Before he is done I fully expect him to release the names, addresses and phone numbers of anyone anywhere in the world who has ever provided any information to agency workers.
The damage to US intel will last multiple generations.
Posted on 12/19/2013 5:10:25 AM PST by Cincinatus' Wife
The presidents hand-picked intelligence review panel has submitted a list of recommendations that would politicize the leadership and the routine operations of the nations leading military intelligence agency.
The 46 recommendations urge the federal government to treat foreign enemies as courtroom-protected citizens, and to would require the soldiers working at the National Security Agency to negotiate day-to-day decisions with an array of private-sector lawyers.
President Barack Obama met Wednesday with his five appointees on the Review Group on Intelligence and Communications Technologies, whose report was released late Wednesday afternoon.
Obama is expected to announce his preferred policies next month, but indicated he supported for much of the report. The President noted that the groups report represented a consensus view of his five carefully selected advisors, said an afternoon statement.
In his meeting with appointees, the President again stated his expectation that, in light of new technologies, the United States use its intelligence collection capabilities in a way that optimally protects our national security while supporting our foreign policy, respecting privacy and civil liberties, maintaining the public trust, and reducing the risk of unauthorized disclosure.
Controversy over the surveillance erupted after the release of many secret documents by a former contract employee, Edward Snowden. The controversy has impact the NSAs ability to collect intelligence, but has also undermined Obamas political support among progressives, civil libertarians and younger voters, and among executives and donors in the information-technology industry.
The agency provides a huge stream of accurate, current and valuable information to policymakers, legislators, generals and battlefield commanders, top officials say. The provided information details foreign weapons, terror plots, Russian and Chinese hacking operations, political payoffs, troop movements, secret plans and the location of potential targets, financial assets and criminal profits.
If Obama does implement the new recommendations, hell tangle the NSAs routine intelligence operations in many slow and expensive legal hearings that will reduce the scope and agility of U.S. intelligence collection efforts.
Some of the recommendations urge legislative changes, but the president who is the commander in chief can impose many of the proposed changes on the military agency without approval from Congress.
Obamas appointees urged that future directors of the National Security Agency be approved by the Senate and that future appointees should be civilians. But a switch to civilian appointees would ensure that trusted political allies of the president to be assigned to run the nations primary intelligence agency, perhaps after a 51-vote majority vote in the Senate. Obama, however, has said he plans to appoint a general when the incumbent general retires.
The appointees said the NSA should be barred from storing so-called metadata, which shows which devices are communicating with each other via the phone networks and the Internet. Instead, the panel urged that the NSA request the metadata from another government agency, or from communications companies, such as Google or AT&T, after each request is reviewed by judges. If the data is held by companies, the recommendation would require those companies to store and share private data, even if they do not want to keep the data. To avoid the legal requirement, the companies could move their headquarters and their data offshore, or store it in a peculiar format that makes it difficult to use.
The appointees said that NSAs requests for information from companies should be made public after six months. If implemented, the rule would create an incentive for companies to hire lawyers to fight any information-sharing with the NSA.
When the NSA is monitoring a non-United States person who is located outside the United States, such as a terrorist, drug-trafficker or corrupt banker, any information that is revealed about a United States contact or collaborator should be shielded unless the NSA can meet a civilian-type probable cause burden of proof, Obamas appointees recommend. But that high burden of proof will prevent the intelligence agencies from following leads until they can build up enough other evidence to get approval from a judge.
In the months prior to September 2011, civilian-style legal protections deterred and slowed U.S. investigations into a Moroccan jihadi training to be a pilot. He was arrested prior to the attack, but his laptop was not examined until after the attack.
Recommendation No. 14 urges Obama to provide U.S. privacy rights to all foreigners living in foreign countries, whether Sweden or Afghanistan, Costa Rica or Iran. We recommend that, in the absence of a specific and compelling showing, the U.S. Government should follow the model of the Department of Homeland Security, and apply the Privacy Act of 1974 in the same way to both U.S. persons and non-U.S. persons, said the report. If implemented, that recommendation would cripple military intelligence gathering.
Whether the proposed civilianization or politicization of the NSA will be controversial remains to be seen.
When civilian laws such as civilian rules of evidence are applied to military scenarios, theyre likely to be bent and gradually reduced to meet political requirements, such as a guilty verdict in a high-profile national security trial like the trial of a 9/11 plotter.
When intelligence agencies are run by civilians, theyre also more vulnerable to partisan political pressures. In 2004, for example, top CIA officials sympathetic to the Democratic Party allowed a senior CIA official to publicly criticize the countrys president, George W. Bush.
The NSA is now run by career soldiers who answer to other soldiers and to top government officials, including the president.
Thats a contrast to the Internal Revenue Service, where top civilian officials including some who formerly worked for the Democratic Party targeted the presidents political enemies throughout the 2012 election campaign. Obama recently denounced the suppression campaign as a media myth, and the FBI has not yet interviewed any of the victims.
Tuesday, Obama met with top executives at 15 high-tech companies who want the governments surveillance programs to be reduced.
The companies included both Google and Facebook, which collect huge amount of data about most Americans private and legal online activities. Nearly all of the political donations made by the companies executives go to Democratic candidates.
The NSA review report also urged that the NSA stop collecting secret weaknesses in commercial software programs, such as those developed by the 15 companies and used by foreign banks and governments. Those weaknesses are collected and used by the NSA to covertly penetrate foreign computer networks to gather information. Instead, the NSA should act like a software-testing subcontractor and help the companies by telling them about software gaps in their products, the report says.
However, the report also says the NSA should not provide any data to companies that would help their commercial operations. The report is also silent on what the NSA should do when it finds a vulnerable gap in software developed by a U.S. company that is mostly owned by foreign investors.
Hey diddle diddle, the cat and the fiddle,
The cow jumped over the moon.
The little dog laughed to see such sport,
and the dish ran away with the spoon.
I’ve been waiting to see the final act of this NSA “scandal” drama — for it to be fully fleshed out. It had to have an ending whereby the U.S.’s ability to protect herself would take a big hit.
I read the Executive Summary portion. I know, it cost me 15-20 IQ points, but it seemed a little touchy feeley. They should have kept it on the Tech side, and not so much Policy.
seems its already been compromised
Impeachment File for the 2014 Impeachment of B. Hussein Obama, aka Barry Soetoro, a documented legal citizen of the Sovereign Nation of Indonesia.
________
Documentation File for the 2014 Impeachment of John Boehner for Dereliction of Congressional Duty by Speaker Boehner for failure to appoint a Special NSA Investigator.
Before he is done I fully expect him to release the names, addresses and phone numbers of anyone anywhere in the world who has ever provided any information to agency workers.
The damage to US intel will last multiple generations.
“The NSA is now run by career soldiers “
Always had been. That’s nothing new.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.