{"id":186455,"date":"2014-01-17T19:45:00","date_gmt":"2014-01-18T00:45:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2014\/01\/17\/obama-presents-cosmetic-reforms-to-the-us-state-security-apparatus\/"},"modified":"2014-01-17T19:45:00","modified_gmt":"2014-01-18T00:45:00","slug":"obama-presents-cosmetic-reforms-to-the-us-state-security-apparatus","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2014\/01\/17\/obama-presents-cosmetic-reforms-to-the-us-state-security-apparatus\/","title":{"rendered":"Obama Presents Cosmetic Reforms to the US State Security Apparatus"},"content":{"rendered":"<p>First, it must be noted that Obama&#8217;s definition of spying is the <a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/obamas-restrictions-on-nsa-surveillance-rely-on-narrow-definition-of-spying\/2014\/01\/17\/2478cc02-7fcb-11e3-93c1-0e888170b723_story.html\">same as the one used by DNI James Clapper as an alibi for perjury<\/a>, that you can collect everything, and it is not spying unless you actually call it up for a specific purpose, even if we have found that <a href=\"https:\/\/www.techdirt.com\/articles\/20130927\/02435024674\/details-reveal-nsa-track-record-flagrant-abuse-failed-audits-minimal-accountability.shtml\">NSA employees tracking ex-giflfriends with that &#8220;not spying&#8221; data that they collected<\/a>:<\/p>\n<blockquote><p><span style=\"color: blue;\">President Obama said Friday, in his first major speech on electronic surveillance, that \u201cthe United States is not spying on ordinary people who don\u2019t threaten our national security.\u201d<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">Obama placed restrictions on access to domestic phone records collected by the National Security Agency, but the changes he announced will allow it to continue \u2014 or expand \u2014 the collection of personal data from billions of people around the world, Americans and foreign citizens alike.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">Obama squares that circle with an unusually narrow definition of \u201cspying.\u201d It does not include the ingestion of tens of trillions of records about the telephone calls, e-mails, locations and relationships of people for whom there is no suspicion of relevance to any threat.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">In his speech, and an accompanying policy directive, Obama described principles for \u201crestricting the use of this information\u201d \u2014 but not for gathering less of it.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">Alongside the invocation of privacy and restraint, Obama gave his plainest endorsement yet of \u201cbulk collection,\u201d a term he used more than once and authorized explicitly in Presidential Policy Directive 28. In a footnote, the directive defined the term to mean high-volume collection \u201cwithout the use of discriminants.\u201d<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">That is perhaps the central feature of \u201cthe golden age of signals intelligence,\u201d which the NSA celebrates in top-secret documents leaked by former contractor Edward Snowden. Obama for the first time put his own imprimatur on a collection philosophy that one of those documents summarized this way: \u201cOrder one of everything from the menu.\u201d<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">\u2026\u2026\u2026<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">\u201cIt\u2019s noteworthy that the president addressed only the bulk collection of call records, but not any of the other bulk collection programs revealed by the media,\u201d said Alexander Abdo, an attorney with the ACLU\u2019s national security project. \u201cThat is a glaring omission. The president needs to embrace structural reforms that will protect us from all forms of bulk collection and that will make future overreach less likely.\u201d<\/span><\/p><\/blockquote>\n<p>Other bulk collection programs, like the NSA <a href=\"http:\/\/hothardware.com\/News\/NSA-Collected-200-Million-Text-Messages-A-Day-But-Its-Coming-To-An-End\/\">hoovering over 200 million text messages a day<\/a>.<\/p>\n<p>You could tell that this was entirely damage control, and an attempt to avoid any meaningful reform because of is bizarre and ahistorical <a href=\"http:\/\/tidbits.com\/article\/14440\">invocation of silversmith and revolutionary Paul Revere<\/a>:<\/p>\n<blockquote><p><span style=\"color: blue;\">In a speech that tried hard to defend the actions of the U.S. intelligence community while simultaneously admitting that some of those actions were unnecessary and egregious, President Obama on 17 January 2014 announced modest reforms of NSA spying practices that have been revealed by former contractor Edward Snowden.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">President Obama began by comparing the National Security Agency to the Sons of Liberty, an American revolutionary group famous for the 1773 Boston Tea Party, and one of whose members, Paul Revere, famously warned of incoming British troops. Ironically, Revere\u2019s legendary midnight ride would have most likely been stopped by the British if they had the NSA\u2019s metadata collection capabilities. Even more ironically, the American Revolution was kicked off in part by overly broad general warrants that gave British troops nearly unlimited power to search for contraband. It\u2019s all about intelligence.<\/span><\/p><\/blockquote>\n<p>I would also suggest that you read <a href=\"http:\/\/crooksandliars.com\/2014\/01\/things-barack-obama-doesn-t-consider-abuse\">Marcy Wheeler&#8217;s list of secret police style techniques that Obama thinks is OK<\/a>, because he has claimed that there have been no abuses:<\/p>\n<p><\/p>\n<ul>\n<li>The spying on the personal lives of political opponents who have nothing to do with terrorism. <\/li>\n<li>Spying on Antiwar activists.&nbsp; <\/li>\n<li>Continued activities forbidden by the FISA Court&nbsp;<\/li>\n<li>Never developed minimization procedures as required by law <\/li>\n<li>Etc. (Read the whole thing at the link)<\/li>\n<\/ul>\n<p>It&#8217;s no wonder that <a href=\"http:\/\/www.washingtonpost.com\/blogs\/post-politics-live\/liveblog\/live-updates-obamas-nsa-reforms\/?id=c3f43a02-4429-45da-a335-1d317576583b\">Glen Greenwald has dismissed this as a PR gesture<\/a>. <\/p>\n<p>Obama stressed the importance of restoring trust in our state security apparatus, and this does very little to inspire trust.<\/p>\n<p>The definitive word comes from public interest Telco Maven Harold Feld, &#8220;<a href=\"https:\/\/www.facebook.com\/harold.feld\/posts\/10152116610821293?stream_ref=1\">First step of oversight that regains my trust. Actually enforce the law<\/a>.&#8221;<\/p>\n<p>This does not do that, and it is clear that the &#8220;Worst Constitutional Law Professor ever<sup>\u2122<\/sup>&#8221; has no interest in ever doing so. <br \/><a href=\"http:\/\/dissenter.firedoglake.com\/2014\/01\/16\/my-doctor-can-disclose-my-medical-records-to-the-nsa-without-my-authorization-and-so-can-yours\/\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>First, it must be noted that Obama&#8217;s definition of spying is the same as the one used by DNI James Clapper as an alibi for perjury, that you can collect everything, and it is not spying unless you actually call it up for a specific purpose, even if we have found that NSA employees tracking &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1142,971,970,1062,969,1051,1102,1066],"tags":[],"class_list":["post-186455","post","type-post","status-publish","format-standard","hentry","category-barack-obama","category-civil-rights","category-corruption","category-espionage","category-evil","category-hypocrisy","category-intelligence","category-privacy"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/186455"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=186455"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/186455\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=186455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=186455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=186455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}