• About Elkhart County Grassroots Hub

Elkhart County Grassroots Hub

Elkhart County Grassroots Hub

Category Archives: NSA

How did your Representative vote? Issue: YOUR Constitutional Rights

25 Thursday Jul 2013

Posted by HattieBelle in Bill of Rights, Bills, Congress, Constitution, House of Representatives, Indiana, Jackie Walorski, Justin Amash, NSA, U.S. House, U.S. House Vote

≈ Leave a comment

Tags

4th Amendment, Constitution, Dragnet Surveillance, Freedom, Jackie Walorski, Justin Amash, Liberty, Marlin Stutzman, NSA, Peeping Tom Authorization Act

The House of Representatives' Dome at night.

The House of Representatives’ Dome at night.

Amash Amendment #100: Stop NSA’s Blanket Surveillance of Americans

H R 2397, Stop Dragnet Surveillance of U.S. citizens. Justin Amash: “We came close (205-217). If just seven Representatives had switched their votes, we would have succeeded. Thank YOU for making a difference. We fight on to defend liberty.” CLICK HERE TO SEE HOW YOUR REPRESENTATIVE VOTED

2014 NDAA

H R 1960, National Defense Authorization Act (NDAA) for Fiscal Year 2014. The bill authorizes $55 billion *more* in military spending than the amount authorized by law under sequestration and provides $5 billion *more* than the President’s request for Overseas Contingency Operations (i.e., war funding). It also contains a misguided and dangerous policy statement on Syria that encourages greater military intervention and implies congressional support for arming the Syrian rebels. And yet again, the House rejected an amendment (Smith-Amash-Gibson) that would have repealed unconstitutional sec. 1021 of the 2012 NDAA, which gives the President sweeping new power to indefinitely detain anyone, including American citizens inside the United States, without charge or trial. Eighteen Republicans opposed their own party’s NDAA, which is the high mark for opposition in modern history. It passed 315-108.
CLICK HERE TO SEE HOW YOUR REPRESENTATIVE VOTED

The Smith-Gibson Amendment to the NDAA Amendment to protect American citizen’s rights to Due Process.
CLICK HERE TO SEE HOW YOUR REPRESENTATIVE VOTED

A Junior Republican in the House of Representatives’ uphill battle to defend OUR Constitutional liberties

24 Wednesday Jul 2013

Posted by HattieBelle in 4th Amendment, Amash Amendment H.R. 2387, Bill of Rights, CISPA, Indiana, Justin Amash, Keith Alexander, NSA, U.S. House Vote

≈ 1 Comment

Tags

4th Amendment, Amash Amendment H.R. 2397, Justin Amash, Keith Alexander, Liberty, NSA, NSA Secret Meeting to Stop Amash, Snooping

Justin Amash, House Representative, Michigan (R)

Justin Amash, House Representative, Michigan (R)

While he may not be close to becoming Speaker of the House, Justin Amash has slowly but surely become one of the more prominent Republicans in the rebellious wing of the House conference, as evidenced Monday when he effectively forced the actual Speaker of the House, John Boehner, to allow a vote on his amendment to partially defund the National Security Agency as part of the Department of Defense appropriations process. The revelations that the NSA had been collecting the phone and Internet data of millions of Americans en masse has given Amash a prime opportunity to move forward with some of his most important priorities.

Tomorrow the the house will vote on Amash’s HR 2397 amendment which will remove funding for NSA programs using the Patriot Act for blanket collection of phone records and metadata from phone service providers.

The summary of the amendment on the House of Representatives website reads:

Ends authority for the blanket collection of records under the Patriot Act. Bars the NSA and other agencies from using Section 215 of the Patriot Act to collect records, including telephone call records, that pertain to persons who are not subject to an investigation under Section 215.

NSA defenders in the Senate, especially Diane Feinstein and Saxby Chambliss, are flipping out. Today the National Security Head, Keith Alexander, scheduled a last-minute, members-only ‘top secret’ briefing. The invitation warned members that they could not share what they learned with their constituents or others. “The briefing will be held at the Top Secret/SCI level and will be strictly Members-Only,” reads the invite.

Keith Alexander, National Security Head

Keith Alexander, National Security Head

No matter what the results of tomorrows vote, the Amash amendment will put the House Representatives on record when it comes to NSA ‘snooping’. Voters will easily be able to find out WHICH REPRESENTATIVES favor tossing our 4th and 5th Amendments down “the toilet”.

As SOON as I have the information I will publish the ROLL CALL here so everyone knows how their representatives voted on limiting NSA mass surveillance. I will also include how U.S. House Representatives voted on the 2014 NDAA, which provides for arming and militarily aiding Al-Qaeda Syrian Rebels (yes, the ones that are massacring Christians, among others) and takes away American citizen’s rights to due process. I will also include the Roll Call for CISPA which aids dragnet surveillance by destroying private corporation’s “freedom of contract”, actually PROHIBITING companies from making legally binding commitment to users not to share personal data/e-mails. (Click here to find out how CISPA aids NSA ‘Dragnet Surveillance’.)

~It is STILL NOT TO LATE TO E-MAIL YOUR REPRESENTATIVE TONIGHT OR TO CALL YOUR REPRESENTATIVE TOMORROW MORNING TO VOICE YOUR OPINION ABOUT
JUSTIN AMASH’S AMENDMENT.~

CLICK HERE FOR YOUR HOUSE REPRESENTATIVE’S PHONE NUMBER.
CLICK HERE TO E-MAIL YOUR HOUSE REPRESENTATIVE.

Obama’s most transparent administration in History, is NOT!

11 Thursday Jul 2013

Posted by HattieBelle in 1st Amendment, 4th Amendment, Barack Obama, Bill of Rights, CISPA, Civil Rights, Constitution, Edward Snowden, FISA, Fusion Centers, Glenn Greenwald, Military, NSA, Secret Court, Secret Laws, Senator Udall, Senator Wyden

≈ 1 Comment

Tags

1st Amendment, 4th Amendment, AP Scandal, Barack Obama, Constitution, Edward Snowden, Glenn Greenwald, NSA, Overreach, Rosen Scandal, Secret Court, Spying, Surveillance, The Guardian

Remember when Richard Nixon told David Frost, “When the President does it, it is NOT illegal”?

Richard M. Nixon, TV interview with David Frost, May 20, 1977.

Remember when President Barack Obama announced:

My Administration is committed to creating an unprecedented level of openness in Government. We will work together to ensure the public trust and establish a system of transparency, public participation, and collaboration. Openness will strengthen our democracy and promote efficiency and effectiveness in Government.

What happened?

“We were hopeful when Obama came into office that some of what we had seen in the Bush years would be reversed,” said Gary Daniels of the ACLU. “Instead, not only has it continued but it has EXPANDED.”

Guardian Journalist, Glenn Greenwald, and whistle blower, Edward Snowden, recently revealed that Obama has, for years, been in charge of a ‘Big Brother’ surveillance state that would make Richard Nixon blush with envy. The FBI, the NSA, DHS, CIA, plus Federal, military and “privately contracted” agencies, more than you can count using every finger on both hands, has a database of all your iMessages, your photos, your videos, your e-mails, your music playlist, your web search history, your documents and connection logs and your cell phone text messages.

Since Sept. 11, 2001, the top-secret world created to respond to the terrorist attacks has grown into an unwieldy enterprise spread over 10,000 U.S. locations

Since Sept. 11, 2001, the top-secret world created to respond to the terrorist attacks has grown into an unwieldy enterprise spread over 10,000 U.S. locations

They have put your phone calls into their data base, including recordings of the contents and the ping triangulations — which can enable analysts to track your every movement of every day, even inside your home, if you are carrying your phone. Obama’s spy network has photocopied the front of every one of your snail mail envelopes. There’s evidence the federal government has collected information on your financial and credit card transactions in addition to your health records.

Obama’s spy agencies don’t just snoop on citizens.

Federal agencies used security badge access records to track the chief Washington correspondent for Fox News’, James Rosen’s, comings and goings from the State Department (court affidavit here). They traced the timing of his calls with a State Department security adviser suspected of sharing the classified report. They obtained a search warrant for Rosen’s personal e-mails.

A Mobile Fusion (spy) Center, to see pictures of the inside & read more about the Mobile Spy Center click: https://www.ldvusa.com/vehicles/emergency-response/recent-deliveries/494-washoe-county-sheriff-mobile-fusion-center

Washoe County’s Mobile Fusion (Spy) Center. To see pictures of the inside and to read more about the Mobile Spy Center click: https://www.ldvusa.com/vehicles/emergency-response/recent-deliveries/494-washoe-county-sheriff-mobile-fusion-center

Associated Press executives and First Amendment watchdogs ALSO have criticized the Justice Department for the broad scope of phone records it secretly subpoenaed from more than 20 phone lines of AP offices in Washington, Hartford, Conn., and New York.

Given the First Amendment’s protection of press freedom, is it ever legal for government to spy on, persecute or prosecute reporters doing their jobs? Just conducting an investigation is intimidating. According to Associated Press CEO Gary Pruit, “the message the government is now sending is — if you talk to the press we are going to go after you.”

To extend his executive power and oversight even further, Barack Obama has ordered federal employees to spy on their colleagues.

“See something, say something” appallingly has overreached into every nook and cranny of our personal lives.

But, if it keeps Americans safe what is the problem? Its not like any of us regular people are troublemakers who might, for example, do something rabble-rousing like doubt the “settled science of climate change” out-loud.

Why should we be concerned about surveillance if we have nothing to hide?

Here’s why…

Privacy isn’t simply the option to hide bad things. Privacy enables us to freely pursue the things that we enjoy, on our own terms. Privacy is your right to control the flow of information about yourself. You choose what details to share, when, where, and with whom. You may not be a terrorist, but there are details in everyone’s personal lives that they want to keep private. Privacy should be important to all who value freedom and the security of a comfortable voluntary lifestyle. It would be awkward to have your mother read through your every email and monitor your phone calls — forever. Let alone some stranger from the government.

Who hasn’t used the Internet to learn about and discuss political ideology? Which  is something that the government is more likely to take a serious interest in than your embarrassing late night texts to your ex-boyfriend.

Should you trust government with the power to listen to private conversations—some undoubtedly concerning politics — whenever they want?

The answer should always be: no. Some Democrats are willing to defend the NSA-Verizon scandal because Barack Obama is in the Oval Office, just as some Republicans were willing to downplay wiretapping under George W. Bush.

That’s partisan political games.

The protection of civilian privacy is an issue far more important than red versus blue. No one should give any president, any power that they wouldn’t trust with their WORST enemy. A Democrat is POTUS today, but a future presidents could be  Republican, Libertarian, from the Green Party or whatever. Parties have come and gone. So far, the Constitution has stood.

“The right of the people to be secure in their persons, papers and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” ~4th Amendment

Our fourth amendment has been 100% compromised. As well as our first. Most of us did NOT consent. It was kept secret. When confronted by Senator Mark Udall (D-CO) and Senators Ron Wyden (D-OR), the Obama administration LIED. They denied what was going on.

Any individual courageous enough to inform the public about secret abuses of our rights risked being prosecuted at unprecedented levels under the Obama administration. Even the Nixon administration was wussy in comparison. Fear of repercussions and intimidation enabled America’s “top secret world” to  become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.

"Watch your back."

“Watch your back.”

Allowing it to go on and stand unchallenged does far more damage to the republic than any law breaking. It sets new boundaries and rules for our government. It confirms what Richard Nixon argued for: “When the president does it, that means it is not illegal.”

The sheer breadth of America’s behemoth “top secret world” confirms the inadequacy of secret courts. Courts exist to enforce our rights in the face of government abuses. That’s one of the central geniuses of the founding fathers and the system of checks and balances they constructed.

When the decisions are secret, they stop being judicial in character. Law is built on mutual references among courts. When the law can’t reference itself, it stops being law, and emerges as something very different: in this case, a rubber stamp allowing any manner of dragnet violations impacting law-abiding Americans and our fundamental rights.

MUST READ: Top Secret America: a Hidden World, Growing Beyond Control. I can’t recommend this Washington Post article enough. It’s about the scope and size of America’s domestic spying and is shocking. CLICK HERE TO READ ARTICLE — YOU NEED TO KNOW THIS

DHS is peddling military weapons to local police. WHAT could go wrong?

31 Tuesday Jul 2012

Posted by HattieBelle in Activism, American, ammunition, Civil Rights, Communist, Department of Homeland Security, Eavedropping, Electronic Communication, Emergency Measures, Executive Order, Facism, Fusion Centers, Independence, Intervention, Law Enforcement, Liberty, Martial Law, NSA, Posse Comitatus Act, Privacy, Socialism, Taser, weapons

≈ 2 Comments

Tags

California, Homeland Security Department, Personal armor, Police, Posse Comitatus Act, Privacy Laws, Security, Surveillance, United States, United States Department of Homeland Security, Unmanned aerial vehicle

The Department of Homeland Security has begun a new program to counsel local police departments on how to buy and use armored vehicles, military helicopters, tanks, humvees, body armor, sniper rifles and even UNMANNED DRONES.

Does anyone actually believe it’s a good idea to use weaponized military vehicles for civilian “surveillance”? Is this really the direction in which we are headed?

Meanwhile…

It’s o.k., they’re the good guys.”

According to the Montgomery County Sheriff’s Office the $300,000 ShadowHawk drone, purchased from Vanguard Defense Industries, will take to the skies in the coming months to provide another tool in their law-enforcement arsenal.

Outside the Anaheim Police Department today.

Don’t worry…more “good guys”.

Aerial ‘Shadowhawk’ Police Drones can now deploy tasers & tear gas.

Related articles
  • Why Wouldn’t a Small-City Police Department Need an Armored Vehicle? (reason.com)
  • Department of Homeland Catheters Spying on Occupy Wallstreet (opednews.com)
  • Can Your Local Police Dept. Call In Military Drone Strikes? (theaveragejoenewsblogg.com)
  • Help EFF Find Out How Your Local Police Agency is Using Drones (eff.org)
  • Final Steps To A US Police State- “Federalize” Local Law Enforcement (gaspeegazette.wordpress.com)
  • US Military and Local Police Working Together on American Streets (pakalertpress.com)

Your internet privacy is up to YOU: 5 essential privacy tools

29 Sunday Jul 2012

Posted by HattieBelle in CALEA, CISPA, Eavedropping, Electronic Communication, Hoosier, Internet Privacy, Lieberman-Collins Cyber Security Act, McCain Cybersecurity Act, NSA, Privacy, Private Web Surfing, Protect your privacy, Tea Party

≈ 4 Comments

Tags

Android, CISPA, Eavesdropping, IOS, NDAA, Patriot Act, PGP, Pretty Good Privacy, Privacy Matters, S 3414, SENATE NO TO CISPA, SENATE NO TO S3414, Snooping, SpiderOak, TELL YOUR SENATOR TO VOTE NO, TrueCrypt

Since  the passage of the Cyber Intelligence Sharing and Protection Act by the U.S. House of Representatives in April, #CISPA has been everywhere. Also, let’s not forget the gradual expansion of CALEA and the Lieberman-Collins Cyber Security Act and the NSA-centric McCain Cybersecurity Act.

The concern by some is that the bill’s language is too broad, giving companies
and the government power to intercept, share or block user information as long as it is to fight “cybersecurity threats.”

An explanation of how CISPA wil kill ALL PRIVACY on the internet HERE.

Who supports CISPA and who doesn’t HERE.

What has gone largely unnoticed in this torrent of analysis, however, is that privacy tools for individuals already exist and they have so for many years! Quietly anticipating encroachment against basic Internet liberties, concerned cyber privacy advocates has been coding and releasing the tools that allow for private electronic communication and private web surfing. Proposed legislation like CISPA may or may not pass and become law, but if it does we have to understand the new landscape. Your privacy is up to you!

1. Email Privacy – Naked email is like a postcard for anyone to read. Pretty Good Privacy (PGP), an open source software program created by Phil Zimmermann in 1991, is the global standard for point-to-point encrypted and authenticated email. Hushmail is an OpenPGP-compatible web-based email platform that does not have access to your user password for decryption. Both products, when used correctly, offer subpoena-proof email communication.

2. File Privacy – Your files might be stored in the encrypted cloud but that doesn’t mean that they’re 100% safe for your eyes only. Free and open-source TrueCrypt allows you to encrypt folders or entire drives locally prior to syncing with Dropbox. BoxCryptor also facilitates local file encryption prior to cloud uploading and it comes with added compatibility for Android and iOS.

There is an alternative to the dual-application process described above. Although most cloud-based storage services transfer over an encrypted session and store data in an encrypted form, the files are still accessible to the service provider which makes the data vulnerable to court-ordered subpoena. In order to rectify this, two different zero-knowledge data storage companies provide secure online data backup and syncing – SpiderOak and Wuala. For obvious reasons, there is no password recovery and employees have zero access to your data.

3. Voice Privacy – Wiretapping will become more prevalent in the days and months ahead. From the creator of PGP, Zfone is a new secure VoIP phone software product utilizing a protocol called ZRTP which lets you make encrypted phone calls over the Internet. The project’s trademark is “whisper in someone’s ear from a thousand miles away.” You can listen to Zimmermann present Zfone at DEFCON 15.

Also utilizing ZRTP, open-source Jitsi provides secure video calls, conferencing, chat, and desktop sharing. Because of security issues and lawful interception, Tor Project’s Jacob Appelbaum recommends using Jitsi instead of Skype.

Designed specifically for mobile devices and utilizing ZRTP, open-source RedPhone from Whisper Systems is an application that enables encrypted voice communication between RedPhone users on Android.

4. Chat Privacy – Encrypting your chat or instant messaging sessions is just as important as encrypting your email. Cryptocat establishes a secure, encrypted chat session that is not subject to commercial or government surveillance. Similar to Cryptocat, the older and more durable Off-the-record Messaging (OTR) cryptographic protocol generates new key pairs for every chat implementing a form of perfect forward secrecy and deniable encryption. It is available via Pidgin plugin.

5. Traffic Privacy – The final step in the process is geo-privacy, which refers to the protection of ‘information privacy’ with regard to geographic information. Virtual Private Networks, or VPNs, have been used consistently for anonymous web browsing and IP address masking. Just make sure that your VPN provider does not log IP addresses and that they accept a form of payment that does not link you to the transaction.

Additionally, the Tor Project provides free software and an open network for privacy-oriented Internet usage. Intended to protect users’ personal freedom, privacy, and ability to conduct confidential business, Tor (The onion router) is a system that improves online anonymity by routing Internet traffic through a worldwide volunteer network of layering and encrypting servers which impedes network surveillance or traffic analysis.

Related articles
  • IF YOU WANT PRIVACY, YOU CAN BUY IT: “Phil Zimmermann and some of the original PGP team have joined… (pjmedia.com)
  • An App Keeps Spies Away from Your iPhone (technologyreview.com)
  • An app that keeps spies away from your iPhone (whptv.com)
  • Web privacy guru designing anti-spying iPhone app (bgr.com)
  • Cryptography for the Rest of Us (lfb.org)

*****Tell the Senate NO on S. 3414, the Cybersecurity Act of 2012: CISPA. They can vote as early as next week!

Recent Posts

  • Holy Cow! The war on milk…
  • Corruption is Legal in America
  • Indiana candidates Stutzman & Young debate for US Senate Seat

Archives

  • April 2016
  • March 2016
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • September 2012
  • August 2012
  • July 2012
  • June 2012

About Elkhart County Grassroots Hub

  • About Elkhart County Grassroots Hub

2012 Election 2013 Activism American Bill of Rights Civic Engagement Civil Rights Community Community Service Event Community Services Compassion Constitution economy Education Elkhart Elkhart County Events Family times Food GOP Health Care Hoosier Indiana Jackie Walorski Neighbors Obamacare Politics Richard Mourdock Tea Party Volunteer
January 2021
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

Cancel
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy