RSN Fundraising Banner
FB Share
Email This Page
add comment
Politics
Over Eight Years, President Barack Obama Has Created the Most Intrusive Surveillance Apparatus in the World. To What End? Print
Sunday, 25 September 2016 08:19

Bamford writes: "Over his two terms, Obama has created the most powerful surveillance state the world has ever seen. Although other leaders may have created more oppressive spying regimes, none has come close to constructing one of equivalent size, breadth, cost, and intrusiveness."

Demonstrators wearing cardboard surveillance camera hats carry a sign depicting U.S. President Barack Obama at the 'Stop Watching Us: A Rally Against Mass Surveillance' march in Washington, October 26, 2013. (photo: Jonathan Ernst/Reuters)
Demonstrators wearing cardboard surveillance camera hats carry a sign depicting U.S. President Barack Obama at the 'Stop Watching Us: A Rally Against Mass Surveillance' march in Washington, October 26, 2013. (photo: Jonathan Ernst/Reuters)


Over Eight Years, President Barack Obama Has Created the Most Intrusive Surveillance Apparatus in the World. To What End?

By James Bamford, Foreign Policy

25 September 16

 

Over eight years, President Barack Obama has created the most intrusive surveillance apparatus in the world. To what end?

his summer, at 1:51 p.m. on Saturday, June 11, an unearthly roar shattered the afternoon quiet along the Florida coast. On Cape Canaveral, liquid fuel surged through the thick aluminum veins of a Delta IV Heavy rocket nearly as tall as the U.S. Capitol. Two million pounds of thrust in three symmetrical boosters fired the engines, sending the craft hurtling over the Atlantic Ocean into the heavens. Eighty seconds after takeoff, it hit Mach 1, the speed of sound.

The Delta IV Heavy, introduced in 2004, is America’s most powerful rocket, and this was only the ninth time it had launched. Even more exclusive, however, was its top-secret cargo: Inside its nearly seven-story-high nose cone was an Advanced Orion, the world’s largest satellite. About eight hours after launch, when the most advanced spy craft ever built went into geosynchronous orbit, it unfurled its gigantic mesh antenna, larger than a football field, and began eavesdropping on the Earth below.

The mission’s patch, dubbed “epic/terrifying” by the Verge, depicted a masked, armored knight standing defensively before an American flag. A sword strapped to his back bore a cross-guard resembling a set of claws. According to the National Reconnaissance Office (NRO), the intelligence agency responsible for the satellite, the image delivered “a message of tenacious, fierce focus … representing extreme reach with global coverage.”

In a sense, this was a fitting tribute to President Barack Obama as his administration entered its last six months in the White House. Over his two terms, Obama has created the most powerful surveillance state the world has ever seen. Although other leaders may have created more oppressive spying regimes, none has come close to constructing one of equivalent size, breadth, cost, and intrusiveness. From 22,300 miles in space, where seven Advanced Orion crafts now orbit; to a 1-million-square-foot building in the Utah desert that stores data intercepted from personal phones, emails, and social media accounts; to taps along the millions of miles of undersea cables that encircle the Earth like yarn, U.S. surveillance has expanded exponentially since Obama’s inauguration on Jan. 20, 2009.

The effort to wire the world — or to achieve “extreme reach,” in the NRO’s parlance — has cost American taxpayers more than $100 billion. Obama has justified the gargantuan expense by arguing that “there are some trade-offs involved” in keeping the country safe. “I think it’s important to recognize that you can’t have 100 percent security and also then have 100 percent privacy and zero inconvenience,” he said in June 2013, shortly after Edward Snowden, a former contractor with the National Security Agency (NSA), revealed widespread government spying on Americans’ phone calls.

Since Snowden’s leaks, pundits and experts (myself included) have debated the legality and ethics of the U.S. surveillance apparatus. Yet has the president’s blueprint for spying succeeded on its own terms? An examination of the unprecedented architecture reveals that the Obama administration may only have drowned itself in data. What’s more, in trying to right the ship, America’s intelligence culture has grown frenzied. Agencies are ever seeking to get bigger, move faster, and pry deeper to keep pace with the enormous quantity of information being generated the world over and with the new tactics and technologies intended to shield it from spies.

This race is a defining feature of Obama’s legacy — and one that threatens to become never-ending, even after he’s left the White House.

The foundations of Obama’s shadow state date back to the immediate post-9/11 period. Six weeks after the attacks, the Patriot Act, which greatly expanded the government’s surveillance powers, was rushed through Congress and signed by President George W. Bush. A few months later, the Bush administration created the Information Awareness Office, part of the Defense Advanced Research Projects Agency (DARPA). That led to the development of the Total Information Awareness program, designed to vacuum up vast amounts of private electronic data — banking transactions, travel documents, medical files, and more — from citizens. After the media exposed and criticized the program, which didn’t use warrants, Congress shut it down in late 2003. Much of the operation, though, was simply transferred to the NSA.

In 2005, the New York Times revealed that Bush had authorized the NSA to monitor the international electronic communications “of hundreds, perhaps thousands, of people in the United States.” Code-named Stellar Wind, the program intercepted telephone conversations, emails, and metadata from taps inside AT&T facilities and from satellites. Each day, millions of communications were scanned for addresses and keywords associated with al Qaeda. Any leads were sent to the FBI. (A secret internal analysis conducted by the bureau in 2006 indicated that no information from Stellar Wind had proved useful.)

The same week the Times investigation was published, Obama, then a senator, gave a speech defending civil liberties and asking the Senate to hold off on voting to reauthorize the Patriot Act. “If someone wants to know why their own government has decided to go on a fishing expedition through every personal record or private document … this legislation gives people no rights to appeal the need for such a search in a court of law,” the former constitutional law professor declared. “This is just plain wrong.”

Obama rode a wave of negative public opinion on mass surveillance. In January 2006, a Zogby Analytics poll showed that, by a margin of 52 to 43 percent, Americans wanted Congress to consider impeaching Bush if he wiretapped citizens without a judge’s approval. Obama then carried the opposition narrative into his White House bid. In late 2007, he publicly promised, “No more secrecy. That’s a commitment that I make to you as president…. That means no more illegal wiretapping of American citizens.” He even vowed to support a filibuster of any bill that gave retroactive immunity to companies providing assistance to government spies. (PRISM, a secretive program to gather data from major internet companies that was later revealed in Snowden’s leaks, was launched in 2007.)

Yet as his campaign progressed, Obama’s stance hardened. Overseas, scores of people were being killed in Iraq by suicide bombings; at home, opponents were hammering Obama for being weak on terrorism. Amid this shifting political climate, he brought in John Brennan, a former CIA deputy director, as his top intelligence advisor. During the Bush years, Brennan had supported the very policies Obama campaigned against. Within months, his influence on the candidate was evident. In July 2008, Obama reversed his earlier promises, announcing support for a sweeping surveillance law that largely legalized the NSA’s warrantless eavesdropping program and granted immunity to telecom companies that aided in spying.

Many of Obama’s supporters were horrified. “I am disgusted,” one wrote on the candidate’s website. “Obama will NOT receive my vote in November.” But the Democratic nominee justified his switch by pointing to violent threats in places such as Iraq, Afghanistan, and Pakistan. “In a dangerous world,” he wrote on a campaign blog, “government must have the authority to collect the intelligence we need to protect the American people.” From a pragmatic perspective, Obama was also heading into the last push for the presidency and needed to appeal to the broader electorate, which viewed terrorism as a bigger threat than his liberal base did.

After being elected, Obama staffed up with intelligence officials who supported mass surveillance. Brennan became his chief counterterrorism advisor (and, a few years later, director of the CIA). Maureen Baginski, the NSA’s former director of signals intelligence, a job that had placed her in charge of wiretapping, joined the transition team that helped establish policy for the NSA and other spy agencies.

Most notable, though, was Obama’s decision to keep the NSA’s chief in place. Keith Alexander, a three-star general who’d led the agency since 2005, was a force to be reckoned with. “We jokingly referred to him as Emperor Alexander — with good cause, because whatever Keith wants, Keith gets,” a former senior CIA official told me. “We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.” Alexander’s preferred spying method was blunt. According to a document leaked by Snowden, while visiting Menwith Hill station, the NSA’s giant listening post in England, in June 2008, Alexander asked, “Why can’t we collect all the signals all the time?” He applied this approach in Iraq, pulling intelligence from phone interceptions, planes, drones, satellites, and other sensors into a powerful computer analysis system known as the Real Time Regional Gateway. He also ran the NSA’s massive metadata surveillance program, which involved secretly keeping track of every phone in the United States: what numbers were called, from where, and exactly when — billions of communications each year.

One of the few people with the security clearance to witness Alexander in action was Judge Reggie Walton of the Foreign Intelligence Surveillance Court (FISC). He didn’t like what he saw, particularly that the NSA did not have “reasonable and articulable suspicion” to justify monitoring some 90 percent of targets in its metadata program. In a January 2009 opinion, Walton wrote that he was “exceptionally concerned” that the agency was operating in “flagrant violation” of the FISC’s orders regarding privacy. Two months later, he accused the NSA of making “material misrepresentations” to the court, which in less polite language is known as lying. He pointed the finger at Alexander, writing that the general’s explanation for why his agency had been eavesdropping illegally on tens of thousands of Americans — essentially, that he thought privacy restrictions applied only to certain archived data — “strains credulity.” Walton concluded that oversight of metadata gathering “has never functioned effectively.”

Yet Obama didn’t dismiss Alexander. In fact, the following year, the general was awarded a fourth star and tapped to lead the newly minted, top-secret U.S. Cyber Command. And rather than limit the NSA chief’s collect-it-all regime, the president authorized its expansion.

For the Obama administration, the next frontier in spying was being able to eavesdrop on every single person in a country by obtaining “full-take audio” of all cell-phone conversations. For this new program, code-named SOMALGET, it needed a testing ground. The Bahamas — small, contained, peaceful, 50 miles from the Florida coast — fit the bill.

In 2009, not long after Obama had taken office, the NSA gained access to Bahamian communications networks by subterfuge. The U.S. Drug Enforcement Administration got legal permission to plant monitoring equipment in the nation’s telecom systems by convincing the islands’ government that the operation would help catch drug dealers. Really, though, it opened a backdoor for the NSA so that it could tap, record, and store cellular data. “[O]ur covert mission is the provision of SIGINT [signals intelligence],” a document leaked by Snowden stated. The host country was “not aware.”

Within two years, SOMALGET would achieve its goal of 100 percent surveillance in the Bahamas — all without legal warrants. This included spying on the cell phones of some 6 million U.S. citizens who visit or reside in the country each year; notable celebrities with homes there are Bill Gates, John Travolta, and Tiger Woods.

The NSA didn’t stop with the Bahamas, however. It eventually deployed SOMALGET in Afghanistan, which brought the total number of conversations recorded and stored by the program to “over 100 million call events per day,” according to leaked agency files. It also began collecting metadata from phones in the Philippines, Mexico, and Kenya. NSA planning documents in 2013 anticipated further uses in other countries.

In some cases, the Obama administration cooperated with foreign governments to expand its reconnaissance capabilities. This included members of the Five Eyes, a clandestine alliance of intelligence agencies in the United States, the United Kingdom, Australia, Canada, and New Zealand that dates back to the Cold War. During Obama’s first three years in office, the U.S. government paid the British equivalent of the NSA, the Government Communications Headquarters (GCHQ), at least $150 million to enhance surveillance. Because undersea fiber-optic cables from North and South America transit the United Kingdom on their way to Europe and the Middle East, the GCHQ was in an ideal position to place taps on them. It did just that, on cables that could transfer upwards of 21 petabytes of information daily; this included a large slice of the internet, which could be stored for three days before being replaced by new data, and some 600 million “telephone events” every 24 hours. In 2010, not long after becoming operational, the program grew to be so successful that the GCHQ boasted it had the “biggest internet access” of any Five Eyes member. “This is a massive amount of data!” acknowledged an agency PowerPoint later made public by Snowden. Another leaked document declared, “We are in the golden age.”

To sift through everything, 250 NSA analysts joined forces with about 300 from the GCHQ. Using computer systems, they searched for data containing any of 71,000 “selectors,” such as keywords, email addresses, or phone numbers. Internally, this work was dubbed Mastering of The Internet (MTI). A leaked 2010 GCHQ document stated, “MTI delivered the next big step in the access, processing and storage journey.” In a single day, the file continued, a GCHQ surveillance operation known as Tempora had captured, stored, and analyzed some 39 billion pieces of information.

The acceleration of surveillance required a construction boom of a scale unprecedented in the history of U.S. intelligence. On March 5, 2012, Alexander opened what is likely the world’s largest listening post, about 130 miles north of Savannah, Georgia; members of the press were warned not to bring cameras within two miles. The $286 million, 604,000-square-foot facility has more than 2,500 workstations and 47 conference rooms, and it employs more than 4,000 eavesdroppers and other personnel who focus on the Middle East. Earphones on, facing their computers, employees sit in cubicles and listen to “cuts,” or intercepted conversations. “It’s very near real time,” Adrienne Kinne, a former intercept operator at the complex, told me a few years ago. “We would just get these thousands of cuts dumped on us … [from] Iraq, Afghanistan, and a whole swath of area. We would get [calls in] Tajik, Uzbek, Russian, Chinese.”

As of 2013, the NSA had spent upwards of $300 million to expand a former Sony chip-fabrication plant near San Antonio and turn it into the agency’s principal listening post for the Caribbean and Central and South America. About 900 miles northwest, it was also constructing a new operations building at Buckley Air Force Base near Denver. The mission was to collect intercepted communications from spy satellites, including Advanced Orions, and ground stations like Menwith Hill, then transmit the data through fiber-optic cables to analysts at their desks near Savannah, San Antonio, and at other NSA outposts. Meanwhile, in January 2012, the NSA opened a $358 million listening post on the island of Oahu targeting Asian and Pacific countries. Upon its debut, Alexander said in a news release that the facility’s goal “is to produce foreign signals intelligence for decision-makers as global terrorism now jeopardizes the lives of our citizens, military forces, and international allies.”

Not to be left out, Menwith Hill also underwent a multimillion-dollar expansion. Like a moon base hidden in the rolling Yorkshire hills, the station’s 33 giant golf-ball-like radomes house parabolic antennas capable of 2 million intercepts an hour from communications satellites. To better analyze data at the post, in 2012, the NSA added powerful supercomputers and boosted personnel from 1,800 to 2,500.

That November, Obama was re-elected following a campaign that centered almost exclusively on domestic and economic issues; little attention was paid to surveillance and privacy. (The Snowden leaks were still more than six months down the road.) Beyond the campaign trail, however, on high ground in Bluffdale, Utah, construction was in progress on the pièce de résistance of Obama’s shadow empire. The $2 billion, 1-million-square-foot complex was set to function as the centerpiece of the NSA’s global eavesdropping operations. Into it would flow streams of emails, text messages, tweets, Google searches, financial records, Facebook posts, YouTube videos, metadata, and telephone chatter picked up by the constellation of satellites, cable taps, and listening posts by then in operation.

For intelligence analysts, the Bluffdale facility serves as a sort of “cloud,” or external hard drive, for intercepted data. About 200 people tend to some 10,000 racks of humming, blinking servers containing trillions of words and thoughts sucked up from unsuspecting people. Some areas of the complex contain data considered critical, such as calls and emails to and from key members of al Qaeda and the Islamic State; other information is eventually erased to make room for more on the servers.

Outside the facility, there’s been the occasional protest. In June 2014, a bulbous, 135-foot-long blimp appeared in the sky bearing a giant sign that read, “NSA Illegal Spying Below.” Inside were representatives from a coalition of grassroots groups dedicated to privacy. “We’re flying an airship over the Utah data center,” a written statement from one participating organization, the Electronic Frontier Foundation, proclaimed, “which has come to symbolize the NSA’s collect-it-all approach to surveillance.”

Although the effort to gather every possible bit of information follows a certain logic — the more you have, the more likely you are to find what you’re looking for — it is complicated by what NSA officials refer to as the three V’s. “Inside [the] NSA, we often say that’s the volume, velocity, variety issue,” Alexander’s deputy, Chris Inglis, told an audience of intelligence officials in 2010, “an enormous quantity of information moving ever faster and coming at us in very complex forms.”

Obama’s surveillance architecture, it seems, has done little to address this multifaceted problem. In fact, it may have made it worse. Privacy hasn’t been traded for security, but for the government hoarding more data than it knows how to handle. Kinne, the former intercept operator, described her work as “just like searching blindly through all these cuts to see what the hell was what.”

In the wake of the Snowden leaks, administration officials tried hard to justify the secret collection of Americans’ telephone records. “We know of at least 50 threats that have been averted because of this information,” Obama said during a visit to Berlin in 2013. He offered no specific examples. Alexander, meanwhile, claimed numerous times to the media and in public speeches that “54 different terrorist-related activities” had been thwarted. But he, too, offered no examples.

On Oct. 2, 2013, when called to testify before the Senate Judiciary Committee, the general backtracked. Alexander cited only one instance when an intercept detected a potential threat: a Somali taxi driver living in San Diego who sent $8,500 to al-Shabab, his home country’s notorious terrorist group. That winter, a panel set up by Obama to review the NSA’s operations concluded that the agency had stopped no terrorist attacks. “We found none,” Geoffrey Stone, a University of Chicago law professor and one of five panel members, bluntly told NBC News in December 2013. Since then, despite mass surveillance both at home and abroad, shootings or bombings have occurred in San Bernardino, California; Orlando, Florida; Paris; Brussels; and Istanbul — to name just a few places.

Beyond failures to create security, there is the matter of misuse or abuse of U.S. spying, the effects of which extend well beyond violations of Americans’ constitutional liberties. In 2014, I met with Snowden in Moscow for a magazine assignment. Over pizza in a hotel room not far from Red Square, he told me that the NSA puts innocent people in danger. In his experience, for instance, the agency routinely had passed raw, unredacted intercepts of millions of phone calls and emails from Arab- and Palestinian-Americans to its Israeli counterpart, Unit 8200. Once in Israeli hands, Snowden feared, this information might be used to extort information or otherwise harm relatives of the individuals being spied upon.

That September, after my interview with Snowden was published, 43 members of Unit 8200 quit their posts in moral protest. They charged publicly that Israel used intercepted communications, like those sent to it by the NSA, to inflict “political persecution” on Palestinians. They said data were gathered on sexual orientations, infidelities, money problems, family medical conditions, and other private matters and then used as tools of coercion — to force targets into becoming Israeli collaborators, for example. “[T]he intelligence is used to apply pressure to people, to make them cooperate with Israel,” one member of the dissenting group, who asked that his name not be used, told the Guardian.

The NSA has at least considered employing similar tactics in the United States. In a top-secret memo dated Oct. 3, 2012, Alexander raised the possibility of using vulnerabilities discovered in mass data — “viewing sexually explicit material online,” for instance — to damage reputations. The agency could, say, smear individuals it believed were radicalizing others in an effort to diminish their influence.

Obama, meanwhile, has taken virtually no steps to fix what ails his spying apparatus. After the Snowden revelations, the president called for ending the NSA’s collection of metadata from phone calls by U.S. citizens. But this represents a rare tremor in the surveillance state. More consistently, Obama has limited oversight. In his first year as president, he threatened to veto a bill from his own party that would have required him to brief all members of congressional intelligence committees about covert operations, as opposed to the much smaller “Gang of Eight,” made up of top-ranking party and committee leaders and created in the Bush era to shield illegal activities from scrutiny. Gang briefings, former White House counterterrorism czar Richard Clarke told Rachel Maddow in 2009, were often a “farce.”

While keeping critics at bay, the Obama administration has gone after people blowing the whistle on intelligence abuses. The Justice Department has charged eight leakers — more than double the number under all previous presidents combined. “[T]his trend line should be going in the opposite direction,” an ACLU lawyer argued in a 2014 blog post. “The modern national security state is more powerful than ever — more powerful even than during the Cold War. It demands democratic accountability.”

The National Geospatial-Intelligence Agency (NGA) released a report in June detailing what it calls a “data tsunami.” By the end of this decade, there will be anywhere from 50 billion to 200 billion networked devices on a planet of some 8 billion people. “For the intelligence community, this equates to 40 zettabytes of data, or 1 sextillion bytes,” the NGA states. “Described in more familiar terms, this is the equivalent of every person on the planet having 174 newspapers delivered daily.” Viewed another way, that’s more data than 7 billion Libraries of Congress could hold.

In the surveillance state Obama has built, this deluge threatens to bury the few needles that might exist — warnings of attacks, signals of radicalizing groups, rallying cries of extremist recruiters — even deeper in the proverbial haystack. So, too, does encryption: Once a tool used mostly by spy agencies and militaries, encryption is becoming commonplace in everyday digital chatter to keep government eyes and ears out. Gmail offers it. WhatsApp began providing its billion-plus users with automatic encryption in April. In July, Facebook announced that it would soon give the option of end-to-end encryption on its Messenger app. More services will surely follow.

Speed is a critical component in breaking encryption because most codes are based on factoring extremely large prime numbers. Conducting what’s known as a “brute force” attack — trying every possible combination of digits — using even the most powerful computers in operation would take centuries or longer to succeed.

Obama, though, signed an executive order in July 2015 urging the creation of an exaflop supercomputer — a machine about 30 times faster than anything in existence. It would be capable of conducting more than a quintillion (1,000,000,000,000,000,000) operations per second. The president’s charge to build was mostly targeted at the scientific community; behind the scenes, however, the NSA has been preparing to breach the exaflop barrier since 2011.

That year, the agency secretly built a 260,000-square-foot facility at the Oak Ridge National Laboratory in Tennessee, the same place where the Manhattan Project developed the atomic bomb. Its research focuses on hitting the computing speed that would not only give the agency an edge over encryption, but also provide it with better cataloging capabilities to tackle the ocean of data already arriving daily at complexes like the one in Bluffdale, Utah.

The government is also finding ways to cheat, most notably through Bullrun, a code-named program run jointly by the NSA and the GCHQ. The agencies clandestinely collaborate with technology companies and internet service providers to “insert vulnerabilities into commercial encryption systems,” as reported by the Guardian. As of 2010, according to a top-secret GCHQ PowerPoint, the NSA had already achieved a breakthrough: “Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable,” the leaked slides state. By 2015, the British agency hoped to have cracked the encryption of 15 major internet companies.

Looking further into the future, Obama’s NSA has also explored quantum computing — technology that, theoretically, could defeat encryption for good. Its science breaks all the rules. Today, data are stored in binary bits — either ones or zeros — but in quantum computing, so-called qubits could be both one and zero at the same time. This would allow for almost incomprehensible operating speeds. According to documents released by Snowden, the NSA has been working to build “a cryptologically useful quantum computer” as part of a research program broadly called Penetrating Hard Targets.

Ultrafast computing could be a game-changer in U.S. intelligence. It would break the last line of defense against government intrusion. Though this wouldn’t necessarily — or even likely — guarantee that security threats could be identified, it would allow the surveillance state to seize every bit of power that its backers, including Obama, have sought to give it.

After the White House panel set up to review NSA surveillance in 2013 suggested halting efforts to undermine commercial encryption, the president demurred. In a speech — one of the few he’s given on surveillance in his second term — Obama kept to the middle of the political road. “We have to make some important decisions about how to protect ourselves and sustain our leadership in the world, while upholding the civil liberties and privacy protections that our ideals and our Constitution require,” he said. “We need to do so not only because it is right, but because the challenges posed by threats like terrorism, and proliferation, and cyberattacks are not going away anytime soon.”

Zack Whittaker, the security editor for ZDNet, summed up Obama’s remarks in a headline: “Keep calm and carry on spying.”

Whoever wins the upcoming presidential election will probably do just that. In response to the Orlando shooting in June, Hillary Clinton said, “I have proposed an intelligence surge to bolster our capabilities across the board with appropriate safeguards here at home” — but offered no details on what that would entail. She has called for Snowden to return from Russia and face trial, and while supporting the end of the NSA’s metadata program, she’s suggested that the agency never broke the law. “I think it’s fair to say the government, the NSA, didn’t, so far as we know, cross legal lines, but they came right up and sat on them,” she told an audience at a San Francisco technology summit in August 2014.

Donald Trump’s rhetoric, meanwhile, suggests that he would prioritize making America’s surveillance empire as powerful as possible. “I think security has to preside, and it has to be preeminent,” he told Fox News in June 2015. Trump has also said NSA reconnaissance is just a fact of modern American life. “I assume that when I pick up my telephone, people are listening to my conversations,” he told radio host Hugh Hewitt last December, implying that Americans should just get used to being spied on.

Whistleblowers, it seems, would not fare well under a Trump administration. “If I were president, [Russian President Vladimir] Putin would give him over,” Trump said of Snowden in a July 2015 appearance on CNN. In 2013, speaking on Fox & Friends, he was even tougher. “I think Snowden is a terrible threat. I think he’s a terrible traitor, and you know what we used to do in the good old days when we were a strong country?” Trump asked. “You know what we used to do to traitors, right?” One of the hosts interjected, “Well, you killed them, Donald.” Trump agreed.

This is Obama’s legacy on surveillance: a shadow state of brick and mortar, hardware and software, satellites and eavesdroppers, that is ready to grow on the next president’s command. How big is too big, though, is a question the outgoing president has never answered fully. At what point does gathering data become an end in itself, rather than a means to an end? Is the U.S. government already there or approaching it?

Unless answers come, 50 years from now, the world may look back at Obama’s architecture of surveillance — full of radomes, windowless walls, phone taps, and double-ringed fences — with the same puzzled astonishment that 1950s bomb shelters elicit today.

Correction, Sept. 12, 2016: The Delta IV Heavy is the most powerful American rocket in use today. A previous version of this article misstated that it was the most powerful rocket in the country’s history.


e-max.it: your social media marketing partner
 
Fighting Big Oil and Big Banks to Save Sacred Lands, Precious Water and Unraveling Climate Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=24462"><span class="small">Bill McKibben, EcoWatch</span></a>   
Saturday, 24 September 2016 14:10

McKibben writes: "Most Americans live far from the path of the Dakota Access Pipeline - they won't be able to visit the encampments on the Standing Rock Sioux reservation where representatives of more than 200 tribes have come together in the most dramatic show of force of this environmental moment."

Tlingit artist Doug Chilton and his canoe traveled 2,800 miles from Alaska to North Dakota to take part in a three-day canoe journey down the Missouri River to protest the Dakota Access Pipeline. Chilton and a caravan of Northwest Indian tribes had arrived at Red Warrior Camp near Cannon Ball, North Dakota, to a warm welcome from onlookers. (photo: Xian Chiang-Waren)
Tlingit artist Doug Chilton and his canoe traveled 2,800 miles from Alaska to North Dakota to take part in a three-day canoe journey down the Missouri River to protest the Dakota Access Pipeline. Chilton and a caravan of Northwest Indian tribes had arrived at Red Warrior Camp near Cannon Ball, North Dakota, to a warm welcome from onlookers. (photo: Xian Chiang-Waren)


Fighting Big Oil and Big Banks to Save Sacred Lands, Precious Water and Unraveling Climate

By Bill McKibben, EcoWatch

24 September 16

 

ost Americans live far from the path of the Dakota Access Pipeline—they won't be able to visit the encampments on the Standing Rock Sioux reservation where representatives of more than 200 tribes have come together in the most dramatic show of force of this environmental moment. They won't be able to participate in the daily nonviolent battle along the Missouri River against a $3.7 billion infrastructure project that threatens precious water and myriad sacred sites, not to mention the planet's unraveling climate.

But most of us live near a bank.

Maybe there's a Citibank branch in your neighborhood. Or Wells Fargo or Bank of America or HSBC. Maybe you even keep your money in one—if so, you inadvertently helped pay for the guard dogs that attacked Native Americans as they tried to keep bulldozers from mowing down ancestral grave sites.

Maybe you have a retirement plan invested with Goldman Sachs or Morgan Stanley—if so, you helped buy the pepper spray that the company used to clear the way for its crews as they cleared the right of way straight to the Missouri River.

Perhaps you bank overseas. Credit Agricole? Deutsche Bank? Sumitomo? Royal Bank of Scotland? Barclays? Yeah, them too.

In fact, virtually every name in the financial pantheon has extended credit in some form to the Dakota Access Pipeline project, according to a remarkable dossier assembled by the organization Food & Water Watch. It shows a credit line of $10.25 billion (that's a b) for the companies directly involved in building the project—from 38 banks—a list of names that, the group adds, "might give you flashbacks to the 2007 financial crisis."

Sporadic protests have begun at some of the banks—activists occupied a Vancouver branch of TD Bank and across the continent in Philadelphia held a protest outside another of the giant's outlets. The same thing happened at a Citibank in downtown Chicago.

"It's unlikely that Citibank customers support poisoning indigenous peoples' water, desecrating sacred burial sites, or contributing to global climate change," said Gloria Fallon of Rising Tide Chicago. Which is true.

But banks love these kinds of deals precisely because they're so capital-intensive. (And because they're financially stacked in favor of the developers: Federal tax breaks worth more than $600 million helped make the balance sheet for Dakota Access Pipeline.)

The key Dakota Access Pipeline loan, said Rainforest Action Network's Amanda Starbuck, is still pending. It's a multibillion-dollar line of credit, but only $1.1 billion of the loan can be doled out until the company "resolves certain governmental permits." Citi, Mizuho, Bank of Tokyo MUFJ, and Mizuho Bank are leaders on that loan.

Many of these banks may be vulnerable to pressure. For one thing, they're eager to appear green: Bank of America, for instance, recently announced plans to make all its bank branches "carbon-neutral" by 2020. Which is nice—solar panels on the roof of the drive-thru tellers are better than no solar panels. But as Starbuck said, it's basically meaningless stacked up against Bank of America's lending portfolio, chock full of loans to develop "extreme fossil fuels, which are simply incompatible with a climate-stable world."

Put another way: They're going to be the vegan owners of a global chain of slaughterhouses.

Rainforest Action Network's numbers make clear just how mammoth this problem is for those of us fighting to keep fossil fuels in the ground: In June, it reported that just 25 banks have invested "$784 billion in coal mining, coal power, 'extreme oil' and liquefied natural gas facilities between 2013 and 2015."

But there are success stories: Australian campaigners, led by indigenous groups downunder and working with campaigners across three continents, persuaded most of the world's banks to stop bankrolling plans for what would have been the world's largest coal mine and port, and in turn, that has helped bring the project to a standstill.

The pressure will increase after this week's release of a new report from Oil Change International, which makes clear that the oil fields, gas wells, and coal mines already in operation have enough carbon to carry us past the 2-degree target the world set in Paris a year ago (and to absolutely annihilate the stretch goal of 1.5 degrees).

That is to say: At this point, anyone who finances any fossil fuel infrastructure is attempting to make money on the guaranteed destruction of the planet.

So those Dakota Access Pipeline loans should come under new scrutiny—moral, as well as financial—since they assume that governments won't enforce their Paris promises. That's a gamble accountants might want to think twice about, especially after this week's news that the SEC was investigating Exxon for its refusal to write down the value of its reserves in light of the global accords.

And at least one bank is waking up. Amalgamated—the New York-based, labor-affiliated bank—announced jointly with Bank of America that it would make its branches carbon neutral. More significantly, it also announced it was divesting from the fossil fuel business.

"We need to be honest, we have a growing environmental crisis unfolding and Amalgamated Bank will no longer sit on the sideline," said Keith Mestrich, President and CEO of Amalgamated Bank. "As an industry that prides itself on innovation and bold action, we must all be leaders and take real action to change our course."

Put another way: They're vegans who will now be lending to tofu makers.

But it's probably sustained public pressure that will do the most good.

"Oil companies are always going to drill for oil and build pipelines—it's why they exist," Rainforest Action Network's Scott Parkin. "But the banks funding this pipeline have a choice as to where they put their money. Right now, Citibank, TD Bank and others have chosen to invest in a project that violates indigenous rights and destroys the climate."

Parkin points to the protests that have already sprung up at dozens of banks from DC to New Orleans to Tucson to Long Beach to the Bronx.

"We have the power to derail that loan with a different kind of currency," he said. "Putting our bodies on the line at any financial institution that says 'Dakota Access Pipeline, we're open for business.'"

And if anyone has any doubts that civil disobedience can be useful, remember how the amazing activists at Standing Rock forced the federal government to blink, pausing construction earlier this month. Their nonviolent leadership has inspired all of us—and it should have sent a shiver down the spine of a few bankers.

e-max.it: your social media marketing partner
 
FOCUS: How Nuclear Power Causes Global Warming Print
Saturday, 24 September 2016 12:25

Wasserman writes: "Supporters of nuclear power like to argue that nukes are the key to combatting climate change. Here's why they are dead wrong."

A power plant. (photo: Noticias MVS)
A power plant. (photo: Noticias MVS)


How Nuclear Power Causes Global Warming

By Harvey Wasserman, Progressive.Org

24 September 16

 

Nuclear power protest in Derby, UK, Indymedia

upporters of nuclear power like to argue that nukes are the key to combatting climate change. Here’s why they are dead wrong.

Every nuclear generating station spews about two-thirds of the energy it burns inside its reactor core into the environment. Only one-third is converted into electricity. Another tenth of that is lost in transmission. According to the Union of Concerned Scientists:

Nuclear fission is the most water intensive method of the principal thermoelectric generation options in terms of the amount of water withdrawn from sources. In 2008, nuclear power plants withdrew eight times as much freshwater as natural gas plants per unit of energy produced, and up to 11 percent more than the average coal plant.

Every day, large reactors like the two at Diablo Canyon, California, individually dump about 1.25 billion gallons of water into the ocean at temperatures up to 20 degrees Fahrenheit warmer than the natural environment.

Diablo’s “once-through cooling system” takes water out of the ocean and dumps it back superheated, irradiated and laden with toxic chemicals. Many U.S. reactors use cooling towers which emit huge quantities of steam and water vapor that also directly warm the atmosphere.

These emissions are often chemically treated to prevent algae and other growth that could clog the towers. Those chemicals can then be carried downwind, along with radiation from the reactors. In addition, hundreds of thousands of birds die annually by flying into the reactor domes and towers.

The Union of Concerned Scientists states:

The temperature increase in the bodies of water can have serious adverse effects on aquatic life. Warm water holds less oxygen than cold water, thus discharge from once-through cooling systems can create a “temperature squeeze” that elevates the metabolic rate for fish. Additionally, suction pipes that are used to intake water can draw plankton, eggs and larvae into the plant’s machinery, while larger organisms can be trapped against the protective screens of the pipes. Blocked intake screens have led to temporary shut downs and NRC fines at a number of plants.

And that’s not all.

All nuclear reactors emit Carbon 14, a radioactive isotope, invalidating the industry’s claim that reactors are “carbon free.” And the fuel that reactors burn is carbon-intensive. The mining, milling, and enrichment processes needed to produce the pellets that fill the fuel rods inside the reactor cores all involve major energy expenditures, nearly all of it based on coal, oil, or gas.

And of course there’s the problem of nuclear waste. After more than a half-century of well-funded attempts, we’ve seen no solution for the management of atomic power’s intensely radioactive waste. There’s the “low-level” waste involving enormous quantities of troublesome irradiated liquids and solid trash that must be dealt with outside the standard civilian waste stream. And that handling involves fossil fuels burned in the process of transportation, management, and disposal as well

As for the high-level waste, this remains one of humankind’s most persistent and dangerous problems. Atomic apologists have claimed that the intensely radioactive spent fuel rods can somehow be usable for additional power generation. But after a half-century of efforts, with billions of dollars spent, all attempts to do that have utterly failed. There are zero successful reactors capable of producing more reactor fuel than they use, or able to derive more energy from the tens of thousands of tons of spent fuel rods they create.

Some reactors, like Fukushima, use “mixed-oxide” fuels that have proven to be extremely dirty and expensive. It’s possible some of this “MOX” fuel containing plutonium, actually fissioned at Fukushima Unit Three, raising terrifying questions about the dangers of its use. The mushroom cloud that appears on video as Fukushima Unit Three exploded stands as an epic warning against further use of these impossible-to-manage fuels.

The MOX facility under construction near Aiken, South Carolina, is now projected to require another ten years to build with another ten possible after that to phase into production. U.S. Secretary of Energy Ernest Moniz said on September 13, 2016, at the Carnegie Endowment for International Peace that the mismanaged project was "impossible" to carry out and that it could cost $30 billion to $50 billion. Even the current pro-nuclear Congress won’t fully fund the project and the Department of Energy DOE continues to recommend abandoning it.

There are no credible estimates of the global warming damage done by the intensely hot explosions at the four Fukushima reactors, or at Chernobyl, or at any other past and future reactor meltdowns or blowups.

Atomic apologists argue that the disposal of high-level reactor wastes should be a relatively simple problem, lacking only the political will to proceed. The industry touts New Mexico’s Waste Isolation Pilot Project, or WIPP, which has long been the poster child for military attempts to deal with high-level trash from the nuclear weapons program. Accepting its first shipment of waste in 1999, WIPP was touted as the ultimate high-tech, spare-no-expense model that proved radioactive waste disposal “can be done.”

But a series of disastrous events in February, 2014, led WIPP to stop accepting wastes—the sole function for which it was designed. Most significant was the explosion of a single barrel of highly radioactive waste materials (it was mistakenly packed with organic rather than clay-based kitty litter). About a dozen WIPP workers were exposed to potentially harmful radiation. The entire facility remains closed. In a phone interview, facility management told me it may again accept some wastes before the end of this year. But at least part of the cavernous underground labyrinth may never be reopened. The Los Angeles Times estimated the cost of this single accident at $2 billion.

Overall, the idea that atomic power is “clean” or “carbon free” or “emission free” is a very expensive misconception, especially when compared to renewable energy, efficiency, and conservation. Among conservation, efficiency, solar and wind power technologies, there are no global warming analogs to the heat, carbon, and radioactive waste impacts of nuclear power. No green technology kills anywhere near the number of marine organisms that die through reactor cooling systems.

Rooftop solar panels do not lose ten percent of the power they generate to transmission, as happens with virtually all centralized power generators. S. David Freeman, former head of numerous large utilities and author of All Electric America: A Climate Solution and the Hopeful Future, says: “Renewables are cheaper and safer. That argument is winning. Let’s stick to it.”

No terrorist will ever threaten one of our cities by blowing up a solar panel. But the nuclear industry that falsely claims its dying technology doesn’t cause global warming does threaten the future of our planet.


Harvey Wasserman wrote SOLARTOPIA! OUR GREEN-POWERED EARTH. He edits nukefree.org. You can find his GREEN POWER & WELLNESS SHOW at www.prn.fm

e-max.it: your social media marketing partner
 
FOCUS: Iowans Ramp Up Resistance to Dakota Access Pipeline Print
Saturday, 24 September 2016 10:43

Galindez writes: "For many Iowans including some landowners in opposition to the Dakota Access Pipeline #DAPL, its a done deal. In Iowa the Governor and most government officials are fully on board and doing the bidding of the out of state companies who will profit from the pipeline. hundreds of miles of pipe has already been buried in the ground."

Opponents of the Dakota Access Pipeline gathered in Iowa calling for an end to construction of the pipeline through four midwestern states. (photo: Iowa CCI)
Opponents of the Dakota Access Pipeline gathered in Iowa calling for an end to construction of the pipeline through four midwestern states. (photo: Iowa CCI)


Iowans Ramp Up Resistance to Dakota Access Pipeline

By Scott Galindez, Reader Supported News

24 September 16

 

or many Iowans in opposition to the Dakota Access Pipeline (#DAPL), including some landowners, it’s a done deal. The governor of Iowa and most government officials are fully on board and doing the bidding of the out of state companies who will profit from the pipeline. Hundreds of miles of pipe have already been buried in the ground.

For other Iowans, the resistance in North Dakota has renewed their hope that no oil will ever flow through the pipe. Damage has already been done to the earth, but if the pipe is not allowed to cross the Missouri and potentially other waterways, no oil can flow through the pipeline. Many felt that the Keystone XL Pipeline was a done deal. Pipe was being laid in many states. But no oil is flowing through those pipes, the movement against Keystone was successful, and now the oil from Canadian Tar Sands has to find another route. Many fear that route could be the Dakota Access Pipeline.

The Keystone Pipeline needed permission from the Obama administration to cross the border. The Dakota Access Pipeline already crosses the border and currently is planned to carry oil through four states. Many fear that it is the first leg of what will eventually be the new Keystone, snaking its way to the refineries on the Gulf.

In Iowa, the governor allowed the use of eminent domain after successfully making the case that the pipeline has “public benefits.” They needed that classification because Iowa has a law doesn’t allow eminent domain to be used for private gain. The oil will not be used in Iowa, so the nine landowners are suing with the claim that eminent domain was illegally used to access their land.

Unfortunately they won’t get their day in court until November. The pipe will be laid by then, but there is still hope that no oil will flow through it. On Thursday, September 22nd, 200 activists from all over the Midwest met at the Boone County Fairgrounds to plan a direct action on the pipeline route. That afternoon they traveled by caravan to Pilot Mound, Iowa. Most of the vehicles parked on the shoulder of the road, while a dozen cars stopped in the road, effectively blocking an access road to a pipeline construction site.

Jess Mazour, an organizer with Iowa Citizens for Community Improvement (CCI), was one of those who left her car in the road. Her car was towed, and she was given a $200 ticket. Mazur told RSN that she is “taking risks, because the risks of this pipeline are so great that I feel I need to do whatever it will take to stop this pipeline.”

Adam Mason, also of Iowa CCI, said, “Folks around the country can join us here in Iowa, stand with our brothers and sisters in Standing Rock, North Dakota. Join us all along the pipeline path and call and email President Obama and let him know we need to shut this pipeline down.”

This weekend, pipeline opponents are gathering at a camp near Sandusky, Iowa, a town on the Mississippi River. Last week 15 people were arrested for trespassing on a pipeline construction site. Dozens have been arrested in recent weeks. Groups opposing the pipeline vow to continue nonviolent resistance to the pipeline and are organizing what they are calling Bakken Action Teams.



Scott Galindez attended Syracuse University, where he first became politically active. The writings of El Salvador's slain archbishop Oscar Romero and the on-campus South Africa divestment movement converted him from a Reagan supporter to an activist for Peace and Justice. Over the years he has been influenced by the likes of Philip Berrigan, William Thomas, Mitch Snyder, Don White, Lisa Fithian, and Paul Wellstone. Scott met Marc Ash while organizing counterinaugural events after George W. Bush's first stolen election. Scott will be spending a year covering the presidential election from Iowa.

Reader Supported News is the Publication of Origin for this work. Permission to republish is freely granted with credit and a link back to Reader Supported News.

e-max.it: your social media marketing partner
 
My Coffee With a Trump Supporter Print
Saturday, 24 September 2016 08:30

Reich writes: "I finally found a Trump supporter - this morning when I went to buy coffee. (I noticed a Trump bumper sticker on his car.) 'Hi,' I said. 'Noticed your Trump bumper sticker.'"

Former Clinton labor secretary Robert Reich. (photo: Steve Russell/Toronto Star)
Former Clinton labor secretary Robert Reich. (photo: Steve Russell/Toronto Star)


My Coffee With a Trump Supporter

By Robert Reich, Robert Reich's Blog

24 September 16

 

finally found a Trump supporter – this morning when I went to buy coffee. (I noticed a Trump bumper sticker on his car.)

“Hi,” I said. “Noticed your Trump bumper sticker.”

“Yup,” he said, a bit defensively.

“I hope you don’t mind my asking, but I’m curious. Why are you supporting him?”

“I know he’s a little bit much,” said the Trump supporter. “But he’s a successful businessman. And we need a successful businessman as president.”

“How do you know he’s a successful businessman?” I asked.

“Because he’s made a fortune.”

“Has he really?” I asked.

“Of course. Forbes magazine says he’s worth four and a half billion.”

“That doesn’t mean he’s been a success,” I said.

“In my book it does,” said the Trump supporter.

“You know, in 1976, when Trump was just starting his career, he said he was worth about $200 million,” I said. “Most of that was from his father.”

“That just proves my point,” said the Trump supporter. “He turned that $200 million into four and a half billion. Brilliant man.“

“But if he had just put that $200 million into an index fund and reinvested the dividends, he’d be worth twelve billion today,” I said.

The Trump supporter went silent.

"And he got about $850 million in tax subsidies, just in New York alone,” I said.

More silence.

“He’s not a businessman,” I said. “He’s a con man. "Hope you enjoy your coffee.”

e-max.it: your social media marketing partner
 
<< Start < Prev 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 Next > End >>

Page 1890 of 3432

THE NEW STREAMLINED RSN LOGIN PROCESS: Register once, then login and you are ready to comment. All you need is a Username and a Password of your choosing and you are free to comment whenever you like! Welcome to the Reader Supported News community.

RSNRSN