According to Marc Ambinder and D.B. Grady's new book Deep State: Inside the Government Secrecy Industry,
the secretive National Security Agency spying programs have become institutionalized, and have grown, since 9/11.
Shane Harris at the Washingtonian read through the book's account of these sweeping and controversial surveillance programs, conducted under the code name "Ragtime":
Ragtime, which appears in official reports by the abbreviation RT, consists of four parts.
Ragtime-A involves US-based interception of all foreign-to-foreign counterterrorism-related data; Ragtime-B deals with data from foreign governments that transits through the US; Ragtime-C deals with counterproliferation actvities;
and then there's Ragtime-P, which will probably be of greatest interest to those who continue to demand more information from the NSA about what it does in the United States.
P stands for Patriot Act. Ragtime-P is the remnant of the original President’s Surveillance Program, the name given to so-called "warrantless wiretapping" activities after 9/11, in which one end of a phone call or an e-mail terminated inside the United States. That collection has since been brought under law, but civil liberties groups, journalists, and legal scholars continue to seek more information about what it entailed, who was targeted, and what authorities exist today for domestic intelligence-gathering.
Harris, who is an experienced national security reporter, analyzes some of those findings in his Washingtonian item. You can buy a copy of the book here (released Feb. 14, 2013).
(HT: Laura Poitras/Freedom of the Press Foundation)
What we already know is bad. But it’s worse than we know. Senator Mark Warner, ranking Democrat on the Senate Intelligence Committee, says Russia’s attacks on our election systems were more broad in scope, and targeted more states, than what the leaked NSA documents published yesterday by The Intercept indicate.
Reality Leigh Winner, 25, has been arrested over charges she leaked top secret National Security Agency documents referenced in this Intercept story about Russia’s cyberwar on U.S. voting infrastructure. She is identified as an NSA contractor.
An anonymously leaked Top Secret NSA report on Russian state hackers interfering with the US elections has been published by The Intercept, which had the documents independently analyzed by a who’s-who of America’s leading security experts.
Toaster ovens are the perfect appliance for small things like toasted sandwiches and roasted garlic (try it!), but anything more involved usually requires a full-sized conventional oven.However, despite its small size, the Wolfgang Puck Pressure Oven can handle anything from baked pastries to broiled meats. This kitchen appliance has a minimal countertop footprint, and cooks […]
The Pry.Me Bottle Opener holds tens of thousands of times its own weight, and you can pick one up now from the Boing Boing Store.This remarkable keychain is considerably smaller than any of your keys, but don’t let that fool you: it can easily open any bottle, and could even tow a trailer full of […]
Guaranteeing your privacy online goes way beyond checking the “Do Not Track” option in your browser’s settings. To ensure that your internet activity is totally hidden from Internet Service Providers, advertisers, and other prying eyes, take a look at Windscribe’s VPN protection. It usually costs $7.50 per month, but you can get a 3-year subscription […]