From the Because-The-First-Amendment-Means-As-Much-As-The-Fourth Dept
Total Page:16
File Type:pdf, Size:1020Kb
Keith Alexander Says The US Gov't Needs To Figure Out A Way To Stop Journalists From Reporting On Snowden Leaks from the because-the-first-amendment-means-as-much-as-the-fourth dept
Mike Masnick, Fri, Oct 25th 2013 7:29am
Apparently not satisfied with just setting fire to the 4th Amendment, NSA boss Keith Alexander's next target is the 1st Amendment. In an interview with the Defense Department's "Armed With Science" blog, it appears that Alexander felt he'd have a friendly audience, so he let loose with some insane claims, including suggesting that the government needs to find a way to "stop" journalists from reporting on the Snowden leaks.
As noted by Politco, General Alexander isn't a fan of journalists doing anything about these documents:
"I think it’s wrong that that newspaper reporters have all these documents, the 50,000— whatever they have and are selling them and giving them out as if these—you know it just doesn’t make sense," Alexander said in an interview with the Defense Department's "Armed With Science" blog.
"We ought to come up with a way of stopping it. I don’t know how to do that. That’s more of the courts and the policymakers but, from my perspective, it’s wrong to allow this to go on," the NSA director declared.
It's not the policymakers and the courts. It's the Constitution, and it says there's freedom of the press.
Other parts of the interview continue to show Alexander spewing things that have already been debunked:
“When you look at the 9/11 commission, it faulted the intelligence community for not connecting the dots. We didn’t have the tools. These [programs we have now] are tools that help us connect the dots. We have learned that lesson once. We all vowed this would never happen again. We should commit to that course of action.”
That's not true. The 9/11 commission argued, indeed, that the intelligence service failed to connect the dots, but it wasn't because they lacked the information. It's just that it wasn't properly shared. The way to fix that is not to collect more information and make it even harder to connect the dots. And yet that's been General Alexander's strategy all along.
Elsewhere in the interview, Alexander laughably tries to pretend that US Cyber Command,
From www.techdirt.com/articles/20131024/18093325010/keith-alexander-says-us-govt-needs-to-figure-out-way-to- stop-journalists-reporting-snowden-leaks.shtml 26 October 2013 which he also controls, is focused on protecting "intellectual property." But that's also not true. As has been clearly stated and confirmed, it's focused on offensive attacks, which it does more than any other country (even as the US government tries to scold countries like China and Iran for their online attacks).
And then, I guess he figures that if he's going to lie about, well, everything, why not go all in, and just claim that these programs aren't "spying."
“They aren’t spying programs,” he says directly. “One is called the Business Records FISA Program, or Section 215, and the other is called the FISA Amendment Act 702 or PRISM.”
The business records program, or Section 215, is probably the most misunderstood of the two programs. The metadata program takes information and puts it in a data repository. Metadata is the phone number, the date, time, group, and duration of the call.
“That’s all we have,” Gen. Alexander explains. “We don’t have any names or any content.”
Except that having that metadata is incredibly revealing and absolutely is a form of spying. If it's not, why won't General Alexander release his phone numbers, date, time, group and duration of all of his calls from the past year? Why not? Because he thinks that's private information. Because it is. And because General Alexander is a hypocrite.
“The oversight and compliance on these programs is greater than any other program in our government.”
Hahahahah. No. This is also a lie. It's been shown that the courts and Congress have admitted they're limited by what the NSA tells them -- and the NSA goes out of its way to avoid telling Congress very much.
Alexander also mocks the recent claims about spying on French phone calls, using the exact same dodge as his boss, James Clapper. Both pretend that the news reports said that 70 million calls were recorded. Alexander mocks this by pointing out it would be impossible to have so many calls listened to, and to find enough translators to understand them. But the reports were about mostly metadata, and just some recordings. Pretending that the press said something that it didn't doesn't make Alexander look trustworthy. It makes it look like he's lying.
Not surprisingly, though hilariously, the blogger for the Defense Department's "Armed With Science," Jessica Tozer doesn't appear to challenge any of Alexander's claims. Instead, she repeats all the statements and mocks anyone who might challenge them:
Some people would rather believe a dramatic, convenient lie than a real, uncomplicated truth. Don’t be that person.
I'd argue that right back at Tozer and Alexander, because Alexander is flat out lying in the interview, based on confirmed facts.
Don’t give credence to speculation, rumor, or hyperbole. Simply put, don’t give into the hype. When it comes down it, a nation without the NSA would be a nation left
From www.techdirt.com/articles/20131024/18093325010/keith-alexander-says-us-govt-needs-to-figure-out-way-to- stop-journalists-reporting-snowden-leaks.shtml 26 October 2013 undefended.
And that, dear readers, is no lie.
Um. It's absolutely a challengeable statement, but the Defense Department, obviously, isn't here for reasoned discussion on this issues.
From www.techdirt.com/articles/20131024/18093325010/keith-alexander-says-us-govt-needs-to-figure-out-way-to- stop-journalists-reporting-snowden-leaks.shtml 26 October 2013 Undated, estimated to be 24 October 2013 I Spy, No Lie
What comes to mind when you see the acronym NSA?
Do you think spies? Protectors of secrets? Information collectors? Privacy violators? You can rarely open up a news website these days without seeing that three letter acronym splashed up somewhere.
But for all the finger-pointing and paranoid ranting, does anyone really know what’s going on here? Is the National Security Agency really capable of the Jafar-like power madness that they’re accused of wielding?
(U.S. Defense Department Or are internet rumors and misinformation painting our best cyber graphic illustration by Jessica L. security defenders ? Tozer/Released) as bad guys
It is time to get the story straight. To do that, I decided to go right to the top.
Gen. Keith Alexander is the Commander of the United States Cyber Command, Director of the National Security Agency,and the the chief of the Central Security Service. He has been the defender of our silent servants since 2005, and is absolutely dedicated to getting the right information out to the American people.
I sat down with Gen. Alexander to find out how to separate the truth from the rumors. To this, he has a proven one-step process: “First, get the facts,” he says. “You’ll see what’s happened in the first step.”
The path to the facts starts with myth-busting the misinformation. So let’s get started.
- See more at: http://science.dodlive.mil/#sthash.Y1c9DvHO.dpuf
Rumors of the National Security Agency’s privacy violations have been greatly exaggerated.
“We [the NSA] collect foreign intelligence for our country, and we provide information assurance for national security systems,” Gen. Alexander says. “We have two great missions, and those missions provide us with some tremendous capabilities.”
These capabilities and the information that they collect are what enables them to defend the nation. They do not choose between national defense and privacy. It must always be both.
From 26 October 2013 When it comes to what the NSA does for the American people, Gen. Alexander says we first need to look at what NSA does to protect this nation from terrorist attacks.
“When you look at the 9/11 commission, it faulted the intelligence community for not connecting the dots. We didn’t have the tools. These [programs we have now] are tools that help us connect the dots. We have learned that lesson once. We all vowed this would never happen again. We should commit to that course of action.”
The world runs on cyber.
From email to online bank accounts, from smart phones to smart TVs, just about everything in our lives runs on computer networks. And most of those are not as secure as they need to be. But how do we protect ourselves in an ubiquitous and constantly-changing cyber domain?
This is where Cyber Command comes in.
“We see a lot of exploitation of intellectual property,” Gen. Alexander says. “Cyber Command is the organization that would respond to [those threats]. That’s the platform for defending the DoD networks, defending the nation, and responding – as policymakers would ask us to do – if someone were to attack us.”
So let’s take a look at some of the recent foreign intelligence programs that have been getting a lot of attention lately. You know the ones. You may have seen them in the news, often mislabeled as “spying programs”. Gen. Alexander is quick to correct this misnomer.
You keep using that word. I do not think it means what you think it means.
“They aren’t spying programs,” he says directly. “One is called the Business Records FISA Program [www.fas.org/irp/agency/doj/fisa/], or Section 215, and the other is called the FISA Amendment Act 702 or PRISM [en.wikipedia.org/wiki/PRISM_(surveillance_program)].”
The business records program, or Section 215, is probably the most misunderstood of the two programs. The metadata program takes information and puts it in a data repository. Metadata is the phone number, the date, time, group, and duration of the call.
“That’s all we have,” Gen. Alexander explains. “We don’t have any names or any content.”
The purpose of this collection is to identify the U.S. nexus of a foreign terrorist threat to the homeland. The government cannot conduct substantive queries of the bulk records for any purpose other than counterterrorism.
If a “nexus” is found in the metadata, that information is passed to the FBI. They don’t know who it is. They don’t know the content of the communication. The FBI can then take that information and proceed as necessary.
The second program is the PRISM program or FISA Amendment Act 702. PRISM is a little bit different. PRISM is a content program. The program legally compels service providers to supply information to the government if there is an appropriate and documented foreign intelligence reason and the subject of interest is believed to be outside the U.S.
From 26 October 2013 It also has to be one end foreign, not on U.S. persons, Gen. Alexander explains. This, of course, requires a lot of management and review. A lot.
“The oversight and compliance on these programs is greater than any other program in our government.”
Oversight. And we’re not talking about a couple of PRISM logo (National manager signatures on a memo here. Security Agency courtesy graphic) “It’s from within NSA by the general counsel, the inspector general, the oversight and compliance directorate; from the DNI’s general counsel and inspector general and civil liberties and privacy officer; by DoD’s inspector general and general counsel; by Department of Justice; by the White House; and by Congress, both committees.”
That’s a lot of oversight. Even by the government’s standards.
So this is a secret program that’s not really so secret. It’s one that Congress, the administration, and the Courts have all approved.
“People say they’re spying on America. That is absolutely wrong,” Gen. Alexander says. “We’re going after terrorists with those programs. We protect civil liberties and privacy.”
So if this isn’t a secret, then why keep these programs from the American people?
“If we could only give it to the good guys and tell them to keep it secret, then yeah, give it to all the good guys. The problem is that the bad guys are amongst us. They will figure it out. This happened in 1998 after the East Africa Embassy bombings. Somebody revealed publicly that the way we track Bin Laden was through satellite communications, or SATCOM. Within two days, we never saw Bin Laden in communications again.”
Sometimes, it’s silence that saves lives.
“My concern is the revealing of these programs allows terrorists to know the best weapons that we have against them,” Gen. Alexander says. “It will cause irreversible and significant damage.”
Speaking of accountability, a lot of the misdirection in these stories and these programs comes from fast spreading, half-baked information. Like the story recently that bemoaned the recording of seventy million phone calls being intercepted in Paris over a one-month time period.
Think about that. Seventy million phone calls.
From 26 October 2013 “ArmyNow, Gen. I don’t Keith B.know Alexander, how U.S. many Cyber phone Command calls commander you get and a day,National but Security let’s Agency director, speaks with Armed with Science blogger Jessica L. Tozer during an interview at the National Cryptologic Museum in Annapolis Junction, Md., Oct. 21, 2013. (U.S. Defense Department photo by Navy Petty Officer 2nd Class Kayla Jo Finley/ Released)
“Now, I don’t know homw many phone calls you get a day, lbut let’s say thirty. Now you’ll need French linguists, because French people speak French. The average analyst might be able to do one call every fifteen minutes,” Gen. Alexander points out. “So that’s four an hour times eight is thirty-two, divide thirty-two into today, and you’re going to need a little bit less than one hundred thousand people, just for France. And France is an ally. It’s absurd.”
But even in the face of facts, checks and balances, people still cry protest. Some are still not convinced. Some people claim that there must be a different, more private way to go about monitoring for terrorist plots. While keeping Americans informed. While still thwarting the bad guys.
The NSA asks: Have you got a better idea?
“I do believe if we can find a better way, we ought to put it on the table and take those steps,” Gen. Alexander proposes. “So anybody who’s got a better idea, let’s put it on the table. But to say ‘stop’ ignores the lessons that we learned in 9/11.”
The bottom line is that these programs help the NSA to take care of our people, our information, and our nation. We should improve our programs, not negate their utility. Even, and especially, in the face of Internet scrutiny.
“I liken this to holding a hornet’s nest,” Gen. Alexander says. “Now I would like to give it to somebody else and say, ‘You protect the nation with this dataset.’ Everybody’s looking around and saying, ‘I don’t want to hold that. You hold it.’ But somebody’s got to hold it for the good of the nation.”
From 26 October 2013 When it comes to supporting his people, Gen. Alexander holds them in the highest regard. “They’re the heroes,” he says. “It should never be a question in anyone’s mind.”
Some people would rather believe a dramatic, convenient lie than a real, uncomplicated truth. Don’t be that person. Don’t give credence to speculation, rumor, or hyperbole. Simply put, don’t give into the hype. When it comes down it, a nation without the NSA would be a nation left undefended.
And that, dear readers, is no lie.
Still not convinced? Watch the whole interview here:
Jessica L. Tozer is a blogger for DoDLive and Armed with Science. She is an Army veteran and an avid science fiction fan, both of which contribute to her enthusiasm for technology in the military.
———-
Disclaimer: The appearance of hyperlinks does not constitute endorsement by the Department of Defense of this website or the information, products or services contained therein. For other than authorized activities such as military exchanges and Morale, Welfare and Recreation sites, the Department of Defense does not exercise any editorial control over the information you may find at these locations. Such links are provided consistent with the stated purpose of this DOD website.
From 26 October 2013 Transcript: Excerpt of capabilities
[World War II] is where NSA started. We built capabilities to break their communications and built capabilities to secure our own (garbled). These are tremendous capabilities. We have those types of people today. What is the adversary doing, what do we need to know, and how do we bring that together. We have great linguists, great analysts, great technical people. On the NSA side we have almost 1,000 PhDs, little over a 1,000 mathematicians, and over 4,000 computer scientists. They are the foundation for technical expertise to operate in the network That is what our nation has to do. 00:01:23
Jim Farmer, Fortnightly Mailing 27 October 2013