According to Marc Ambinder and D.B. Grady's new book Deep State: Inside the Government Secrecy Industry, the secretive National Security Agency spying programs have become institutionalized, and have grown, since 9/11.
Shane Harris at the Washingtonian read through the book's account of these sweeping and controversial surveillance programs, conducted under the code name "Ragtime":
Ragtime, which appears in official reports by the abbreviation RT, consists of four parts.
Ragtime-A involves US-based interception of all foreign-to-foreign counterterrorism-related data; Ragtime-B deals with data from foreign governments that transits through the US; Ragtime-C deals with counterproliferation actvities;
and then there's Ragtime-P, which will probably be of greatest interest to those who continue to demand more information from the NSA about what it does in the United States.
P stands for Patriot Act. Ragtime-P is the remnant of the original President’s Surveillance Program, the name given to so-called "warrantless wiretapping" activities after 9/11, in which one end of a phone call or an e-mail terminated inside the United States. That collection has since been brought under law, but civil liberties groups, journalists, and legal scholars continue to seek more information about what it entailed, who was targeted, and what authorities exist today for domestic intelligence-gathering.
Harris, who is an experienced national security reporter, analyzes some of those findings in his Washingtonian item. You can buy a copy of the book here (released Feb. 14, 2013).
(HT: Laura Poitras/Freedom of the Press Foundation)
Well, pretty much everyone saw this lawsuit coming.
Andy Greenberg (previously) is Wired's senior security reporter; he did amazing work covering Russian cyberwarfare in Ukraine, which he has expanded into a forthcoming book: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (I read it for a blurb and a review; it's excellent).
The American ransomware epidemic shows no signs of slowing, as the confluence of underinvestment in IT and information security and the NSA's reckless stockpiling of computer vulnerabilities means that petty criminals can extort vast sums from distant municipalities by seizing their entire networked infrastructure.
When it comes to data analytics or deep learning, there’s one language behind the apps and algorithms that power the biggest companies of today: Python. The best part about this tool is that as versatile as it is, it’s actually fairly easy to learn. But mastery? For that, you need more than just a beginners’ […]
Your smartphone’s GPS is a modern necessity for some trips, but how do you use it safely? It’s been a problem ever since phones went mobile. A certain phone mount even shelled out the money for a commercial during the Big Game, so clearly there’s a market for the solution. Turns out there are a […]
There’s reading for pleasure, and then there’s reading for fuel; absorbing the great ideas in nonfiction books so you can apply them in your own life. In today’s hectic pace, it can be difficult to find the time to do that reading – especially for the entrepreneurs and professionals who can benefit the most from […]