Profile image
By Alexander Higgins (Reporter)
Contributor profile | More stories
Story Views

Last Hour:
Last 24 Hours:

Obama Already Secretly Implementing CISPA

Saturday, April 27, 2013 12:04
% of readers think this story is Fact. Add your two cents.

New documents show the Obama administration has sidestepped congress and has been secretly conducting CISPA style Orwellian online spying in complete secrecy.

The revelation comes in over 1,000 pages of government documents showing the Pentagon has been working behind the scenes to spearhead the effort to push all-seeing online spy program on the American people.

While pushing the effort to have congress pass legislation for a broad draconian surveillance umbrella in the name of cybersecurity the documents show the Obama administration has already authorized the secret interception of communications from major telecommunication providers in violation of federal wiretapping laws.

As with numerous instances of constitution trampling legislation congress approved despite widespread public outcry, such as the NDAA and the Patriot Act, the government’s unrelenting push for CISPA is a desperate attempt to legalize the illegal activities the government is already conducting.

Once fully implemented, every single digital communication sent – be it by email, text message or social networks such as Twitter and Facebook – will be intercepted by telecommunication providers and forwarded to government supercomputing centers were state of the art artificial intelligence algorithms will track and mine the data for a variety of purposes.

Such methods have already in appropriately flagged individuals as terrorists in the past which becomes more unnerving in the wake of the Boston Bombings in which we saw a hit squad of thousands of law enforcement officers completely fabricate details of events occurring on the ground to justify the murder of the alleged suspects on live national television.

As the capabilities of computer technology continues to increase exponentially as the government continues to expand quantum computing technologies it is only a matter of time before robots are completely charged with the task of the identification and the capturing or killing of individuals who show signs of potential terrorist activities.

For example:

NSA Building A $2 Billion Quantum Computer Spy Center?

The NSA is building a $2 billion spy center after reporting an enormous breakthrough in encryption cracking, which may be a massive Quantum computer center.


The National Security Center's massive $2 Billion Dollar highly fortified top secret data center

The National Security Center’s massive $2 Billion Dollar highly fortified top secret data center

As wired reports (more below)

Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

The news has conspiracy theorists, IT experts, and mathematicians abuzz with speculation that the NSA is building a quantum computer capable of cracking any type of encryption available today.



Read entire article…

Given the fact that artificial intelligence programs used for such operations implement non-deterministic or probabilistic algorithms, meaning they operate on probability which are incapable of making a 100% percent determination, there will always be many individuals who are wrongfully classified and treated as terrorists.

Even more alarming is the fact the federal government is already making the push to jail people for crimes that computers determine they will commit in the future.

while American’s may feel they don’t mind complete government surviellance because they are not committing any crimes, so forfeiting such civil liberties is acceptable to protect them from the bad guys, they certainly will be unnerved by the idea of computers mining their activities and communications to determine they will commit a crime in the future and the government throwing them in jail permanently based on such determinations.

Here’s more from RT on the Obama administrations secret illegal implementation of CISPA style surveillance:

U.S. Deputy Defense Secretary William Lynn (2nd R).(Reuters / Jim Young)


U.S. Deputy Defense Secretary William Lynn (2nd R).(Reuters / Jim Young)

Obama administration bypasses CISPA by secretly allowing Internet surveillance

Scared that CISPA might pass? The federal government is already using a secretive cybersecurity program to monitor online traffic and enforce CISPA-like data sharing between Internet service providers and the Department of Defense.

The Electronic Privacy Information Center has obtained over 1,000 pages of documents pertaining to the United States government’s use of a cybersecurity program after filing a Freedom of Information Act request, and CNET reporter Declan McCullagh says those pages show how the Pentagon has secretly helped push for increased Internet surveillance.

“Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws,” McCullagh writes.

That practice, McCullagh recalls, was first revealed when Deputy Secretary of Defense William Lynn disclosed the existence of the Defense Industrial Base (DIB) Cyber Pilot in June 2011. At the time, the Pentagon said the program would allow the government to help the defense industry safeguard the information on their computer systems by sharing classified threat information between the Department of Defense, the Department of Homeland Security and the Internet service providers (ISP) that keep government contractors online.

“Our defense industrial base is critical to our military effectiveness. Their networks hold valuable information about our weapons systems and their capabilities,” Lynn said. “The theft of design data and engineering information from within these networks greatly undermines the technological edge we hold over potential adversaries.”

Just last week the US House of Representatives voted in favor of the Cyber Intelligence Sharing and Protection Act, or CISPA — a legislation that, if signed into law, would allow ISPs and private Internet companies across the country like Facebook and Google to share similar threat data with the federal government without being held liable for violating their customers’ privacy. As it turns out, however, the DIB Cyber Pilot has expanded exponentially in recent months, suggesting that a significant chunk of Internet traffic is already subjected to governmental monitoring.

In May 2012, less than a year after the pilot was first unveiled, the Defense Department announced the expansion of the DIB program. Then this past January, McCullagh says it was renamed the Enhanced Cybersecurity Services (ECS) and opened up to a larger number of companies — not just DoD contractors. An executive order signed by US President Barack Obama earlier this year will let all critical infrastructure companies sign-on to ECS starting this June, likely in turn bringing on board entities in energy, healthcare, communication and finance.

Although the 1,000-plus pages obtained in the FOIA request haven’t been posted in full on the Web just yet, a sampling of that trove published by EPIC on Wednesday begins to show just exactly how severe the Pentagon’s efforts to eavesdrop on Web traffic have been.

In one document, a December 2011 slideshow on the legal policies and practices regarding the monitoring of Web traffic on DIB-linked systems, the Pentagon instructs the administrators of those third-party computer networks on how to implement the program and, as a result, erode their customers’ expectation of privacy.

In one slide, the Pentagon explains to ISPs and other system administrators how to be clear in letting their customers know that their traffic was being fed to the government. Key elements to keep in mind, wrote the Defense Department, was that DIB “expressly covers monitoring of data and communications in transit rather than just accessing data at rest.”

“[T]hat information transiting or stored on the system may be disclosed for any purpose, including to the government,” it continued. Companies participating in the pilot program were told to let users know that monitoring would exist “for any purpose,” and that users have no expectation of privacy regarding communications or data stored on the system.

According to the 2011 press release on the DIB Cyber Pilot, “the government will not monitor, intercept or store any private-sector communications through the program.” In a privacy impact assessment of the ECS program that was published in January by the DHS though, it’s revealed that not only is information monitored, but among the data collected by investigators could be personally identifiable information, including the header info from suspicious emails. That would mean the government sees and stores who you communicate with and what kind of subject lines are used during correspondence.

The DHS says that personally identifiable information could be retained if “analytically relevant to understanding the cyber threat” in question.

Meanwhile, the lawmakers in Congress that overwhelmingly approved CISPA just last week could arguably use a refresher in what constitutes a cyberthreat. Rep. Michael McCaul (R-Texas) told his colleagues on the Hill that “Recent events in Boston demonstrate that we have to come together as Republicans and Democrats to get this done,” and Rep. Dan Maffei (D-New York) made unfounded claims during Thursday’s debate that the whistleblowing website WikiLeaks is pursuing efforts to “hack into our nation’s power grid.”

Should CISPA be signed into law, telecommunication companies will be encouraged to share Internet data with the DHS and Department of Justice for so-called national security purposes. But even if the president pursues a veto as his advisers have suggested, McCullagh says few will be safe from this secretive cybersecurity operation already in place.

The tome of FOIA pages, McCullagh says, shows that the Justice Department has actively assisted telecoms as of late by letting them off the hook for Wiretap Act violations. Since the sharing of data between ISPs and the government under the DIB program and now ECS violates federal statute, the Justice Department has reportedly issued an undeterminable number of “2511 letters” to telecoms: essentially written approval to ignore provisions of the Wiretap Act in exchange for immunity.

“The Justice Department is helping private companies evade federal wiretap laws,” EPIC Executive Director Marc Rotenberg tells CNET. “Alarm bells should be going off.”

In an internal Justice Department email cited by McCullagh, Associate Deputy Attorney General James Baker is alleged to write that ISPs will likely request 2511 letters and the ECS-participating companies “would be required to change their banners to reference government monitoring.”

“These agencies are clearly seeking authority to receive a large amount of information, including personal information, from private Internet networks,” EPIC staff attorney Amie Stepanovich adds to CNET. “If this program was broadly deployed, it would raise serious questions about government cybersecurity practices.”


Stay up to date with the latest news:

Google Plus
Youtube: alexhiggins732
My Stories on Before It’s News


We encourage you to Share our Reports, Analyses, Breaking News and Videos. Simply Click your Favorite Social Media Button and Share.

Report abuse


Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Total 1 comment
  • BrettMeyers

    They just may have purchased a system called Ntrepid.

Top Stories
Recent Stories



Top Global

Top Alternative



Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.