FBI Abuses Continue

This is one of those symbols we used to be proud of, we used to respect them, and we used to think they were here to protect us. After all, it was the FBI that investigated what happened in Saudi Arabia when one of the oil-drilling facilities was bombed and the people there shot down in the streets as a baseball game was being played. But that was then and this is now. It makes you wonder how these Americans can have turned on their own. After all, we are their own. We are those they are supposed to protect.
From CommonDreams.org I bring you this article:

Published on Wednesday, March 19, 2008 by Inter Press Service
Reforms Failed to Curb FBI Spying
by William Fisher

NEW YORK – One of the nation’s most respected counterterrorism experts is predicting that Congress will take action to rein in the ‘unchecked power’ of the Federal Bureau of Investigation to spy on U.S. citizens without court approval — and then forbid them from publicly protesting the violation of their civil liberties.

He is Mike German, a 16-year FBI veteran who resigned as a special agent in 2004 to make Congress and the public aware of the continuing deficiencies in FBI counterterrorism operations after the implementation of the 9/11 Commission’s reforms.

German told IPS that following passage of the USA Patriot Act in 2001, FBI operations have been conducted ‘with unchecked power, hampered by mismanagement in its counter-terrorism unit, and facilitated by lack of Congressional oversight.’ The FBI, he added, ‘is obtaining personal and business records they’re not entitled to’.

He also called attention to so-called ‘third party error’. This occurs when the government targets a particular telephone number or email address, and then not only continues to tap all who call into that target, but the calls and emails sent to and from the addresses of these ’secondary targets’, and calls to and from these secondary targets, creating groups of tertiary targets.

He also told IPS that there is little evidence that the FBI is systematically purging its databases of telephone or email records unlawfully or inadvertently obtained during these electronic surveillance operations.

German’s charges come on the heels of a report last month by the Department of Justice Inspector General (IG), which concluded that the FBI was continuing to issue so-called National Security Letters (NSLs) unlawfully.

The IG’s report suspended judgment on the effectiveness of reforms put in place by the FBI following a 2006 IG report that found widespread abuses in the agency’s use of NSLs. But others are less charitable.

Michael Ratner, president of the Centre for Constitutional Rights, a civil liberties advocacy group, told IPS, ‘DOJ’s reforms have clearly not fixed the problem; despite these fixes, the misuse of NSLs continues. It is far past the time when Congress ought to mandate judicial approval of such a significant invasion of privacy. Without such approval any claimed reforms have little meaning.’

Read the rest of the story HERE:

The Constitution ALREADY mandates how and in what manner a citizen’s personal space may be invaded, that is with proper evidence and with an exact letter of intent. This is NOT what these NLS are about. The list of words alone that they use to find suspects would amaze you! One has to wonder just what fishing expedition the FBI is on. Where does the human conscience come in? Makes you wonder how these people can sleep at night knowing they are going after innocent people. Do the Salem Witch Trials or the Burning Times come to mind? Most of the people tortured during those trials were innocent also. And who is next on their list?


From the Intelligence Summit we get this:

Session AB1: Session Name
February XX, Time
Understanding Terrorist Strategy: A Defense of a Criminal Justice Approach to Counterterrorism

Terrorism is often defined by its effect: an act meant to terrorize a population. This is because the term ‘terrorism’ is always defined by the victims of these attacks. From the terrorist’s perspective, the fear instilled in the population is merely a side effect. The purpose of a terrorist attack is to compel a reaction from the governing authorities. The terrorist’s strategy is a complex plan that requires specific, but unfortunately predictable, responses from the government. Their success is entirely dependent on our reaction.

As an FBI undercover agent I spent months at a time working inside terrorist groups, planning and preparing for terrorist attacks. The terrorist’s greatest hope is to be regarded as a soldier, even a martyr if necessary, fighting for a just cause. The terrorist’s greatest fear is being regarded as, and treated as, a criminal.

I know that proactive criminal law enforcement techniques can prevent terrorism because I have had repeated success preventing terrorism using them. In this talk I will explain how and why a criminal justice counterterrorism approach is more effective than the militiary/intelligence approach currently underway.

Surely by that account what the FBI is doing searching through people’s emails, phone calls, library check-outs, etc., is NOT the same thing. We are presumed guilty by their searches instead of innocent. Since when did the United States of America hold her Citizens GUILTY first? And for all the information found, how much of it is actually useful?

Not only are Landlines subject to infiltration, but cell phones are also being tapped. From WIRED we get this story:

A U.S. government office in Quantico, Virginia, has direct, high-speed access to a major wireless carrier’s systems, exposing customers’ voice calls, data packets and physical movements to uncontrolled surveillance, according to a computer security consultant who says he worked for the carrier in late 2003.

What I thought was alarming is how this carrier ended up essentially allowing a third party outside their organization to have unfettered access to their environment,” Babak Pasdar, now CEO of New York-based Bat Blue told THREAT LEVEL. “I wanted to put some access controls around it; they vehemently denied it. And when I wanted to put some logging around it, they denied that.”

Pasdar won’t name the wireless carrier in question, but his claims are nearly identical to unsourced allegations made in a federal lawsuit filed in 2006 against four phone companies and the U.S. government for alleged privacy violations. That suit names Verizon Wireless as the culprit.

Yup, that’s the one. And you thought all those guys in the network were helping you? Ya, right! Anyone with a Verizon phone should tell that company to shove it where the sun don’t shine! As for the rest of the companies, I can see why some people have to use them. But shame on them!! I don’t care what kind of a deal you have with them, is it worth having NO privacy at all?

All of this because of a governor who lied about everything and stole the Presidency of the United States of America. I can’t help but wonder if he’s ever told the truth in his life or if he has spent his whole life as a psychopath hiding just out of sight. Do you like where he’s taken us?


~ by justmytruth on March 30, 2008.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: