Author James Bamford, who has written three books about the National Security Agency (NSA), talked about President Obama’s remarks on surveillance policy — C-Span

 

*

*

*

http://www.c-span.org/video/?317221-3/Bamford

*

*

*

*

http://www.washingtonpost.com/world/national-security/a-true-whistleblower-doesnt-behave-like-edward-snowden/2014/06/02/5e8484e0-e90c-11e3-afc6-a1dd9407abcf_story.html

*

A true whistleblower doesn’t behave like Edward Snowden

*

*

Greenwald says Snowden “was determined to expose the extremity of NSA spying revealed by the documents, so as to enable an enduring public debate with real consequences, rather than achieve a one-off scoop that would accomplish nothing beyond accolades for the reporters.”

Snowden could have gone through the documents, selected fewer than the tens of thousands he leaked in order to support his allegations, and made certain they would not cause harm to national security.

Instead, Snowden turned over classified material in bulk, saying, as he did on NBC, that “the journalists have been required by their agreement with me as a source . . . to consult with the government to make sure that no individuals or specific harms could be caused by any of that reporting.”

A real whistleblower would have selected the documents to be published, made certain that they didn’t harm security and remained in the country to face the consequences of his actions.

*

*

*

*

http://www.washingtonpost.com/world/national-security/oversight-board-says-nsa-data-mining-puts-citizens-privacy-at-risk-but-sees-no-abuse/2014/07/14/04e232e0-06e7-11e4-bbf1-cc51275e7f8f_story.html

*

The NSA’s procedures require the destruction of irrelevant communications made by or concerning U.S. citizens, but that “rarely happens,” notes a July 2 report from the five-member Privacy and Civil Liberties Oversight Board (PCLOB).

*

As a result, “apart from communications acquired inadvertently, U.S. persons’ communications are not typically purged or eliminated from the government’s Section 702 databases before the end of their default retention periods even when the communications pertain to matters unrelated to foreign intelligence or crime,” the board said.

*

The board emphasized that it found no illegitimate activity or abuse during its review, nor efforts to circumvent the legal limits or rules governing the use of the data.

Still, is your privacy violated when the government collects and stores your information? Is it violated when your archived data are queried and read, or does a violation arise only when that information is made public or used against you?

The board says: “The collection and examination of U.S. persons’ communications represent a privacy intrusion even in the absence of misuse for improper ends.”

*

*

 

 

Advertisements
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s