{"id":7668,"date":"2014-06-03T07:07:01","date_gmt":"2014-06-03T11:07:01","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=7668"},"modified":"2014-06-03T07:08:18","modified_gmt":"2014-06-03T11:08:18","slug":"five-ridiculous-ways-people-defend-nsa-spying","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/five-ridiculous-ways-people-defend-nsa-spying\/","title":{"rendered":"Five Ridiculous Ways People Defend NSA Spying"},"content":{"rendered":"<div class=\"panel-pane pane-eff-node-title\" style=\"color: #000000;\">\n<div class=\"pane-content\" style=\"font-weight: inherit; font-style: inherit;\">\n<blockquote>\n<h2 class=\"node-title\" style=\"font-style: inherit;\">The Top 5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible<\/h2>\n<\/blockquote>\n<\/div>\n<\/div>\n<blockquote>\n<div class=\"panel-separator\" style=\"color: #000000;\">\u00a0<span style=\"font-weight: bold; color: #aaaaaa;\">Cindy Cohn and Nadia Kayyali &#8211; EFF<\/span><\/div>\n<\/blockquote>\n<div class=\"panel-pane pane-entity-field pane-node-body\" style=\"color: #000000;\">\n<div class=\"pane-content\" style=\"font-weight: inherit; font-style: inherit;\">\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden\" style=\"font-weight: inherit; font-style: inherit;\">\n<div class=\"field-items\" style=\"font-weight: inherit; font-style: inherit;\">\n<div class=\"field-item even\" style=\"font-weight: inherit; font-style: inherit;\">\n<blockquote>\n<p style=\"font-weight: inherit; font-style: inherit;\"><b style=\"font-style: inherit;\"><a href=\"http:\/\/thundercloud.net\/infoave\/new\/wp-content\/uploads\/2013\/11\/spy-vs-spy.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-6508\" src=\"http:\/\/thundercloud.net\/infoave\/new\/wp-content\/uploads\/2013\/11\/spy-vs-spy-300x183.jpg\" alt=\"spy-vs-spy\" width=\"300\" height=\"183\" srcset=\"https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2013\/11\/spy-vs-spy-300x183.jpg 300w, https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2013\/11\/spy-vs-spy.jpg 424w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/b>Over the past year, as the Snowden revelations have rolled out, the government and its apologists have developed a set of talking points about mass spying that the public has now heard over and over again. From the President, to Hilary Clinton to Rep. Mike Rogers, Sen. Dianne Feinstein and many others, the arguments are often eerily similar.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">But as we approach the one year anniversary, it\u2019s time to call out the key claims that have been thoroughly debunked and insist that the NSA apologists retire them.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">So if you hear any one of these in the future, you can tell yourself straight up: \u201cthis person isn\u2019t credible,\u201d and look elsewhere for current information about the NSA spying. And if these are still in your talking points (you know who you are) it\u2019s time to retire them if you want to remain credible. And next time, the talking points should stand the test of time.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><b style=\"font-style: inherit;\">1.\u00a0 The NSA has Stopped 54 Terrorist Attacks with Mass Spying<\/b><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">The discredited claim<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">NSA defenders have thrown out many claims about how NSA surveillance has protected us from terrorists, including repeatedly declaring that it has thwarted 54 plots. \u00a0Rep. Mike Rogers<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.propublica.org\/documents\/item\/803163-rogers-nsa-speech.html#document\/p23\/a125317\">says it<\/a>\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/votesmart.org\/public-statement\/800806\/cbs-face-the-nation-transcript-national-security-agency#.Ulq5kGSDSu4\">often<\/a>. Only weeks after the first Snowden leak, US President Barack Obama\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.realclearpolitics.com\/video\/2013\/06\/19\/obama_on_nsa_spying_we_have_struck_the_appropriate_balance_of_privacy_and_security.html\">claimed:<\/a>\u00a0\u201cWe know of at least 50 threats that have been averted\u201d because of the NSA\u2019s spy powers. Former NSA Director Gen. Keith Alexander also repeatedly claimed that those programs thwarted\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.realclearpolitics.com\/video\/2013\/06\/19\/obama_on_nsa_spying_we_have_struck_the_appropriate_balance_of_privacy_and_security.html\">54 different attacks<\/a>.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">Others, including former\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/firstread.nbcnews.com\/_news\/2013\/06\/16\/18987472-cheney-says-nsa-monitoring-could-have-prevented-911?lite\">Vice President Dick Cheney<\/a>\u00a0have claimed that had the bulk spying programs in place, the government could have stopped the 9\/11 bombings, specifically noting that the government needed the program to locate Khalid al Mihdhar, a hijacker who was living in San Diego.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">Why it\u2019s not credible:<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">These claims\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.propublica.org\/article\/claim-on-attacks-thwarted-by-nsa-spreads-despite-lack-of-evidence\">have been thoroughly debunked<\/a>. \u00a0First, the claim that the information stopped 54 terrorist plots fell completely apart.\u00a0 In dramatic\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.propublica.org\/article\/claim-on-attacks-thwarted-by-nsa-spreads-despite-lack-of-evidence?utm_campaign=inline_twitter&amp;utm_source=twitter&amp;utm_medium=social&amp;utm_term=nsa-54\">Congressional testimony<\/a>, Sen. Leahy forced a formal retraction from NSA Director Alexander in October, 2013:<\/p>\n<\/blockquote>\n<blockquote style=\"font-weight: inherit; font-style: inherit; color: #666666;\">\n<p style=\"font-weight: inherit; font-style: inherit;\">&#8220;Would you agree that the 54 cases that keep getting cited by the administration were not all plots, and of the 54, only 13 had some nexus to the U.S.?&#8221; Leahy said at the hearing. &#8220;Would you agree with that, yes or no?&#8221;<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">&#8220;Yes,&#8221; Alexander replied, without elaborating.<\/p>\n<\/blockquote>\n<blockquote>\n<p style=\"font-weight: inherit; font-style: inherit;\">But that didn\u2019t stop the apologists. We keep hearing the\u201c54 plots\u201d line to this day.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">As for 9\/11, sadly, the same is true. \u00a0The government did not need additional mass collection capabilities, like the mass phone records programs, to find al Mihdhar in San Diego. \u00a0As<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.propublica.org\/article\/fact-check-the-nsa-and-sept-11#clarke-update\">ProPublica noted<\/a>, quoting Bob Graham, the former chair of the Senate Intelligence Committee:<\/p>\n<\/blockquote>\n<blockquote style=\"font-weight: inherit; font-style: inherit; color: #666666;\">\n<p style=\"font-weight: inherit; font-style: inherit;\">U.S. intelligence agencies knew the identity of the hijacker in question, Saudi national Khalid al Mihdhar, long before 9\/11 and had the ability find him, but they failed to do so.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">&#8220;There were plenty of opportunities without having to rely on this metadata system for the FBI and intelligence agencies to have located Mihdhar,&#8221; says former Senator Bob Graham, the Florida Democrat who\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.propublica.org\/documents\/item\/716032-congressional-911-report-crpt-107hrpt792\">extensively investigated<\/a>\u00a09\/11 as chairman of the Senate\u2019s intelligence committee.<\/p>\n<\/blockquote>\n<blockquote>\n<p style=\"font-weight: inherit; font-style: inherit;\">Moreover, Peter Bergen and a team at the New America Foundation dug into the government\u2019s claims about plots in America, including studying over 225 individuals recruited by al Qaeda and similar groups in the United States and charged with terrorism, \u00a0and\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.newamerica.net\/publications\/policy\/do_nsas_bulk_surveillance_programs_stop_terrorists\">concluded<\/a>:<\/p>\n<\/blockquote>\n<blockquote style=\"font-weight: inherit; font-style: inherit; color: #666666;\">\n<p style=\"font-weight: inherit; font-style: inherit;\">Our review of the government\u2019s claims about the role that NSA &#8220;bulk&#8221; surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading&#8230;<\/p>\n<\/blockquote>\n<blockquote>\n<p style=\"font-weight: inherit; font-style: inherit;\">When backed into a corner, the government\u2019s apologists cite the capture of Zazi, the so-called New York subway bomber. However, in that case,\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/bigstory.ap.org\/article\/nyc-bomb-plot-details-settle-little-nsa-debate\">the Associated Press reported<\/a>\u00a0that the government could have easily stopped the plot\u00a0<i style=\"font-weight: inherit;\">without<\/i>\u00a0the NSA program, under authorities that comply with the Constitution. Sens. Ron Wyden and Mark Udall\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.techdirt.com\/articles\/20130613\/10352023450\/senators-wyden-udall-say-theyve-seen-no-evidence-that-nsa-surveillance-stopped-dozens-terrorist-attacks.shtml\">have been saying this<\/a>\u00a0for a long time.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">Both of the President\u2019s hand-picked advisors on mass surveillance concur about the telephone records collection. The President\u2019s Review Board issued a<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/2013-12-12_rg_final_report.pdf\">\u00a0report<\/a>\u00a0in which it stated \u201cthe information contributed to terrorist investigations by the use of section 215 telephony meta-data was not essential to preventing attacks,\u201d The Privacy and Civil Liberties Oversight Board (PCLOB) also\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/deeplinks\/2014\/01\/privacy-oversight-board-agrees-eff-mass-surveillance-illegal-and-must-end\">issued a report<\/a>\u00a0in which it stated, \u201cwe have not identified a single instance involving a threat to the United States in which [bulk collection under Section 215 of the Patriot Act] made a concrete difference in the outcome of a counterterrorism investigation.\u201d<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">And in an\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/document\/amici-brief-senators-wyden-udall-heinrich\">amicus brief<\/a>\u00a0in EFF\u2019s case\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/cases\/first-unitarian-church-los-angeles-v-nsa\"><i style=\"font-weight: inherit;\">First Unitarian Church of Los Angeles v. the NSA<\/i><\/a>\u00a0case, Sens. Ron Wyden, Mark Udall, and Martin Heinrich stated that, while the administration has claimed that bulk collection is necessary to prevent terrorism, they \u201chave reviewed the bulk-collection program extensively, and none of the claims appears to hold up to scrutiny.\u201d<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">Even former top NSA official John Inglis\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/boingboing.net\/2014\/01\/13\/nsa-official-mass-spying-has.html\">admitted<\/a>\u00a0that the phone records program has not stopped any terrorist attacks aimed at the US and at most, helped catch one guy who shipped about $8,000 to a Somalian group that the US has designated as a terrorist group but that has never even remotely been involved in any attacks aimed at the US.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><b style=\"font-style: inherit;\">2. Just collecting call detail records isn\u2019t a big deal.<\/b><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">The discredited claim<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">The argument goes like this: Metadata can\u2019t be privacy invasive, isn\u2019t very useful and therefore its collection isn\u2019t dangerous\u2014so the Constitution shouldn\u2019t protect it.\u00a0 Even the\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/blogs.wsj.com\/washwire\/2013\/06\/07\/transcript-what-obama-said-on-nsa-controversy\/\">President said<\/a>, \u201cwhat the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people\u2019s names, and they\u2019re not looking at content\u201d\u2014as if that means there is no privacy protection for this information.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">Why it\u2019s not credible:<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">As former director of the NSA and CIA Michael Hayden\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/justsecurity.org\/2014\/05\/10\/michael-hayden-kill-people-based-metadata\/\">recently admitted<\/a>: \u201cWe kill people based on metadata.\u201d\u00a0 And former NSA General Counsel Stu Baker\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.nybooks.com\/blogs\/nyrblog\/2014\/may\/10\/we-kill-people-based-metadata\/?insrc=wbll\">said<\/a>: \u201cmetadata absolutely tells you everything about somebody\u2019s life. If you have enough metadata, you don\u2019t really need content.\u201d<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">In fact, a\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/cyberlaw.stanford.edu\/blog\/2013\/11\/what%27s-in-your-metadata,\">Stanford study<\/a>\u00a0this year demonstrated exactly what you can reconstruct using metadata: \u201cWe were able to infer medical conditions, firearm ownership, and more, using solely phone metadata.\u201d Metadata can show what your religion is, if you went to get an abortion, and other incredibly private details of your life.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><b style=\"font-style: inherit;\">3.\u00a0\u00a0<\/b><b style=\"font-style: inherit;\">There Have Been No Abuses of Power<\/b><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">The discredited claim<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">President Obama stated in an\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.cnn.com\/2013\/08\/23\/politics\/barack-obama-new-day-interview-transcript\/\">interview<\/a>\u00a0that \u201cthere are no allegations, and I am very confident \u2014knowing the NSA and how they operate \u2014 that purposefully somebody is out there trying to abuse this program\u2026\u201d And General Alexander stated in a\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/abcnews.go.com\/Blotter\/nsa-chief-alexander-hackers-abuse-power-bulls\/story?id=19830060\">speech<\/a>\u00a0that \u201cWe get all these allegations of [abuses of power] but when people check&#8230; they find zero times that that&#8217;s happened. And that&#8217;s no bullshit. Those are facts.\u201d<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">Why it\u2019s not credible:<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">We already have evidence of abuses of power. We know that NSA analysts were using their surveillance powers to\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/blogs.wsj.com\/washwire\/2013\/08\/23\/nsa-officers-sometimes-spy-on-love-interests\/\">track their ex-wives and husbands<\/a>, and other love interests. They even had a name for it, LOVEINT. The FISA court has also\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/deeplinks\/2013\/11\/same-surveillance-story-different-chapter\">cited the NSA for violating or ignoring court orders<\/a>\u00a0for years at a time. And those are just self-reported abuses \u2013 the only oversight that occurs is that the NSA investigates itself and reports on the honor system to Congress or the FISC about what it finds. A real independent investigation might reveal even more. Unfortunately, until we get something like a\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/deeplinks\/2014\/03\/ex-church-committee-staffers-call-congress-create-modern-day-church-committee\">new Church Committee<\/a>, we are unlikely to see such details.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><b style=\"font-style: inherit;\">4. Invading Privacy is Okay Because It\u2019s Done to Prevent Terrorist Attacks<\/b><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">The discredited claim<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">We keep hearing the same thing:\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/online.wsj.com\/news\/articles\/SB10001424127887324299104578529112289298922\">Surveillance is<\/a>\u00a0a \u201ccritical tool in protecting the nation from terror threats.\u201d When we\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/intelligence.house.gov\/press-release\/house-intelligence-committee-advances-bill-end-bulk-collection-metadata\">reform the NSA<\/a>, it must be done in a way that \u201cprotect[s] the operational capability of a critical counterterrorism tool.\u201d The implication is that the stopping terrorist attacks is the government\u2019s only goal.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">Why it\u2019s not credible:<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">We know that NSA surveillance is not used just for stopping terrorists and it\u2019s not even just used for national security.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">The Intercept<\/i>\u00a0recently revealed leaks detailing the NSA\u2019s role in the \u201c<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/deeplinks\/2014\/05\/how-nsa-transforming-law-enforcement\">war on drugs<\/a>,\u201d\u2014in particular, a\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/document\/20140519-intercept-dea-warfighter\">2004 memo<\/a>\u00a0detailing how the NSA has redefined narcotics trafficking as a national security issue. We also know that the NSA feeds\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/deeplinks\/2013\/08\/dea-and-nsa-team-intelligence-laundering\">data to the DEA<\/a>, where it ends up playing a part in ordinary law enforcement investigations. And internationally, the NSA engages in\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/deeplinks\/2014\/05\/looking-back-one-year-after-edward-snowden-disclosures-international-perspective\">economic espionage<\/a>\u00a0and diplomatic spying, something detailed in Glenn Greenwald\u2019s recent book\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.amazon.com\/dp\/162779073X\/?tag=electronicfro-20\"><i style=\"font-weight: inherit;\">No Place to Hide<\/i><\/a><i style=\"font-weight: inherit;\">.\u00a0<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><b style=\"font-style: inherit;\">5.<\/b><b style=\"font-style: inherit;\">\u00a0There\u2019s Plenty of Oversight From Congress, the Foreign Intelligence Surveillance Court, and Agency Watchdogs<\/b><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">The discredited claim<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">We\u2019ve repeatedly heard from the President and from NSA defenders like\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.washingtonpost.com\/blogs\/post-politics\/wp\/2013\/06\/06\/transcript-dianne-feinstein-saxby-chambliss-explain-defend-nsa-phone-records-program\/\">Sen. Dianne Feinstein<\/a>and Rep. Mike Rogers that Congress knows all about NSA spying. Right after the first Snowden leak,\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/blogs.wsj.com\/washwire\/2013\/06\/07\/transcript-what-obama-said-on-nsa-controversy\/\">President Obama said<\/a>: \u201cyour duly elected representatives have been consistently informed on exactly what we\u2019re doing.\u201d We\u2019ve also heard that a court has approved these programs, so we shouldn\u2019t be concerned.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">Why it\u2019s not credible:<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">EFF and others have long documented that Congress has an incredibly\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/deeplinks\/2014\/05\/way-nsa-uses-section-702-deeply-troubling-heres-why\">hard time getting information<\/a>\u00a0about NSA spying. And it\u2019s not just Congress. We learned a few months ago that the Department of Defense&#8217;s deputy Inspector General, in charge of Intelligence and Special Program Assessments,\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.theguardian.com\/world\/2014\/mar\/18\/pentagon-watchdog-nsa-bulk-phone-collection\">was not aware<\/a>\u00a0of the call detail collection program.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">What\u2019s more, the secretive\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/deeplinks\/2014\/04\/in-one-sided-foreign-intelligence-surveillance-court-its-hard-to-get-whole-story\">Foreign Intelligence Surveillance Court<\/a>\u00a0(FISC) is completely incomparable to an ordinary adversarial court. It makes decisions in a vacuum, and it doesn\u2019t always have complete information, much less a second adversarial voice or technical help. Its chief judge has said that it\u2019s\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/deeplinks\/2013\/08\/nsa-spying-three-pillars-government-trust-have-fallen\">not equipped to conduct oversight<\/a>. EFF\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/document\/plaintiffs-brief-re-governments-non-compliance-courts-evidence-preservation-orders\">recently had to tell the court<\/a>\u00a0that its\u00a0<i style=\"font-weight: inherit;\">Jewel v. NSA<\/i>\u00a0case even existed \u2013 the government had apparently decided that it didn\u2019t have to. We also know that the FISC isn\u2019t much of a block, since\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"http:\/\/www.salon.com\/2013\/06\/07\/despite_obamas_claim_fisa_court_rarely_much_of_a_check\/\">in 11 years<\/a>\u00a0\u201cthe court has denied just 10 applications, and modified several dozen, while approving more than 15,000.\u201d<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\"><i style=\"font-weight: inherit;\">So why are we giving up our rights?<\/i><\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">It&#8217;s time for NSA and its supporters to admit what we all know is true: what is at stake in this debate is the simple ability for any of us\u2014in the US or around the world\u2014to be able to use the Internet without fear of surveillance. They continue to be willing to overstate their case in order to scare us into allowing them to continue to\u00a0 \u201ccollect it all.\u201d\u00a0 But the American people are getting wise and the media are increasingly double-checking their claims. As a result, more Americans than ever now say that the NSA has gone too far and those tired old stories are starting to wear thin.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">That\u2019s why it\u2019s time to\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/action.eff.org\/o\/9042\/p\/dia\/action3\/common\/public\/?action_KEY=9642\">tell Congress<\/a>\u00a0that these excuses won\u2019t work anymore. Right now, Congress is considering legislation that could be a first step to reining in NSA mass spying. But there\u2019s a contentious political battle taking place on Capitol Hill, with NSA defenders pushing a<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/www.eff.org\/deeplinks\/2014\/05\/us-house-moves-forward-narrow-nsa-reform-after-year-eye-opening-revelations\">weaker version<\/a>\u00a0of the reform bill while civil liberties groups campaign for powerful reform. Please\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #cc0000;\" href=\"https:\/\/action.eff.org\/o\/9042\/p\/dia\/action3\/common\/public\/?action_KEY=9642\">add your voice<\/a>\u00a0and call on the Senate to pass real NSA reform.<\/p>\n<\/blockquote>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"panel-separator\" style=\"color: #000000;\"><\/div>\n<div class=\"panel-pane pane-entity-field pane-node-field-issue\" style=\"color: #000000;\">\u00a0<em style=\"font-style: italic; color: #222222;\">This article\u00a0<a style=\"color: #28ade6;\" href=\"https:\/\/www.eff.org\/deeplinks\/2014\/06\/top-5-claims-defenders-nsa-have-stop-making-remain-credible\" target=\"_blank\">first appeared on Electronic Frontier Foundation<\/a>\u00a0and is reproduced here under Creative Commons license.<\/em><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Top 5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible \u00a0Cindy Cohn and Nadia Kayyali &#8211; EFF Over the past year, as the Snowden revelations have rolled out, the government and its apologists have developed a set of talking points about mass spying that the public has now heard over and over\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/five-ridiculous-ways-people-defend-nsa-spying\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1426,1670],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7668"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=7668"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7668\/revisions"}],"predecessor-version":[{"id":7671,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7668\/revisions\/7671"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=7668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=7668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=7668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}