Skip to comments.Republicans for Snowden
Posted on 07/26/2013 6:48:14 AM PDT by Qbert
Few things are more dangerous than Congress in heat, and so it is this week as a libertarian-left wing coalition in the House of Representatives is rushing to neuter one of the National Security Agency's antiterror surveillance programs.
The chief instigator is Michigan Republican Justin Amash, the 33-year-old second-termer who has made opposition to the country's post-9/11 security programs a personal crusade.
Now he's back with an amendment to this year's defense spending bill that would bar the NSA from collecting metadata except when specific individuals are already being investigated and are subject to a court order. This would effectively end one of the two programs exposed by admitted NSA leaker and fugitive, Edward Snowden.
Metadata are the general phone recordsnumbers called, duration of the callsnot the content of the conversations. Searching through metadata amounts to searching the haystack to find a needle. But under Mr. Amash's amendment, the NSA could only gather metadata if it has already found the needle.
Several former Bush security officials on Tuesday also released an open letter to Congress supporting the NSA programs as lawful, carefully limited and essential to U.S. security. The signers include former Attorneys General Michael Mukasey and Alberto Gonzales, former CIA directors Michael Hayden and Porter Goss, former national security adviser Stephen Hadley, and former secretary of Homeland Security Michael Chertoff.
By all means Congress should debate the NSA programs now that they are public, but any new limits ought to be carefully vetted for their potential consequences. The last thing Congress should do is kill a program in a rush to honor the reckless claims of Mr. Snowden and his apologists.
(Excerpt) Read more at online.wsj.com ...
If they were concerned about security they would secure the border and stop importing muslims.
The WSJ would have backed the Brits in 1776. They don’t care about freedom as long as they have the security to keep their money.
Michigan Republican Justin Amash is a Tea Partier who sponsored the bill to defund bulk collection of American citizens telephone records by the NSA, which is a clear violation of the 4th Amendment. As a fellow Tea Partier, I applaud Amash for his efforts to defend our Constitutional rights, but alas, the big government statists on both sides of the aisle, both Democrats and Republicans, teamed up to continue this unconstitutional spying program. Remember who they are and if you live in their district, do everything you can to defeat them in the upcoming 2014 elections.
All of this wonderful metadata collection... and they still couldn’t stop two Muslim terrorists from killing and maiming innocent people at the Boston Marathon.
voted their own consciences.
Terrorists could rent every billboard along the length of I-80 and advertize an impending attack 6 months ahead of time and the Neo Stasi Agency would still miss it.
The terrorists won on 9/11.
This is a radical statement, but look at the way OUR government has used that event to go after each and every one of our Liberties since then! It started under Bush, but 0bama has used it to make himself emperor. Look at how our quasi-dictator, who rules and lives like an emperor, daily flaunts The Constitution. Two events from just yesterday:
1. Holder has declared the Supreme Court ruling on enforcement of the Voting Rights Act not to be of his liking, so he stated that he intends to continue strict oversight and enforcement;
2. 0bama out giving an indoctrination speech, had young Republicans (citizens) banned - this is only one step in banning ALL dissention!
Take a look at Executive Order EO13603. "At a time of the President's choosing, he may seize all food stuffs and water ..." It goes on from there including forced induction into the military. This is just the beginning of broad dictatorial powers.
Oh please - did the NSA stop a plot by two foreginers, warned to us by Russia, who traveled to Chechnya, had criminal records, from pulling off the plot in boston?
These things are not keeping you safer. They are enslaving us.
"I will accept all of the government intrusion necessary to protect my rights and freedom."
How do you know what is "necessary" if you simply take them at their word (keeping in mind that they have already purposefully deceived you), without asking basic questions?
Seems that a few of our founders warned that tyranny would come to America under the guise of fighting a foreign enemy.
Yes, it was close. Here's the graphic for the breakdown of the vote:
Liberty vs security is a continuing issue and there's a lot of Republicans (and Democrats too, but we already knew that) who ignore the following advice:
Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety.
Yep. Meanwhile, College Republicans who simply wanted to listen to a public speech by the president are viewed as potential “terrorists” and turned away...
Now there is the news that the government is demanding that passwords be handed over.
That could come in real handy for eliminating political enemies. With that kind of access, they could pass child porn around via tea partiers email addresses then send in the FBI to take down the child porn ring.
"Reckless claims?! Of every put forward, NO ONE has suggested that Snowden doesn't have bona fide documents. C'mon WSJ, conservatives are supposed to be above such obvious spin."
Yep. (Btw, I misread your other comment- my bad)
“The WSJ would have backed the Brits in 1776. They dont care about freedom as long as they have the security to keep their money.”
+1. A quote from the movie “Sgt. York” comes to mind: “The cost of that heritage is high. Sometimes it takes all we have to preserve it.” Those who promise security in exchange for our liberty do not value either.
did the NSA stop a plot by two foreginers, warned to us by Russia,
Just to review: The 16 major US Intelligence agencies in 7 independent government branches.
1) Central Intelligence Agency (CIA)
2) United States Department of Defense
Defense Intelligence Agency (DIA)
National Security Agency (NSA)
National Geospatial-Intelligence Agency (NGA)
National Reconnaissance Office (NRO)
Air Force Intelligence, Surveillance and Reconnaissance Agency (AFISRA)
Army Intelligence and Security Command (INSCOM)
Marine Corps Intelligence Activity (MCIA)
Office of Naval Intelligence (ONI)
3) United States Department of Energy
Office of Intelligence and Counterintelligence (OICI)
4) United States Department of Homeland Security
Office of Intelligence and Analysis (I&A)
Coast Guard Intelligence (CGI)
5) United States Department of Justice
Federal Bureau of Investigation (FBI)
Drug Enforcement Administration, Office of National Security Intelligence (DEA/ONSI)
6) United States Department of State
Bureau of Intelligence and Research (INR)
7) United States Department of the Treasury
Office of Terrorism and Financial Intelligence (TFI)
The major espionage programs being used against the American public today.
CALEA, the Communications Assistance for Law Enforcement Act (1994) (FBI)
ADVISE (Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement), a massive data mining system run by the DHS.
PRISM - Finally the NSA gets involved. (PRISM is a government codename for a data collection effort known officially as US-984XN.)
“Other systems”, run by the 100+ federal police agencies. There are lots of these.
Much of the raw data from these are compiled with local, state, commercial and medical information into 72 “Fusion Centers” around the US, accessible to many government personnel.
The non-police and non-intelligence related federal agencies keep their own databases and dossiers of personal information of US citizens, as well as engage in intelligence gathering and police activities.
Ironically, the massive installation in Utah that collects and stores vast amounts of civilian data mostly does just that: collecting and storage. It is just in case somebody in government ever wants 10 years of communications to and from somebody they don’t like, even if they aren’t a criminal or suspected terrorist.