{"id":71971,"date":"2017-05-01T17:49:24","date_gmt":"2017-05-01T21:49:24","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=71971"},"modified":"2017-05-01T17:50:08","modified_gmt":"2017-05-01T21:50:08","slug":"what-is-the-nsa-up-to-now","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=71971","title":{"rendered":"What is the NSA up to now?"},"content":{"rendered":"<h2>Big Brother Is Still Watching You: Don\u2019t Fall for the NSA\u2019s Latest Ploy<\/h2>\n<p><!--more--><strong>By John W. Whitehead<\/strong><br \/>\nMay 01, 2017<\/p>\n<blockquote><p>\u201cYou had to live\u2014did live, from habit that became instinct\u2014in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.\u201d\u2014George Orwell,\u00a0<em>1984<\/em><\/p><\/blockquote>\n<p>Supposedly the National Security Administration is going to <a href=\"http:\/\/www.wired.com\/2017\/04\/big-change-nsa-spying-marks-win-american-privacy\/\">stop collecting certain internet communications<\/a> that merely mention a foreign intelligence target.<\/p>\n<p>Privacy advocates are hailing it as a major victory for Americans whose communications have been caught in the NSA\u2019s dragnet.<\/p>\n<p>If this is a victory, it\u2019s a hollow victory.<\/p>\n<p>Here\u2019s why.<\/p>\n<p>Since its creation in 1952, when President Harry S. Truman issued a\u00a0<a href=\"http:\/\/www.saturdayeveningpost.com\/2014\/04\/17\/culture\/politics\/a-brief-history-of-the-nsa.html\">secret executive order<\/a>\u00a0establishing the NSA as the hub of the government\u2019s foreign intelligence activities, the agency has been covertly spying on Americans, listening in on their phone calls, reading their mail, and monitoring their communications.<\/p>\n<p>For instance, under Project SHAMROCK, the NSA spied on telegrams to and from the U.S., as well as the correspondence of American citizens. Moreover, as the\u00a0<em>Saturday Evening Post<\/em>\u00a0<a href=\"http:\/\/www.saturdayeveningpost.com\/2014\/04\/17\/culture\/politics\/a-brief-history-of-the-nsa.html\">reports<\/a>, \u201cUnder Project MINARET, the NSA monitored the communications of civil rights leaders and opponents of the Vietnam War, including targets such as Martin Luther King, Jr., Mohammed Ali, Jane Fonda, and two active U.S. Senators. The NSA had launched this program in 1967 to monitor suspected terrorists and drug traffickers, but successive presidents used it to track all manner of political dissidents.\u201d<\/p>\n<p>Not even the\u00a0<a href=\"http:\/\/www.saturdayeveningpost.com\/2014\/04\/17\/culture\/politics\/a-brief-history-of-the-nsa.html\">passage of the Foreign Intelligence Surveillance Act<\/a> and the creation of the FISA Court, which was supposed to oversee and correct how intelligence information is collected and collated, managed to curtail the NSA\u2019s illegal activities.<\/p>\n<p>In the wake of the 9\/11 attacks,\u00a0<a href=\"http:\/\/www.saturdayeveningpost.com\/2014\/04\/17\/culture\/politics\/a-brief-history-of-the-nsa.html\">George W. Bush secretly authorized the NSA to conduct warrantless surveillance<\/a>\u00a0on Americans\u2019 phone calls and emails.<\/p>\n<p>Nothing changed under Barack Obama. In fact, the\u00a0<a href=\"http:\/\/www.saturdayeveningpost.com\/2014\/04\/17\/culture\/politics\/a-brief-history-of-the-nsa.html\">violations worsened<\/a>, with the NSA authorized to secretly collect internet and telephone data on millions of Americans, as well as on foreign governments.<\/p>\n<p>It was only after whistleblower\u00a0<a href=\"http:\/\/www.saturdayeveningpost.com\/2014\/04\/17\/culture\/politics\/a-brief-history-of-the-nsa.html\">Edward Snowden\u2019s revelations in 2013<\/a>\u00a0that the American people fully understood the extent to which they had been betrayed once again.<\/p>\n<p>What this brief history makes clear is that the NSA cannot be reformed.<\/p>\n<p>This is an agency whose very existence\u2014unaccountable and lacking any degree of transparency\u2014flies in the face of the Constitution.<\/p>\n<p>Despite the fact that its <a href=\"http:\/\/theweek.com\/articles\/453981\/nsas-data-snooping-actually-effective\">data snooping has been shown to be ineffective<\/a> at detecting, let alone stopping, any actual terror attacks, the NSA has continued to operate largely in secret, carrying out <a href=\"http:\/\/www.thedailybeast.com\/articles\/2015\/05\/14\/nsa-loves-the-nothing-burger-spying-reform-bill.html\">warrantless mass surveillance<\/a> on hundreds of millions of Americans\u2019 phone calls, emails, text messages and the like, beyond the scrutiny of most of Congress and the taxpayers who are forced to fund its <a href=\"http:\/\/www.washingtonpost.com\/wp-srv\/special\/national\/black-budget\/\">multi-billion dollar secret black ops budget<\/a>.<\/p>\n<p>As long as the government is allowed to make a mockery of the law\u2014be it the Constitution, the FISA law, or any other law intended to limit its reach and curtail its activities\u2014and is permitted to operate behind closed doors, relaying on secret courts, secret budgets and secret interpretations of the laws of the land, there will be no reform.<\/p>\n<p>Presidents, politicians, and court rulings have come and gone over the course of the NSA\u2019s 60-year history, but none of them have done much to put an end to the NSA\u2019s \u201ctechnotyranny.\u201d<\/p>\n<p>The beast has outgrown its chains. It will not be restrained.<\/p>\n<p>Moreover, even if the NSA could be reformed, the problem of government surveillance goes far beyond the criminal activities of this one agency.<\/p>\n<p>In fact, long before the NSA became the agency we loved to hate, the Justice Department, the FBI, and the Drug Enforcement Administration were\u00a0<a href=\"http:\/\/www.usatoday.com\/story\/news\/2015\/04\/07\/dea-bulk-telephone-surveillance-operation\/70808616\/\">carrying out their own secret mass surveillance<\/a>\u00a0on an unsuspecting populace. Just about every branch of the government\u2014from the Postal Service to the Treasury Department and every agency in between\u2014<a href=\"http:\/\/nsa.gov1.info\/partners\/index.html\">now has its own surveillance sector<\/a>, authorized to spy on the American people.<\/p>\n<p>Then there are the fusion and counterterrorism centers that gather all of the data from the smaller government spies\u2014the police, public health officials, transportation, etc.\u2014and make it accessible for all those in power. And of course that doesn\u2019t even begin to touch on the complicity of the corporate sector, which buys and sells us from cradle to grave, until we have no more data left to mine.<\/p>\n<p>Consider that on any given day, the average American going about his daily business will be monitored, surveilled, spied on and tracked in more than 20 different ways, by both government and corporate eyes and ears. A byproduct of this new age in which we live, whether you\u2019re walking through a store, driving your car, checking email, or talking to friends and family on the phone, you can be sure that some government agency, whether the NSA or some other entity, is listening in and tracking your behavior.<\/p>\n<p>Corporate trackers monitor your purchases, web browsing, Facebook posts and other activities taking place in the cyber sphere. For example, every time you use a loyalty card at the grocery store or elsewhere, your purchases are being monitored, <a href=\"http:\/\/www.dummies.com\/programming\/big-data\/loyalty-programs-and-data-mining\/\">mined for data<\/a>, and sold to the highest bidder. Every time you use your credit or debit card, or your digital \u201cwallet,\u201d your transactions are being <a href=\"http:\/\/www.creditcards.com\/credit-card-news\/credit-card-purchase-privacy-1282.php\">tracked<\/a>. Uber\u2019s ride service app knows where you are <a href=\"http:\/\/www.buzzfeed.com\/priya\/eff-wants-uber-to-stop-tracking-users-after-rides-end\">even when you are not actively using the service<\/a>. Even <a href=\"http:\/\/abcnews.go.com\/Technology\/department-store-mannequins-watch-eyesee-analyzes-shoppers-webcams\/story?id=17813441\">store mannequins<\/a> are being used to monitor and identify shoppers with facial recognition software.<\/p>\n<p>Major cities are being transformed into <a href=\"http:\/\/www.theguardian.com\/cities\/2014\/dec\/17\/truth-smart-city-destroy-democracy-urban-thinkers-buzzphrase\">\u201cSmart Cities\u201d<\/a> filled with sensors in everything from pavement to lamp posts, and all of that data is being linked together to monitor the day-to-day lives of everyone in them. In some cities, <a href=\"http:\/\/motherboard.vice.com\/read\/the-plan-to-test-cities-sewage-for-drugs-is-a-new-form-of-mass-surveillance\">even the sewage is being monitored<\/a> and could potentially be used to find out what drugs a household may have used.<\/p>\n<p>All of your medical data in the near future will be constantly monitored, and while the data is supposed to only be shared with your doctor, in practice it will be accessible by any number of government and private actors.\u00a0 Microchips in <a href=\"http:\/\/www.washingtonpost.com\/national\/health-science\/smart-pills-with-chips-cameras-and-robotic-parts-raise-legal-ethical-questions\/2014\/05\/24\/6f6d715e-dabb-11e3-b745-87d39690c5c0_story.html\">\u201csmart pills\u201d<\/a> can communicate with tablet devices to ensure the elderly take their medications already exist. And a <a href=\"http:\/\/www.washingtonpost.com\/national\/health-science\/smart-pills-with-chips-cameras-and-robotic-parts-raise-legal-ethical-questions\/2014\/05\/24\/6f6d715e-dabb-11e3-b745-87d39690c5c0_story.html\">transponder injected into the skin<\/a> that contains a person\u2019s entire medical history has been approved by the FDA.\u00a0 Wearable <a href=\"http:\/\/www.itworld.com\/article\/2856481\/data-from-wearable-devices-could-soon-land-you-in-jail.html\">health-monitoring devices<\/a> likewise can be used to monitor you, and the information collected can be used in a court of law.\u00a0 <a href=\"http:\/\/www.sfgate.com\/business\/article\/Smart-toothbrushes-the-latest-Internet-of-Things-7971669.php\">Smart toothbrushes<\/a> can monitor your brushing habits and communicate them to your dentist, or anyone else.\u00a0 <a href=\"http:\/\/www.abouttheinternetofthings.com\/product\/withings-aura-alarm-clock-wake-light-sound-system\/\">Smart alarm clocks<\/a> can monitor your sleep habits.<\/p>\n<p>Like all other devices relying on the Internet of Things (IoT) to communicate, these can be hacked into by government and private corporations.<\/p>\n<p>The \u201cinternet of things\u201d refers to the growing number of \u201csmart\u201d appliances and electronic devices now connected to the internet and capable of interacting with each other and being controlled remotely. These range from thermostats and coffee makers to cars and TVs.<\/p>\n<p>Of course, there\u2019s a price to pay for such easy control and access. That price amounts to relinquishing ultimate control of and access to your home to the government and its corporate partners. For example, while <a href=\"http:\/\/www.thedailybeast.com\/articles\/2015\/02\/05\/your-samsung-smarttv-is-spying-on-you-basically.html\">Samsung\u2019s Smart TVs are capable of \u201clistening\u201d to what you say<\/a>, thereby allow users to control the TV using voice commands, it also records everything you say and relays it to a third party. Same goes for Amazon\u2019s Echo.<\/p>\n<p>\u201cSmart houses\u201d filled with IoT-capable devices are just starting to come into play, but by 2020 Samsung pledges that <a href=\"http:\/\/www.theverge.com\/2015\/1\/5\/7497537\/samsung-iot-internet-of-things-vision-presented-at-ces-2015-keynote\">all of its devices<\/a>, including its household appliances, will be IoT capable.\u00a0 Such products include <a href=\"http:\/\/www.samsung.com\/us\/home-appliances\/wall-ovens\/\">ovens<\/a>, <a href=\"http:\/\/www.samsung.com\/us\/home-appliances\/microwaves\/\">microwaves<\/a>, <a href=\"http:\/\/www.samsung.com\/us\/home-appliances\/vacuums\/\">vacuums<\/a> (including robot vacuums), refrigerators, dishwashers, washing machines, and dryers, as well as smart hubs which coordinate everything.\u00a0 Coffee makers and <a href=\"http:\/\/www.nextgov.com\/big-data\/2016\/06\/welcome-internet-things-your-toaster-watching-you\/129258\/\">toasters<\/a> are also being made IoT compatible.<\/p>\n<p>Smart TVs seemingly out of Orwell\u2019s <em>1984<\/em> will also collect data and spy on you.\u00a0 <a href=\"http:\/\/www.thedailybeast.com\/articles\/2015\/02\/05\/your-samsung-smarttv-is-spying-on-you-basically.html\">Modern gaming consoles<\/a> likewise have internet connections, and those with cameras can be used to spy like any smartphone or computer.\u00a0 <a href=\"http:\/\/workswith.nest.com\/company\/sdi-technologies\/ihome-connector\">Smart power outlets<\/a> can turn your lights on and off remotely, and smart thermostats work similarly.<\/p>\n<p>All of them monitor when you\u2019re at home or not, as can smart home security systems.\u00a0 Wi-Fi routers can even monitor the inside of your home and distinguish between different individuals in the house, while <a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2016\/08\/wi-fi-surveillance\/497132\/\">reading their lips<\/a> to \u201chear\u201d what they say.\u00a0 Other forms of home monitoring systems for the elderly can be hacked and used by anyone.<\/p>\n<p>Already the web-enabled \u201cHello Barbie\u201d doll has been the center of a hacking controversy, in which security experts disclosed a number of significant security flaws with the toy.\u00a0 Other smart objects include smart golf clubs, which monitor the speed, acceleration, and swing plane of your golf swing, smart shoes which track your location and can guide you on where to go. Tostitos has even unveiled a promotional smart bag of chips which can tell you if you\u2019ve been drinking too much.<\/p>\n<p>That doesn\u2019t even begin to touch on all of the government\u2019s many methods of spying on its citizens. For instance, police have been using <a href=\"http:\/\/www.startribune.com\/politics\/statelocal\/284945781.html\">Stingray devices<\/a> mounted on their cruisers to intercept cell phone calls and text messages without court-issued search warrants.<\/p>\n<p><a href=\"http:\/\/www.washingtonpost.com\/news\/volokh-conspiracy\/wp\/2014\/12\/30\/judge-gorsuch-on-arrrest-warrants-and-doppler-radar-devices\/\">Doppler radar devices<\/a>, which can detect human breathing and movement within in a home, are already being employed by the police to peer inside a suspect\u2019s home.<\/p>\n<p>License plate readers, yet another law enforcement spying device made possible through funding by the Department of Homeland Security, can <a href=\"http:\/\/www.washingtonexaminer.com\/how-many-times-have-the-cops-photographed-your-license-plate\/article\/2547247\">record up to 1800 license plates <em>per minute<\/em><\/a>. These <a href=\"http:\/\/www.theguardian.com\/world\/2015\/feb\/05\/aclu-dea-documents-spy-program-millions-drivers-passengers\">surveillance devices can also photograph those <em>inside <\/em>a moving car<\/a>. Recent reports indicate that the DEA has been using license plate readers in conjunction with facial recognition software to build a \u201cvehicle surveillance database\u201d of the nation\u2019s cars, drivers and passengers.<\/p>\n<p><a href=\"http:\/\/www.huffingtonpost.com\/2014\/04\/03\/government-surveillance_n_5084623.html\">Sidewalk and \u201cpublic space\u201d cameras<\/a>, sold to gullible communities as a sure-fire means of fighting crime, is yet another DHS program that is blanketing small and large towns alike with government-funded and <em>monitored <\/em>surveillance cameras. It\u2019s all part of a public-private partnership that gives government officials access to all manner of surveillance cameras, on sidewalks, on buildings, on buses, even those installed on private property.<\/p>\n<p>Couple these surveillance cameras with facial recognition and behavior-sensing technology and you have the makings of <a href=\"http:\/\/www.dailymail.co.uk\/sciencetech\/article-2154861\/U-S-surveillance-cameras-use-eyes-pre-crimes-detecting-suspicious-behaviour-alerting-guards.html\">\u201cpre-crime\u201d cameras<\/a>, which scan your mannerisms, compare you to pre-set parameters for \u201cnormal\u201d behavior, and alert the police if you trigger any computerized alarms as being \u201csuspicious.\u201d<\/p>\n<p>Capitalizing on a series of notorious abductions of college-aged students, several states are pushing to expand their biometric and DNA databases by requiring that anyone accused of a misdemeanor have their DNA collected and catalogued. Technology is already available that allows the government to collect biometrics such as fingerprints from a distance, without a person\u2019s cooperation or knowledge. One system can actually <a href=\"http:\/\/www.popsci.com\/technology\/article\/2012-06\/fingerprint-scanner-captures-prints-20-feet-away\">scan and identify a fingerprint from nearly 20 feet away<\/a>.<\/p>\n<p>Radar guns have long been the speed cop\u2019s best friend, allowing him to hide out by the side of the road, identify speeding cars, and then radio ahead to a police car, which does the dirty work of pulling the driver over and issuing a ticket. Now, developers are hard at work on a <a href=\"http:\/\/www.cnet.com\/news\/police-radar-gun-that-shows-if-youre-texting\/\">radar gun that can actually show if you or someone in your car is texting<\/a>. No word yet on whether the technology will also be able to detect the contents of that text message.<\/p>\n<p>It\u2019s a sure bet that anything the government welcomes (and funds) too enthusiastically is bound to be a Trojan horse full of nasty surprises. Case in point: police body cameras. Hailed as the easy fix solution to police abuses, these body cameras\u2014made possible by <a href=\"http:\/\/thehill.com\/regulation\/administration\/231477-police-reforms-immigration-highlight-doj-budget-request\">funding from the Department of Justice<\/a>\u2014are turning police officers into roving surveillance cameras. Of course, if you try to request access to that footage, you\u2019ll find yourself being led <a href=\"http:\/\/www.latimes.com\/local\/crime\/la-me-lapd-cameras-20150205-story.html#page=1\">a merry and costly chase<\/a> through miles of red tape, bureaucratic footmen and unhelpful courts.<\/p>\n<p>And the <a href=\"http:\/\/www.wsj.com\/articles\/SB10001424127887323997004578641993388259674\">FBI can remotely activate the microphone on your cellphone and record your conversations<\/a>. The FBI can also do the same thing to laptop computers without the owner knowing any better.<\/p>\n<p>Government <a href=\"http:\/\/www.theage.com.au\/digital-life\/digital-life-news\/twitters-latest-transparency-report-shows-government-surveillance-on-the-up-20150210-13ag51.html\">surveillance of social media such as Twitter and Facebook is also on the rise<\/a>. Americans have become so accustomed to the government overstepping its limits that most don\u2019t even seem all that bothered anymore about the fact that the government is spying on our emails and listening in on our phone calls.<\/p>\n<p>Drones, which are taking to the skies en masse, will be the converging point for all of the weapons and technology already available to law enforcement agencies. This means drones that can listen in on your phone calls, see through the walls of your home, scan your biometrics, photograph you and track your movements, and even corral you with sophisticated weaponry.<\/p>\n<p>It\u2019s a given that the government\u2019s tactics are always more advanced than we know, so there\u2019s no knowing what new technologies are already being deployed against us without our knowledge. Certainly, by the time we learn about a particular method of surveillance or new technological gadget, it\u2019s a sure bet that the government has been using it covertly for years already.<\/p>\n<p>If you haven\u2019t figured it out yet, we\u2019ve all become suspects, a.k.a. potential criminals.<\/p>\n<p>As I make clear in my book, <a href=\"http:\/\/www.amazon.com\/Battlefield-America-War-American-People\/dp\/1590793099\"><em>Battlefield America: The War on the American People<\/em><\/a>, we now find ourselves in the unenviable position of being monitored, managed and controlled by our technology, which answers not to us but to our government and corporate rulers.<\/p>\n<p>This is the creepy, calculating yet diabolical genius of the American police state: the very technology we hailed as revolutionary and liberating has become our prison, jailer, and probation officer.<\/p>\n<p>So don\u2019t get too excited about the NSA\u2019s latest concession.<\/p>\n<p>It won\u2019t stop Big Brother from watching you.<\/p>\n<p>WC: 2287<\/p>\n<p>___<br \/>\n<a href=\"http:\/\/www.rutherford.org\/publications_resources\/john_whiteheads_commentary\/big_brother_is_still_watching_you_dont_fall_for_the_nsas_latest_ploy\">http:\/\/www.rutherford.org\/publications_resources\/john_whiteheads_commentary\/big<br \/>\n_brother_is_still_watching_you_dont_fall_for_the_nsas_latest_ploy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Big Brother Is Still Watching You: Don\u2019t Fall for the NSA\u2019s Latest Ploy<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-71971","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/71971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=71971"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/71971\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=71971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=71971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=71971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}