NSA spying on “anyone, anytime, anywhere”

This January 2016 video is called The Silent Order: NSA Sees Everything, Hears Everything; Documentary.

By Tom Carter in the USA:

NSA strategy document envisions unrestrained global surveillance

26 November 2013

A top secret National Security Administration (NSA) strategy document leaked by whistleblower Edward Snowden envisions spying on “anyone, anytime, anywhere,” free from all legal restraints, and radical expansions in the NSA’s activities in the period of 2012-2016.

The five-page document dated February 23, 2012, which was published by the New York Times on Saturday, is entitled “SIGINT Strategy 2012-2016.” The name of the author does not appear on the document, nor is it clear who was responsible for it.

Among the document’s central themes is that the law has “not kept pace” with the NSA’s “mission.” Translated into plain English, this means that the NSA is knowingly engaged in illegal activity.

The NSA’s strategy is to remedy this situation by campaigning for what amounts to the abolition of basic constitutional rights. Existing law must be “adapted,” the document states, in order to facilitate unlimited spying. “For SIGINT [signals intelligence] to be optimally effective, legal, policy, and process authorities must be as adaptive and dynamic as the technological and operational advances we seek to exploit.”

In fact, the NSA’s spying activities—as well as the activities of the numerous other government agencies engaged in domestic spying—are in flagrant violation of the letter and spirit of the Fourth Amendment, part of the Bill of Rights. This amendment protects the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures,” and provides that the government must obtain a warrant based on “probable cause” connecting a targeted person with criminal activity before a search or seizure can be carried out.

The words “Fourth Amendment,” “search warrant,” “probable cause,” “democracy,” and “Constitution” do not appear in the NSA strategy document. Nor does the document include the word “right” at all. The document does not even invoke “terror,” or the Obama administration’s standard formula of “balancing” individual liberties against national security.

For all practical purposes, the military-intelligence agencies operate without restraint, as if there was no such thing as a Fourth Amendment.

Without mentioning any legal rights its targets might have, the document simply announces that the NSA intends to achieve “mastery of the global network,” i.e., unrestrained global surveillance. To the extent the document obliquely makes reference to legal rights at all, it does so to state that the NSA will “aggressively pursue legal authorities and a policy framework mapped more fully to the information age.”

The document’s most striking feature is that it is written entirely in the language of a business advertising brochure. The document contains numerous references to the NSA’s “external partners,” “stakeholders,” and “customers”(!). It touts the NSA’s “high quality products and services”(!!). This grotesque intersection of the language of the corporate-financial boardroom with the apparatus of state repression is an expression of the malignant growth of the intelligence-industrial complex.

The document refers three times to the NSA’s “business processes,” to “more efficient management of the mission and businesses,” to “market driven forces,” to “internal and external partnerships,” to “global business trends,” and to “strengthening customer relationships.”

The document also hints at possible turf wars between the NSA and other unnamed intelligence agencies that are also involved in spying, perhaps including the Defense Intelligence Agency (DIA), Department of Homeland Security (DHS), Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), Bureau of Intelligence and Research (INR), Office of Intelligence and Counterintelligence, Air Force Intelligence, Surveillance, and Reconnaissance (AF ISR), Navy Intelligence, or perhaps other as yet undiscovered agencies. The NSA’s strategy involves making sure “to keep SIGINT relevant” and “maintain current mission relevance,” noting the growing “mission space for SIGINT.”

The document paints a picture of the internal life of the NSA before the exposures later last year by whistle-blower Edward Snowden. Prepared and distributed soon after president Obama took office in 2012, the document sets forth the agency’s goals and strategies for the next four years.

Apparently enjoying the full support of the Obama administration, NSA leaders saw no obstacle in the way of their project of establishing “mastery of the global network,” which in their words would usher in “the golden age of SIGINT” in the period of 2012 to 2016. In this way, the document is a reminder of the immense service Edward Snowden has performed for the world population by bringing this anti-democratic conspiracy to light.

The document refers to the need to “close gaps between the environment and expectations over the next five years.” From the NSA’s standpoint, if anyone, anywhere in the world, anytime, is engaged in any kind of activity, and the NSA does not know about it, then there exists a “gap” that needs to be closed.

The massive expansion of domestic spying in the US, which exceeds all the traditional bounds of “plausible deniability,” is a symptom of the crisis and decay of American capitalism. Determined to impose the cost of the crisis of their system onto the population as a whole, the corporate and financial aristocracy that rules America is bracing itself for popular opposition. Only in this context is it possible to explain the cavalier attitude to democratic rights and the energetic buildup of the machinery of a police state.

More information is still coming to light. This Sunday, Snowden revealed that the NSA has infected 50,000 computer networks with malware. Malware is intrusive software that can be used to take control of a computer, either for the purpose of gaining access to private information or of disrupting activity. In many countries, creating and distributing malware is a criminal offense.

The NSA calls its malware “Computer Network Exploitation” (CNE). One document leaked by Snowden shows the NSA collaborating with its UK counterpart GCHQ to infect the Belgian telecom company Belgacom with malware.

A person may use a computer for years without knowing that it has been compromised by NSA hackers. The malware presumably allows the NSA to view everything that happens on the computer, and to take control of the computer with a push of a button.

The NSA strategy document concludes its “Values” section with the following sentence: Our customers and stakeholders can rely on us to provide timely, high quality products and services, because we never stop innovating and improving, and we never give up!

National Security Agency – The only part of the government that really listens to what you have to say: here.

31 thoughts on “NSA spying on “anyone, anytime, anywhere”

  1. The public are fair game to be spied upon, Tony Abbot, sent a letter to the president of Indonesia, on Australian spying, he refused to disclose what was written in the letter, as already we are now able to see, Abbot has already mislead the public on being elected, once he had a calling from God, interesting how so many called in the service of God, become deceitful, hypocrites and so on.
    He even refused to be temporarily placed in accommodation at the cost to taxpayers $3000, per week, as not good enough for him, once again like so many, He is another, that is up himself!
    When humans start to become the big guys, or pop guys, its not long before vanity knocks at the door.


  2. Pingback: Indonesia, Australia, more spying scandals | Dear Kitty. Some blog

  3. Pingback: NSA, Canadian spying on G20 summit | Dear Kitty. Some blog

  4. Pingback: Australian oil spying in East Timor | Dear Kitty. Some blog

  5. Pingback: NSA spying, Snowden revelations and the Internet | Dear Kitty. Some blog

  6. Pingback: NSA massive spying on ordinary Australians | Dear Kitty. Some blog

  7. Pingback: British soldier suspected of racist terrorism | Dear Kitty. Some blog

  8. Pingback: NSA spying on five billion cellphone calls a day | Dear Kitty. Some blog

  9. Pingback: Edward Snowden, 2013 Person of the Year | Dear Kitty. Some blog

  10. Pingback: Nelson Mandela, eulogy by Barack Obama | Dear Kitty. Some blog

  11. Pingback: Stop spying on us, writers say | Dear Kitty. Some blog

  12. Pingback: NSA spying scandals update | Dear Kitty. Some blog

  13. Pingback: NSA spying is unconstitutional, United States judge says | Dear Kitty. Some blog

  14. Pingback: NSA economic and political espionage | Dear Kitty. Some blog

  15. Pingback: Edward Snowden’s Christmas message | Dear Kitty. Some blog

  16. Pingback: Internet founder supports Edward Snowden’s Christmas message | Dear Kitty. Some blog

  17. Pingback: Facebook and privacy | Dear Kitty. Some blog

  18. Pingback: ‘NSA, GCHQ spying is illegal’ | Dear Kitty. Some blog

  19. Pingback: NSA spying on 200 million phone messages a day | Dear Kitty. Some blog

  20. Pingback: Edward Snowden’s life threatened by United States spies | Dear Kitty. Some blog

  21. Pingback: Edward Snowden on NSA industrial espionage | Dear Kitty. Some blog

  22. Pingback: United States NSA recruiting child spies | Dear Kitty. Some blog

  23. Pingback: NSA spying on Angry Birds, other smartphone apps | Dear Kitty. Some blog

  24. Pingback: NSA spying on political views of millions of of cellphone users | Dear Kitty. Some blog

  25. Pingback: NSA spying threatens journalism | Dear Kitty. Some blog

  26. Pingback: British protest against Microsoft’s role in NSA Internet spying | Dear Kitty. Some blog

  27. Pingback: United States NSA spying even on its Bahraini royal allies | Dear Kitty. Some blog

  28. Pingback: United States General Wesley Clark attacks civil liberties | Dear Kitty. Some blog

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.