.Twitter was taking requests from every conceivable government body, beginning with the Senate Intel Committee (SSCI), which seemed to need reassurance Twitter was taking FBI direction. Execs rushed to tell “Team SSCI” they zapped five accounts on an FBI tip: 87 3,026 151 11,159 Show this thread Edward Snowden retweeted Matt Taibbi @mtaibbi Jan 3 26.Requests arrived and were escalated from all over: from Treasury, the NSA, virtually every state, the HHS, from the FBI and DHS, and more: 84 2,766 118 10,944 Show this thread Edward Snowden retweeted Matt Taibbi @mtaibbi Jan 3 27.They also received an astonishing variety of requests from officials asking for individuals they didn’t like to be banned. Here, the office for Democrat and House Intel Committee chief Adam Schiff asks Twitter to ban journalist Paul Sperry: 1,086 11,848 2,089 32,991 Show this thread Edward Snowden retweeted Matt Taibbi @mtaibbi Jan 3 37.“I APOLOGIZE IN ADVANCE FOR YOUR WORK LOAD”: Requests poured in from FBI offices all over the country, day after day, hour after hour: If Twitter didn’t act quickly, questions came: “Was action taken?” “Any movement?” 81 2,239 120 8,531 Show this thread Edward Snowden @Snowden Jan 3 "Bug," or "undocumented feature?" Breitbart News @BreitbartNews Jan 3 According to a recent report, a bug in Google Home smart speakers allowed for the installation of a backdoor account that could be used to control the device and access its microphone feed. trib.al/D7iYdnE 826 5,874 204 30,324
Juan caught wanking to Pelosi again... Roomba Robot Vacuum Testers Find "Intimate" Photos Of Themselves On The Web https://www.breitbart.com/tech/2023/01/11/roomba-testers-feel-misled-after-i... Well, it looks like you can score one for all of the "conspiracy theorists" who have said they don't like "smart" appliances in their home because they feel like they were being spied on. And you can tell those writing off these concerns that intimate photos of some Roomba tester vacuums have magically turned up on Facebook after being ascertained by Venezuelan gig workers. One woman even found photographs of herself on the toilet, taken by her robot vacuum. What a time to be alive! Breitbart reported last week that gig workers had posted pictures online where they were discussing "work-related matters". One photo was a woman sitting on a toilet seat with her shorts pulled down to her mid thighs - it was taken by her Roomba J7 series robot vacuum, the report says. The photos were sent to iRobot by Scale AI, a startup that contracts workers to label AI data used to train artificial intelligence, the report says. Users had agreed to "participate in the data collection" as part of a testing. They signed consent forms but now say they feel "misled" about the true nature of the consent. Albert Fox Cahn, executive director of the Surveillance Technology Oversight Project, told Brietbart: “There is a real concern about whether the company is being deceptive if people are signing up for this sort of highly invasive type of surveillance and never fully understand… what they’re agreeing to.” The MIT Technology Review conducted an investigation and determined it to be gig workers in Venezuela. There were also photos of a child and a woman using the restroom, the report says. iRobot has terminated its agreement with ScaleAI in response to the investigation.
nitter Logo Name Redacted @NameRedacted247 United States Joined December 2022 Tweets 210 Following 145 Followers 36,483 Likes 107 61 Photos and videos Tweets Tweets & Replies Media Search Load newest Name Redacted @NameRedacted247 19 Dec 2022 1. After learning that Twitter employs at least 15 former FBI agents, I searched Facebook. What I found is alarming Facebook currently employs at least 115 people, in high-ranking positions, that formerly worked at FBI/CIA/NSA/DHS: 17 CIA 37 FBI 23 NSA 38 DHS Thread🧵 1,436 17,035 1,818 29,556 Name Redacted @NameRedacted247 19 Dec 2022 2. All, but a few, of the former intelligence agents were hired, by Facebook after the 2016 Presidential Election & after the FBI established their social media-focused task force FTIF. 25 1,144 36 3,757 Name Redacted @NameRedacted247 19 Dec 2022 3. As @mtaibbi detailed in #TwitterFiles Part 6, we know there was massive coordination of censorship between the FBI & Twitter during 2020-2022. Who is controlling “misinfo” censorship at Facebook? Is there similar coordination between Facebook & the Intelligence community? 39 974 29 3,526 Name Redacted @NameRedacted247 19 Dec 2022 4. The following is a list (obtained through PUBLICLY available LinkedIn profiles) of former CIA/FBI/NSA/DHS that are currently working at Facebook, at least 10 work in the Trust & Safety (Misinfo) department. Many of the LinkedIn profiles are private so those will not be posted. 14 898 24 2,918 Name Redacted @NameRedacted247 19 Dec 2022 5. Aaron Berman (He/Him) leads the Misinformation Policy team at Facebook. According to Aaron’s public LinkedIn profile, he worked for the CIA for 17 years. linkedin.com/in/aarondberman… 75 1,329 65 3,821 Name Redacted @NameRedacted247 19 Dec 2022 6. Aaron states that his experience at the CIA included writing President’s Daily Brief, leading briefings for Cabinet members, senior NSC officials & members of Congress. 7 658 17 2,307 Name Redacted @NameRedacted247 19 Dec 2022 7. On Twitter, Aaron is followed by Yoel Roth & admits he is friends with Trust & Safety people at Twitter. Was Facebook coordinating with Twitter on info-sharing to censor posts they deem as ‘misinfo’? archive.vn/7r2vX This tweet is unavailable 52 872 24 2,861 Name Redacted @NameRedacted247 19 Dec 2022 8. Aaron admits to specific Facebook campaigns where he tackles “misinfo.” Re: COVID19, they allow ‘health authorities’ to guide what Facebook should label as misinformation archive.vn/85N7v This tweet is unavailable 15 662 19 2,113 Name Redacted @NameRedacted247 19 Dec 2022 9. On a YouTube discussion, with Stanford, Aaron admits that Facebook works with a ‘Global network of over 80 fact checker Organizations” who direct Facebook on which posts to reduce distribution, add warning labels & shadowban 35 909 52 2,327 40,360 Name Redacted @NameRedacted247 19 Dec 2022 10. Aaron discusses in detail the lengths Facebook goes to in censoring what they deem as COVID19 misinfo, specifically on Vaccines 25 740 39 2,121 23,672 Name Redacted @NameRedacted247 19 Dec 2022 11. Here is the entire YouTube video where Aaron and members from Twitter & Google discuss misinformation censoring piped.kavin.rocks/watch?v=hB_YNbnt… The Role of Social Media Companies - Dr. Anne Merritt, Aaron Berman,... youtube.com 15 706 23 1,972 Name Redacted @NameRedacted247 19 Dec 2022 12.Brazil Election misinfo censorship. archive.vn/JSgET This tweet is unavailable 25 691 43 2,042 Name Redacted @NameRedacted247 19 Dec 2022 13.Philippines Election misinfo censorship. archive.vn/Mm15a This tweet is unavailable 9 593 17 1,797 Name Redacted @NameRedacted247 19 Dec 2022 14.Russia/Ukraine War misinfo censorship. archive.vn/9jAkq This tweet is unavailable 7 606 13 1,787 Name Redacted @NameRedacted247 19 Dec 2022 15. Aaron tweeted that the CIA backs insurgency groups archive.vn/i8KiE This tweet is unavailable 6 576 19 1,718 Name Redacted @NameRedacted247 19 Dec 2022 16.“As a current combatant against misinfo and former intelligence officer” archive.vn/9jAkq This tweet is unavailable 12 463 11 1,583 Name Redacted @NameRedacted247 19 Dec 2022 17. Climate change censorship & again, Aaron states that Facebook partners “with more than 80 independent fact-checking organizations” archive.vn/gArWb archive.vn/6ijCS This tweet is unavailable 15 578 20 1,750 Name Redacted @NameRedacted247 19 Dec 2022 18.Deborah B. (She/Her). Current Facebook Trust & Safety. Former CIA Analyst 15 years. linkedin.com/in/deborah-b-21… Deborah B. - United States | Professional Profile | LinkedIn View Deborah B.’s professional profile on LinkedIn. LinkedIn is the world’s largest business network, helping professionals like Deborah B. discover inside connections to recommended job candidates,... linkedin.com 6 523 13 1,534 Name Redacted @NameRedacted247 19 Dec 2022 19.Scott S. (He/Him) current Facebook Senior Manager Trust & Safety. Former CIA 7 years. linkedin.com/in/scottbstern/ 5 489 9 1,517 Name Redacted @NameRedacted247 17 Dec 2022 Jon, you would not have this story without my initial thread highlighting the 15 FBI agents working at Twitter. You should have credited my work as the foundation to your story. Jon Levine @LevineJonathan 17 Dec 2022 NEW from me James Baker was only the tip of the iceberg. Twitter's top ranks are riddled with former FBI agents nypost.com/2022/12/17/twitte… Show this thread 13 46 5 163 Load more
nitter Logo Name Redacted @NameRedacted247 United States Joined December 2022 Tweets 208 Following 145 Followers 36,490 Likes 108 61 Photos and videos Tweets Tweets & Replies Media Search Load newest Name Redacted retweeted Thomas Massie @RepThomasMassie 10 Dec 2022 Why does the FBI need a retirement plan when they have Twitter? Name Redacted @NameRedacted247 7 Dec 2022 1. @elonmusk , Your new company @Twitter has many ex FBI/CIA agents in high ranks. Should probably do a little housecleaning. Thread 🧵 Show this thread 226 1,110 37 5,605 Name Redacted retweeted Breanna Morello @BreannaMorello 14 Dec 2022 Great work by @NameRedacted247 for uncovering this story. Back on Monday we covered @NameRedacted247’s findings on @AbsoluteWithE and we also gave him credit for his investigation. Benny Johnson @bennyjohnson 14 Dec 2022 What are Spies doing working for Social Media companies? @ElonMusk should take a look at anyone in the FBI, Intel community or any foreign operatives currently working for Twitter and make sure there are no more Jim Bakers working against him from the inside.. 11 96 3 243 Name Redacted retweeted TheLastRefuge @TheLastRefuge2 10 Dec 2022 This is exceptional. Well done. Takes effort that should be appreciated. And I have not always been in agreement with NameRedacted, but this deserves major kudos. Name Redacted @NameRedacted247 7 Dec 2022 1. @elonmusk , Your new company @Twitter has many ex FBI/CIA agents in high ranks. Should probably do a little housecleaning. Thread 🧵 Show this thread 29 225 5 630 Name Redacted retweeted Sebastian Gorka DrG @SebGorka 11 Dec 2022 Twitter is still full of FBI and CIA conduits. 👇🏻 Name Redacted @NameRedacted247 7 Dec 2022 1. @elonmusk , Your new company @Twitter has many ex FBI/CIA agents in high ranks. Should probably do a little housecleaning. Thread 🧵 Show this thread 87 648 22 2,034 Name Redacted retweeted Scott Adams @ScottAdamsSays 10 Dec 2022 Holy Mole-y. Name Redacted @NameRedacted247 7 Dec 2022 1. @elonmusk , Your new company @Twitter has many ex FBI/CIA agents in high ranks. Should probably do a little housecleaning. Thread 🧵 Show this thread 132 486 24 2,372 Name Redacted retweeted Elon Musk @elonmusk 10 Dec 2022 Twitter is both a social media company and a crime scene 35,117 93,329 8,493 683,790 Name Redacted @NameRedacted247 9 Dec 2022 .@jack lied to Congress. That's a crime. What say you Jack Dorsey? Terri Green @TerriGreenUSA 9 Dec 2022 Jack Dorsey denied what we knew was true, Twitter was rigged to censor conservatives. 20 181 5 431 Name Redacted @NameRedacted247 7 Dec 2022 5. Douglas Turner - current Twitter Senior Manager, Corporate and Executive Security Services. Ex FBI 14 years. Ex Secret Service 7 years. linkedin.com/in/turnerdoug37… 17 970 15 3,721 Name Redacted @NameRedacted247 7 Dec 2022 6. Patrick G. - current Twitter Head of Corporate Security. Ex FBI Special Agent 23 years. linkedin.com/in/p98378573839… 11 934 12 3,564 Name Redacted @NameRedacted247 7 Dec 2022 7. Karen Walsh - current Twitter Director - Corporate Resilience. Ex FBI Special Agent 21 years linkedin.com/in/karen-walsh/ Karen Walsh - Director - Corporate Resilience - Twitter | LinkedIn View Karen Walsh’s profile on LinkedIn, the world’s largest professional community. Karen has 4 jobs listed on their profile. See the complete profile on LinkedIn and discover Karen’s connections and... linkedin.com 14 909 14 3,445 Name Redacted @NameRedacted247 7 Dec 2022 8. Russell Handorf - current Twitter Senior Staff Technical Program Manager. Ex FBI 10 years. linkedin.com/in/handorf/ 10 855 9 3,312 Name Redacted @NameRedacted247 7 Dec 2022 9. Michael B. - current Twitter Senior Corporate Security Manager. Ex FBI 23 years. linkedin.com/in/michaelbertr… Michael B. - Crisis Manager - Twitter | LinkedIn View Michael B.’s profile on LinkedIn, the world’s largest professional community. Michael has 4 jobs listed on their profile. See the complete profile on LinkedIn and discover Michael’s connections... linkedin.com 10 839 8 3,229 Name Redacted @NameRedacted247 7 Dec 2022 10. Vincent Lucero - current Twitter Senior Security Manager. Ex FBI Special Agent 22 years. linkedin.com/in/vincent-luce… 16 855 10 3,238 Name Redacted @NameRedacted247 7 Dec 2022 11. Kevin L. - current Twitter Corporate Security Manager. Ex FBI Special Agent 25 years. linkedin.com/in/kevin-l-a570… 12 776 6 3,059 Name Redacted @NameRedacted247 7 Dec 2022 12. Matthew W. - current Twitter Senior Director of Product Trust, Revenue Policy, and Counsel Systems & Analytics. Ex FBI 15 years. linkedin.com/in/matthew-w-61… 13 762 12 2,976 Name Redacted @NameRedacted247 7 Dec 2022 13. Claire O. - current Twitter Senior Corporate Security Analyst. Ex FBI 8 years. linkedin.com/in/claireobrien… Claire O. - Portland, Oregon, United States | Professional Profile | LinkedIn View Claire O.’s professional profile on LinkedIn. LinkedIn is the world’s largest business network, helping professionals like Claire O. discover inside connections to recommended job candidates,... linkedin.com 13 749 6 2,903 Name Redacted @NameRedacted247 7 Dec 2022 14. Bruce A. - current Twitter Director, Corporate Security. Ex FBI 23 years. linkedin.com/in/bruceapplin3… Bruce A. - Director, Insider Threats and Data Protection Engineering - Twitter | LinkedIn High impact, results-driven and inclusive security leader. Globally experienced in both the private sector and government with executive protection, investigations, threat intelligence, risk assess... linkedin.com 16 743 5 2,860 Name Redacted @NameRedacted247 7 Dec 2022 15. Jeff Carlton - current Twitter Senior Manager. Ex FBI & CIA Intelligence Analyst 3 years. linkedin.com/in/jeff-usna/ 20 754 13 2,913 Name Redacted @NameRedacted247 7 Dec 2022 16. What do all of these Twitter employees have in common? They were ALL hired since @realDonaldTrump was elected. Why, after Trump was elected, did Twitter hire over a dozen ex FBI/CIA agents and place them in Senior Management roles? 120 2,363 158 7,131 Name Redacted @NameRedacted247 7 Dec 2022 17. @elonmusk - how many "Jim Bakers" are imbedded in Twitter, possibly working against you? or....."watching" you. I'd advise you to do some investigating and clean house. 85 1,391 41 5,939 Show this thread Load more
nitter Logo Name Redacted @NameRedacted247 United States Joined December 2022 Tweets 208 Following 145 Followers 36,490 Likes 108 61 Photos and videos Tweets Tweets & Replies Media Search Load newest Name Redacted @NameRedacted247 7 Dec 2022 1. @elonmusk , Your new company @Twitter has many ex FBI/CIA agents in high ranks. Should probably do a little housecleaning. Thread 🧵 1,295 9,639 2,432 22,010 Name Redacted @NameRedacted247 7 Dec 2022 2. Kevin Michelena - current Twitter Sr. Corporate Security Analyst. Ex FBI Intelligence Analyst 12 years linkedin.com/in/kevin-p-mich… 54 1,247 52 4,531 Name Redacted @NameRedacted247 7 Dec 2022 3. Doug Hunt - current Twitter Senior Director. Ex FBI Special Agent 20 years. linkedin.com/in/doug-hunt-42… Doug Hunt - Senior Director - Twitter | LinkedIn Doug has over 25 years of experience solving high risk crises and complex investigations. Doug repeatedly demonstrates the ability to successfully build and motivate teams while developing the... linkedin.com 28 1,087 20 4,141 Name Redacted @NameRedacted247 7 Dec 2022 4. Mark Jaroszewski - current Twitter Director Corporate Security/Risk. Ex FBI 20 years linkedin.com/in/mark-jaro/ Mark Jaroszewski - San Francisco Bay Area | Professional Profile | LinkedIn View Mark Jaroszewski’s professional profile on LinkedIn. LinkedIn is the world’s largest business network, helping professionals like Mark Jaroszewski discover inside connections to recommended job... linkedin.com 12 1,039 14 3,937 Load more
The USA CISA Govt Agency are your Corrupt 1984 Censors too. But wait, there's more coming to fuck you into Dystopia, and you stupid sheep continue to bend over for that totalitarian cock... U.S. Senate bill crafted with DEA targets end-to-end encryption https://therecord.media/senate-dea-bill-targets-end-to-end-encryption-requir... US senate coming after users privacy. A Senate bill called the Cooper Davis Act aims to require social media companies and encrypted communications providers to report drug activity on their platforms to the DEA. Privacy advocates are concerned that this legislation would turn these companies into de facto drug enforcement agents and expose them to liability for providing end-to-end encryption. The bill includes controversial language that holds companies accountable for conduct they don't report if they deliberately blind themselves to violations. Law enforcement argues that end-to-end encryption creates a lawless space for criminals, while privacy advocates argue that determining drug sales is more challenging than identifying child sexual abuse material. The bill's potential impact on encryption and privacy is a cause for concern.
Been telling you need to build global p2p nets for years, no one listens. So you're gonna get fucked like sheep. @michelleweekley 25 Dec 2023 When I can back to the United States in 2018 after being abroad for several years, I started saying that the censorship here was worse than China. Obviously this was a hot take. But my thesis is that at least in China, the rules are clear. They’re very black and white about their censorship. In the US, there was still a charade. Many people thought I was crazy but 2020 woke many people up. Started on January 1, 2024 @TMobile will begin fining customers for speech they don’t like. Not limited to but including SHAFT content. What’s that? 👇🏼 S: Sexually inappropriate content H: Hate speech or profanity A: Alcohol F: Firearms, and depictions or endorsements of violence T: Tobacco (including vaping), or endorsement of illegal or illicit drugs, including marijuana and cannabis The charade that they’re “not” reading the content of your text messages is over. The charade that the first amendment still stands, is over. The charade that Americans are not subject to politically objective “hate speech” regulations, is over. I genuinely don’t know what the answer is. I’m not sure there is one. But awareness is extremely important. Speak up.
https://twitter.com/LizaGoitein/status/1734249938333167889 Elizabeth Goitein @LizaGoitein 11 Dec 2023 RED ALERT: Buried in the House intelligence committee’s Section 702 “reform” bill, which is schedule for a floor vote as soon as tomorrow, is the biggest expansion of surveillance inside the United States since the Patriot Act. 1/11
https://twitter.com/LizaGoitein/status/1734249938333167889 Elizabeth Goitein @LizaGoitein 11 Dec 2023 RED ALERT: Buried in the House intelligence committee’s Section 702 “reform” bill, which is schedule for a floor vote as soon as tomorrow, is the biggest expansion of surveillance inside the United States since the Patriot Act. 1/11
Elizabeth Goitein @LizaGoitein 11 Dec 2023 Through a seemingly innocuous change to the definition of “electronic service communications provider,” the bill vastly expands the universe of U.S. businesses that can be conscripted to aid the government in conducting surveillance. 2/11 33 1,665 45 6,237 Elizabeth Goitein @LizaGoitein 11 Dec 2023 Under current law, the government can compel companies that have direct access to communications, such as phone, email, and text messaging service providers, to assist in Section 702 surveillance by turning over the communications of Section 702 targets. 3/11 12 1,215 24 5,071 Elizabeth Goitein @LizaGoitein 11 Dec 2023 Under Section 504 of the House intelligence committee’s bill, any entity that has access to *equipment* on which communications may be transmitted or stored, such as an ordinary router, is fair game. What does that mean in practice? It’s simple… 4/11 19 1,263 32 5,009 Elizabeth Goitein @LizaGoitein 11 Dec 2023 Hotels, libraries, coffee shops, and other places that offer wifi to their customers could be forced to serve as surrogate spies. They could be required to configure their systems to ensure that they can provide the government access to entire streams of communications. 5/11 66 2,166 140 6,505 Elizabeth Goitein @LizaGoitein 11 Dec 2023 Even a repair person who comes to fix the wifi in your home would meet the revised definition: that person is an “employee” of a “service provider” who has “access” to “equipment” (your router) on which communications are transmitted. 6/11 18 1,286 26 4,980 Elizabeth Goitein @LizaGoitein 11 Dec 2023 The bill’s sponsors deny that Section 504 is intended to sweep so broadly. What *is* the provision intended to do, and how is the government planning to use it? Sorry, that’s classified. 7/11 13 1,115 33 5,100 Elizabeth Goitein @LizaGoitein 11 Dec 2023 At the end of the day, though, the government’s claimed intent matters little. What matters is what the provision, on its face, actually allows—because as we all know by now, the government will interpret and apply the law as broadly as it can get away with. 8/11 12 992 20 5,046 Elizabeth Goitein @LizaGoitein 11 Dec 2023 This isn’t a minor or theoretical concern. One of the FISA Court amici posted a blog to warn Americans about this provision. I can’t overstate how unusual it is for FISA Court amici to take to the airwaves in this manner. We’d be foolish to ignore it. 9/11 zwillgen.com/law-enforcement… House Intelligence Committee FISA “Reform” Bill Would Greatly Expand the Class of Businesses and... Yesterday the House Permanent Select Committee on Intelligence unanimously approved the FISA Reform and Reauthorization Act of 2023 (FRRA), which would reauthorize Section 702 of the Foreign Intell... zwillgen.com 12 1,897 35 5,793 Elizabeth Goitein @LizaGoitein 11 Dec 2023 If you don't want to have to worry that the NSA is tapping into communications at the hotel where you're staying, tell your House representative to vote NO on the House intelligence bill this week. More on the many flaws with that bill here: 10/11 brennancenter.org/our-work/r… FISA "Reform" and Reauthorization Act: The Biggest Expansion in Government Surveillance Since the... A one-page document compiled by the Brennan Center for Justice and the Electronic Privacy Information Center that illustrates how the FISA "Reform" and Reauthorization Act is the biggest expansion in... brennancenter.org 40 2,011 80 5,512 Elizabeth Goitein @LizaGoitein 11 Dec 2023 Instead, they should vote for the Protect Liberty & End Warrantless Surveillance Act, a bill passed by the House Judiciary Committee on a 35-2 vote that would reauthorize Sec. 702 with strong reforms to protect Americans’ privacy and civil liberties. 11/11 judiciary.house.gov/media/pr… House Judiciary Committee Applauds Bipartisan Passage of H.R. 6570, the Protect Liberty and End... WASHINGTON, D.C. – Today, House Judiciary Committee Chairman Jim Jordan (R-OH), Ranking Member Jerry Nadler (D-NY), Subcommittee on Crime and Federal Government Surveillance Chairman Andy Biggs... judiciary.house.gov 116 1,902 62 6,390
participants (1)
-
grarpamp