According to Marc Ambinder and D.B. Grady's new book Deep State: Inside the Government Secrecy Industry,
the secretive National Security Agency spying programs have become institutionalized, and have grown, since 9/11.
Shane Harris at the Washingtonian read through the book's account of these sweeping and controversial surveillance programs, conducted under the code name "Ragtime":
Ragtime, which appears in official reports by the abbreviation RT, consists of four parts.
Ragtime-A involves US-based interception of all foreign-to-foreign counterterrorism-related data; Ragtime-B deals with data from foreign governments that transits through the US; Ragtime-C deals with counterproliferation actvities;
and then there's Ragtime-P, which will probably be of greatest interest to those who continue to demand more information from the NSA about what it does in the United States.
P stands for Patriot Act. Ragtime-P is the remnant of the original President’s Surveillance Program, the name given to so-called "warrantless wiretapping" activities after 9/11, in which one end of a phone call or an e-mail terminated inside the United States. That collection has since been brought under law, but civil liberties groups, journalists, and legal scholars continue to seek more information about what it entailed, who was targeted, and what authorities exist today for domestic intelligence-gathering.
Harris, who is an experienced national security reporter, analyzes some of those findings in his Washingtonian item. You can buy a copy of the book here (released Feb. 14, 2013).
(HT: Laura Poitras/Freedom of the Press Foundation)
What we already know is bad. But it’s worse than we know. Senator Mark Warner, ranking Democrat on the Senate Intelligence Committee, says Russia’s attacks on our election systems were more broad in scope, and targeted more states, than what the leaked NSA documents published yesterday by The Intercept indicate.
Reality Leigh Winner, 25, has been arrested over charges she leaked top secret National Security Agency documents referenced in this Intercept story about Russia’s cyberwar on U.S. voting infrastructure. She is identified as an NSA contractor.
An anonymously leaked Top Secret NSA report on Russian state hackers interfering with the US elections has been published by The Intercept, which had the documents independently analyzed by a who’s-who of America’s leading security experts.
Even though credit cards now feature an EMV chip for securing transactions, they still have to include the magnetic strip for compatibility with older point of sale systems. Because of this, there’s no way for the chip’s new security capabilities to protect against card skimmers in the wild.How do you protect yourself from legacy-technology-induced fraud? […]
As the old saying goes, “You should sit in meditation for 30 minutes every day. Unless you are too busy, in which case you should meditate for an hour.” Since most of us have an endless list of things to do and people to see, carving out quiet time can feel impossible, especially when most […]
The Bragi Dash Truly Wireless Smart Earphones are far more than your run of the mill Bluetooth earbuds. While the earpiece design makes these earbuds ideal for exercise and activity, and passive noise cancelling is conducive to a more serene listening experience, these buds go well beyond just playing music.First of all, they can actually […]