BREAKING NEWS TILL 03-07-2013
UTTARAKHAND FLOOD VICTIM CHILD NO MORE !!!
WANT TO PART OF OUR RESCUE FOR UTTARAKHAND FLOOD VICTIMS?
IT IS NOT SO HARD IF YOU SOOO FAR FROM US THEN JUST BE A PART OF OUR
OPERATION "HOPE & SMILE"
FOR MORE: http://kosullaindialtd.blogspot.in/p/blog-page_28.html
OPERATION HOPE & SMILE
Want To Contact With Us?
Address:
Noida , Sector-49
E-Mail ID: bhupeshmandal84@gmail.com , bhupesh_mandal@yahoo.com
Mob No: +91-9716015884 , +91-9311464711
Web Address: kosullaindialtd.blogspot.com , http://kosullaindialtd.blogspot.in/p/blog-page_28.html
मिस्र: फ़ौज ने दिया सरकार को 48 घंटे का वक़्त
मंगलवार, 2 जुलाई, 2013 को 04:22 IST तक के समाचार
मिस्र को मौजूदा संकट से उबारने
के लिए फ़ौज ने राजनीतिक नेतृत्व को 48 घंटे का वक़्त दिया है. फ़ौज ने
ऐलान किया है कि अगर सियासी लीडरशिप नाकाम हुई तो वो मुल्क़ की ज़िम्मेदारी
अपने सिर ले लेगी और अपने हिसाब से भविष्य का ख़ाका तैयार करेगी.
देश के नाम अपने टेलीवाइज़ संबोधन में सेना प्रमुख
जनरल आब्देल फत्ताह अल सीसी ने सभी नेताओं को हिदायत दी है कि वो लोगों की
सुनें और लोगों की मांग पूरी करें.बीबीसी रेडियो फोर के वर्ल्ड टुनाइट कार्यक्रम में पूर्व जनरल सामेह साएफ एल यज़ल ने कहा कि अब राष्ट्रपति मोहम्मद मुर्सी के लिए एक ही रास्ता बचा है.
सेना की कार्रवाई
"राष्ट्रपति मुर्सी को मिस्री जनता की इच्छा का सम्मान करना होगा. सड़कों पर मौजूद मिस्र के लोगों की एक ही मांग है- राष्ट्रपति चुनाव और कोई भी मुर्सी से इससे ज़्यादा कुछ नहीं चाहता."
सामेह साएफ एल यज़ल, पूर्व जनरल
सामेह ने कहा है कि अगर मुर्सी कुर्सी छोड़ देते हैं तो इसके बाद सेना कार्रवाई कर सकती है. अगर वो ये काम नहीं करने जा रहे तो उन्हें ऐसा करने को मजबूर किया जा सकता है. इसलिए ये उनकी और मिस्र की इज़्ज़त का सवाल बन गया है.
हजारों मिस्री लोगों ने रविवार को राष्ट्रपति मोहम्मद मुर्सी के ख़िलाफ़ सड़कों पर उतरकर क्लिक करें प्रदर्शन किए थे. मुर्सी को राष्ट्रपति बने एक साल बीत चुके हैं.
काहिरा में मौजूद बीबीसी संवाददाता ने कहा है कि सेना की चेतावनी तख्तापलट की शुरुआत जैसी लगी थी लेकिन मुस्लिम ब्रदरहुड के एक प्रवक्ता ने कहा कि ये नहीं माना जाना चाहिए कि सेना प्रदर्शनकारियों का साथ दे रही है.
चेतावनी
सेना प्रमुख का बयान ऐसे वक़्त आया है कि जब प्रदर्शनकारी राष्ट्रपति मोहम्मद मुर्सी का इस्तीफ़ा मांग कर रहे हैं. इस बयान के कुछ मिनट पहले ही अमरीकी राष्ट्रपति बराक ओबामा ने कहा था कि मिस्र की जनता की मांग सुनी जानी चाहिए.
बराक ओबामा ने कहा, “ये साफ है कि मुर्सी को लोकतांत्रिक ढंग से चुना गया था. मगर ऐसे हालात पैदा करने के लिए बहुत काम करना पड़ेगा, जिसमें सभी लोगों को लगे कि उनकी आवाज सुनी जा रही है और सरकार उनकी सच्ची नुमाइंदगी करती है. तो हम सरकार से कहना चाहते हैं कि वो विपक्ष तक पहुंचे और इन सभी मुद्दों के राजनीतिक समाधान के लिए काम करे. ये अमरीका का काम नहीं कि वो प्रक्रिया क्या होनी चाहिए, ये बताए बल्कि उन तरीक़ों के ज़रिए काम होना चाहिए जिन्हें क़ानून मान्यता देता है.“
ओबामा का ये भी कहना था कि सभी राजनीतिक दलों को एक साझा समझौते की तरफ कदम बढ़ाने चाहिए. ओबामा इस वक्त तंजानिया के दौरे पर हैं.
मुर्सी के समर्थक
उधर, राष्ट्रपति मोहम्मद मुर्सी के समर्थकों का कहना है कि विपक्ष की मांग यूं ही स्वीकार नहीं की जा सकती.एक प्रदर्शनकारी शाकिर हसन ने कहा, “जिन्होंने मुस्लिम ब्रदरहुड के हेडक्वार्टर पर हमला किया है वो भाड़े के लोग हैं. उन्हें किसने पैसा दिया है. नेशनल डेमोक्रेटिक पार्टी के बारे में सभी जानते हैं. लोगों को पैसा देकर बताया जा रहा है कि उन्हें क्या करना है.”
एक और प्रदर्शनकारी हामिदी सुलेमान का कहना था, “अब लड़ाई देश की पहचान को लेकर है. जब से क्रांति हुई तब से सेक्युलर कही जाने वाली सेनाएं इस बात के लिए लड़ रही हैं कि मिस्र की पहचान इस्लामिक नहीं होनी चाहिए. मगर हमारा ज़ोर इस बात पर है कि मिस्र की पहचान इस्लामिक ही होनी चाहिए.”
इससे पहले मिस्र की सत्तारूढ़ पार्टी के हेडक्वार्टर के सामने हुए क्लिक करें संघर्ष में कम से कम आठ लोगों की मौत हो गई है. प्रदर्शनकारियों ने काहिरा में मुस्लिम ब्रदरहुड के हेडक्वार्टर पर क्लिक करें हमला बोला था.
मुर्सी सरकार के खिलाफ तमारुद आंदोलन चल रहा है, जिसके तहत रविवार को प्रदर्शन हुए थे और राष्ट्रपति मोहम्मद मुर्सी को मंगलवार शाम 5 बजे तक इस्तीफ़ा देने का अल्टीमेटम दिया गया था.
from bbc
'जासूसी' पर आमने सामने अमरीका और यूरोपीय संघ
रविवार, 30 जून, 2013 को 14:30 IST तक के समाचार
यूरोपीय संसद के प्रमुख ने क्लिक करें
अमरीका से उस रिपोर्ट पर "पूरी सफाई" मांगी है जिसके अनुसार अमरीका में यूरोपीय संघ के कुछ प्रमुख परिसरों की जासूसी कराई गई है.
यूरोपीय संसद के अध्यक्ष मार्टिन शुल्ट्स का कहना
है कि अगर यह बात सच है तो इससे यूरोपीय संघ और अमरीका के रिश्ते पर बुरा
असर पड़ेगा. यूरोपीय संघ के परिसरों में जासूसी की रिपोर्ट जर्मन पत्रिका
'डेयर श्पीगल' ने दी है.डेयर श्पीगल पत्रिका का कहना है कि अमरीकी खुफ़िया एजेंसी सीआईए के पूर्व विश्लेषक क्लिक करें एडवर्ड स्नोडेन ने इसका खुलासा किया है, जो इस वक्त अमरीका से फ़रार हैं.
स्नोडेन आम लोगों की फोन और इंटरनेट गतिविधियों पर नजर रखने वाले अमरीकी कार्यक्रम को उजागर करने के बाद सुर्खियों में हैं.
नेशनल सिक्योरिटी एजेंसी (एनएसए) से भी जुड़े रहे स्नोडेन ने क्लिक करें इक्वाडोर में शरण मांगी है.
'घृणित कदम'
डेयर श्पीगल का कहना है कि ये दस्तावेज़ एनएसए से मिले हैं और इसी एजेंसी ने वॉशिंगटन में यूरोपीय संघ के आंतरिक कंप्यूटर नेटवर्क और न्यूयॉर्क में संघ के के संयुक्त राष्ट्र के दफ़्तर में भी सेंधमारी की.इस दस्तावेज़ में कथित तौर पर ईयू को ‘निशाना’ बनाया था. हालांकि अभी ये साफ नहीं है कि अमरीकी जासूसों को कौन सी सूचनाएं हाथ लगी है.
"अगर ये रिपोर्ट सही हैं तो यह बेहद घृणित कदम है. अपने मित्र राष्ट्रों की जासूसी कराने के बजाय अमरीका अपनी गोपनीय सेवाओं की निगरानी को बेहतर बनाए."
ज़्यौं एस्सलबॉर्न, लक्जमबर्ग के विदेश मंत्री
शनिवार को शुल्ट्स ने अपने एक बयान में कहा, “यूरोपीय संसद की ओर से मैं पूरा स्पष्टीकरण चाहता हूं और इस शिकायत के मद्देनज़र अमरीकी अधिकारियों से जल्द ही कुछ सूचनाएं हासिल करने की ज़रूरत पड़ेगी.”
डेयर श्पीगल ने लक्जमबर्ग के विदेश मंत्री ज़्यौं एस्सलबॉर्न के बयान का हवाला भी दिया है जिसमें उन्होंने कहा, “अगर ये रिपोर्ट सही हैं तो यह बेहद घृणित कदम है. अपने मित्र राष्ट्रों की जासूसी कराने के बजाय अमरीका अपनी गोपनीय सेवाओं की निगरानी को बेहतर बनाए.”
श्पीगल की रिपोर्ट पर अमरीकी सरकार ने अब तक कोई सार्वजनिक टिप्पणी नहीं की है.
'नम्र निवेदन'
ऐसा माना जा रहा है कि स्नोडेन क्लिक करें मॉस्को के हवाई अड्डे पर हैं.स्नोडेन पर अमरीका में सरकारी संपत्ति को चुराने, राष्ट्रीय रक्षा संबंधी जानकारी को अनाधिकृत रूप से उजागर करने और जानबूझ कर गोपनीय खुफिया जानकारी को लीक करने के आरोप लगे हैं. इनमें प्रत्येक आरोपों के लिए 10 साल तक की जेल की सजा का प्रावधान है.
स्नोडेन के इक्वाडोर में शरण मांगने पर शनिवार को अमरीका के उप राष्ट्रपति जो बाइडन और इक्वाडोर के राष्ट्रपति रफ़ायल कोरेया के बीच फ़ोन पर बात हुई.
कोरेया के मुताबिक बाइडन ने नम्र निवेदन किया है कि इक्वाडोर शरण के लिए स्नोडेने के आवेदन को ठुकरा दे.
कोरेया ने जवाब में कहा, “फोन करने के लिए धन्यवाद. अमरीका का हम सम्मान करते हैं. हम ऐसी स्थिति उत्पन्न नहीं होने देंगे.”
उन्होंने कहा, “अगर स्नोडेन कभी निवेदन कर इक्वाडोर आते तो सबसे पहले हम अमरीका की राय लेंगे.”
from bbc
स्नोडेन ने भारत में मांगी राजनीतिक शरण: विकीलीक्स
मंगलवार, 2 जुलाई, 2013 को 09:39 IST तक के समाचार
अमरीकी ख़ुफिया सूचनाएं लीक करने के आरोपी एडवर्ड स्नोडेन ने भारत में राजनीतिक शरण मांगी है.
क्लिक करें
विकीलीक्स पर जारी एक बयान के मुताबिक स्नोडेन ने भारत के अलावा 20 अन्य देशों में राजनीतिक शरण के लिए आवेदन किया है.
सीआईए के पूर्व कर्मचारी स्नोडेन ने भारत के अलावा चीन, रूस, ऑस्ट्रिया, बोलीविया, ब्राजील, चीन, क्यूबा, फिनलैंड, फ्रांस, जर्मनी, इटली, आयरलैंड, हॉलैंड, निकारागुआ, नार्वे, पोलैंड, स्पेन, स्विटजरलैंड और वेनेजुएला में राजनीतिक शरण मांगी है.
वो इससे पहले इक्वाडोर और आइसलैंड में राजनीतिक शरण के लिए आवेदन कर चुके हैं.
ओबामा पर आरोप
इस बीच स्नोडेन ने राष्ट्रपति बराक ओबामा पर आरोप लगाया है कि वो उन्हें विदेश में राजनीतिक शरण लेने के अधिकार से वंचित कर रहे हैं.उनके इस बयान को क्लिक करें विकीलीक्स ने जारी किया है. 23 जून को क्लिक करें रूस पहुंचने के बाद यह उनका पहला सार्वजनिक बयान है.
क्लिक करें विकीलीक्स का मूल बयान पढ़ने के लिए क्लिक करें
उन्होंने कहा, “राष्ट्रपति ओबामा ने उपराष्ट्रपति को निर्देश दिए हैं कि वो उन देशों पर दबाव बनाए जहां मैंने राजनीतिक शरण के लिए आवेदन किया है.”
स्नोडेन ने कहा, “एक वैश्विक नेता को इस तरह की हरकत शोभा नहीं देती है. ये राजनीतिक दादागिरी के पुराने और घटिया हथकंडे हैं. उनका मकसद मुझे डराना नहीं हैं बल्कि मेरा साथ देने वालों को आगाह करना है.”
शरण
"एक वैश्विक नेता को इस तरह की हरकत शोभा नहीं देती है. ये राजनीतिक दादागिरी के पुराने और घटिया हथकंडे हैं"
स्नोडेन
रूस के विदेश मंत्रालय के कॉन्सुल किम शेवचेन्को ने कहा है कि क्लिक करें स्नोडेन की तरफ़ से ये आवेदन रविवार रात दिया गया. हालांकि क्रैमलिन ने अभी तक इस बारे में कोई टिप्पणी नहीं की है.
माना जाता है कि 30 साल के पूर्व सीआईए अधिकारी स्नोडेन मॉस्को हवाई अड्डे के एक होटल में रुके हुए हैं.
इससे पहले रूस के क्लिक करें राष्ट्रपति व्लादिमीर पुतिन ने कहा था कि स्नोडेन वहां रह सकते हैं, बशर्ते वो उनके 'अमरीकी सहयोगियों को नुकसान ना पहुंचाएं.'
ठिकाना
बीबीसी संवाददाता ने कहा, “इसका फ़ैसला संसद को नहीं बल्कि क्रैमलिन को करना है. पहले राष्ट्रपति पुतिन ने कहा था कि स्नोडेन के रूस में रहने की संभावना नहीं है. उन्होंने कहा कि वो इस शर्त पर ही यहां रह सकते हैं कि रूस के अमरीकी सहयोगियों को कोई नुकसान ना पहुंचाएं. उन्होंने साथ ही कहा था कि शायद स्नोडेन इसके लिए तैयार न हों और उन्हें कहीं और ठिकाना ढूढ़ना चाहिए.”
रोजेनबर्ग ने कहा, “स्नोडेन का अगला ठिकाना वेनेजुएला हो सकता है? वेनेजुएला के राष्ट्रपति गैस निर्यातक देशों के एक सम्मेलन के सिलसिले में फिलहाल मॉस्को में हैं. उनका मंगलवार को पुतिन से मिलने का कार्यक्रम है. ये निश्चित है कि इस बैठक में स्नोडेन का मुद्दा जरूर उठेगा.”
क्लिक करें अमरीका ने इस मामले में ताज़ा हालात पर कोई टिप्पणी नहीं की है. हालांकि तंजानिया के दौरे पर गए राष्ट्रपति बराक ओबामा ने कहा है कि वॉशिंगटन और मॉस्को में स्नोडेन के मामले में 'उच्चस्तरीय' बातचीत हुई है.
प्रतिक्रिया
ओबामा ने मीडिया से बातचीत में कहा था, 'हमें उम्मीद है कि क्लिक करें रूसी सरकार अंतरराष्ट्रीय यात्रा के बारे में सामान्य प्रक्रिया और क़ानून के मुताबिक फ़ैसला लेगी.'रूस की समाचार एजेंसी इंटरफ़ैक्स के मुताबिक स्नोडेन का राजनीतिक शरण संबंधी आवेदन मॉस्को के शेरेमेतयेवो एयरपोर्ट पर मौजूद एक कॉन्सुलर अधिकारी किम शेवचेन्को को सौंप दिया गया है.
इंटरफ़ैक्स ने शेवचेन्को के हवाले से कहा है कि स्नोडेन का ये आवेदन साराह हैरीसन ने अधिकारी को सौंपा. साराह स्नोडेन की प्रतिनिधि के तौर पर काम कर रही हैं और विकीलीक्स की क़ानूनी मामलों की टीम की सदस्य भी हैं.
from bbc
भारत का पहला नेविगेशनल सैटेलाइट स्थापित
मंगलवार, 2 जुलाई, 2013 को 02:54 IST तक के समाचार
भारत ने अपना पहला नेविगेशनल सैटेलाइट ऑर्बिट में सफलतापूर्वक स्थापित कर दिया है.
ये उपग्रह भारत और उसके 1500 किलोमीटर के दायरे में पड़ने वाले इलाकों से रियल टाइम पोज़िशनिंग जानकारी उपलब्ध कराएगा.सोमवार रात 11 बजकर 45 मिनट पर चेन्नई से करीब 80 किलोमीटर दूर श्रीहरिकोटा में स्थित सतीश धवन अंतरिक्ष केंद्र से इस उपग्रह को पीएसएलवी सी22 रॉकेट से अंतरिक्ष में पहुंचाया गया.
ये 36000 किलोमीटर की ऊंचाई पर पृथ्वी का चक्कर लगाएगा. ऐसे ही छह और उपग्रह अंतरिक्ष में भेजे जाने हैं.
from bbc
‘पृथ्वी’ प्रक्षेपास्त्र की जगह लेगा और अधिक सक्षम ‘प्रहार’ : डीआरडीओ
पीटीआई-भाषा संवाददाता 13:58 HRS IST नयी दिल्ली, 30 जून :भाषा:
अपनी मारक क्षमता बढ़ाने के लिए प्रयासरत भारत 150 किमी रेंज वाले पृथ्वी प्रक्षेपास्त्र की जगह हाल ही में विकसित प्रहार प्रक्षेपास्त्र को शामिल करने पर विचार कर रहा है।
डीआरडीओ प्रमुख अविनाश चंदर ने यहां प्रेस ट्रस्ट को बताया ‘हम 150 किमी मारक क्षमता वाले पृथ्वी प्रक्षेपास्त्र को हटा कर उसकी जगह प्रहार प्रक्षेपास्त्र शामिल करेंगे , जो अधिक सक्षम और सटीक है।’ उन्होंने बताया कि पृथ्वी प्रक्षेपास्त्र के सामरिक संस्करण को सेवा से हटा लिया जाएगा और लंबी दूरी के उपयोग के लिए उसका उन्नयन किया जाएगा।
from pti news
अमेरिका में भारतीय दूतावास की हुई जासूसी: रिपोर्ट
पीटीआई-भाषा संवाददाता 17:40 HRS IST लंदन..वाशिंगटन, 1 जुलाई :भाषा:अमेरिका की राष्ट्रीय सुरक्षा एजेंसी :एनएसए: ने वाशिंगटन स्थित जिन 38 देशों के दूतावासों की जासूसी की, उनमें भारतीय दूतावास भी शामिल था। एडवर्ड स्नोडेन द्वारा लीक दस्तावेजों में यह दावा किया गया है।
लंदन स्थित समाचार पत्र ‘द गार्जियन’ ने लीक गई रिपोर्ट के हवाले से खबर दी है कि अमेरिका जासूसी के लिए व्यापक तरकीबों का इस्तेमाल कर रहा था।
from pti news
कश्मीर मुद्दा भारत का आंतरिक मामला : खुर्शीद
पीटीआई-भाषा संवाददाता 17:19 HRS IST श्रीनगर, 28 जून :भाषा:
विदेशमंत्री सलमान खुर्शीद ने आज कश्मीर मुद्दे को भारत का आंतरिक मामला करार देते हुए कहा कि तमाम मुद्दों के हल के लिए देश के अंदर तंत्र मौजूद है और बाहरी ताकतों को उनमें दखलअंदाजी करने की कोई जरूरत नहीं है।
खुर्शीद ने कहा, ‘‘किसी बाहरी को हम पर उंगलियां उठाने की कोई जरूरत नहीं है कि हमें क्या करना है या हमने थोड़ी गलती की। यह परिवार के अंदर का मामला है।
from pti news
Google Reader closes today
Millions of Google Reader users are preparing for its closure today by transferring RSS feeds to new platforms.
Google announced
plans to shut down the RSS reader in March, claiming that the company
wanted to focus on fewer products.
The internet search giant admitted at the time that Google Reader had "a
devoted following who will be very sad to see it go" and gave users a
three month transition period to find an alternative feed-reading service.
Google Reader was created in 2005 and became one of the most popular RSS
readers, allowing users to see a stream of updates from their selected
websites.
RSS stands for Really Simple Syndication and updates content from multiple
sources into one feed, so users can quickly scan stories from many different
websites.
Despite Google Reader's many fans, Google said in its March blog post that use
of the RSS service had declined, and provided instructions for how to export
data to a different RSS platform.
Google software engineer Alan Green said: "Usage of Google Reader has
declined, and as a company we’re pouring all of our energy into fewer
products.
"We think that kind of focus will make for a better user experience."
Loyal followers who rely on Google Reader tried to persuade the company to reverse its decision. A petition calling on Google to save the aggregator received more than 100,000 signatures in a few days, but without success.
Several alternative RSS feeds have gained followers since Google's announcement in March. Digg Reader, built explicitly as an alternative to Google Reader, allows users to import their old Google feeds as a first step when they create an account.
Digg's president, Andrew McLaughlin asked users for their thoughts on how the feed should look and wrote: "As daily (hourly) users of Google Reader, we’re convinced that it’s a product worth saving."
"We hope to identify and rebuild the best of Google Reader’s features (including its API), but also advance them to fit the Internet of 2013."
Another platform, Feedly, created an option to view streams in a similar layout to Google Reader and developed a one-click tool for users to transfer their old content.
In a blog post, Feedly said millions of users signed up to their service in the 100 days after Google's announcement.
The company wrote: "A lot of undecided Google Reader users are looking for a home."
from telegrafh
"We think that kind of focus will make for a better user experience."
Loyal followers who rely on Google Reader tried to persuade the company to reverse its decision. A petition calling on Google to save the aggregator received more than 100,000 signatures in a few days, but without success.
Several alternative RSS feeds have gained followers since Google's announcement in March. Digg Reader, built explicitly as an alternative to Google Reader, allows users to import their old Google feeds as a first step when they create an account.
Digg's president, Andrew McLaughlin asked users for their thoughts on how the feed should look and wrote: "As daily (hourly) users of Google Reader, we’re convinced that it’s a product worth saving."
"We hope to identify and rebuild the best of Google Reader’s features (including its API), but also advance them to fit the Internet of 2013."
Another platform, Feedly, created an option to view streams in a similar layout to Google Reader and developed a one-click tool for users to transfer their old content.
In a blog post, Feedly said millions of users signed up to their service in the 100 days after Google's announcement.
The company wrote: "A lot of undecided Google Reader users are looking for a home."
from telegrafh
देश का पहला नेवीगेशन सेटेलाइट आज होगा लांच
01 Jul 2013 05:49 AMचेन्नई। भारत का अपना और पहला नेवीगेशनल सेटेलाइट आइआरएनएसएस-1ए सोमवार मध्यरात्रि के करीब श्रीहरिकोटा अंतरिक्ष केंद्र से प्रक्षेपित किया जाएगा। इसे समुद्री नौवहन और तटीय सीमा की निगरानी के काम के लिए दूसरे देशों पर निर्भरता खत्म करने की राह में ऐतिहासिक कदम माना जा रहा है।
भारतीय अंतरिक्ष अनुसंधान संगठन (इसरो) के अंतरिक्ष अभियान की अहम कड़ी पीएसएलवी-सी22 रॉकेट के जरिये इसे श्रीहरिकोटा स्थित सतीश धवन अंतरिक्ष केंद्र से रात 11.41 बजे छोड़ा जाएगा। इसरो प्रवक्ता देवीप्रसाद कार्णिक ने रविवार को बताया कि प्रक्षेपण के लिए साढ़े चौसठ घंटों की काउंटडाउन शनिवार सुबह 7.11 बजे पर शुरू हुई थी। 1425 किलो वजनी आइआरएनएसएस-1ए इंडियन रीजनल नेवीगेशन सेटेलाइट सिस्टम का पहला उपग्रह है। दस साल सेवा देने वाला यह सेटेलाइट भारत और उसके 1500 किमी के दायरे में रियल टाइम पोजीशन और टाइमिंग की सटीक जानकारी देगा। आइआरएनएसएस-1ए में दो तरह के पेलोड होंगे जिन्हें 20 मिनट के अंतराल में अंतरिक्ष में छोड़ा जाएगा। इस श्रृंखला के सात सेटेलाइट 2015 तक चरणबद्ध तरीके से छोड़े जाएंगे। पूरी परियोजना पर 1420 करोड़ रुपये की लागत आएगी।
कार्णिक के मुताबिक, इस सेटेलाइट से जमीनी, हवाई और समुद्री नेवीगेशन, आपदा प्रबंधन, वाहनों की निगरानी, फ्लीट मैनेजमेंट समेत तमाम फायदे मिलेंगे। आइआरएनएसएस सिस्टम के तहत तीन सेटेलाइट जियो स्टेशनरी और चार जियोसिनक्रोनस कक्षा में 36,000 किमी ऊंचाई पर स्थापित किए जाएंगे। इस प्रक्षेपण के लिए पीएसएलवी का उन्नत संस्करण एक्सएल का इस्तेमाल किया जा रहा है जो इस रॉकेट का 24वां मिशन होगा।
वर्ष 1993 के पहले मिशन को छोड़कर इस साल फरवरी तक पीएसएलवी के सभी 22 प्रक्षेपण सफल रहे हैं। इसके पहले चंद्रयान प्रथम, जीसैट-12 और रिसैट-1 में एक्सएल का उपयोग किया गया था। सेटेलाइट में दो सोलर पैनल भी होंगे।
FROM DENIK JAGRAN
नासा ने 25 दिन पहले दे दिए थे तबाही के संकेत
01 Jul 2013 05:49 AM
देहरादून [सुमन सेमवाल]। काश! अमेरिकी अंतरिक्ष एजेंसी नासा के 25 दिन पहले जारी किए गए सेटेलाइट चित्रों के संकेत को भांप लिया जाता तो केदारघाटी में मची तबाही से बचा जा सकता था।
नासा ने जो चित्र जारी किए थे, उनसे साफ हो रहा है कि किस तरह केदारनाथ के ऊपर मौजूद चूराबारी व कंपेनियन ग्लेशियर की कच्ची बर्फ सामान्य से अधिक मात्रा में पानी बनकर रिसने लगी थी।
लेकिन भारतीय वैज्ञानिक यह भांपने में नाकाम रहे तेजी से पिघल रहे ग्लेशियर ऐसी भीषण तबाही का कारण बन सकती हैं।
नासा ने लैंडसेट-8 सेटेलाइट के जरिये हादसे से पहले 22 मई को केदारनाथ क्षेत्र के चित्र लिए, जिसमें पता चला कि ग्लेशियर के अल्पाइन जोन से लगे भाग की बर्फ कम होती जा रही है।
विशेषज्ञों के मुताबिक, यह तभी होता है जब ग्लेशियर की कच्ची बर्फ के पिघलने व जमने का अनुपात गड़बड़ा जाता है। नासा की तस्वीरों के अनुसार, इसी वजह से करीब 25 दिन पहले से ही केदारनाथ घाटी में ग्लेशियर से निकलने वाले पानी का बहाव तेज होने लगा था। यदि तंत्र तभी सक्रिय हो जाता, तो हादसा होने से पहले ही उचित आपदा प्रबंधन किए जा सकते थे।
इन चित्रों का अध्ययन करते हुए संयुक्त राष्ट्र संघ की दुरहम यूनिवर्सिटी के डिपार्टमेंट ऑफ जियोग्राफी के प्रो. दवे पेटले ने भी एक रिपोर्ट जारी की है। रिपोर्ट के मुताबिक गर्मियों के शुरुआती महीनों में इस तरह ग्लेशियर से बर्फ पिघलने की स्थिति खतरे का संकेत थी, फिर भी इससे ज्यादा खतरा नहीं होता, यदि भारत में मानसून करीब 10 दिन पहले नहीं आता। बाकी का काम 14 से 16 जून के बीच हुई, जबरदस्त बारिश ने कर दिया। यदि मानसून समय से पहले नहीं आता तो बर्फ पिघलने की वह दर और तेज नहीं होती।
प्रो. दवे की रिपोर्ट में दोनों ग्लेशियर की जलधाराओं के मध्य एक अन्य जलधारा शुरू होने का भी जिक्र है। हालांकि खुद को केदारनाथ क्षेत्र के भौगोलिक स्वरूप से अनजान बताते हुए उन्होंने अपनी रिपोर्ट में सिर्फ इतना कहा कि तबाही का जमीनी अध्ययन भी जरूरी है।
इस रिपोर्ट पर वाडिया हिमालय भूविज्ञान संस्थान के वरिष्ठ वैज्ञानिक डॉ. डीपी डोभाल का कहना है कि 'हमने प्रो. दवे की रिपोर्ट का अध्ययन किया था। उसमें नासा के चित्रों के आधार पर ग्लेशियर से अधिक जलस्राव की आशंका व्यक्त की गई थी। हमारी टीम ने चार जून को ग्लेशियर का अध्ययन किया, लेकिन ऐसी आशंका नहीं थी कि ये पानी भीषण तबाही का कारण बन जाएगा।'
मौसम विभाग के कठघरे में सरकार
देहरादून। दैवीय आपदा से सक्षमता के साथ निपटने में नाकाम साबित हुई उत्तराखंड सरकार को अब मौसम विभाग की चेतावनी को नजरअंदाज करने के आरोप का सामना करना पड़ रहा है। हालांकि, आपदा प्रबंधन मंत्री यशपाल आर्य का कहना है कि सरकार का कहना है कि कम समय में जितना हो सकता था, उतने कदम उठाए थे। दरअसल, मौसम विभाग ने 15 जून को जारी अपने बुलेटिन में जिक्र किया था कि उत्तराखंड में अगले 72 घंटों में भारी बारिश की संभावना है, जबकि 17 जून को भीषण बारिश की चेतावनी दी गई थी। सरकार पर आरोप लग रहे हैं कि अगर वह चेतावनी पर ध्यान देती तो तबाही को कम किया जा सकता था।
OPERATION HOPE & SMILE
FROM DENIK JAGRAN
तबाही के 15 दिन बाद भी बद्रीनाथ में फंसे हैं 900 श्रद्धालु, रुद्रप्रयाग में कई घर बहे
1 जुलाई 2013
उत्तराखंड में कुदरत की तबाही के पंद्रह दिन बाद भी 900 श्रद्धालु और
स्थानीय लोग बद्रीनाथ में फंसे हुए हैँ. मौसम खराब होने की वजह से रेस्क्यू
ऑपरेशन में बाधा आ रही है. उत्तराखंड सरकार के मुताबिक रविवार को करीब
1459 सैलानियों को बद्रीनाथ से निकाला गया.
उधर आपदा में मारे गए लोगों के शवों को निकालने की कवायद भी शुरू हो गई है.
उत्तराखंड के मुख्यमंत्री विजय बहुगुणा ने कहा कि शवों को निकालने के लिए
विभिन्न विभागों के 200 लोगों की टीम एनडीआरएफ से मिले साजो सामान के साथ
केदारनाथ और रामबाड़ा भेजी जा रही है. बारिश की वजह
से एनडीआरएफ की टीम रविवार को केदारनाथ नहीं पहुंच सकी थी.
खराब मौसम से शवों के अंतिम संस्कार में बाधा
खराब मौसम केदारनाथ में शवों के अंतिम संस्कार में भी बाधा बनकर खड़ी हो गई है. पहले दो दिनों में 34 शवों का दाह संस्कार हुआ था, लेकिन पिछले दो दिनों से ये काम रुका है. उत्तराखंड के डीजीपी सत्यव्रत बंसल के मुताबिक 55 से 60 शव अभी भी नजर आ रहे हैं, महामारी के खतरे को देखते हुए जिनका अंतिम संस्कार तुरंत जरूरी है.
मंदाकिनी में आए उफान से रुद्रप्रयाग में कई घर बहे
मंदाकिनी नदी में आए उफान से रुद्रप्रयाग से करीब पच्चीस किलोमीटर दूर चंद्रपुरी गांव अलग-थलग पड़ गया है. नदी की धारा में गांव के करीब 36 मकान बह गए. करीब पांच सौ लोग मंदाकिनी नदी के एक किनारे फंस गए हैं, इनमें डेढ़ सौ लोग बेघर हैं जिनके घर सैलाब में बह गए. आजतक की टीम ने इलाके का दौरा किया तो पाया कि गांव में जरूरी चीजों की भी बेहद कमी है.
दाह संस्कार के तरीकों पर रामदेव ने उठाए सवाल
योग गुरु बाबा रामदेव ने उत्तराखंड की त्रासदी में मारे गए लोगों के दाह संस्कार के तरीकों पर सवाल खड़े किए हैँ. उन्होंने कहा कि शवों का अंतिम संस्कार पूरे वैदिक तरीके से होना चाहिए. केदारनाथ मंदिर और रामबाड़ा में खुले में पड़े शवों पर तीखी प्रतिक्रिया देते हुए रामदेव ने कहा कि त्रासदी में मारे गए लोगों के प्रति सरकार को संवेदनशीलता दिखाते हुए शवों को तुरंत इकट्ठा कर वैदिक तरीके से अंतिम संस्कार करना चाहिए.
हरिद्वार स्थित शान्ति कुंज में शिवराज सिंह चौहान
उत्तराखंड में आई दैवीय आपदा में मारे गए लोगों को सांत्वना देने मध्यप्रदेश के मुख्यमंत्री शिवराज सिंह चौहान हरिद्वार स्थित शान्ति कुंज पहुंचे. बाढ़ पीडितों के लिए मध्य प्रदेश सरकार ने शांति कुंज में आपदा राहत कैंप की स्थापना कर रखी है, साथ ही मध्य प्रदेश के लोगों को स्पेशल फ्लाईट के जरिये भोपाल भेजा जा रहा है. शिवराज सिंह चौहान ने देहरादून जाकर उत्तराखंड के मुख्यमंत्री विजय बहुगुणा से भी मुलाकात की और उत्तराखंड के पुननिर्माण में हरसंभव मदद का भरोसा दिया.
खराब मौसम से शवों के अंतिम संस्कार में बाधा
खराब मौसम केदारनाथ में शवों के अंतिम संस्कार में भी बाधा बनकर खड़ी हो गई है. पहले दो दिनों में 34 शवों का दाह संस्कार हुआ था, लेकिन पिछले दो दिनों से ये काम रुका है. उत्तराखंड के डीजीपी सत्यव्रत बंसल के मुताबिक 55 से 60 शव अभी भी नजर आ रहे हैं, महामारी के खतरे को देखते हुए जिनका अंतिम संस्कार तुरंत जरूरी है.
मंदाकिनी में आए उफान से रुद्रप्रयाग में कई घर बहे
मंदाकिनी नदी में आए उफान से रुद्रप्रयाग से करीब पच्चीस किलोमीटर दूर चंद्रपुरी गांव अलग-थलग पड़ गया है. नदी की धारा में गांव के करीब 36 मकान बह गए. करीब पांच सौ लोग मंदाकिनी नदी के एक किनारे फंस गए हैं, इनमें डेढ़ सौ लोग बेघर हैं जिनके घर सैलाब में बह गए. आजतक की टीम ने इलाके का दौरा किया तो पाया कि गांव में जरूरी चीजों की भी बेहद कमी है.
दाह संस्कार के तरीकों पर रामदेव ने उठाए सवाल
योग गुरु बाबा रामदेव ने उत्तराखंड की त्रासदी में मारे गए लोगों के दाह संस्कार के तरीकों पर सवाल खड़े किए हैँ. उन्होंने कहा कि शवों का अंतिम संस्कार पूरे वैदिक तरीके से होना चाहिए. केदारनाथ मंदिर और रामबाड़ा में खुले में पड़े शवों पर तीखी प्रतिक्रिया देते हुए रामदेव ने कहा कि त्रासदी में मारे गए लोगों के प्रति सरकार को संवेदनशीलता दिखाते हुए शवों को तुरंत इकट्ठा कर वैदिक तरीके से अंतिम संस्कार करना चाहिए.
हरिद्वार स्थित शान्ति कुंज में शिवराज सिंह चौहान
उत्तराखंड में आई दैवीय आपदा में मारे गए लोगों को सांत्वना देने मध्यप्रदेश के मुख्यमंत्री शिवराज सिंह चौहान हरिद्वार स्थित शान्ति कुंज पहुंचे. बाढ़ पीडितों के लिए मध्य प्रदेश सरकार ने शांति कुंज में आपदा राहत कैंप की स्थापना कर रखी है, साथ ही मध्य प्रदेश के लोगों को स्पेशल फ्लाईट के जरिये भोपाल भेजा जा रहा है. शिवराज सिंह चौहान ने देहरादून जाकर उत्तराखंड के मुख्यमंत्री विजय बहुगुणा से भी मुलाकात की और उत्तराखंड के पुननिर्माण में हरसंभव मदद का भरोसा दिया.
OPERATION HOPE & SMILE
FROM AAJTAK
Prayer vigil for Nelson Mandela after condition improves
28 June 2013 Last updated at 03:49 GMT
South
Africans have been holding an all-night prayer vigil for former
President Nelson Mandela, outside his former home in Soweto.
The crowd have been singing and saying prayers for Mr Mandela's health, on what is now his 20th night in hospital.South Africa's first black president - an icon of the anti-apartheid struggle - is suffering from a lung infection.
President Jacob Zuma said on Thursday that the 94-year-old's condition had improved, but still remained critical.
"He is much better today than he was when I saw him last night," Mr Zuma said after speaking to Mr Mandela's medical team.
Mr Zuma cancelled a visit to Mozambique to visit Mr Mandela in hospital.
Meanwhile Mr Mandela's daughter Makaziwe said he was "still there" and responding to touch.
Continue reading the main story
One such report suggested that Mr Mandela had suffered cardiac arrest on 8 June when he was rushed to hospital, and more recently some unconfirmed media reports said the national icon was now on life support. Some have described such details as "too much information", others as "insensitive".
Meanwhile the media continues to camp outside the heart hospital in Pretoria where he is being treated, as well as outside his home in Johannesburg, waiting for any news.
This is particularly uncomfortable for traditional South Africans, who see all the media attention as not only distasteful but also going against African culture.
There is a huge respect for death here and it is never mentioned before the event.
Even in this dark hour, very few speak frankly about the 94-year-old's passing - instead many are still praying for his recovery.
Analysis
Nelson Mandela's eldest daughter Makiziwe's criticism has echoed the sentiments of many South Africans who have baulked at the "intrusive" nature of some of the media coverage around the former president's state of health.One such report suggested that Mr Mandela had suffered cardiac arrest on 8 June when he was rushed to hospital, and more recently some unconfirmed media reports said the national icon was now on life support. Some have described such details as "too much information", others as "insensitive".
Meanwhile the media continues to camp outside the heart hospital in Pretoria where he is being treated, as well as outside his home in Johannesburg, waiting for any news.
This is particularly uncomfortable for traditional South Africans, who see all the media attention as not only distasteful but also going against African culture.
There is a huge respect for death here and it is never mentioned before the event.
Even in this dark hour, very few speak frankly about the 94-year-old's passing - instead many are still praying for his recovery.
But she accused some journalists of being like vultures, waiting for her father to die.
Emotional crowds gathered outside the hospital, adding messages of support for Mr Mandela, known by his clan name Madiba.Children released 94 balloons - one for every year of the ex-president's life - into the air in his honour.
Correspondents say South Africans now seem resigned to the prospect of his death.
"We don't like seeing Mandela going through so much pain, he has had a tough time in his life and he's gone through a lot of struggle. I think this struggle should get over sooner," Khulile Mlondleni told Reuters news agency.
"We are all going to feel bad when he passes [away], but at the same time we will be celebrating his life. He has done so many great things for this country," said 25-year-old John Ndlovu, quoted by the agency.
As crowds prayed in Soweto on Thursday evening, South Africa's ruling African National Congress (ANC) said it would hold vigils each day that the former leader remained in hospital.
US President Barack Obama, who is in Senegal, described Mr Mandela as "a hero for the world".
"His legacy will linger on through the ages," he said.
Speculation warning
After visiting her grandfather in hospital on Wednesday, Ndileka Mandela said it was an anxious time for the family.
"He's stable and we'd like to say that we thank everybody for giving their support and praying with us... we are anxious as you know that he is critical but he's in a stable condition right now," she said.
Continue reading the main story
Nelson Mandela: Key dates
- 1918 Born in the Eastern Cape
- 1944 Joins African National Congress
- 1956 Charged with high treason, but charges dropped
- 1962 Arrested, convicted of sabotage, sentenced to five years in prison
- 1964 Charged again, sentenced to life
- 1990 Freed from prison
- 1993 Wins Nobel Peace Prize
- 1994 Elected first black president
- 1999 Steps down as leader
"It's been hard, especially because of all of this - that we have to do everything in the public eye."
Later Mr Mandela's daughter Makaziwe said that while the situation was serious he was still responsive."He doesn't look good, I'm not going to lie," she said, after seeing him on Wednesday night.
"But as I say, if we speak to him, he responds and tries to open his eyes. He's still there. He might be waning off, but he's still there," she told public broadcaster SABC.
She was also highly critical of the behaviour of the international media.
"There is sort of a racist element with many of the foreign national media where they cross boundaries - it's like truly vultures waiting [for] when the lion has devoured the buffalo… we don't mind the interest but I just think that it has gone overboard," Ms Mandela said.
Mr Zuma's spokesman Mac Maharaj also criticised some media outlets for broadcasting unverified information, as rumours spread on social media sites.
Meanwhile media reports say the bodies of three of Mr Mandela's children are to be moved from his birthplace to his home in Qunu, where he himself has said he wants to be buried.
They include his son Makgatho, who died of an Aids-related illness in 2005.
He was awarded the Nobel Peace Prize in 1993 and was elected president the following year. He left office in 1999 after a single term.
Mr Mandela retired from public life in 2004 and has rarely been seen at official events since.
He has a long history of lung problems, and was diagnosed with tuberculosis in the 1980s while he was a prisoner on Robben Island, off Cape Town.
After his release, Mr Mandela said that the tuberculosis was probably caused by dampness in his prison cell.
1/5
Related Stories
From bbc
Nelson Mandela
Mandela in May 2008 | |
President of South Africa | |
In office 10 May 1994 – 14 June 1999 |
|
Deputy | Thabo Mbeki F. W. de Klerk |
Preceded by | F. W. de Klerk |
Succeeded by | Thabo Mbeki |
Personal details | |
Born | Rolihlahla Mandela 18 July 1918 Mvezo, South Africa |
Nationality | South African |
Political party | African National Congress |
Spouse(s) | Evelyn Ntoko Mase (1944–1957) Winnie Madikizela (1958–1996) Graça Machel (1998–present) |
Children | Madiba Thembekile Makgatho Lewanika Makaziwe Maki Zenani Zindziswa |
Residence | Houghton Estate, Johannesburg, Gauteng, South Africa |
Alma mater | University of Fort Hare University of London External System University of South Africa University of the Witwatersrand |
Religion | Christianity (Methodism) |
Signature | |
Website | www.nelsonmandela.org |
Nelson Rolihlahla Mandela (Xhosa pronunciation: [xoˈliːɬaɬa manˈdeːla]; born 18 July 1918) is a South African anti-apartheid revolutionary and politician who served as President of South Africa from 1994 to 1999. He was the first black South African to hold the office, and the first elected in a fully representative, multiracial election. His government focused on dismantling the legacy of apartheid through tackling institutionalised racism, poverty and inequality, and fostering racial reconciliation. Politically an African nationalist and democratic socialist, he served as the President of the African National Congress (ANC) from 1991 to 1997. Internationally, Mandela was the Secretary General of the Non-Aligned Movement from 1998 to 1999.
A Xhosa born to the Thembu royal family, Mandela attended Fort Hare University and the University of Witwatersrand, where he studied law. Living in Johannesburg, he became involved in anti-colonial politics, joining the ANC and becoming a founding member of its Youth League. After the Afrikaner nationalists of the National Party came to power in 1948 and began implementing the policy of apartheid, he rose to prominence in the ANC's 1952 Defiance Campaign, was elected President of the Transvaal ANC Branch and oversaw the 1955 Congress of the People. Working as a lawyer, he was repeatedly arrested for seditious activities and, with the ANC leadership, was prosecuted in the Treason Trial from 1956 to 1961 but was found not guilty. Although initially committed to non-violent protest, in association with the South African Communist Party he co-founded the militant Umkhonto we Sizwe (MK) in 1961, leading a bombing campaign against government targets. In 1962 he was arrested, convicted of sabotage and conspiracy to overthrow the government, and sentenced to life imprisonment in the Rivonia Trial.
Mandela served 27 years in prison, first on Robben Island, and later in Pollsmoor Prison and Victor Verster Prison. An international campaign lobbied for his release, which was granted in 1990 amid escalating civil strife. Becoming ANC President, Mandela published his autobiography and led negotiations with President F.W. de Klerk to abolish apartheid and establish multiracial elections in 1994, in which he led the ANC to victory. He was elected President and formed a Government of National Unity in an attempt to diffuse ethnic tensions. As President, he established a new constitution and initiated the Truth and Reconciliation Commission to investigate past human rights abuses. Continuing the former government's liberal economic policy, his administration introduced measures to encourage land reform, combat poverty and expand healthcare services. Internationally, he acted as mediator between Libya and the United Kingdom in the Pan Am Flight 103 bombing trial, and oversaw military intervention in Lesotho. He declined to run for a second term, and was succeeded by his deputy Thabo Mbeki, subsequently becoming an elder statesman, focusing on charitable work in combating poverty and HIV/AIDS through the Nelson Mandela Foundation.
Controversial for much of his life, right-wing critics denounced Mandela as a terrorist and communist sympathiser. He has nevertheless received international acclaim for his anti-colonial and anti-apartheid stance, having received over 250 awards, including the 1993 Nobel Peace Prize, the US Presidential Medal of Freedom and the Soviet Order of Lenin. He is held in deep respect within South Africa, where he is often referred to by his Xhosa clan name of Madiba or as tata; he is often described as "the father of the nation".
Early life
Childhood: 1918–1936
Mandela was born on 18 July 1918 in the village of Mvezo in Umtatu, then a part of South Africa's Cape Province.[1] Given the forename Rolihlahla, a Xhosa term colloquially meaning "troublemaker",[1] in later years he became known by his clan name, Madiba.[2] His patrilineal great-grandfather, Ngubengcuka, was ruler of the Thembu people in the Transkeian Territories of South Africa's modern Eastern Cape province.[3] One of this king's sons, named Mandela, became Nelson's grandfather and the source of his surname.[4] Because Mandela was only the king's child by a wife of the Ixhiba clan, a so-called "Left-Hand House", the descendants of his cadet branch of the royal family were morganatic, ineligible to inherit the throne but recognized as hereditary royal councillors.[4] Nonetheless, his father, Gadla Henry Mphakanyiswa, was a local chief and councillor to the monarch; he had been appointed to the position in 1915, after his predecessor was accused of corruption by a governing white magistrate.[5] In 1926, Gadla, too, was sacked for corruption, but Nelson would be told that he had lost his job for standing up to the magistrate's unreasonable demands.[6] A devotee of the god Qamata,[7] Gadla was a polygamist, having four wives, four sons and nine daughters, who lived in different villages. Nelson's mother was Gadla's third wife, Nosekeni Fanny, who was daughter of Nkedama of the Right Hand House and a member of the amaMpemvu clan of Xhosa.[8]
"No one in my family had ever attended school [...] On the first day
of school my teacher, Miss Mdingane, gave each of us an English name.
This was the custom among Africans in those days and was undoubtedly due
to the British bias of our education. That day, Miss Mdingane told me
that my new name was Nelson. Why this particular name I have no idea."
— Mandela, 1994.[9]
His mother took Mandela to the "Great Place" palace at Mqhekezweni, where he was entrusted under the guardianship of Thembu regent, Chief Jongintaba Dalindyebo. Although he would not see his mother again for many years, Mandela felt that Jongintaba and his wife Noengland treated him as their own child, raising him alongside their son Justice and daughter Nomafu.[15] As Mandela attended church services every Sunday with his guardians, Christianity became a significant part of his life.[16] He attended a Methodist mission school located next to the palace, studying English, Xhosa, history and geography.[17] He developed a love of African history, listening to the tales told by elderly visitors to the palace, and becoming influenced by the anti-imperialist rhetoric of Chief Joyi.[18] At the time he nevertheless considered the European colonialists as benefactors, not oppressors.[19] Aged 16, he, Justice and several other boys travelled to Tyhalarha to undergo the circumcision ritual that symbolically marked their transition from boys to men; the rite over, he was given the name "Dalibunga".[20]
Clarkebury, Healdtown and Fort Hare: 1936–1940
Intending to gain skills needed to become a privy councillor for the Thembu royal house, Mandela began his secondary education at Clarkebury Boarding Institute in Engcobo, a Western-style institution that was the largest school for black Africans in Thembuland.[21] Made to socialise with other students on an equal basis, he claimed that he lost his "stuck up" attitude, becoming best friends with a girl for the first time; he began playing sports and developed his lifelong love of gardening.[22] Completing his Junior Certificate in two years,[23] in 1937 he moved to Healdtown, the Methodist college in Fort Beaufort attended by most Thembu royalty, including Justice.[24] The headmaster emphasised the superiority of English culture and government, but Mandela became increasingly interested in native African culture, making his first non-Xhosa friend, a Sotho language-speaker, and coming under the influence of one of his favourite teachers, a Xhosa who broke taboo by marrying a Sotho.[25] Spending much of his spare time long-distance running and boxing, in his second year Mandela became a prefect.[26]With Jongintaba's backing, Mandela began work on a Bachelor of Arts (BA) degree at the University of Fort Hare, an elite black institution in Alice, Eastern Cape with around 150 students. There he studied English, anthropology, politics, native administration and Roman Dutch law in his first year, desiring to become an interpreter or clerk in the Native Affairs Department.[27] Mandela stayed in the Wesley House dormitory, befriending Oliver Tambo and his own kinsman, K.D. Matanzima.[28] Continuing his interest in sport, Mandela took up ballroom dancing,[29] and performed in a drama society play about Abraham Lincoln.[30] A member of the Students Christian Association, he gave Bible classes in the local community,[31] and became a vocal supporter of the British war effort when the Second World War broke out.[32] Although having friends connected to the African National Congress (ANC) and the anti-imperialist movement, Mandela avoided any involvement.[33] Helping found a first-year students' House Committee which challenged the dominance of the second-years,[34] at the end of his first year he became involved in a Students' Representative Council (SRC) boycott against the quality of food, for which he was temporarily suspended from the university; he left without receiving a degree.[35]
Arriving in Johannesburg: 1941–1943
Returning to Mqhekezweni in December 1940, Mandela found that Jongintaba had arranged marriages for him and Justice; dismayed, they fled to Johannesburg via Queenstown, arriving in April 1941.[36] Mandela found work as a night watchman at Crown Mines, his "first sight of South African capitalism in action", but was fired when the induna (headman) discovered he was a runaway.[37] Staying with a cousin in George Goch Township, Mandela was introduced to the realtor and ANC activist Walter Sisulu, who secured him a job as an articled clerk at law firm Witkin, Sidelsky and Edelman. The company was run by a liberal Jew, Lazar Sidelsky, who was sympathetic to the ANC's cause.[38] At the firm, Mandela befriended Gaur Redebe, a Xhosa member of the ANC and Communist Party, as well as Nat Bregman, a Jewish communist who became his first white friend.[39] Attending communist talks and parties, Mandela was impressed that Europeans, Africans, Indians and Coloureds were mixing as equals. However, he stated later that he did not join the Party because its atheism conflicted with his Christian faith, and because he saw the South African struggle as being racially based rather than class warfare.[40] Becoming increasingly politicised, in August 1943 Mandela marched in support of a successful bus boycott to reverse fare rises.[41] Continuing his higher education, Mandela signed up to a University of South Africa correspondence course, working on his BA at night.[42]Earning a small wage, Mandela rented a room in the house of the Xhoma family in the Alexandra township; although rife with poverty, crime and pollution, Alexandra always remained "a treasured place" for him.[43] Although embarrassed by his poverty, he briefly courted a Swazi woman before unsuccessfully courting his landlord's daughter.[44] In order to save money and be closer to downtown Johannesburg, Mandela moved into the compound of the Witwatersrand Native Labour Association, living among miners of various tribes; as the compound was a "way station for visiting chiefs", he once met the Queen Regent of Basutoland.[45] In late 1941, Jongintaba visited, forgiving Mandela for running away. On returning to Thembuland, the regent died in winter 1942; Mandela and Justice arrived a day late for the funeral.[46] After passing his BA exams in early 1943, Mandela returned to Johannesburg to follow a political path as a lawyer rather than become a privy councillor in Thembuland.[47] He later stated that he experienced no epiphany, but that he "simply found myself doing so, and could not do otherwise."[48]
Revolutionary activity
Law studies and the ANC Youth League: 1943–1949
Beginning law studies at the University of Witwatersrand, Mandela was the only native African in the faculty, and though facing racism, he befriended a number of liberal and communist European, Jewish, and Indian students, among them Joe Slovo, Harry Schwarz and Ruth First.[49] Joining the ANC, Mandela was increasingly influenced by Sisulu, spending much time with other activists at Sisulu's Orlando house, including old friend Oliver Tambo.[50] In 1943, Mandela met Anton Lembede, an African nationalist virulently opposed to a racially united front against colonialism and imperialism or to an alliance with the communists.[51] Despite his friendships with non-blacks and communists, Mandela supported Lembede's views, believing that black Africans should be entirely independent in their struggle for political self-determination.[52] Deciding on the need for a youth wing to mass mobilise Africans in opposition to their subjugation, Mandela was among a delegation that approached ANC President Alfred Bitini Xuma on the subject at his home in Sophiatown; the African National Congress Youth League (ANCYL) was founded on Easter Sunday 1944 in the Bantu Men's Social Centre in Eloff Street, with Lembede as President and Mandela as a member of the executive committee.[53]At Sisulu's house, Mandela met Evelyn Mase, an ANC activist and nurse from Engcobo, Transkei. Married on 5 October 1944, after initially living with her relatives, they rented House no. 8115 in Orlando from early 1946.[54] Their first child, Madiba "Thembi" Thembekile, was born in February 1946, while a daughter named Makaziwe was born in 1947, dying nine months later of meningitis.[55] Mandela enjoyed home life, welcoming his mother and sister Leabie to stay with him.[56] In early 1947, his three years of articles ended at Witkin, Sidelsky and Edelman, and he decided to become a full-time student, subsisting on loans from the Bantu Welfare Trust.[57]
In July 1947, Mandela rushed Lembede to hospital, where he died; he was succeeded as ANCYL president by the more moderate Peter Mda, who agreed to co-operate with communists and non-blacks, appointing Mandela ANCYL secretary.[58] Mandela disagreed with Mda's approach, in December 1947 supporting an unsuccessful measure to expel communists from the ANCYL, considering their ideology un-African.[59] In 1947, Mandela was elected to the executive committee of the Transvaal ANC, serving under regional president C.S. Ramohanoe. When Ramohanoe acted against the wishes of the Transvaal Executive Committee by co-operating with Indians and communists, Mandela was one of those who forced his resignation.[60]
In the South African general election, 1948, in which only whites were permitted to vote, the Afrikaner-dominated Herenigde Nasionale Party under Daniel François Malan took power, soon uniting with the Afrikaner Party to form the National Party. Openly racialist, the party codified and expanded racial segregation with the new apartheid legislation.[61] Gaining increasing influence in the ANC, Mandela and his cadres began advocating direct action against apartheid, such as boycotts and strikes, influenced by the tactics of South Africa's Indian community. Xuma did not support these measures and was removed from the presidency in a vote of no confidence, replaced by James Moroka and a more militant cabinet containing Sisulu, Mda, Tambo and Godfrey Pitje; Mandela later related that "We had now guided the ANC to a more radical and revolutionary path."[62] Having devoted his time to politics, Mandela failed his final year at Witwatersrand three times; he was ultimately denied his degree in December 1949.[63]
Defiance Campaign and Transvaal ANC Presidency: 1950–1954
Mandela took Xuma's place on the ANC National Executive in March 1950.[64] That month, the Defend Free Speech Convention was held in Johannesburg, bringing together African, Indian and communist activists to call an anti-apartheid general strike. Mandela opposed the strike because it was not ANC-led, but a majority of black workers took part, resulting in increased police repression and the introduction of the Suppression of Communism Act, 1950, affecting the actions of all protest groups.[65] In 1950, Mandela was elected national president of the ANCYL; at the ANC national conference of December 1951, he continued arguing against a racially united front, but was outvoted.[66] Thenceforth, he altered his entire perspective, embracing such an approach; influenced by friends like Moses Kotane and by the Soviet Union's support for wars of national liberation, Mandela's mistrust of communism also broke down. He became influenced by the texts of Karl Marx, Friedrich Engels, Vladimir Lenin, Joseph Stalin and Mao Zedong, and embraced dialectical materialism.[67] In April 1952, Mandela began work at the H.M. Basner law firm,[68] though his increasing commitment to work and activism meant he spent less time with his family.[69]In 1952, the ANC began preparation for a joint Defiance Campaign against apartheid with Indian and communist groups, founding a National Voluntary Board to recruit volunteers. Deciding on a path of nonviolent resistance influenced by Mohandas Gandhi, some considered it the ethical option, but Mandela instead considered it pragmatic.[70] At a Durban rally on 22 June, Mandela addressed an assembled crowd of 10,000, initiating the campaign protests, for which he was arrested and briefly interned in Marshall Square prison.[71] With further protests, the ANC's membership grew from 20,000 to 100,000; the government responded with mass arrests, introducing the Public Safety Act, 1953 to permit martial law.[72] In May, authorities banned Transvaal ANU President J. B. Marks from making public appearances; unable to maintain his position, he recommended Mandela as his successor. Although the ultra-Africanist Bafabegiya group opposed his candidacy, Mandela was elected regional president in October.[73]
On 30 July 1952, Mandela was arrested under the Suppression of Communism Act and stood trial as a part of the 21 accused – among them Moroka, Sisulu and Dadoo – in Johannesburg. Found guilty of "statutory communism", their sentence of nine months' hard labour was suspended for two years.[74] In December, Mandela was given a six-month ban from attending meetings or talking to more than one individual at a time, making his Transvaal ANU presidency impractical. The Defiance Campaign meanwhile petered out.[75] In September 1953, Andrew Kunene read out Mandela's "No Easy Walk to Freedom" speech at a Transvaal ANC meeting; the title was taken from a quote by Indian independence leader Jawaharlal Nehru, a seminal influence on Mandela's thought. The speech laid out a contingency plan for a scenario in which the ANC was banned. This Mandela Plan, or M-Plan, involved dividing the organisation into a cell structure with a more centralised leadership.[76]
Mandela obtained work as an attorney for the firm Terblanche and Briggish, before moving to the liberal-run Helman and Michel, passing qualification exams to become a full-fledged attorney.[77] In August 1953, Mandela and Oliver Tambo opened their own law firm, Mandela and Tambo, operating in downtown Johannesburg. The only African-run law firm in the country, it was popular with aggrieved blacks, often dealing with cases of police brutality. Disliked by the authorities, the firm was forced to relocate to a remote location after their office permit was removed under the Group Areas Act; as a result, their custom dwindled.[78] Though a second daughter, Makaziwe Phumia, was born in May 1954, Mandela's relationship with Evelyn became strained, and she accused him of adultery. Evidence has emerged indicating that he was having affairs with ANC member Lillian Ngoyi and secretary Ruth Mompati; persistent but unproven claims assert that the latter bore Mandela a child. Disgusted by her son's behaviour, Nosekeni returned to Transkei, while Evelyn embraced the Jehovah's Witnesses and rejected Mandela's obsession with politics.[79]
Congress of the People and the Treason Trial: 1955–1961
"We, the people of South Africa, declare for all our country and the world to know:
That South Africa belongs to all who live in it, black and white, and that no government can justly claim authority unless it is based on the will of the people."
That South Africa belongs to all who live in it, black and white, and that no government can justly claim authority unless it is based on the will of the people."
— The opening of the Freedom Charter[80]
Following the end of a second ban in September 1955, Mandela went on a working holiday to Transkei to discuss the implications of the Bantu Authorities Act, 1951 with local tribal leaders, also visiting his mother and Noengland before proceeding to Cape Town.[84] In March 1956 he received his third ban on public appearances, restricting him to Johannesburg for five years, but he often defied it.[85] His marriage broke down as Evelyn left Mandela, taking their children to live with her brother. Initiating divorce proceedings in May 1956, she claimed that Mandela had physically abused her; he denied the allegations, and fought for custody of their children. She withdrew her petition of separation in November, but Mandela filed for divorce in January 1958; the divorce was finalised in March, with the children placed in Evelyn's care.[86] During the divorce proceedings, he began courting and politicising a social worker, Winnie Madikizela, who he married in Bizana on 14 June 1958. She later became involved in ANC activities, spending several weeks imprisoned.[87]
On 5 December 1956, Mandela was arrested alongside most of the ANC Executive for "high treason" against the state. Held in Johannesburg Prison amid mass protests, they underwent a preparatory examination in Drill Hall on 19 December, before being granted bail.[88] The defence's refutation began on 9 January 1957, overseen by defence lawyer Vernon Berrangé, and continued until adjourning in September. In January 1958, judge Oswald Pirow was appointed to the case, and in February he ruled that there was "sufficient reason" for the defendants to go on trial in the Transvaal Supreme Court.[89] The formal Treason Trial began in Pretoria in August 1958, with the defendants successfully applying to have the three judges – all linked to the governing National Party – replaced. In August, one charge was dropped, and in October the prosecution withdrew its indictment, submitting a reformulated version in November which argued that the ANC leadership committed high treason by advocating violent revolution, a charge the defendants denied.[90]
In April 1959, militant Africanists dissatisfied with the ANC's united front approach founded the Pan-African Congress (PAC); Mandela's friend Robert Sobukwe was elected president, though Mandela thought the group "immature".[91] Both parties campaigned for an anti-pass campaign in May 1960, in which Africans burned the passes that they were legally obliged to carry. One of the PAC-organized demonstrations was fired upon by police, resulting in the deaths of 69 protesters in the Sharpeville massacre. In solidarity, Mandela publicly burned his pass as rioting broke out across South Africa, leading the government to proclaim martial law.[92] Under the State of Emergency measures, Mandela and other activists were arrested on 30 March, imprisoned without charge in the unsanitary conditions of the Pretoria Local prison, while the ANC and PAC were banned in April.[93] This made it difficult for their lawyers to reach them, and it was agreed that the defence team for the Treason Trial should withdraw in protest. Representing themselves in court, the accused were freed from prison when the state of emergency was lifted in late August.[94] Mandela used his free time to organise an All-In African Conference near Pietermaritzburg, Natal, in March, at which 1,400 anti-apartheid delegates met, agreeing on a stay-at home protest to mark 31 May, the day South Africa became a republic.[95] On 29 March 1961, after a six-year trial, the judges produced a verdict of not guilty, embarrassing the government.[96]
Umkhonto we Sizwe and African tour: 1961–1962
Disguising himself as a chauffeur, Mandela travelled the country incognito, organising the ANC's new cell structure and a mass stay-at-home strike for 29 May. Referred to as the "Black Pimpernel" in the press – a reference to Emma Orczy's 1905 novel The Scarlet Pimpernel – the police put out a warrant for his arrest.[97] Mandela held secret meetings with reporters, and after the government failed to prevent the strike, he warned them that many anti-apartheid activists would soon resort to violence through groups like the PAC's Poqo.[98] He believed that the ANC should form an armed group to channel some of this violence, convincing both ANC leader Albert Luthuli – who was morally opposed to violence – and allied activist groups of its necessity.[99]Inspired by Fidel Castro's 26th of July Movement in the Cuban Revolution, in 1961 Mandela co-founded Umkhonto we Sizwe ("Spear of the Nation", abbreviated MK) with Sisulu and the communist Joe Slovo. Becoming chairman of the militant group, he gained ideas from illegal literature on guerilla warfare by Mao and Che Guevara. Officially separate from the ANC, in later years MK became the group's armed wing.[100] Most early MK members were white communists; after hiding in communist Wolfie Kodesh's flat in Berea, Mandela moved to the communist-owned Liliesleaf Farm in Rivonia, there joined by Raymond Mhlaba, Slovo and Bernstein, who put together the MK constitution.[101] Operating through a cell structure, the MK agreed to acts of sabotage to exert maximum pressure on the government with minimum casualties, bombing military installations, power plants, telephone lines and transport links at night, when civilians were not present. Mandela noted that should these tactics fail, MK would resort to "guerilla warfare and terrorism."[102] Soon after ANC leader Luthuli was awarded the Nobel Peace Prize, the MK publicly announced its existence with 57 bombings on Dingane's Day (16 December) 1961, followed by further attacks on New Year's Eve.[103]
The ANC agreed to send Mandela as a delegate to the February 1962 Pan-African Freedom Movement for East, Central and Southern Africa (PAFMECSA) meeting in Addis Ababa, Ethiopia.[104] Traveling there in secret, Mandela met with Emperor Haile Selassie I, and gave his speech after Selaisse's at the conference.[105] After the conference, he travelled to Cairo, Egypt, admiring the political reforms of President Gamal Abdel Nasser, and then went to Tunis, Tunisia, where President Habib Bourguiba gave him £5000 for weaponry. He proceeded to Morocco, Mali, Guinea, Sierra Leone, Liberia and Senegal, receiving funds from Liberian President William Tubman and Guinean President Ahmed Sékou Touré.[106] Leaving Africa for London, England, he met anti-apartheid activists, reporters and prominent leftist politicians.[107] Returning to Ethiopia, he began a six-month course in guerrilla warfare, but completed only two months before being recalled to South Africa.[108]
Imprisonment
Arrest and Rivonia trial: 1962–1964
On 5 August 1962, police captured Mandela along with Cecil Williams near Howick.[109] Jailed in Johannesburg's Marshall Square prison, he was charged with inciting workers' strikes and leaving the country without permission. Representing himself with Slovo as legal advisor, Mandela intended to use the trial to showcase "the ANC's moral opposition to racism" while supporters demonstrated outside the court.[110] Moved to Pretoria, where Winnie could visit him, in his cell he began correspondence studies for a Bachelor of Laws (LLB) degree from the University of London.[111] His hearing began on 15 October, but he disrupted proceedings by wearing a traditional kaross, refusing to call any witnesses, and turning his plea of mitigation into a political speech. Found guilty, he was sentenced to five years' imprisonment; as he left the courtroom, supporters sang Nkosi Sikelel iAfrika.[112]
"In a way I had never quite comprehended before, I realized the role I
could play in court and the possibilities before me as a defendant. I
was the symbol of justice in the court of the oppressor, the
representative of the great ideals of freedom, fairness and democracy in
a society that dishonoured those virtues. I realized then and there
that I could carry on the fight even in the fortress of the enemy."
— Mandela, 1994[113]
With the exception of James Kantor, who was innocent of all charges, Mandela and the accused admitted sabotage but denied that they had ever agreed to initiate guerilla war against the government. They used the trial to highlight their political cause; one of Mandela's speeches – inspired by Castro's "History Will Absolve Me" speech – was widely reported in the press despite official censorship.[116] The trial gained international attention, with global calls for the release of the accused from such institutions as the United Nations and World Peace Council. The University of London Union voted Mandela to its presidency, and nightly vigils for him were held in St. Paul's Cathedral, London.[117] However, deeming them to be violent communist agitators, South Africa's government ignored all calls for clemency, and on 12 June 1964 de Wet found Mandela and two of his co-accused guilty on all four charges, sentencing them to life imprisonment rather than death.[118]
Robben Island: 1962–1982
Mandela and his co-accused were transferred from Pretoria to the prison on Robben Island, remaining there for the next 18 years.[119] Isolated from non-political prisoners in Section B, Mandela was imprisoned in a damp concrete cell measuring 8 feet (2.4 m) by 7 feet (2.1 m), with a straw mat on which to sleep.[120] Verbally and physically harassed by several white prison wardens, the Rivonia Trial prisoners spent their days breaking rocks into gravel, until being reassigned in January 1965 to work in a lime quarry. Mandela was initially forbidden to wear sunglasses, and the glare from the lime permanently damaged his eyesight.[121] At night, he worked on his LLB degree, but newspapers were forbidden, and he was locked in solitary confinement on several occasions for possessing smuggled news clippings.[122] Classified as the lowest grade of prisoner, Class D, he was permitted one visit and one letter every six months, although all mail was heavily censored.[123]The political prisoners took part in work and hunger strikes – the latter considered largely ineffective by Mandela – to improve prison conditions, viewing this as a microcosm of the anti-apartheid struggle.[124] ANC prisoners elected him to their four-man "High Organ" along with Sisulu, Govan Mbeki and Raymond Mhlaba, while he also involved himself in a group representing all political prisoners on the island, Ulundi, through which he forged links with PAC and Yu Chi Chan Club members.[125] Initiating the "University of Robben Island," whereby prisoners lectured on their own areas of expertise, he debated topics such as homosexuality and politics with his comrades, getting into fierce arguments on the latter with Marxists like Mbeki and Harry Gwala.[126] Though attending Christian Sunday services, Mandela studied Islam.[127] He also studied Afrikaans, hoping to build a mutual respect with the warders and convert them to his cause.[128] Various official visitors met with Mandela; most significant was the liberal parliamentary representative Helen Suzman of the Progressive Party, who championed Mandela's cause outside prison.[129] In September 1970 he met British Labour Party MP Dennis Healey.[130] South African Minister of Justice Jimmy Kruger visited in December 1974, but he and Mandela did not get on.[131] His mother visited in 1968, dying shortly after, and his firstborn son Thembi died in a car accident the following year; Mandela was forbidden from attending either funeral.[132] His wife was rarely able to visit, being regularly imprisoned for political activity, while his daughters first visited in December 1975; Winnie got out of prison in 1977 but was forcibly settled in Brandfort, still unable to visit him.[133]
From 1967, prison conditions improved, with black prisoners given trousers rather than shorts, games being permitted, and food quality increasing.[134] In 1969, an escape plan for Mandela was developed by Gordon Bruce, but it was abandoned after being infiltrated by an agent of the South African Bureau of State Security (BOSS), who hoped to see Mandela shot during the escape.[135] In 1970, Commander Piet Badenhost became commanding officer. Mandela, seeing an increase in the physical and mental abuse of prisoners, complained to visiting judges, who had Badenost reassigned.[136] He was replaced by Commander Willie Willemse, who developed a co-operative relationship with Mandela and was keen to improve prison standards.[137] By 1975, Mandela had become a Class A prisoner,[138] allowing greater numbers of visits and letters; he corresponded with anti-apartheid activists like Mangosuthu Buthelezi and Desmond Tutu.[139] That year, he began his autobiography, which was smuggled to London, but remained unpublished at the time; prison authorities discovered several pages, and his study privileges were stopped for four years.[140] Instead he devoted his spare time to gardening and reading until he resumed his LLB degree studies in 1980.[141]
By the late 1960s, Mandela's fame had been eclipsed by Steve Biko and the Black Consciousness Movement (BCM). Seeing the ANC as ineffectual, the BCM called for militant action, but following the Soweto uprising of 1976, many BCM activists were imprisoned on Robben Island.[142] Mandela tried to build a relationship with these young radicals, although he was critical of their racialism and contempt for white anti-apartheid activists.[143] Renewed international interest in his plight came in July 1978, when he celebrated his 60th birthday.[144] He was awarded an honourary doctorate in Lesotho, the Nehru Prize for International Understanding in India in 1970, and the Freedom of the City of Glasgow, Scotland in 1980.[145] In March 1980 the slogan "Free Mandela!" was developed by journalist Percy Qoboza, sparking an international campaign that led the UN Security Council to call for his release.[146] Despite increasing foreign pressure, the government refused, relying on powerful foreign Cold War allies in US President Ronald Reagan and UK Prime Minister Margaret Thatcher; Thatcher considered Mandela a communist terrorist and supported the suppression of the ANC.[147]
Pollsmoor Prison: 1982–1988
In April 1982 Mandela was transferred to Pollsmoor Prison in Tokai, Cape Town along with senior ANC leaders Walter Sisulu, Andrew Mlangeni, Ahmed Kathrada and Raymond Mhlaba; they believed that they were being isolated to remove their influence on younger activists.[148] Conditions at Pollsmoor were better than at Robben Island, although Mandela missed the camaraderie and scenery of the island.[149] Getting on well with Pollsmoor's commanding officer, Brigadier Munro, Mandela was permitted to create a roof garden,[150] also reading voraciously and corresponding widely, now permitted 52 letters a year.[151] He was appointed patron of the multi-racial United Democratic Front (UDF), founded to combat reforms implemented by South African President P.W. Botha. Botha's National Party government had permitted Coloured and Indian citizens to vote for their own parliaments which would have control over education, health, and housing, but black Africans were excluded from the system; like Mandela, the UDF saw this as an attempt to divide the anti-apartheid movement on racial lines.[152]Violence across the country escalated, with many fearing civil war. Under pressure from an international lobby, multinational banks stopped investing in South Africa, resulting in economic stagnation. Numerous banks and Thatcher asked Botha to release Mandela – then at the height of his international fame – to defuse the volatile situation.[153] Although considering Mandela a dangerous "arch-Marxist",[154] in February 1985 Botha offered him a release from prison on condition that he '"unconditionally rejected violence as a political weapon". Mandela spurned the offer, releasing a statement through his daughter Zindzi stating "What freedom am I being offered while the organisation of the people [ANC] remains banned? Only free men can negotiate. A prisoner cannot enter into contracts."[155]
In 1985 Mandela underwent surgery on an enlarged prostate gland, before being given new solitary quarters on the ground floor.[156] He was met by "seven eminent persons", an international delegation sent to negotiate a settlement, but Botha's government refused to co-operate, in June calling a state of emergency and initiating a police crackdown on unrest. The anti-apartheid resistance fought back, with the ANC committing 231 attacks in 1986 and 235 in 1987. Utilising the army and right-wing paramilitaries to combat the resistance, the government secretly funded Zulu nationalist movement Inkatha to attack ANC members, furthering the violence.[157] Mandela requested talks with Botha but was denied, instead secretly meeting with Minister of Justice Kobie Coetsee in 1987, having a further 11 meetings over 3 years. Coetsee organised negotiations between Mandela and a team of four government figures starting in May 1988; the team agreed to the release of political prisoners and the legalisation of the ANC on the condition that they permanently renounce violence, break links with the Communist Party and not insist on majority rule. Mandela rejected these conditions, insisting that the ANC would only end the armed struggle when the government renounced violence.[158]
Mandela's 70th birthday in July 1988 attracted international attention, with the BBC organising the Nelson Mandela 70th Birthday Tribute music gig at London's Wembley Stadium.[159] Although presented globally as a heroic figure, he faced personal problems when ANC leaders informed him that Winnie had set herself up as head of a criminal gang, the "Mandela United Football Club", who had been responsible for torturing and killing opponents – including children – in Soweto. Though some encouraged him to divorce her, he decided to remain loyal until she was found guilty by trial.[160]
Victor Verster Prison and release: 1988–1990
Recovering from tuberculosis caused by dank conditions in his cell,[161] in December 1988 Mandela was moved to Victor Verster Prison near Paarl. Here, he was housed in the relative comfort of a warders house with a personal cook, using the time to complete his LLB degree.[162] Allowed many visitors, Mandela organised secret communications with exiled ANC leader Oliver Tambo.[163] In 1989, Botha suffered a stroke, retaining the state presidency but stepping down as leader of the National Party, to be replaced by the conservative F. W. de Klerk.[164] In a surprise move, Botha invited Mandela to a meeting over tea in July 1989, an invitation Mandela considered genial.[165] Botha was replaced as state president by de Klerk six weeks later; the new president believed that apartheid was unsustainable and unconditionally released all ANC prisoners except Mandela.[166] Following the fall of the Berlin Wall in November 1989, de Klerk called his cabinet together to debate legalising the ANC and freeing Mandela. Although some were deeply opposed to his plans, de Klerk met with Mandela in December to discuss the situation, a meeting both men considered friendly, before releasing Mandela unconditionally and legalising all formerly banned political parties on 2 February 1990.[167]Leaving Victor Verster on 11 February, Mandela held Winnie's hand in front of amassed crowds and press; the event was broadcast live across the world.[168] Driven to Cape Town's City Hall through crowds, he gave a speech declaring his commitment to peace and reconciliation with the white minority, but made it clear that the ANC's armed struggle was not over, and would continue as "a purely defensive action against the violence of apartheid." He expressed hope that the government would agree to negotiations, so that "there may no longer be the need for the armed struggle", and insisted that his main focus was to bring peace to the black majority and give them the right to vote in national and local elections.[169] Staying at the home of Desmond Tutu, in the following days, Mandela met with friends, activists, and press, giving a speech to 100,000 people at Johannesburg's Soccer City.[170]
The end of apartheid
Main article: Negotiations to end apartheid in South Africa
Early negotiations: 1990–1991
Mandela proceeded on an African tour, meeting supporters and politicians in Zambia, Zimbabwe, Namibia, Libya and Algeria, continuing to Sweden where he was reunited with Tambo, and then London, where he appeared at the Nelson Mandela: An International Tribute for a Free South Africa concert in Wembley Stadium.[171] Encouraging foreign countries to support sanctions against the apartheid government, in France he was welcomed by President François Mitterrand, in the Vatican City by Pope John Paul II, and in England he met Margaret Thatcher. In the United States, he met President George H.W. Bush, addressed both Houses of Congress and visited eight cities, being particularly popular among the African-American community.[172] In Cuba he met President Fidel Castro, whom he had long emulated, with the two becoming friends.[173] In Asia he met President R. Venkataraman in India, President Suharto in Indonesia and Prime Minister Mahathir Mohamad in Malaysia, before visiting Australia and Japan; he notably did not visit the Soviet Union, a longtime ANC supporter.[174]In May 1990, Mandela led a multiracial ANC delegation into preliminary negotiations with a government delegation of 11 Afrikaner males. Mandela impressed them with his discussions of Afrikaner history, and the negotiations led to the Groot Schuur Minute, in which the government lifted the state of emergency. In August Mandela – recognising the ANC's severe military disadvantage – offered a ceasefire, the Pretoria Minute, for which he was widely criticised by MK activists.[175] He spent much time trying to unify and build the ANC, appearing at a Johannesburg conference in December attended by 1600 delegates, many of whom found him more moderate than expected.[176] At the ANC's July 1991 national conference in Durban, Mandela admitted the party's faults and announced his aim in building a "strong and well-oiled task force" for securing majority rule. At the conference, he was elected ANC President, replacing the ailing Tambo, while a 50-strong multiracial, multi-gendered national executive was elected.[177]
Mandela was given an office in the newly purchased ANC headquarters at Shell House, central Johannesburg, while moving with Winnie to her large Soweto home.[178] Their marriage was increasingly strained as he learned of her affair with Dali Mpofu, but he supported her during her trial for kidnap and assault. He gained funding for her defence from International Defence and Aid and from Libyan leader Muammar Gaddafi, but in June 1991 she was found guilty and sentenced to six years, reduced to two on appeal. On 13 April 1992, Mandela publicly announced his separation from Winnie, while the ANC forced her to step down from the national executive for misappropriating ANC funds; Mandela moved into the mostly-white Johannesburg suburb of Houghton.[179] Mandela's reputation was further damaged by the increase in "black-on-black" violence, particularly between ANC and Inkatha supporters in KwaZulu-Natal, in which thousands died. Mandela met with Inkatha leader Buthelezi, but the ANC prevented further negotiations on the issue. Mandela recognised that there was a "third force" within the state intelligence services fuelling the "slaughter of the people" and openly blamed de Klerk – whom he increasingly distrusted – for the Sebokeng massacre.[180] In September 1991 a national peace conference was held in Johannesburg in which Mandela, Buthelezi and de Klerk signed a peace accord, though the violence continued.[181]
The CODESA talks: 1991–1992
The Convention for a Democratic South Africa (CODESA) began in December 1991 at the Johannesburg World Trade Center, attended by 228 delegates from 19 political parties. Although Cyril Ramaphosa led the ANC's delegation, Mandela remained a key figure, and after de Klerk used the closing speech to condemn the ANC's violence, he took to the stage to denounce him as "head of an illegitimate, discredited minority regime". Dominated by the National Party and ANC, little negotiation was achieved.[182] CODESA 2 was held in May 1992, in which de Klerk insisted that post-apartheid South Africa must use a federal system with a rotating presidency to ensure the protection of ethnic minorities; Mandela opposed this, demanding a unitary system governed by majority rule.[183] Following the Boipatong massacre of ANC activists by government-aided Inkatha militants, Mandela called off the negotiations, before attending a meeting of the Organisation of African Unity in Senegal, at which he called for a special session of the UN Security Council and proposed that a UN peacekeeping force be stationed in South Africa to prevent "state terrorism". The UN subsequently sent special envoy Cyrus Vance to the country to aid negotiations.[184] Calling for domestic mass action, in August the ANC organised the largest-ever strike in South African history, while supporters marched on Pretoria.[185]Following the Bisho massacre, in which 28 ANC supporters and one soldier were shot dead by the Ciskei Defence Force during a protest march, Mandela realised that mass action was leading to further violence and resumed negotiations in September. He agreed to do so on the conditions that all political prisoners be released, that Zulu traditional weapons be banned, and that Zulu hostels would be fenced off, the latter two measures to prevent further Inkatha attacks; under increasing pressure, de Klerk reluctantly agreed. The negotiations agreed that a multiracial general election would be held, resulting in a five-year coalition government of national unity and a constitutional assembly that gave the National Party continuing influence. The ANC also conceded to safeguarding the jobs of white civil servants; such concessions brought fierce internal criticism.[186] The duo agreed on an interim constitution, guaranteeing separation of powers, creating a constitutional court, and including a US-style bill of rights; it also divided the country into nine provinces, each with its own premier and civil service, a concession between de Klerk's desire for federalism and Mandela's for unitary government.[187]
The democratic process was threatened by the Concerned South Africans Group (COSAG), an alliance of far-right Afrikaner parties and black ethnic-secessionist groups like Inkatha; in June 1993 the white supremacist Afrikaner Weerstandsbeweging (AWB) attacked the Kempton Park World Trade Centre.[188] Following the murder of ANC leader Chris Hani, Mandela made a publicised speech to calm rioting, soon after appearing at a mass funeral in Soweto for Tambo, who had died from a stroke.[189] In July 1993, both Mandela and de Klerk visited the US, independently meeting President Bill Clinton and each receiving the Liberty Medal.[190] Soon after, they were jointly awarded the Nobel Peace Prize in Norway.[191] Influenced by young ANC leader Thabo Mbeki, Mandela began meeting with big business figures, and played down his support for nationalisation, fearing that he would scare away much-needed foreign investment. Although criticised by socialist ANC members, he was encouraged to embrace private enterprise by members of the Chinese and Vietnamese Communist parties at the January 1992 World Economic Forum in Switzerland.[192] Mandela also made a cameo appearance as a schoolteacher reciting one of Malcolm X's speeches in the final scene of the 1992 film Malcolm X.[193]
General election: 1994
Main article: South African general election, 1994
With the election set for 27 April 1994, the ANC began campaigning, opening 100 election offices and hiring advisor Stanley Greenberg.
Greenberg orchestrated the foundation of People's Forums across the
country, at which Mandela could appear; though a poor public speaker, he
was a popular figure with great status among black South Africans.[194] The ANC campaigned on a Reconstruction and Development Programme
(RDP) to build a million houses in five years, introduce universal free
education and extend access to water and electricity. The party's
slogan was "a better life for all", although it was not explained how
this development would be funded.[195] With the exception of the Weekly Mail and the New Nation, South Africa's press opposed Mandela's election, fearing continued ethnic strife, instead supporting the National or Democratic Party.[196]
Mandela devoted much time to fundraising for the ANC, touring North
America, Europe and Asia to meet wealthy donors, including former
supporters of the apartheid regime.[197] He also urged a reduction in the voting age from 18 to 14; rejected by the ANC, this policy became the subject of ridicule.[198]Concerned that COSAG would undermine the election, particularly in the wake of the Battle of Bop and Shell House Massacre – incidents of violence involving the AWB and Inkatha, respectively – Mandela met with Afrikaner politicians and generals, including P.W. Botha, Pik Botha and Constand Viljoen, persuading many to work within the democratic system, and with de Klerk convinced Inkatha's Buthelezi to enter the elections rather than launch a war of secession.[199] As leaders of the two major parties, de Klerk and Mandela appeared on a televised debate; although de Klerk was widely considered the better speaker at the event, Mandela's offer to shake his hand surprised him, leading some commentators to consider it a victory for Mandela.[200] The election went ahead with little violence, although an AWB cell killed 20 with car bombs. Mandela voted at the Ohlange High School in Durban, and though he was elected President, he publicly accepted that the election had been marred by instances of fraud and sabotage.[201] Having taken 62% of the national vote, the ANC was just short of the two-thirds majority needed to change the constitution. The ANC was also victorious in 7 provinces, with Inkatha and the National Party each taking another.[202]
Presidency of South Africa: 1994–1999
Main article: Presidency of Nelson Mandela
Mandela's inauguration took place in Pretoria on 10 May 1994,
televised to a billion viewers globally. The event was attended by 4000
guests, including world leaders from disparate backgrounds.[203] South Africa's first black President, Mandela became head of a Government of National Unity
dominated by the ANC – which alone had no experience of governance –
but containing representatives from the National Party and Inkatha. In
keeping with earlier agreements, de Klerk became first Deputy President, while Thabo Mbeki was selected as second.[204]
Although Mbeki had not been his first choice for the job, Mandela would
grow to rely heavily on him throughout his presidency, allowing him to
organise policy details.[205] Moving into the presidential office at Tuynhuys in Cape Town, Mandela allowed de Klerk to retain the presidential residence in the Groote Schuur estate, instead settling into the nearby Westbrooke manor, which he renamed "Genadendal", meaning "Valley of Mercy" in Afrikaans.[206]
Retaining his Houghton home, he also had a house built in his home
village of Qunu, which he visited regularly, walking around the area,
meeting with locals, and judging tribal disputes.[207]Aged 76, he faced various ailments, and although exhibiting continued energy, he felt isolated and lonely.[208] He often entertained celebrities, such as Michael Jackson, Whoopi Goldberg, and the Spice Girls, and befriended a number of ultra-rich businessman, like Harry Oppenheimer of Anglo-American, as well as British monarch Elizabeth II on her March 1995 state visit to South Africa, resulting in strong criticism from ANC anti-capitalists.[209] Despite his opulent surroundings, Mandela lived simply, donating a third of his 552,000 rand annual income to the Nelson Mandela Children's Fund, which he had founded in 1995.[210] Although speaking out in favour of freedom of the press and befriending many journalists, Mandela was critical of much of the country's media, noting that it was overwhelmingly owned and run by middle-class whites and believing that it focused too much on scaremongering around crime.[211] Changing clothes several times a day, after assuming the presidency, one of Mandela's trademarks was his use of Batik shirts, known as "Madiba shirts", even on formal occasions.[212]
In December 1994, Mandela's autobiography, Long Walk to Freedom, was finally published.[213] In late 1994 he attended the 49th conference of the ANC in Bloemfontein, at which a more militant National Executive was elected, among them Winnie Mandela; although she expressed an interest in reconciling, Nelson initiated divorce proceedings in August 1995.[214] By 1995 he had entered into a relationship with Graça Machel, a Mozambican political activist 27 years his junior who was the widow of former president Samora Machel. They had first met in July 1990, when she was still in mourning, but their friendship grew into a partnership, with Machel accompanying him on many of his foreign visits. She turned down Mandela's first marriage proposal, wanting to retain some independence and dividing her time between Mozambique and Johannesburg.[215]
National reconciliation
Presiding over the transition from apartheid minority rule to a multicultural democracy, Mandela saw national reconciliation as the primary task of his presidency.[216] Having seen other post-colonial African economies damaged by the departure of white elites, Mandela worked to reassure South Africa's white population that they were protected and represented in "the Rainbow Nation".[217] Mandela attempted to create the broadest possible coalition in his cabinet, with de Klerk as first Deputy President while other National Party officials became ministers for Agriculture, Energy, Environment, and Minerals and Energy, and Buthelezi was named Minister for Home Affairs.[218] The other cabinet positions were taken by ANC members, many of whom – like Joe Modise, Alfred Nzo, Joe Slovo, Mac Maharaj and Dullah Omar – had long been comrades, although others, such as Tito Mboweni and Jeff Radebe, were much younger.[219] Mandela's relationship with de Klerk was strained; Mandela thought that de Klerk was intentionally provocative, while de Klerk felt that he was being intentionally humiliated by the president. In January 1995, Mandela heavily chastised him for awarding amnesty to 3,500 police just before the election, and later criticised him for defending former Minister of Defence Magnus Malan when the latter was charged with murder.[220]Mandela personally met with senior figures of the apartheid regime, including Hendrik Verwoerd's widow Betsie Schoombie and the lawyer Percy Yutar; emphasising personal forgiveness and reconciliation, he announced that "courageous people do not fear forgiving, for the sake of peace."[221] He encouraged black South Africans to get behind the previously hated national rugby team, the Springboks, as South Africa hosted the 1995 Rugby World Cup. After the Springboks won an epic final over New Zealand, Mandela presented the trophy to captain Francois Pienaar, an Afrikaner, wearing a Springbok shirt with Pienaar's own number 6 on the back. This was widely seen as a major step in the reconciliation of white and black South Africans; as de Klerk later put it, "Mandela won the hearts of millions of white rugby fans."[222] Mandela's efforts at reconciliation assuaged the fears of whites, but also drew criticism from more militant blacks. His estranged wife, Winnie, accused the ANC of being more interested in appeasing whites than in helping blacks.[223]
More controversially, Mandela oversaw the formation of a Truth and Reconciliation Commission to investigate crimes committed under apartheid by both the government and the ANC, appointing Desmond Tutu as its chair. To prevent the creation of martyrs, the Commission granted individual amnesties in exchange for testimony of crimes committed during the apartheid era. Dedicated in February 1996, it held two years of hearings detailing rapes, torture, bombings, and assassinations, before issuing its final report in October 1998. Both de Klerk and Mbeki appealed to have parts of the report suppressed, though only de Klerk's appeal was successful.[224] Mandela praised the Commission's work, stating that it "had helped us move away from the past to concentrate on the present and the future".[225]
Domestic programs
Mandela's administration inherited a country with a huge disparity in wealth and services between white and black communities. Of a population of 40 million, around 23 million lacked electricity or adequate sanitation, 12 million lacked clean water supplies, with 2 million children not in school and a third of the population illiterate. There was 33% unemployment, and just under half of the population lived below the poverty line.[226] Government financial reserves were nearly depleted, with a fifth of the national budget being spent on debt repayment, meaning that the extent of the promised Reconstruction and Development Programme (RDP) was scaled back, with none of the proposed nationalisation or job creation.[227] Instead, the government adopted liberal economic policies designed to promote foreign investment, adhering to the "Washington consensus" advocated by the World Bank and International Monetary Fund.[228]Under Mandela's presidency, welfare spending increased by 13% in 1996/97, 13% in 1997/98, and 7% in 1998/99.[229] The government introduced parity in grants for communities, including disability grants, child maintenance grants, and old-age pensions, which had previously been set at different levels for South Africa's different racial groups.[229] In 1994, free healthcare was introduced for children under six and pregnant women, a provision extended to all those using primary level public sector health care services in 1996.[230] By the 1999 election, the ANC could boast that due to their policies, 3 million people were connected to telephone lines, 1.5 million children were brought into the education system, 500 clinics were upgraded or constructed, 2 million people were connected to the electricity grid, water access was extended to 3 million people, and 750,000 houses were constructed, housing nearly 3 million people.[231]
The Land Restitution Act of 1994 enabled people who had lost their property as a result of the Natives Land Act, 1913 to claim back their land, leading to the settlement of tens of thousands of land claims.[232] The Land Reform Act 3 of 1996 safeguarded the rights of labour tenants who live and grow crops or graze livestock on farms. This legislation ensured that such tenants could not be evicted without a court order or if they were over the age of sixty-five.[233] The Skills Development Act of 1998 provided for the establishment of mechanisms to finance and promote skills development at the workplace.[234] The Labour Relations Act of 1995 promoted workplace democracy, orderly collective bargaining, and the effective resolution of labour disputes.[235] The Basic Conditions of Employment Act of 1997 improved enforcement mechanisms while extending a "floor" of rights to all workers,[235] while the Employment Equity Act of 1998 was passed to put an end to unfair discrimination and ensure the implementation of affirmative action in the workplace.[235]
Many domestic problems however remained. Critics like Edwin Cameron accused Mandela's government of doing little to stem the HIV/AIDS pandemic in the country; by 1999, 10% of South Africa's population were HIV positive. Mandela later admitted that he had personally neglected the issue, leaving it for Mbeki to deal with.[236] Mandela also received criticism for failing to sufficiently combat crime, with South Africa having one of the world's highest crime rates; this was a key reason cited by the 750,000 whites who emigrating in the late 1990s.[237] Mandela's administration was mired in corruption scandals, with Mandela being perceived as "soft" on corruption and greed.[238]
Foreign affairs
Following the South African example, Mandela encouraged other nations to resolve conflicts through diplomacy and reconciliation.[240] He echoed Mbeki's calls for an "African Renaissance", and was greatly concerned with issues on the continent; he took a soft diplomatic approach to removing Sani Abacha's military junta in Nigeria but later became a leading figure in calling for sanctions when Abacha's regime increased human rights violations.[241] In 1996 he was appointed Chairman of the Southern African Development Community (SADC) and initiated unsuccessful negotiations to end the First Congo War in Zaire.[242] In South Africa's first post-apartheid military operation, Mandela ordered troops into Lesotho in September 1998 to protect the government of Prime Minister Pakalitha Mosisili after a disputed election prompted opposition uprisings.[243]In September 1998, Mandela was appointed Secretary-General of the Non-Aligned Movement, who held their annual conference in Durban. He used the event to criticise the "narrow, chauvinistic interests" of the Israeli government in stalling negotiations to end the Israeli-Palestinian conflict and urged India and Pakistan to negotiate to end the Kashmir conflict, for which he was criticised by both Israel and India.[244] Inspired by the region's economic boom, Mandela sought greater economic relations with East Asia, in particular with Malaysia, although this was scuppered by the 1997 Asian financial crisis.[245] He attracted controversy for his close relationship with Indonesian President Suharto, whose regime was responsible for mass human rights abuses, although privately urged him to withdraw from the occupation of East Timor.[246]
Mandela faced similar criticism from the west for his personal friendships with Fidel Castro and Muammar Gaddafi. Castro visited in 1998, to widespread popular acclaim, while Mandela met Gaddafi in Libya to award him the Order of Good Hope.[247] When western governments and media criticised these visits, Mandela lambasted the criticisms as having racist undertones.[248] Mandela hoped to resolve the long-running dispute between Libya and the US and Britain over bringing to trial the two Libyans, Abdelbaset al-Megrahi and Lamin Khalifah Fhimah, who were indicted in November 1991 and accused of sabotaging Pan Am Flight 103. Mandela proposed that they be tried in a third country, which was agreed to by all parties; governed by Scots law, the trial was held at Camp Zeist in the Netherlands in April 1999, and found one of the two men guilty.[249]
Withdrawing from politics
The new Constitution of South Africa was agreed upon by parliament in May 1996, enshrining a series of institutions to check political and administrative authority within a constitutional democracy.[250] De Klerk however opposed the implementation of this constitution, withdrawing from the coalition government in protest.[251] The ANC took over the cabinet positions formerly held by the National Party, with Mbeki becoming sole Deputy President.[252] When both Mandela and Mbkei were out of the country in one occasion, Buthelezi was appointed "Acting President", marking an improvement in his relationship with Mandela.[253]Mandela stepped down as ANC President at the December 1997 conference, and although hoping that Ramaphosa would replace him, the ANC elected Mbeki to the position; Mandela admitted that by then, Mbeki had become "de facto President of the country". Replacing Mbeki as Deputy President, Mandela and the Executive supported the candidacy of Jacob Zuma, a Zulu who had been imprisoned on Robben Island, but he was challenged by Winnie, whose populist rhetoric had gained her a strong following within the party; Zuma defeated her in a landslide victory vote at the election.[254]
Mandela's relationship with Machel had intensified; in February 1998 he publicly stated that "I'm in love with a remarkable lady", and under pressure from his friend Desmond Tutu, who urged him to set an example for young people, he set a wedding for his 80th birthday, in July.[255] The following day he held a grand party with many foreign dignitaries.[256] Mandela had never planned on standing for a second term in office, and gave his farewell speech on 29 March 1999, after which he retired.[257]
Retirement
Continued activism: 1999–2004
Retiring in June 1999, Mandela sought a quiet family life, to be divided between Johannesburg and Qunu. He set about authoring a sequel to his first autobiography, to be titled The Presidential Years, but it was abandoned before publication.[258] Finding such seclusion difficult, he reverted to a busy public life with a daily programme of tasks, meeting with world leaders and celebrities, and when in Johannesburg worked with the Nelson Mandela Foundation, founded in 1999 to focus on combating HIV/AIDS, rural development and school construction.[259] Although he had been heavily criticised for failing to do enough to fight the pandemic during his presidency, he devoted much of his time to the issue following his retirement, describing it as "a war" that had killed more than "all previous wars", and urged Mbeki's government to ensure that HIV+ South Africans had access to retrovirals.[260] In 2000, the Nelson Mandela Invitational charity golf tournament was founded, hosted by Gary Player.[261] Mandela was successfully treated for prostate cancer in July 2001.[262]In 2002, Mandela inaugurated the Nelson Mandela Annual Lecture, and in 2003 the Mandela Rhodes Foundation was created at Rhodes House, University of Oxford, to provide postgraduate scholarships to African students. These projects were followed by the Nelson Mandela Centre of Memory and the 46664 campaign against HIV/AIDS.[263] He gave the closing address at the XIII International AIDS Conference in Durban in 2000,[264] and in 2004, spoke at the XV International AIDS Conference in Bangkok, Thailand.[265]
Publicly, Mandela became more vocal in criticising Western powers. He strongly opposed the 1999 NATO intervention in Kosovo and called it an attempt by the world's powerful nations to police the entire world.[266] In 2003 he spoke out against the plans for the US and UK to launch the War in Iraq, describing it as "a tragedy" and lambasting US President George W. Bush and UK Prime Minister Tony Blair for undermining the UN. He attacked the US more generally, asserting that it had committed more "unspeakable atrocities" across the world than any other nation, citing the atomic bombing of Japan; this attracted international controversy, although he would subsequently reconcile his relationship with Blair.[267] Retaining an interest in Libyan-UK relations, he visited Megrahi in Barlinnie prison, and spoke out against the conditions of his treatment, referring to them as "psychological persecution."[268]
"Retiring from retirement": 2004–present
In June 2004, aged 85 and amid failing health, Mandela announced that he was "retiring from retirement" and retreating from public life, remarking "Don't call me, I will call you."[269] Although continuing to meet with close friends and family, the Foundation discouraged invitations for him to appear at public events and denied most interview requests.[270] He retained some involvement in international affairs and encouraged Zimbabwean President Robert Mugabe to resign over growing human rights abuses in the country. When this proved ineffective, he spoke out publicly against Mugabe in 2007, asking him to step down "with residual respect and a modicum of dignity."[271] That year, Mandela, Machel, and Desmond Tutu convened a group of world leaders in Johannesburg to contribute their wisdom and independent leadership to some of the world's toughest problems. Mandela announced the formation of this new group, The Elders, in a speech delivered on his 89th birthday.[272]Mandela's 90th birthday was marked across the country on 18 July 2008, with the main celebrations held at Qunu,[273] and a concert in his honour in Hyde Park, London.[274] In a speech marking the event, Mandela called for the rich to help the poor across the world.[273] Throughout Mbeki's presidency, Mandela continued to support the ANC, although usually overshadowed Mbeki at any public events that the two attended. Mandela was more at ease with Mbeki's successor Jacob Zuma, although the Nelson Mandela Foundation were upset when his grandson, Chief Mandla Mandela, flew him out to the Eastern Cape to attend a pro-Zuma rally in the midst of a storm in 2009.[275]
Since 2004, Mandela had successfully campaigned for South Africa to host the 2010 FIFA World Cup, declaring that there would be "few better gifts for us in the year" marking a decade since the fall of apartheid. Despite maintaining a low-profile during the event, Mandela made a rare public appearance during the closing ceremony, where he received a "rapturous reception".[276]
Health
In February 2011, he was briefly hospitalised with a respiratory infection, attracting international attention,[277] before being re-hospitalised for a lung infection and gallstone removal in in December 2012.[278] After a successful medical procedure in early March 2013,[279] his lung infection reoccurred, and he was briefly hospitalised in Pretoria.[280]On 8 June 2013, his lung infection worsened, and he was rehospitalized in Pretoria in a serious condition.[281] After four days, it was reported that he had stabilized and remained in a "serious, but stable condition".[282] En route to the hospital, his ambulance broke down and was stranded on the roadside for 40 minutes; the South African government was criticized for the incident when it confirmed the report several weeks later, but President Jacob Zuma countered that "There were seven doctors in the convoy who were in full control of the situation throughout the period. He had expert medical care."[283]
On 22 June 2013, CBS News stated that he had not opened his eyes in days and was unresponsive, and the family was discussing just how much medical intervention should be given.[284] (Former bodyguard Shaun van Heerden, described by CBS News as "Mandela's constant companion for the last 12 years", had publicly asked the family to "set him free" a week prior).[285]
On 23 June 2013, President Jacob Zuma issued a statement saying that Mandela's condition had become "critical".[286][287][288] Zuma, accompanied by the Deputy President of the ANC, Cyril Ramaphosa, met Mandela's wife Graça Machel at the hospital in Pretoria and discussed his condition.[289] On 25 June Cape Town Archbishop Thabo Makgoba visited Mandela at the hospital and prayed with Graça Machel Mandela "at this hard time of watching and waiting".[290] The next day, Zuma visited Mandela in the hospital and canceled a visit scheduled for the next day to Mozambique.[291] A relative of Mandela told The Daily Telegraph newspaper he is on life support.[292]
Personal and public life
Image
Across the world, Mandela came to be seen as "a moral authority" with a great "concern for truth".[293] Considered friendly and welcoming, Mandela exhibited a "relaxed charm" when talking to others, including his opponents.[294] Although often befriending millionaires and dignitaries, he enjoyed talking with their staff when at official functions.[295] In later life, he was known for looking for the best in everyone, even defending political opponents to his allies, though some thought him too trusting of others.[296] He was renowned for his stubbornness and loyalty,[297] and exhibited a "hot temper" which could flare up in anger in certain situations, also being "moody and dejected" away from the public eye.[298] He also had a mischievous sense of humour.[299] The 14th Dalai Lama is a long-time friend of former president Nelson Mandela.Very conscious of his image, throughout his life he sought fine quality clothes, carrying himself in a "regal style" stemming from his childhood in the Thembu royal house, and during his presidency was often compared to a constitutional monarch.[300] Considered a "master of imagery and performance", he excelled at presenting himself well in press photographs and producing soundbites.[301]
Political ideology
Mandela was an African nationalist, an ideological position he held since joining the ANC,[302] also being "a democrat, and a socialist".[303] Although he presented himself in an autocratic manner in several speeches, Mandela was a devout believer in democracy and would abide by majority decisions even when deeply disagreeing with them.[304] He held a conviction that "inclusivity, accountability and freedom of speech" were the fundamentals of democracy,[305] and was driven by a belief in natural and human rights.[306]A democratic socialist, Mandela was "openly opposed to capitalism, private land-ownership and the power of big money".[307] Influenced by Marxism, during the revolution Mandela advocated scientific socialism,[308] although he denied being a communist during the Treason Trial.[309] Biographer David James Smith thought this untrue, stating that Mandela "embraced communism and communists" in the late 1950s and early 1960s, though was a "fellow traveller" rather than a party member.[310] In the 1955 Freedom Charter, which Mandela had helped create, it called for the nationalisation of banks, gold mines, and land, believing it necessary to ensure equal distribution of wealth.[311] Despite these beliefs, Mandela nationalised nothing during his presidency, fearing that this would scare away foreign investors. This decision was in part influenced by the fall of the socialist states in the Soviet Union and Eastern Bloc during the early 1990s.[312]
Family
Mandela has been married three times, has fathered six children, As of April 2013 has 17 grandchildren,[313] and a growing number of great-grandchildren.[314] Considered physically undemonstrative with his children, he could be stern and demanding of them, although was more affectionate with his grandchildren.[315]Mandela's first marriage was to Evelyn Ntoko Mase, who was also from the Transkei, although they met in Johannesburg before being married in October 1944.[54] The couple broke up in 1957 after 13 years, divorcing under the multiple strains of his adultery and constant absences, devotion to revolutionary agitation, and the fact that she was a member of the Jehovah's Witnesses, a religion requiring political neutrality.[86] The couple had two sons, Madiba "Thembi" Thembekile (1946–1969) and Makgatho Mandela (1950–2005), and two daughters, both named Makaziwe Mandela (known as Maki; born 1947 and 1953). Their first daughter died aged nine months, and they named their second daughter in her honour.[316] Mase died in 2004, and Mandela attended her funeral.[317] Makgatho's son, Mandla Mandela, became chief of the Mvezo tribal council in 2007.[318]
Mandela's second wife, Winnie Madikizela-Mandela, also came from the Transkei area, although they, too, met in Johannesburg, where she was the city's first black social worker.[319] They had two daughters, Zenani (Zeni), born 4 February 1958, and Zindziswa (Zindzi) Mandela-Hlongwane, born 1960.[319] Zindzi was only 18 months old when her father was sent to Robben island. Later, Winnie would be deeply torn by family discord which mirrored the country's political strife; while her husband was serving a life sentence in the Robben Island prison, her father became the agriculture minister in the Transkei.[319] The marriage ended in separation (April 1992) and divorce (March 1996), fueled by political estrangement.[320] Mandela was still in prison when his daughter Zenani was married in 1973 to Prince Thumbumuzi Dlamini, a brother of both King Mswati III of Swaziland[321] and of Queen Mantfombi of the Zulus.[322] Although she had vivid memories of her father, from the age of four up until sixteen, South African authorities did not permit her to visit him.[323] In July 2012, Zenani was appointed ambassador to Argentina, becoming the first of Mandela's three remaining children to enter public life.[324]
Mandela remarried on his 80th birthday in 1998, to Graça Machel (née Simbine), widow of Samora Machel, the former Mozambican president and ANC ally who was killed in an air crash 12 years earlier.[325]
Legacy
Within South Africa, Mandela was often referred to by his Xhosa clan name of Madiba.[326][327]Orders, decorations and monuments
Main article: List of awards and honours bestowed upon Nelson Mandela
Within South Africa, Mandela is widely considered to be "the father of the nation",[328] and "the founding father of democracy",[329] being seen as "the national liberator, the saviour, its Washington and Lincoln rolled into one".[330] In 2004, Johannesburg granted Mandela the freedom of the city,[331] and the Sandton Square shopping centre was renamed Nelson Mandela Square, after a Mandela statue was installed there.[332] In 2008, another Mandela statue was unveiled at Groot Drakenstein Correctional Centre, formerly Victor Verster Prison, near Cape Town, standing on the spot where Mandela was released from the prison.[333]He has also received international acclaim. In 1993, he received the joint Nobel Peace Prize with de Klerk.[334] In November 2009, the United Nations General Assembly proclaimed Mandela's birthday, 18 July, as "Mandela Day", marking his contribution to the anti-apartheid struggle. It called on individuals to donate 67 minutes to doing something for others, commemorating the 67 years that Mandela had been a part of the movement.[335]
Awarded the US Presidential Medal of Freedom,[336] and the Order of Canada,[337] he was the first living person to be made an honorary Canadian citizen.[338] The last reciprocent of the Soviet Union's Lenin Peace Prize from the Soviet Union,[339] in 1990 he received the Bharat Ratna Award from the government of India,[340] and in 1992 received Pakistan's Nishan-e-Pakistan.[341] In 1992 he was awarded the Atatürk Peace Award by Turkey. He refused the award, citing human rights violations committed by Turkey at the time,[342] but later accepted the award in 1999.[339] Elizabeth II awarded him the Bailiff Grand Cross of the Order of St. John and the Order of Merit.[343]
Artistic tributes
Many artists have dedicated songs to Mandela. One of the most popular was from The Special AKA who recorded the song "Free Nelson Mandela" in 1983, which Elvis Costello also recorded and had a hit with. Stevie Wonder dedicated his 1985 Oscar for the song "I Just Called to Say I Love You" to Mandela, resulting in his music being banned by the South African Broadcasting Corporation.[344] In 1985, Youssou N'Dour's album Nelson Mandela was the Senegalese artist's first US release. Other artists who released songs or videos honouring Mandela include Johnny Clegg,[345] Hugh Masekela,[346] Brenda Fassie,[347] Beyond,[348] Nickelback,[349] Raffi,[350] and Ampie du Preez and AB de Villiers.[351]Cinema and television
Mandela has been depicted in cinema and television on multiple occasions. The 1997 film Mandela and de Klerk starred Sidney Poitier as Mandela,[352] while Dennis Haysbert played him in Goodbye Bafana (2007).[353] In the 2009 BBC television film Mrs Mandela, Nelson Mandela was portrayed by David Harewood,[354] and Morgan Freeman portrayed him in Invictus (2009).[355]from wikipedia
Last Traded on Jun 28
25375.00
Volume
N.A |
Low
High
24830.00
25655.00
|
For live update : http://www.moneycontrol.com/commodity/gold-price.html
Yearly gold price chart in india - Last 50 years History
Yearly gold price chart in india - Last 50 years HistoryGold price history chart including last 1 year, 5 years and 10 years history.here you can see last 50 years of gold price history in India.In 1950, the price of gold was around Rs 100 per 10 gm of gold. Now it reaches to value of Rs 32000 per 10 gm of gold. Gold prices touched a record high in 2012.
Latest Gold Price Chart in INR per 10 GM
Year Rate(In INR)
1950 Rs.99
1951 Rs.98
1952 Rs.76
1953 Rs.73
1954 Rs.77
1955 Rs.79
1956 Rs.90
1957 Rs.90
1958 Rs.95
1959 Rs.102
1950 to 1959 Gold Price Chart in India
Year Rate(In INR)
1960 Rs.111
1961 Rs.119
1962 Rs.119
1963 Rs.97
1964 Rs.63
1965 Rs.71
1966 Rs.83
1967 Rs.102
1968 Rs.162
1969 Rs.176
1960 to 1969 Gold Price Chart in India
Year Rate(In INR)
1970 Rs.184
1971 Rs.193
1972 Rs.202
1973 Rs.243
1974 Rs.369
1975 Rs.520
1976 Rs.545
1977 Rs.486
1978 Rs.685
1979 Rs.890
1970 to 1979 Gold Price Chart in India
Year Rate(In INR)1980 Rs.1300
1981 Rs.1800
1982 Rs.1600
1983 Rs.1800
1984 Rs.1900
1985 Rs.2000
1986 Rs.2100
1987 Rs.2500
1988 Rs.3000
1989 Rs.3100
1980 to 1989 Gold Price Chart in India
Year Rate(In INR)
1990 Rs.3200
1991 Rs.3400
1992 Rs.4300
1993 Rs.4100
1994 Rs.4500
1995 Rs.4650
1996 Rs.5100
1997 Rs.4700
1998 Rs.4000
1999 Rs.4200
1990 to 1999 Gold Price Chart in India
Year Rate(In INR)
2000 Rs.4400
2001 Rs.4300
2002 Rs.5000
2003 Rs.5700
2004 Rs.5800
2005 Rs.7000
2006 Rs.9000
2007 Rs.10800
2008 Rs.12500
2009 Rs.14500
2010 Rs.18000
2011 Rs.25000
2012 Rs.32000
2013 Rs.29000- 24.900 aprox
2000 to 2012 Gold Price Chart in India
From moneycontrol
दिल दहला देने वाली है उत्तराखंड में मृतकों की तादाद
3000 के आंकड़े को पार कर सकती है
उत्तराखंड से जो खबर आ रही है, वो वाकई परेशान करनेवाली है. पुलिस सूत्रों
ने इस बात की पुष्टि की है कि जितने लोगों की मौत की अब तक जानकारी आई है,
वो तो बहुत कम है. नई जानकारी के बाद अब इस प्राकृतिक आपदा में मरने वालों
की संख्या 3000 के आंकड़े को पार कर सकती है.
उत्तराखंड में तबाही का भयंकर सच आ रहा है सामने, रामबाड़ा-गौरीकुंड के बीच पड़े हैं करीब 2500 शव
उत्तराखंड से जो खबर आ रही है, वो वाकई परेशान करनेवाली है. पुलिस
सूत्रों ने इस बात की पुष्टि की है कि जितने लोगों की मौत की अब तक जानकारी
आई है, वो तो बहुत कम है. खबर मिली है कि रामबाड़ा और गोरीकुंड के बीच अब
भी ढाई हजार शव पड़े हैं. पुलिस सूत्रों ने हमें ये भी जानकारी दी है कि इन
शवों को पहचान पाना भी मुश्किल है. इस नई जानकारी के बाद अब इस प्राकृतिक
आपदा में मरने वालों की संख्या 3000 के आंकड़े को पार कर जाएगी. अभी तक इस
आपदा में 822 लोगों के मारे जाने की पुष्टि हो चुकी है.
एक्सकैवेटर मशीनों से हटेगा मलबाकेन्द्र सरकार
बाढ़ के कहर से गुजरे उत्तराखंड के केदारनाथ से शिलाखंडों और मलबे को हटाने
के लिए विमान से विशाल एक्सकैवेटर मशीनें भेजने की योजना बना रही है. बाढ़
प्रभावित राज्य से लौट कर आए राष्ट्रीय आपदा प्रबंधन प्राधिकरण (एनडीएमए)
के उपाध्यक्ष एम. शशिधर रेड्डी ने बताया, ‘केदारनाथ में शिलाखंड और भारी
मलबा जमा हो गया है और हम मलबा हटाने के लिए विशेष एमआई-26 हेलीकाप्टर से
एक्सकैवेटर ले जाने की योजना बना रहे हैं.’ रेड्डी ने पत्रकारों को बताया,
‘हेलीकाप्टरों को उतारने का मुद्दा भी तय किया जा रहा है.’
विमानों से किया जाएगा सर्वेक्षणउन्होंने बताया कि जिन जगहों पर बचाव अभियान चलाया गया है वहां का ‘नेत्र’ जैसे मानवरहित विमानों (यूएवी) से सर्वेक्षण किया जाएगा. उत्तराखंड के ताजा हालात बताते हुए रेड्डी ने प्रभावित गांवों की तादाद और राहत कार्य की नवीनतम स्थिति की जानकारी दी. उन्होंने यह भी बताया कि लोक स्वास्थ्य बनाए रखने के लिए कौन से कदम उठाए जा रहे हैं. रेड्डी ने बताया, ‘राज्य में कुल 22,000 गांवों में से 2,375 गांव प्रभावित हैं. उनमें से 1,636 को अभी तक जोड़ा जा चुका है जबकि 739 को जोड़ा जाना बाकी है.’
डॉक्टरों की टीम तैनातउन्होंने कहा, ‘चिकित्सीय तैयारियों का प्रभार संभाल रही एक टीम स्वास्थ्य मंत्रालय के शीर्ष अधिकारियों के साथ देहरादून में है. न्यूनतम समय में प्रभावित क्षेत्रों में जाने के लिए 50 डाक्टर अभी स्टैंडबाई में हैं. कुछ को अगले 2-3 महीने के लिए रुकना पड़ सकता है क्योंकि हम पुनर्वास देखेंगे.’ रेड्डी ने कहा कि अभी तक कहीं से किसी भी तरह की महामारी फैलने की कोई रिपोर्ट नहीं है. उन्होंने कहा, ‘अभी तक 1,04,095 लोगों को बचाया गया है. लेकिन बद्रीनाथ में अभी 1,400 लोगों को बचाया जाना है.’ रेड्डी ने कहा, ‘तकरीबन 1,000 लोग पिथौरागढ़ में फंसे हैं जो माना जाता है कि मानसरोवर की तरफ जा रहे हैं, लेकिन उनकी स्थिति आपात जैसी नहीं है. हषिर्ल में लोगों को बचाया गया है.’ उन्होंने बताया कि केन्द्रीय गृहमंत्री ने राहत और बचाव अभियान के लिए और हेलीकाप्टरों की सेवा लेने का आदेश दिया है और 105 सैटेलाइट फोन पहले से उपयोग किए जा रहे हैं.
हेलीकॉप्टर दुर्घटना के शिकार लोगों के परिजन के लिए पेंशनरेड्डी ने कहा कि दो दिन पहले हेलीकॉप्टर दुर्घटना में मारे गए लोगों के बारे में उन्होंने केन्द्रीय गृहमंत्री को उनके निकटतम परिजन को भत्तों के साथ विशेष पेंशन देने को कहा है जो नक्सल हमले में मारे गए अर्धसैनिक बलों के जवानों के निकटतम परिजन को मिलने वाली पेंशन जैसी हो. उन्होंने कहा, ‘आपदा में क्षतिग्रस्त हुए 80 प्रतिशत मोबाइल टावर का काम-काज बहाल कर दिया गया है. जहां तक सड़कों का मामला है, सीमा सड़क संगठन को कहा गया है कि जहां सड़क मुमकिन नहीं है वहां खच्चरों का रास्ता बनाया जाए और पैदल-पथ बनाए जाएं ताकि राहत सामग्रियां उस छोर तक ले जाया जाए जहां सड़क मौजूद है.’
विमानों से किया जाएगा सर्वेक्षणउन्होंने बताया कि जिन जगहों पर बचाव अभियान चलाया गया है वहां का ‘नेत्र’ जैसे मानवरहित विमानों (यूएवी) से सर्वेक्षण किया जाएगा. उत्तराखंड के ताजा हालात बताते हुए रेड्डी ने प्रभावित गांवों की तादाद और राहत कार्य की नवीनतम स्थिति की जानकारी दी. उन्होंने यह भी बताया कि लोक स्वास्थ्य बनाए रखने के लिए कौन से कदम उठाए जा रहे हैं. रेड्डी ने बताया, ‘राज्य में कुल 22,000 गांवों में से 2,375 गांव प्रभावित हैं. उनमें से 1,636 को अभी तक जोड़ा जा चुका है जबकि 739 को जोड़ा जाना बाकी है.’
डॉक्टरों की टीम तैनातउन्होंने कहा, ‘चिकित्सीय तैयारियों का प्रभार संभाल रही एक टीम स्वास्थ्य मंत्रालय के शीर्ष अधिकारियों के साथ देहरादून में है. न्यूनतम समय में प्रभावित क्षेत्रों में जाने के लिए 50 डाक्टर अभी स्टैंडबाई में हैं. कुछ को अगले 2-3 महीने के लिए रुकना पड़ सकता है क्योंकि हम पुनर्वास देखेंगे.’ रेड्डी ने कहा कि अभी तक कहीं से किसी भी तरह की महामारी फैलने की कोई रिपोर्ट नहीं है. उन्होंने कहा, ‘अभी तक 1,04,095 लोगों को बचाया गया है. लेकिन बद्रीनाथ में अभी 1,400 लोगों को बचाया जाना है.’ रेड्डी ने कहा, ‘तकरीबन 1,000 लोग पिथौरागढ़ में फंसे हैं जो माना जाता है कि मानसरोवर की तरफ जा रहे हैं, लेकिन उनकी स्थिति आपात जैसी नहीं है. हषिर्ल में लोगों को बचाया गया है.’ उन्होंने बताया कि केन्द्रीय गृहमंत्री ने राहत और बचाव अभियान के लिए और हेलीकाप्टरों की सेवा लेने का आदेश दिया है और 105 सैटेलाइट फोन पहले से उपयोग किए जा रहे हैं.
हेलीकॉप्टर दुर्घटना के शिकार लोगों के परिजन के लिए पेंशनरेड्डी ने कहा कि दो दिन पहले हेलीकॉप्टर दुर्घटना में मारे गए लोगों के बारे में उन्होंने केन्द्रीय गृहमंत्री को उनके निकटतम परिजन को भत्तों के साथ विशेष पेंशन देने को कहा है जो नक्सल हमले में मारे गए अर्धसैनिक बलों के जवानों के निकटतम परिजन को मिलने वाली पेंशन जैसी हो. उन्होंने कहा, ‘आपदा में क्षतिग्रस्त हुए 80 प्रतिशत मोबाइल टावर का काम-काज बहाल कर दिया गया है. जहां तक सड़कों का मामला है, सीमा सड़क संगठन को कहा गया है कि जहां सड़क मुमकिन नहीं है वहां खच्चरों का रास्ता बनाया जाए और पैदल-पथ बनाए जाएं ताकि राहत सामग्रियां उस छोर तक ले जाया जाए जहां सड़क मौजूद है.’
for videos:
no 1 : http://aajtak.intoday.in/video/uttarakhand-floods-death-toll-could-cross-3000-mark-1-734632.html
no 2: http://aajtak.intoday.in/story/2500-dead-bodies-found-between-rambada-and-gaurikund-1-734627.html
from aajtak
जो फर्ज के लिए कुर्बान कर गए अपनी जान
for video:
from aajtak
एक ग़लती ने कर दिया फ़ेसबुक को परेशान और शर्मिंदा
मंगलवार, 25 जून, 2013
फ़ेसबुक के डाटा आर्काइव में आई
एक गड़बड़ी के कारण करीब 60 लाख लोगों की व्यक्तिगत जानकारी सार्वजनिक हो
गई. इस त्रुटि के कारण लोगों के ईमेल और फोन नंबर उन लोगों के साथ शेयर हो
गए जिन्हें उनकी जानकारी नहीं थी.
हालांकि फ़ेसबुक ने कहा है कि अभी तक ऐसा कोई सबूत
नहीं मिला है जिसके आधार पर कहा जा सके कि सार्वजनिक हुई जानकारियों का
गलत इस्तेमाल किया गया है.ईमेल और फोन नंबर
दरअसल, फ़ेसबुक कॉंटेक्ट लिस्ट से लोगों के नाम और उनकी संपर्क जानकारियों का विश्लेषण करता है और उन लोगों को दोस्त बनाने की सलाह देता है जिन्हें यूजर के पहले से जानने की संभावना हो.
इस प्रक्रिया के दौरान फ़ेसबुक ने ईमेल और फोन नंबर जैसी जो जानकारियां इकट्ठा की वह भी कांटेक्ट लिस्ट और एड्रैस बुक में अपडेट हो गईं.
फ़ेसबुक के मुताबिक जब लोगों ने अपने प्रोफाइल की जानकारियां डाउनलोड की तब तक यह संपर्क संबंधित जानकारी भी साथ में आ गई और उन लोगों तक पहुंच गई जिनके साथ वो शेयर नहीं की गईं थी.
इस त्रुटि की जांच के बाद पता चला कि करीब 60 लाख लोगों की जानकारी इस तरह साझा हो गई. हालांकि इसके बाद भी फ़ेसबुक का कहना है कि इसका ज्यादा असर इसलिए नहीं हुआ क्योंकि यह जानकारी उन लोगों तक पहुँची थी जो यूजर को पहले से ही जानते थे.
फ़ेसबुक का कहना है कि अब इस त्रुटि को ठीक कर दिया गया है.
मोटा ईनाम
इस त्रुटि के बारे में जानकारी फ़ेसबुक के 'व्हाइट हैट' कार्यक्रम से जुड़े एक प्रोग्रामर ने दी. यह कार्यक्रम फ़ेसबुक की कोडिंग में गलतियां या त्रुटियां पकड़ने के लिए है. इस त्रुटि को पकड़ने वाले प्रोग्रामर को फ़ेसबुक ने मोटी राशि दी है.इंटरनेट सुरक्षा विश्लेषक ग्राहम क्लूली ने सप्ताहांत से ठीक पहले इस जानकारी को सार्वजनिक करने पर फ़ेसबुक की आलोचना करते हुए कहा कि फ़ेसबुक ने इस जरूरी जानकारी का सभी लोगों तक पहुंचना सुनिश्चित करने के बजाए अपनी छवि बचाने की कोशिश की है.
FROM BBC HINDI
स्नोडेन के मुद्दे पर अमरीका और रूस में तकरार
मंगलवार, 25 जून, 2013
अमरीका ने इस बात पर नाराजगी जताई
है कि चीन और रूस ने अमरीकी खुफिया कॉन्ट्रैक्टर एडवर्ड स्नोडेन को
हांगकांग से मॉस्को तक जाने दिया है.
लोगों की इंटरनेट और फोन गतिविधियों पर नजर रखे जाने के अमरीकी कार्यक्रम की क्लिक करें
जानकारी लीक करने वाले क्लिक करें
स्नोडेन अमरीका प्रत्यर्पण से बचने का प्रयास कर रहे हैं और उन्होंने लातिन अमरीकी देश इक्वाडोर से राजनीतिक शरण मांगी है.
वहीं भारत दौरे पर पहुंचे अमरीकी विदेश मंत्री जॉन कैरी ने दिल्ली में कहा कि अगर रूस और चीन प्रत्यर्पण से बचने की स्नोडेन की कोशिशों में मदद करते हैं तो ये क्लिक करें 'निराशाजनक' होगा.
व्हाइट हाउस ने कहा है कि वो मानता है कि स्नोडेन अब भी रूस में ही हैं. व्हाइट हाउस के प्रवक्ता जे कार्नी के मुताबिक वो इस बात को नहीं मानते कि चीनी क्षेत्र हांगकांग के प्रशासन के पास स्नोडेन को जाने देने के पर्याप्त कारण थे.
अमरीका की चेतावनी
स्नोडेन रविवार को हांगकांग से रूस की राजधानी क्लिक करें मॉस्को पहुंचे थे और उम्मीद की जा रही थी कि वो सोमवार को क्यूबा के लिए रवाना हो जाएंगे.सोमवार को उनके नाम से क्यूबा जाने वाली उड़ान का टिकट बुक कराया गया था, लेकिन लगता है कि मॉस्को से उड़ान भरने वाले विमान में स्नोडेन नहीं थे जबकि रूस का कहना है कि स्नोडेन उसके अधिकार क्षेत्र में नहीं आते हैं क्योंकि वो अब भी विमान में सवार होने के लिए मॉस्को हवाई अड्डे के भीतर मौजूद हैं.
अमरीका ने रूस को चेतावनी दी है कि अगर उसने स्नोडन को नहीं सौंपा तो इससे दोतरफा रिश्ते खराब होंगे.
व्हाइट हाउस का कहना है कि चीनी सरकार ने जानबूछ कर स्नोडेन को जाने दिया जबकि उनकी गिरफ्तारी के लिए वैध वारंट जारी हो चुका था.
अमरीका के अनुसार अमरीका और चीन के रिश्तों पर इसका नकारात्मक असर होगा.
पासपोर्ट रद्द
व्हाइट हाउस का कहना है कि वो उन सभी देशों के संपर्क में है जहां से होकर स्नोडेन यात्रा कर सकते हैं.उधर अमरीकी राजनयिक गोपनीय दस्तावेज लीक करने वाली वेबसाइट विकीलीक्स के संस्थापक जूलियन असांज ने कहा है कि स्नोडेन इक्वाडोर के शरणार्थी यात्रा दस्तावेजों पर सफर कर रहे हैं. अमरीका स्नोडेन का पासपोर्ट रद्द कर चुका है.
इक्वाडोर ने इस बात की पुष्टि की है कि उससे स्नोडेन ने राजनीतिक शरण मांगी है और वो इस बारे में मॉस्को के अधिकारियों के संपर्क में है.
स्नोडेन पर अमरीका में सरकारी संपत्ति को चुराने, राष्ट्रीय रक्षा संबंधी जानकारी को अनाधिकृत रूप से उजागर करने और जानबूझ कर गोपनीय खुफिया जानकारी को लीक करने के आरोप लगे हैं.
FROM BBC HINDI
फेसबुक यूजर्स रहें सावधान, मुफ्त में हो सकते हैं बदनाम
अगर
आप फेसबुक यूजर हैं तो सावधान होने की जरूरत है। 'एन29एन29' एक अश्लील
वीडियो है जिसमें वायरस है। क्लिक करते ही यह आपके दोस्तों और रिश्तेदारों
में आपको बदनाम कर देगा।
दरअसल 'एन29एन29' एक कोड है जिसे किसी अश्लील वीडियो के साथ एंबेड कर फेसबुक फीड पर डाल दिया जाता है। जब आप फेसबुक फीड पर कोई अश्लील वीडियो देखें तो उसे किसी भी तरह क्लिक करने की चूक न करें।
चाहे देखने के लिए या डिलीट करने या शेयर करने के लिए। इसे क्लिक करते ही यह अश्लील वीडियो कई बार आपकी टाइमलाइन पर पोस्ट हो जाएगा।
रोमांस का नया दुश्मन है 'फेसबुक'
इसके तुरंत बाद आपसे फेसबुक पर जुड़े सभी लोगों की टाइमलाइन पर ये वीडियो इस मैसेज के साथ पहुंचेगा कि आपने इसे देखा और आपको बेहद पसंद आया।
ये भी लिखा होगा कि आपने उनकी वॉल पर ये वीडियो पोस्ट किया है।
इस वायरस को सबसे ज्यादा उस वीडियो के साथ भेजा जा रहा है जिसमें एक लड़की खड़ी है और उसके हिप्स की एक झलक दिखाई दे रही है।
फेसबुक पर रच डाली अपने ही रेप की साजिश
इस वीडियो में ये भी लिखा रहता है कि इस लड़की ने शराब के नशे में बीच सड़क पर अपने सारे कपड़े उतार दिए। ये सब देखकर अगर आपने अगर उस वीडियो पर गलती से भी क्लिक कर दिया तो आपको बदनाम होने से कोई नहीं बचा सकता।
हल्द्वानी में भी कई लोग इस वायरस से बदनाम हो चुके हैं।
इससे पहले भी इस तरह के कई वायरस फेसबुक यूजर्स के लिए परेशानी का सबब बन चुके हैं।
जियस वायरस
जियस वायरस (Zeus) भी फेसबुक पर जबरदस्त तरीके से फैला हुआ है। यह वायरस आपके बैंक अकाउंट को खाली कर सकता है।
फेसबुक पर कोई भी ऐसा लिंक जो संदेहास्पद हो, उस पर क्लिक करते ही यह 'जियस' आपके सिस्टम में अपनी जगह बना लेता है। वायरस को जब तक अपने मतलब की जानकारी नहीं मिल जाती तब तक वह इंतजार करता है।
लगाइए # और फेसबुक पर कीजिए ट्रेंड
मान लीजिए अभी तक आपने ना तो इंटरनेट बैंकिंग का इस्तेमाल किया और न ही कहीं लॉगइन डिटेल्स सेव की हैं तो ऐसी स्थिति में यह वायरस सही वक्त का इंतजार करेगा।
यानी कि जब भी आप ऑनलाइन बैंकिंग के लिए अपना लॉगइन आईडी और पासवर्ड डालेंगे, यह वायरस उन्हें चुरा लेगा।
लिंकस्पैम वायरस
फेसबुक पर लिंकस्पैम वायरस (linkspam virus) के चलते भी कई लोगों को अपने अकाउंट तक को बंद करना पड़ा।
जेडडीनेट नामक साइट दावा किया था कि यह वायरस फेसबुक यूजर्स को सीधे तौर से किसी लिंक पर क्लिक करने के लिए उकसाता है।
कई यूजर्स ने दावा किया कि कि उन्होंने साइट पर बेहद ही डरावनी और अश्लील तस्वीरें देखीं। उन्हें ये तस्वीरें यूजर्स की न्यूजफीड्स में दिखाई दी।
दरअसल 'एन29एन29' एक कोड है जिसे किसी अश्लील वीडियो के साथ एंबेड कर फेसबुक फीड पर डाल दिया जाता है। जब आप फेसबुक फीड पर कोई अश्लील वीडियो देखें तो उसे किसी भी तरह क्लिक करने की चूक न करें।
चाहे देखने के लिए या डिलीट करने या शेयर करने के लिए। इसे क्लिक करते ही यह अश्लील वीडियो कई बार आपकी टाइमलाइन पर पोस्ट हो जाएगा।
रोमांस का नया दुश्मन है 'फेसबुक'
इसके तुरंत बाद आपसे फेसबुक पर जुड़े सभी लोगों की टाइमलाइन पर ये वीडियो इस मैसेज के साथ पहुंचेगा कि आपने इसे देखा और आपको बेहद पसंद आया।
ये भी लिखा होगा कि आपने उनकी वॉल पर ये वीडियो पोस्ट किया है।
इस वायरस को सबसे ज्यादा उस वीडियो के साथ भेजा जा रहा है जिसमें एक लड़की खड़ी है और उसके हिप्स की एक झलक दिखाई दे रही है।
फेसबुक पर रच डाली अपने ही रेप की साजिश
इस वीडियो में ये भी लिखा रहता है कि इस लड़की ने शराब के नशे में बीच सड़क पर अपने सारे कपड़े उतार दिए। ये सब देखकर अगर आपने अगर उस वीडियो पर गलती से भी क्लिक कर दिया तो आपको बदनाम होने से कोई नहीं बचा सकता।
हल्द्वानी में भी कई लोग इस वायरस से बदनाम हो चुके हैं।
इससे पहले भी इस तरह के कई वायरस फेसबुक यूजर्स के लिए परेशानी का सबब बन चुके हैं।
जियस वायरस
जियस वायरस (Zeus) भी फेसबुक पर जबरदस्त तरीके से फैला हुआ है। यह वायरस आपके बैंक अकाउंट को खाली कर सकता है।
फेसबुक पर कोई भी ऐसा लिंक जो संदेहास्पद हो, उस पर क्लिक करते ही यह 'जियस' आपके सिस्टम में अपनी जगह बना लेता है। वायरस को जब तक अपने मतलब की जानकारी नहीं मिल जाती तब तक वह इंतजार करता है।
लगाइए # और फेसबुक पर कीजिए ट्रेंड
मान लीजिए अभी तक आपने ना तो इंटरनेट बैंकिंग का इस्तेमाल किया और न ही कहीं लॉगइन डिटेल्स सेव की हैं तो ऐसी स्थिति में यह वायरस सही वक्त का इंतजार करेगा।
यानी कि जब भी आप ऑनलाइन बैंकिंग के लिए अपना लॉगइन आईडी और पासवर्ड डालेंगे, यह वायरस उन्हें चुरा लेगा।
लिंकस्पैम वायरस
फेसबुक पर लिंकस्पैम वायरस (linkspam virus) के चलते भी कई लोगों को अपने अकाउंट तक को बंद करना पड़ा।
जेडडीनेट नामक साइट दावा किया था कि यह वायरस फेसबुक यूजर्स को सीधे तौर से किसी लिंक पर क्लिक करने के लिए उकसाता है।
कई यूजर्स ने दावा किया कि कि उन्होंने साइट पर बेहद ही डरावनी और अश्लील तस्वीरें देखीं। उन्हें ये तस्वीरें यूजर्स की न्यूजफीड्स में दिखाई दी।
from amarujala
सीरिया में 93,000 से ज़्यादा मौतें: संयुक्त राष्ट्र
शुक्रवार, 14 जून, 2013
अमरीका ने सीरियाई सरकार पर आरोप लगाया है कि उसने विपक्षी लड़ाकों के ख़िलाफ़ क्लिक करें
रासायनिक हथियारों का इस्तेमाल किया है.
राष्ट्रपति भवन द्वारा जारी एक बयान में कहा गया
है कि ख़ुफ़िया सूचनाओं के मुताबिक छोटे पैमाने पर किए गए इन रासायनिक
हमलों में तकरीबन डेढ़ सौ लोगों की मौत हुई है.बयान में कहा गया है कि इस बात के कोई सुबूत नहीं हैं कि सीरियाई विपक्ष ने भी ऐसे रासायनिक हमलों का सहारा लिया है.
अमरीकी राष्ट्रपति कार्यालय व्हाइट हाउस के एक अधिकारी का कहना है कि सरकार ने सभी सीमाएं तोड़ दी है और अब राष्ट्रपति ओबामा विद्रोहियों को और ज्यादा सैन्य सहायता प्रदान करेंगे लेकिन स्वरूप निश्चित नहीं है.
उधर राष्ट्रपति बशर अल-असद सरकार ने रासायनिक हथियारों के उपयोग की बात से इनकार किया है.
संयुक्त राष्ट्र रिपोर्ट
इस बीच, संयुक्त राष्ट्र के नवीनतम आंकड़ों के अनुसार क्लिक करें सीरिया में जारी संघर्ष में अब तक कम से कम 93 हज़ार लोग मारे जा चुके हैं.संयुक्त राष्ट्र मानवाधिकार संगठन का कहना है कि पिछली जुलाई से अब तक सीरिया में हर महीने औसतन कम से कम पांच हजार लोगों की मौत हो रही हैं.
हालांकि संयुक्त राष्ट्र का कहना है कि यह आंकड़े भी कहीं कम हैं क्योंकि तमाम मौतों को दर्ज नहीं किया जाता है.
बर्बरता की हद
संयुक्त राष्ट्र मानवाधिकार प्रमुख नवी पिल्लै ने कहा कि कई बार ऐसे मामले भी सामने आए हैं जिसमें बच्चों को प्रताड़ित किया गया और बाद में उन्हें मार दिया गया या फिर पूरे परिवार को बच्चों समेत ही मार दिया गया.उन्होंने कहा कि मृतकों की इतनी अधिक दर यह दर्शाती है कि यह विवाद कितना बर्बर हो चुका है.
इसके अलावा संयुक्त राष्ट्र की एक अन्य रिपोर्ट में कहा गया है कि सीरिया में पिछले दो वर्षों से जारी लड़ाई में अब तक हजारों बच्चे मारे गए हैं.
"कई बार ऐसे मामले भी सामने आए हैं जिसमें बच्चों को प्रताड़ित किया गया और बाद में उन्हें मार दिया गया या फिर पूरे परिवार को बच्चों समेत ही मार दिया गया."
नवी पिल्लै,संयुक्त राष्ट्र मानवाधिकार उच्चायुक्त
रिपोर्ट में बच्चों की मौत की संख्या 'असहनीय' करार देते हुए कहा गया है कि सरकारी बलों और विद्रोही बच्चों को आत्मघाती हमलावर या मानव कवच के तौर पर इस्तेमाल करते हैं.
बाल प्रताड़ना
संयुक्त राष्ट्र प्रतिनिधि ने रिपोर्ट के आंकड़े बताते हुए कहा कि सीरिया में मारे गए बच्चों की संख्या दुनिया भर में सबसे अधिक है.संयुक्त राष्ट्र की विशेष प्रतिनिधि ने न्यूयॉर्क में पत्रकारों से कहा,”बच्चे मारे गए हैं, उन पर अत्याचार होता है, उन्हें बंदी बना कर रखा जाता है, उन्हें लड़ाकुओं में शामिल किया जाता है और उन्हें प्रताड़ित किया जाता है ' .
रिपोर्ट में सीरिया की सेना पर आरोप लगाया गया है कि वे विद्रोही गुटों वाले बच्चों पर हिंसा करता है जबकि विपक्ष बच्चों को लड़ाई के साथ सामान पहुंचाने के लिए भी इस्तेमाल करता है.
संयुक्त राष्ट्र मानवाधिकार संगठन की रिपोर्ट के अनुसार मृतकों की सबसे अधिक संख्या ग्रामीण दमिश्क, हमस और हलब क्षेत्रों में हुई हैं.
संगठन ने तत्काल संघर्ष विराम की अपील की है, ताकि अब और जानें न जाएं.
नवी पिल्लै का कहना था कि शक्तिशाली व प्रभावशाली देश मिलकर इस विवाद को समाप्त करने के लिए बहुत कुछ कर सकते हैं और अनगिनत जानें बचाई जा सकती हैं.
from bbc
After NSA PRISM : New Facebook privacy settings for Update Staus
***
Please Comment what is your choice and guide me for new update status in face book...
Actually i am so confuse about it...
Please send me right one choice...
***
I am waiting for your right suggestion.
Oh!!! My God rely great human right are in USA-America!!!
They are destroying great thoughts of Abraham linkan about human rights and America.
Hey Americans what are you doing?
Is you have not any will power for objection it?
Are you know now what is your future?
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
India angry at U.S. cyber spying
New Delhi.
By the U.S. to spy worldwide reports of Internet data is moved to India. She puzzled over this issue - is disturbing that despite being allies of the U.S. Intelligence Monitoring Network is the Computer. Foreign Ministry says it is surprised and concerned by reports of cyber espionage. We will call for returns from the U.S.. This issue will be raised at both national security adviser.
Both countries including national security adviser. Akbaruddin says, 'cyber espionage national security adviser level meeting of the two countries in this case arise. It will be about an explanation from the U.S.. "According
to the Washington Post, the U.S. National Security Agency since 2007
emails and other information from around the world computer network
intelligence is spying. Boundles Infarmet active surveillance system for the data.
The British newspaper The Guardian says that the U.S. 'Boundles Infarmet' in March this year by 97 billion worldwide computer network information is collected. Information gathered from his arch enemy Iran to the United States there are approximately 14 billion had been collected information.
The second nearly 13.5 billion from Pakistan's information was collected. In the case of India in fifth place. India has raised nearly 6.3 billion Infarmet information.
In Hindi
अमेरिकी साइबर जासूसी पर भड़का भारत
नई दिल्ली। दुनिया भर के इंटरनेट डाटा की अमेरिका द्वारा जासूसी करने की खबरों से भारत भड़का हुआ है। वह इस बात को लेकर हैरान-परेशान है कि मित्र देश होने के बावजूद अमेरिका उसके कंप्यूटर नेटवर्क की भी खुफिया निगरानी करा रहा है। विदेश मंत्रलय का कहना है कि साइबर जासूसी की खबरों से चिंतित और आश्चर्यचकित हैं। हम अमेरिका से जवाब तलब करेंगे। यह मसला दोनों के राष्ट्रीय सुरक्षा सलाहकार स्तर पर उठेगा।
विदेश मंत्रलय के प्रवक्ता सैयद अकबरूद्दीन ने मंगलवार को स्पष्ट तौर पर चेताया कि अगर अमेरिकी साइबर निगरानी के चलते भारतीय निजता कानूनों का उल्लंघन होते पाया गया तो यह स्थिति हमें अस्वीकार्य होगी। पत्रकारों के सवालों का जवाब देते हुए उन्होंने बताया कि भारत और अमेरिका के बीच साइबर सुरक्षा को लेकर बातचीत चल रही है। दोनों देशों के राष्ट्रीय सुरक्षा सलाहकार इसमें शामिल हैं। बकौल अकबरूद्दीन, 'साइबर जासूसी का यह प्रकरण दोनों देशों के राष्ट्रीय सुरक्षा सलाहकार स्तरीय बैठक में उठेगा। अमेरिका से उसमें इस बारे में जवाब तलब किया जाएगा।' अमेरिका द्वारा विश्व भर के इंटरनेट डाटा की निगरानी किए जाने संबंधी खबरों के अमेरिकी और ब्रिटिश मीडिया में आने के बाद विदेश मंत्रलय ने यह प्रतिक्रिया व्यक्त की है।
वाशिंगटन पोस्ट के अनुसार अमेरिकी राष्ट्रीय सुरक्षा एजेंसी 2007 से ही दुनिया भर के कंप्यूटर नेटवर्क से ईमेल और अन्य सूचनाओं की खुफिया जासूसी कर रही है। इसके लिए उसका डाटा निगरानी तंत्र बाउंडलेस इंफार्मेट सक्रिय है। जबकि ब्रिटिश अखबार गार्जियन का कहना है कि अमेरिका ने 'बाउंडलेस इंफार्मेट' के जरिये इस वर्ष मार्च में विश्व भर के कंप्यूटर नेटवर्क से 97 अरब सूचनाएं एकत्रित की है। अमेरिका ने सबसे अधिक सूचना अपने कट्टर दुश्मन ईरान से जुटाई वहां से लगभग 14 अरब सूचनाएं जुटाई गई हैं।
इसके बाद दूसरे नंबर पर रहे पाकिस्तान से करीब 13.5 अरब जानकारी एकत्रित की गई हैं। इस मामले में भारत पांचवें स्थान पर रहा। इंफार्मेट ने भारत से करीब 6.3 अरब सूचनाएं जुटाई हैं।
Data Source Provided From : From dainik jagran
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
US spy leaker Edward Snowden 'missing' in Hong Kong
An
ex-CIA employee who leaked details of US top-secret phone and internet
surveillance has disappeared from his hotel in Hong Kong.
Edward Snowden, 29, checked out from his hotel on Monday. His
whereabouts are unknown, but he is believed to be still in Hong Kong.Earlier, he said he had an "obligation to help free people from oppression".
It emerged last week that US agencies were gathering millions of phone records and monitoring internet data.
A spokesman for the US Office of the Director of National Intelligence said the case had been referred to the Department of Justice as a criminal matter.
Continue reading the main story
“Start Quote
I do not want to live in a world where everything I do and say is recorded”
Meanwhile a petition posted on the White House website, calling for Mr Snowden's immediate pardon, has gathered more than 30,000 signatures.
However an opinion poll commissioned by the Washington Post
suggests a majority of Americans think government monitoring of phone
records is acceptable if the aim is to fight terrorism. Transatlantic fallout Hong Kong's broadcaster RTHK said Mr Snowden checked out of the Mira hotel on Monday.
Reuters news agency quoted hotel staff as saying that he had left at noon.
Ewen MacAskill, a Guardian journalist, told the BBC he believed Mr Snowden was still in Hong Kong.
The Chinese territory has an extradition treaty with the US, although analysts say any attempts to bring Mr Snowden to America may take months and could be blocked by Beijing.
Continue reading the main story
An editorial in the Chicago Tribune argues that "some new restrictions" in the US intelligence gathering programme may be in order, adding: "If the government is looking for, say, calls between the United States and terrorists in Pakistan or Yemen, why can't it simply demand records of calls to certain foreign countries. Is there no way to narrow the search to leave most Americans out of it?"
Robert O'Harrow in the Washington Post writes that the growing reliance on contractors in US intelligence gathering "reflects a massive shift toward outsourcing over the past 15 years, in part because of cutbacks in the government agencies". He argues that this "has dramatically increased the risk of waste and contracting abuses... but given the threat of terrorism and the national security mandates from Congress, the intelligence community had little choice".
US media response
A USA Today editorial accepts that "the primary result of Snowden's actions is a plus. He has forced a public debate on the sweepingly invasive programs that should have taken place before they were created". But, it goes on, "pure motives and laudable effects don't alter the fact that he broke the law".An editorial in the Chicago Tribune argues that "some new restrictions" in the US intelligence gathering programme may be in order, adding: "If the government is looking for, say, calls between the United States and terrorists in Pakistan or Yemen, why can't it simply demand records of calls to certain foreign countries. Is there no way to narrow the search to leave most Americans out of it?"
Robert O'Harrow in the Washington Post writes that the growing reliance on contractors in US intelligence gathering "reflects a massive shift toward outsourcing over the past 15 years, in part because of cutbacks in the government agencies". He argues that this "has dramatically increased the risk of waste and contracting abuses... but given the threat of terrorism and the national security mandates from Congress, the intelligence community had little choice".
Mr Snowden was revealed as the source of the leaks at his own request by the UK's Guardian newspaper.
He is believed to have arrived in Hong Kong on 20 May. A
standard visa on arrival in the territory for a US citizen lasts for 90
days.His revelations have caused transatlantic political fallout, amid allegations that the UK's electronic surveillance agency, GCHQ, used the US system to snoop on British citizens.
Foreign Secretary William Hague cancelled a trip to Washington to address the UK parliament on Monday and deny the claims.
Mr Snowden is described by the Guardian as an ex-CIA technical assistant, currently employed by Booz Allen Hamilton, a defence contractor for the US National Security Agency (NSA).
He told the newspaper: "The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting.
"I don't want to live in a society that does these sort of things. I do not want to live in a world where everything I do and say is recorded."
Mr Snowden said he did not believe he had committed a crime: "We have seen enough criminality on the part of government. It is hypocritical to make this allegation against me."
'Core values' In a statement, Booz Allen Hamilton confirmed Mr Snowden had been an employee for less than three months.
"If accurate, this action represents a grave violation of the code of conduct and core values of our firm," the statement said.
At a daily press briefing on Monday, White House press secretary Jay Carney said he could not comment on the Snowden case, citing an ongoing investigation.
The first of the leaks came out on Wednesday night, when the Guardian reported a US secret court ordered phone company Verizon to hand over to the NSA millions of records on telephone call "metadata".
Continue reading the main story
Major US security leaks
- Pentagon papers, 1971: Daniel Ellsberg leaks study showing the government had knowledge it was unlikely to win Vietnam war
- Watergate, 1972: Bob Woodward and Carl Bernstein reveal extent of cover-up over burglary at Democrat National Committee HQ
- Iran-Contra affair, 1986: Iranian cleric reveals illegal US arms sales to Iran, the proceeds of which are later used to fund Nicaraguan Contras
- Valerie Plame, 2003: Ms Plame is revealed to be an undercover CIA agent, ending her covert career
- Abu Ghraib, 2004: Publication of pictures showing abuse of detainees at Iraq prison by US officials turns initial media reports of abuse into full-blown scandal
- Bradley Manning, 2010: The soldier downloads thousands of classified documents from military servers and hands them over to Wikileaks
The metadata include the numbers
of both phones on a call, its duration, time, date and location (for
mobiles, determined by which mobile signal towers relayed the call or
text).
On Thursday, the Washington Post and Guardian said the NSA
tapped directly into the servers of nine internet firms including
Facebook, Google, Microsoft and Yahoo to track online communication in a
programme known as Prism.All the internet companies deny giving the US government access to their servers.
Prism is said to give the NSA and FBI access to emails, web chats and other communications directly from the servers of major US internet companies.
The data is used to track foreign nationals suspected of terrorism or spying. The NSA is also collecting the telephone records of American customers, but said it is not recording the content of their calls.
US director of national intelligence James Clapper's office said information gathered under Prism was obtained with the approval of the secret Foreign Intelligence Surveillance Act Court (Fisa).
Prism was authorised under changes to US surveillance laws passed under President George W Bush, and renewed last year under Barack Obama.
Mr Obama has defended the surveillance programmes, assuring Americans that nobody was listening to their calls.
Related Stories
In Hindi:
______
होटल से गायब हुए एडवर्ड स्नोडेन
मंगलवार, 11 जून, 2013 को 08:34 IST तक के समाचार
अमरीका में टेलीफ़ोन और इंटरनेट पर निगरानी रखे जाने के कार्यक्रम की जानकारी एक ब्रितानी अख़बार को देने वाले क्लिक करें
एडवर्ड स्नोडेन हॉन्ग कॉन्ग के अपने होटल से गायब हो गए हैं.
अमरीकी खु़फ़िया एजेंसी सीआईए के पूर्व तकनीकी सहायक क्लिक करें
स्नोडेन ने मंगलवार को होटल से चेक आउट किया. वहाँ से वह कहाँ
गए, यह अभी पता नहीं चल पाया है लेकिन माना जा रहा है कि वे हॉन्ग कॉन्ग
में ही कहीं हैं.
ब्रितानी अखबार गार्डियन ने पिछले हफ़्ते एक खबर प्रकाशित की थी कि अमेरिकी सुरक्षा एजेंसियां लाखों लोगों के टेलीफ़ोन काल्स के रिकॉर्ड और इंटरनेट डाटा एकत्र कर रही हैं.
आपराधिक मामला
अमरीका के राष्ट्रीय क्लिक करें खुफिया निदेशक के कार्यालय के एक प्रवक्ता ने कहा कि इस मामले को एक आपराधिक मामले के रूप में न्याय विभाग को भेज दिया गया है."मुझे विश्वास है कि एडवर्ड स्नोडेन अभी भी हांग कांग में ही हैं"
इवन मैक्सकिल, गार्डियन के पत्रकार
क्लिक करें ब्रितानी अख़बार गार्डियन ने एडवर्ड स्नोडेन की ख़बर के स्रोत के रूप में पहचान उन्हीं के अनुरोध पर ज़ाहिर की थी.
हॉन्ग कॉन्ग के रेडियो और टीवी चैनल आरटीएचके ने ख़बर दी है कि स्नोडेन सोमवार को होटल मीरा से चेक आउट कर गए हैं.
समाचार एजेंसी रॉयटर्स ने होटल के कर्मचारियों के हवाले से ख़बर दी है कि स्नोडेन दोपहर में होटल से गए.
गार्डियन के पत्रकार इवन मैक्सकिल ने बीबीसी से बातचीत में विश्वास जताया कि स्नोडेन अब भी हॉन्ग कॉन्ग में ही हैं.
प्रत्यर्पण की संभावना
माना जा रहा है कि एडवर्ड स्नोडेन 20 मई को हॉन्ग कॉन्ग पहुंचे थे. वहाँ अमरीकी नागरिकों को आने पर वीजा दिया जाता है, जो तीन महीने के लिए वैध होता है.
स्नोडेन की ओर से दी गई जानकारी से अटलांटिक पार की राजनीति में विवाद पैदा हो गया था. इसमें आरोप लगाया गया था कि ब्रितानी इलेक्ट्रॉनिक एजेंसी जीसीएचक्यू ने ब्रितानी नागरिकों पर नजर रखने के लिए अमरीकी तंत्र का उपयोग किया.
इस विवाद की वजह से ब्रितानी विदेश मंत्री विलियम हेग ने अपनी अमरीकी यात्रा स्थगित कर संसद में सोमवार को बयान दिया और आरोपों से इनकार किया.
गार्डियन अख़बार के मुताबिक़ 29 वर्षीय एडवर्ड स्नोडेन सीआईए के पूर्व तकनीकी सहायक हैं. अभी वे अमरीका के राष्ट्रीय सुरक्षा विभाग (एनएसए) के लिए काम करने वाले ठेकेदार बूज़ एलेन हैमिल्टन के कर्मचारी हैं.
संबंधित समाचार
अमरीका: ख़बर लीक करने वाले की पहचान ज़ाहिर
10.06.13
,
Data Source Provided From : From bbc hindi ,uk
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
हांगकांग में छिपा सीआईए की पोल खोल कर मोस्ट वांटेड बना एडवर्ड
फेसबुक और गूगल के जरिए दुनिया के लोगों के बारे में जासूसी करने वाली
अमेरिकी खुफिया एजेंसी (सीआईए) के इस कारनामे का खुलासा करने वाले शख्स ने
अपनी पहचान सार्वजनिक कर दी
है। यह शख्स कोई और नहीं बल्कि सीआईए के पूर्व कर्मचारी और इस समय एनएसए
के लिए काम करने वाली एक कंपनी के टेक्नीशियन एडवर्ड स्नोवेडेन हैं। वह
इस वक्त हांगकांग में हैं। इस खुलासे के बाद 29 साल का यह शख्स अमेरिका
का मोस्ट वांटेड बन गया है। उन्होंने कहा है कि वह उस दुनिया में रहना
नहीं चाहते जहां आप जो कुछ करते हैं उसे रिकार्ड किया जाता हो और इसी कारण
उन्होंने दुनिया की एक सबसे खतरनाक खुफिया एजेंसी के खिलाफ मुंह खोला है।
उन्होंने बताया है कि सीआईए प्रिज्म नाम के एक प्रोग्राम के जरिए दुनिया
के लोगों की निजी सूचनाएं इकट्ठा करती है। हर साल 130,000 डॉलर की कमाई
करने वाले एडवर्ड का कहना है कि वे एक ऐसी दुनिया में नहीं रहना चाहते हैं
जहां हम जो कुछ भी करते और कहते हैं उन्हें रिकार्ड किया जाता है।
प्रिज्म सिस्टम के जरिए सीआईए दुनिया की इंटरनेट सेवा प्रदान करने वाली
नौ प्रमुख कंपनियों के डाटा तक पहुंच बनाती है।
एडवर्ड की पैरवी करने वाले वकील मार्क जैद का कहना है कि हांगकांग से उनका
प्रत्यर्पण करवाया जाता है तो उन्हें दशकों की सजा हो सकती है। वहीं,
हाउस इंटेलिजेंस कमिटी के सदस्य और सीनेटर पीटर किंग का कहना है कि एडवर्ड
का तुरंत हांगकांग से प्रत्यर्पण करवाया जाना चाहिए और कड़ी से कड़ी सजा
दिलाई जानी चाहिए।
हाई स्कूल ड्रॉप आउट एडवर्ड ने सीआईए के लिए कंप्यूटर सिक्योरिटी विभाग
में टेक्निकल असिस्टेंट के रूप में काम करने के बाद एक डिफेंस
कॉन्ट्रैक्टर बूज एलेन हैमिल्टन के कर्मचारी के रूप में एनएसए के लिए
चार साल तक काम किया। उनका काम लोगों के बारे निजी जानकारियां इकट्ठा करने
का था। इस बारे में उन्होंने अपने वरिष्ठ साथियों को बताया लेकिन
उन्होंने इसपर कोई ध्यान नहीं दिया। उनका कहना है कि उन्होंने जो किया
है, उसकी वजह से उन्हें छिपने की जरूरत नहीं है। उन्हें पता है कि
उन्होंने जो कुछ भी किया है, वह ठीक है।
एडवर्ड का कहना है कि उनके पास किसी चीज की कमी नहीं थी। उनकी सैलरी अच्छी
थी, उनकी एक गर्लफ्रेंड है और हवाई में घर और परिवार है। उनका कहना है,
'मैं इन सभी चीजों को इसलिए छोड़ देने की इच्छा रखता हूं क्योंकि मेरी
आत्मा अमेरिकी सरकार को लोगों के बारे में निजी जानकारियां चुराने का हक
देना चाहती है।'
Data Source Provided From : From Denik Bhaskar
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
आडवाणी ने भाजपा के पद छोड़े, पार्टी में संकट
सोमवार, 10 जून, 2013 को 16:49 IST तक के समाचार
भारतीय जनता पार्टी के वरिष्ठ नेता लाल कृष्ण आडवाणी ने पार्टी के महत्वपूर्ण पदों से इस्तीफ़ा दे दिया है.
पार्टी अध्यक्ष राजनाथ सिंह को भेजे एक पत्र में
आडवाणी ने कहा है, ‘‘ मैंने फैसला किया है कि मैं पार्टी की राष्ट्रीय
कार्यकारिणी, संसदीय बोर्ड और चुनाव समिति से इस्तीफ़ा दे दूं और इस पत्र
को मेरा इस्तीफ़ा माना जाए.’’गुजरात के मुख्यमंत्री क्लिक करें नरेंद्र मोदी को चुनाव समिति का प्रमुख बनाए जाने से आडवाणी नाराज़ बताए जा रहे थे और वो पार्टी की गोवा में हुई कार्यकारिणी की बैठक में भी शामिल नहीं हुए थे.
"कुछ समय से जिस दिशा में पार्टी जा रही है उससे और पार्टी की वर्तमान कार्यशैली के साथ तालमेल बिठाने में मैं कठिनाई महसूस कर रहा हूं. अब मुझे नहीं लगता कि ये वो ही पार्टी है जो आदर्शवादी पार्टी डॉ मुखर्जी, पंडित दीनदयालजी, नानाजी और वाजपेयीजी ने बनाई थी. जिसका मुख्य उद्देश्य देश और उसके लोग थे. अब हमारे नेताओं का मुख्य उद्देश्य अपने निजी एजेंडा हैं."
लालकृष्ण आडवाणी
क्लिक करें आडवाणी को मनाने की कोशिश
अपने पत्र में आडवाणी लिखते हैं, ‘‘ कुछ समय से जिस दिशा में पार्टी जा रही है उससे और पार्टी की वर्तमान कार्यशैली के साथ तालमेल बिठाने में मैं कठिनाई महसूस कर रहा हूं. अब मुझे नहीं लगता कि ये वो ही पार्टी है जो आदर्शवादी पार्टी डॉ मुखर्जी, पंडित दीनदयालजी, नानाजी और वाजपेयीजी ने बनाई थी. जिसका मुख्य उद्देश्य देश और उसके लोग थे. अब हमारे नेताओं का मुख्य उद्देश्य अपने निजी एजेंडा हैं.’’
'पत्र को इस्तीफ़ा माना जाए'
आडवाणी ने इसी पत्र में लिखा है कि उनके पत्र को ही इस्तीफा माना जाए.अभी एक दिन पहले ही गोवा में रविवार को गुजरात के मुख्यमंत्री नरेंद्र मोदी को 2014 के चुनाव के लिए चुनाव प्रचार समिति का अध्यक्ष बनाया गया है. बताया गया था कि आडवाणी बीमार हैं और इसलिए कार्यकारिणी में नहीं आ सकते.
1980 में भाजपा के गठन के बाद ये पहला मौक़ा था जब आडवाणी पार्टी की राष्ट्रीय कार्यकारिणी की बैठक में शामिल नहीं हुए.
हालांकि गोवा में नया रोल मिलने के बाद मोदी ने ट्विट किया था, "मैने आडवाणी जी से फोन पर बात की. उन्होंने मुझे अपना आशीर्वाद दिया. उनका आशीर्वाद पाकर मैं सम्मानित महसूस कर रहा हूँ."
आडवाणी के अलावा पूर्व विदेश मंत्री जसवंत सिंह और उमा भारती भी गोवा में शामिल नहीं हुए थे.
राजनाथ के घर बैठक, आडवाणी संकट पर चर्चा
सोमवार, 10 जून, 2013 को 17:19 IST तक के समाचार
भारतीय जनता पार्टी के अध्यक्ष
राजनाथ सिंह ने जहां लाल कृष्ण आडवाणी के इस्तीफे को स्वीकार करने से इंकार
कर दिया है वहीं पार्टी के अन्य नेताओं ने आडवाणी को इस्तीफा वापस लेने के
लिए मना लेने की बात कही है.क्लिक करें
भारतीय जनता पार्टी के वरिष्ठ नेता क्लिक करें
लाल कृष्ण आडवाणी ने पार्टी के महत्वपूर्ण पदों से सोमवार को इस्तीफ़ा दे दिया है.
इस मुद्दे को लेकर भाजपा अध्यक्ष राजनाथ सिंह के घर में पार्टी नेताओं की बैठक हुई जिसमें अरुण जेटली और वैंकेया नायडू ने हिस्सा लिया.बैठके के बाद वैंकेया नायडू ने कहा है कि आडवाणी को मनाने की कोशिश की जाएगी.
सुषमा स्वराज, नेता विपक्ष
सुषमा स्वराज ने पत्रकारों से कहा, "आडवाणी जी से मेरी फ़ोन पर बात हुई है और मैंने उनसे कहा कि मैं आपसे मिलने आ रही हूं, मुझे विश्वास है कि हम उन्हें मना लेंगे. दुर्भाग्यपूर्ण है कि उन जैसे शीर्ष नेता को ऐसा करना पड़ा, हम उन्हें मना लेंगे."क्लिक करेंक्लिक करें (पूरी रिपोर्ट: आडवाणी ने भाजपा के पद छोड़े, पार्टी में संकट)
राम माधव, आरएसएस
राम माधव ने ट्विटर पर कहा, "आडवाणी का इस्तीफ़ा दुर्भाग्यपूर्ण है और उम्मीद है कि पार्टी उन्हें इस्तीफ़ा वापस लेने के लिए मना लेगी."राजनाथ सिंह, बीजेपी अध्यक्ष
राजनाथ सिंह ने ट्विटर पर लिखा, "मैंने श्री आडवाणीजी का इस्तीफा स्वीकार नहीं किया है."कांग्रेस की प्रतिक्रिया
पीटीआई के मुताबिक कांग्रेस ने आडवाणी के इस्तीफ़े पर अपनी पहली प्रतिक्रिया देते हुए कहा, "आडवाणी का इस्तीफ़ा नरेंद्र मोदी की पदोन्नति का पहला परिणाम है."महेश तवासे, एनसीपी
पीटीआई के अनुसार कांग्रेस के साथी दल एनसीपी के प्रवक्ता महेश तपासे ने लालकृष्ण आडवाणी के इस्तीफ़े पर चुटकी लेते हुए कहा कि 'बीजेपी पार्टी विथ ए डिफ्रेंस है और आडवाणी के इस्तीफ़े से ये साबित भी होता है.'उन्होंने कहा, "बीजेपी नमो-निया से पीड़ित है और एनडीए का भविष्य तय हो चुका है. यूपीए 2014 के लोकसभा चुनाव में विजयी होकर वापस आएगी."
शरद यादव, जेडीयू
शरद यादव ने पीटीआई को दिए अपनी प्रतिक्रिया में कहा कि लालकृष्ण आडवाणी का इस्तीफ़ा चौकाने वाला है. उन्होंने कहा कि वो और लोगों से मिलकर इस मामले पर चर्चा करेंगे.सुखबीर सिंह बादल, पंजाब के मुख्यमंत्री और अकाली दल के नेता
सुखबीर सिंह बादल ने पत्रकारों से कहा, "ये बीजेपी का आअंदरूनी मामला है, हम बीजेपी के साथ है, जो फैसला बीजेपी करेगी उसे मानेंगे."Data Source Provided From : From bbc hindi
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
Edward Snowden: the whistleblower behind the NSA surveillance revelations
The
29-year-old source behind the biggest intelligence leak in the NSA's
history explains his motives, his uncertain future and why he never
intended on hiding in the shadows
• Q&A with NSA whistleblower Edward Snowden: 'I do not expect to see home again'
• Q&A with NSA whistleblower Edward Snowden: 'I do not expect to see home again'
Edward Snowden, a 29-year-old former technical assistant for the CIA
and current employee of the defence contractor Booz Allen Hamilton.
Snowden has been working at the National Security Agency for the last
four years as an employee of various outside contractors, including Booz
Allen and Dell.
The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. "I have no intention of hiding who I am because I know I have done nothing wrong," he said.
Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the world's most secretive organisations – the NSA.
In a note accompanying the first set of documents he provided, he wrote: "I understand that I will be made to suffer for my actions," but "I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant."
Despite his determination to be publicly unveiled, he repeatedly insisted that he wants to avoid the media spotlight. "I don't want public attention because I don't want the story to be about me. I want it to be about what the US government is doing."
He does not fear the consequences of going public, he said, only that doing so will distract attention from the issues raised by his disclosures. "I know the media likes to personalise political debates, and I know the government will demonise me."
Despite these fears, he remained hopeful his outing will not divert attention from the substance of his disclosures. "I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in." He added: "My sole motive is to inform the public as to that which is done in their name and that which is done against them."
He has had "a very comfortable life" that included a salary of roughly $200,000, a girlfriend with whom he shared a home in Hawaii, a stable career, and a family he loves. "I'm willing to sacrifice all of that because I can't in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building."
He then advised his NSA supervisor that he needed to be away from work for "a couple of weeks" in order to receive treatment for epilepsy, a condition he learned he suffers from after a series of seizures last year.
As he packed his bags, he told his girlfriend that he had to be away for a few weeks, though he said he was vague about the reason. "That is not an uncommon occurrence for someone who has spent the last decade working in the intelligence world."
On May 20, he boarded a flight to Hong Kong, where he has remained ever since. He chose the city because "they have a spirited commitment to free speech and the right of political dissent", and because he believed that it was one of the few places in the world that both could and would resist the dictates of the US government.
In the three weeks since he arrived, he has been ensconced in a hotel room. "I've left the room maybe a total of three times during my entire stay," he said. It is a plush hotel and, what with eating meals in his room too, he has run up big bills.
He is deeply worried about being spied on. He lines the door of his hotel room with pillows to prevent eavesdropping. He puts a large red hood over his head and laptop when entering his passwords to prevent any hidden cameras from detecting them.
Though that may sound like paranoia to some, Snowden has good reason for such fears. He worked in the US intelligence world for almost a decade. He knows that the biggest and most secretive surveillance organisation in America, the NSA, along with the most powerful government on the planet, is looking for him.
Since the disclosures began to emerge, he has watched television and monitored the internet, hearing all the threats and vows of prosecution emanating from Washington.
And he knows only too well the sophisticated technology available to them and how easy it will be for them to find him. The NSA police and other law enforcement officers have twice visited his home in Hawaii and already contacted his girlfriend, though he believes that may have been prompted by his absence from work, and not because of suspicions of any connection to the leaks.
"All my options are bad," he said. The US could begin extradition proceedings against him, a potentially problematic, lengthy and unpredictable course for Washington. Or the Chinese government might whisk him away for questioning, viewing him as a useful source of information. Or he might end up being grabbed and bundled into a plane bound for US territory.
"Yes, I could be rendered by the CIA. I could have people come after me. Or any of the third-party partners. They work closely with a number of other nations. Or they could pay off the Triads. Any of their agents or assets," he said.
"We have got a CIA station just up the road – the consulate here in Hong Kong – and I am sure they are going to be busy for the next week. And that is a concern I will live with for the rest of my life, however long that happens to be."
Having watched the Obama administration prosecute whistleblowers at a historically unprecedented rate, he fully expects the US government to attempt to use all its weight to punish him. "I am not afraid," he said calmly, "because this is the choice I've made."
He predicts the government will launch an investigation and "say I have broken the Espionage Act and helped our enemies, but that can be used against anyone who points out how massive and invasive the system has become".
The only time he became emotional during the many hours of interviews was when he pondered the impact his choices would have on his family, many of whom work for the US government. "The only thing I fear is the harmful effects on my family, who I won't be able to help any more. That's what keeps me up at night," he said, his eyes welling up with tears.
By his own admission, he was not a stellar student. In order to get the credits necessary to obtain a high school diploma, he attended a community college in Maryland, studying computing, but never completed the coursework. (He later obtained his GED.)
In 2003, he enlisted in the US army and began a training program to join the Special Forces. Invoking the same principles that he now cites to justify his leaks, he said: "I wanted to fight in the Iraq war because I felt like I had an obligation as a human being to help free people from oppression".
He recounted how his beliefs about the war's purpose were quickly dispelled. "Most of the people training us seemed pumped up about killing Arabs, not helping anyone," he said. After he broke both his legs in a training accident, he was discharged.
After that, he got his first job in an NSA facility, working as a security guard for one of the agency's covert facilities at the University of Maryland. From there, he went to the CIA, where he worked on IT security. His understanding of the internet and his talent for computer programming enabled him to rise fairly quickly for someone who lacked even a high school diploma.
By 2007, the CIA stationed him with diplomatic cover in Geneva, Switzerland. His responsibility for maintaining computer network security meant he had clearance to access a wide array of classified documents.
That access, along with the almost three years he spent around CIA officers, led him to begin seriously questioning the rightness of what he saw.
He described as formative an incident in which he claimed CIA operatives were attempting to recruit a Swiss banker to obtain secret banking information. Snowden said they achieved this by purposely getting the banker drunk and encouraging him to drive home in his car. When the banker was arrested for drunk driving, the undercover agent seeking to befriend him offered to help, and a bond was formed that led to successful recruitment.
"Much of what I saw in Geneva really disillusioned me about how my government functions and what its impact is in the world," he says. "I realised that I was part of something that was doing far more harm than good."
He said it was during his CIA stint in Geneva that he thought for the first time about exposing government secrets. But, at the time, he chose not to for two reasons.
First, he said: "Most of the secrets the CIA has are about people, not machines and systems, so I didn't feel comfortable with disclosures that I thought could endanger anyone". Secondly, the election of Barack Obama in 2008 gave him hope that there would be real reforms, rendering disclosures unnecessary.
He left the CIA in 2009 in order to take his first job working for a private contractor that assigned him to a functioning NSA facility, stationed on a military base in Japan. It was then, he said, that he "watched as Obama advanced the very policies that I thought would be reined in", and as a result, "I got hardened."
The primary lesson from this experience was that "you can't wait around for someone else to act. I had been looking for leaders, but I realised that leadership is about being the first to act."
Over the next three years, he learned just how all-consuming the NSA's surveillance activities were, claiming "they are intent on making every conversation and every form of behaviour in the world known to them".
He described how he once viewed the internet as "the most important invention in all of human history". As an adolescent, he spent days at a time "speaking to people with all sorts of views that I would never have encountered on my own".
But he believed that the value of the internet, along with basic privacy, is being rapidly destroyed by ubiquitous surveillance. "I don't see myself as a hero," he said, "because what I'm doing is self-interested: I don't want to live in a world where there's no privacy and therefore no room for intellectual exploration and creativity."
Once he reached the conclusion that the NSA's surveillance net would soon be irrevocable, he said it was just a matter of time before he chose to act. "What they're doing" poses "an existential threat to democracy", he said.
For him, it is a matter of principle. "The government has granted itself power it is not entitled to. There is no public oversight. The result is people like myself have the latitude to go further than they are allowed to," he said.
His allegiance to internet freedom is reflected in the stickers on his laptop: "I support Online Rights: Electronic Frontier Foundation," reads one. Another hails the online organisation offering anonymity, the Tor Project.
Asked by reporters to establish his authenticity to ensure he is not some fantasist, he laid bare, without hesitation, his personal details, from his social security number to his CIA ID and his expired diplomatic passport. There is no shiftiness. Ask him about anything in his personal life and he will answer.
He is quiet, smart, easy-going and self-effacing. A master on computers, he seemed happiest when talking about the technical side of surveillance, at a level of detail comprehensible probably only to fellow communication specialists. But he showed intense passion when talking about the value of privacy and how he felt it was being steadily eroded by the behaviour of the intelligence services.
His manner was calm and relaxed but he has been understandably twitchy since he went into hiding, waiting for the knock on the hotel door. A fire alarm goes off. "That has not happened before," he said, betraying anxiety wondering if was real, a test or a CIA ploy to get him out onto the street.
Strewn about the side of his bed are his suitcase, a plate with the remains of room-service breakfast, and a copy of Angler, the biography of former vice-president Dick Cheney.
Ever since last week's news stories began to appear in the Guardian, Snowden has vigilantly watched TV and read the internet to see the effects of his choices. He seemed satisfied that the debate he longed to provoke was finally taking place.
He lay, propped up against pillows, watching CNN's Wolf Blitzer ask a discussion panel about government intrusion if they had any idea who the leaker was. From 8,000 miles away, the leaker looked on impassively, not even indulging in a wry smile.
Snowden said that he admires both Ellsberg and Manning, but argues that there is one important distinction between himself and the army private, whose trial coincidentally began the week Snowden's leaks began to make news.
"I carefully evaluated every single document I disclosed to ensure that each was legitimately in the public interest," he said. "There are all sorts of documents that would have made a big impact that I didn't turn over, because harming people isn't my goal. Transparency is."
He purposely chose, he said, to give the documents to journalists whose judgment he trusted about what should be public and what should remain concealed.
As for his future, he is vague. He hoped the publicity the leaks have generated will offer him some protection, making it "harder for them to get dirty".
He views his best hope as the possibility of asylum, with Iceland – with its reputation of a champion of internet freedom – at the top of his list. He knows that may prove a wish unfulfilled.
But after the intense political controversy he has already created with just the first week's haul of stories, "I feel satisfied that this was all worth it. I have no regrets."
The individual responsible for one of the most significant leaks in US political history is The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. "I have no intention of hiding who I am because I know I have done nothing wrong," he said.
Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the world's most secretive organisations – the NSA.
In a note accompanying the first set of documents he provided, he wrote: "I understand that I will be made to suffer for my actions," but "I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant."
Despite his determination to be publicly unveiled, he repeatedly insisted that he wants to avoid the media spotlight. "I don't want public attention because I don't want the story to be about me. I want it to be about what the US government is doing."
He does not fear the consequences of going public, he said, only that doing so will distract attention from the issues raised by his disclosures. "I know the media likes to personalise political debates, and I know the government will demonise me."
Despite these fears, he remained hopeful his outing will not divert attention from the substance of his disclosures. "I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in." He added: "My sole motive is to inform the public as to that which is done in their name and that which is done against them."
He has had "a very comfortable life" that included a salary of roughly $200,000, a girlfriend with whom he shared a home in Hawaii, a stable career, and a family he loves. "I'm willing to sacrifice all of that because I can't in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building."
'I am not afraid, because this is the choice I've made'
Three weeks ago, Snowden made final preparations that resulted in last week's series of blockbuster news stories. At the NSA office in Hawaii where he was working, he copied the last set of documents he intended to disclose.He then advised his NSA supervisor that he needed to be away from work for "a couple of weeks" in order to receive treatment for epilepsy, a condition he learned he suffers from after a series of seizures last year.
As he packed his bags, he told his girlfriend that he had to be away for a few weeks, though he said he was vague about the reason. "That is not an uncommon occurrence for someone who has spent the last decade working in the intelligence world."
On May 20, he boarded a flight to Hong Kong, where he has remained ever since. He chose the city because "they have a spirited commitment to free speech and the right of political dissent", and because he believed that it was one of the few places in the world that both could and would resist the dictates of the US government.
In the three weeks since he arrived, he has been ensconced in a hotel room. "I've left the room maybe a total of three times during my entire stay," he said. It is a plush hotel and, what with eating meals in his room too, he has run up big bills.
He is deeply worried about being spied on. He lines the door of his hotel room with pillows to prevent eavesdropping. He puts a large red hood over his head and laptop when entering his passwords to prevent any hidden cameras from detecting them.
Though that may sound like paranoia to some, Snowden has good reason for such fears. He worked in the US intelligence world for almost a decade. He knows that the biggest and most secretive surveillance organisation in America, the NSA, along with the most powerful government on the planet, is looking for him.
Since the disclosures began to emerge, he has watched television and monitored the internet, hearing all the threats and vows of prosecution emanating from Washington.
And he knows only too well the sophisticated technology available to them and how easy it will be for them to find him. The NSA police and other law enforcement officers have twice visited his home in Hawaii and already contacted his girlfriend, though he believes that may have been prompted by his absence from work, and not because of suspicions of any connection to the leaks.
"All my options are bad," he said. The US could begin extradition proceedings against him, a potentially problematic, lengthy and unpredictable course for Washington. Or the Chinese government might whisk him away for questioning, viewing him as a useful source of information. Or he might end up being grabbed and bundled into a plane bound for US territory.
"Yes, I could be rendered by the CIA. I could have people come after me. Or any of the third-party partners. They work closely with a number of other nations. Or they could pay off the Triads. Any of their agents or assets," he said.
"We have got a CIA station just up the road – the consulate here in Hong Kong – and I am sure they are going to be busy for the next week. And that is a concern I will live with for the rest of my life, however long that happens to be."
Having watched the Obama administration prosecute whistleblowers at a historically unprecedented rate, he fully expects the US government to attempt to use all its weight to punish him. "I am not afraid," he said calmly, "because this is the choice I've made."
He predicts the government will launch an investigation and "say I have broken the Espionage Act and helped our enemies, but that can be used against anyone who points out how massive and invasive the system has become".
The only time he became emotional during the many hours of interviews was when he pondered the impact his choices would have on his family, many of whom work for the US government. "The only thing I fear is the harmful effects on my family, who I won't be able to help any more. That's what keeps me up at night," he said, his eyes welling up with tears.
'You can't wait around for someone else to act'
Snowden did not always believe the US government posed a threat to his political values. He was brought up originally in Elizabeth City, North Carolina. His family moved later to Maryland, near the NSA headquarters in Fort Meade.By his own admission, he was not a stellar student. In order to get the credits necessary to obtain a high school diploma, he attended a community college in Maryland, studying computing, but never completed the coursework. (He later obtained his GED.)
In 2003, he enlisted in the US army and began a training program to join the Special Forces. Invoking the same principles that he now cites to justify his leaks, he said: "I wanted to fight in the Iraq war because I felt like I had an obligation as a human being to help free people from oppression".
He recounted how his beliefs about the war's purpose were quickly dispelled. "Most of the people training us seemed pumped up about killing Arabs, not helping anyone," he said. After he broke both his legs in a training accident, he was discharged.
After that, he got his first job in an NSA facility, working as a security guard for one of the agency's covert facilities at the University of Maryland. From there, he went to the CIA, where he worked on IT security. His understanding of the internet and his talent for computer programming enabled him to rise fairly quickly for someone who lacked even a high school diploma.
By 2007, the CIA stationed him with diplomatic cover in Geneva, Switzerland. His responsibility for maintaining computer network security meant he had clearance to access a wide array of classified documents.
That access, along with the almost three years he spent around CIA officers, led him to begin seriously questioning the rightness of what he saw.
He described as formative an incident in which he claimed CIA operatives were attempting to recruit a Swiss banker to obtain secret banking information. Snowden said they achieved this by purposely getting the banker drunk and encouraging him to drive home in his car. When the banker was arrested for drunk driving, the undercover agent seeking to befriend him offered to help, and a bond was formed that led to successful recruitment.
"Much of what I saw in Geneva really disillusioned me about how my government functions and what its impact is in the world," he says. "I realised that I was part of something that was doing far more harm than good."
He said it was during his CIA stint in Geneva that he thought for the first time about exposing government secrets. But, at the time, he chose not to for two reasons.
First, he said: "Most of the secrets the CIA has are about people, not machines and systems, so I didn't feel comfortable with disclosures that I thought could endanger anyone". Secondly, the election of Barack Obama in 2008 gave him hope that there would be real reforms, rendering disclosures unnecessary.
He left the CIA in 2009 in order to take his first job working for a private contractor that assigned him to a functioning NSA facility, stationed on a military base in Japan. It was then, he said, that he "watched as Obama advanced the very policies that I thought would be reined in", and as a result, "I got hardened."
The primary lesson from this experience was that "you can't wait around for someone else to act. I had been looking for leaders, but I realised that leadership is about being the first to act."
Over the next three years, he learned just how all-consuming the NSA's surveillance activities were, claiming "they are intent on making every conversation and every form of behaviour in the world known to them".
He described how he once viewed the internet as "the most important invention in all of human history". As an adolescent, he spent days at a time "speaking to people with all sorts of views that I would never have encountered on my own".
But he believed that the value of the internet, along with basic privacy, is being rapidly destroyed by ubiquitous surveillance. "I don't see myself as a hero," he said, "because what I'm doing is self-interested: I don't want to live in a world where there's no privacy and therefore no room for intellectual exploration and creativity."
Once he reached the conclusion that the NSA's surveillance net would soon be irrevocable, he said it was just a matter of time before he chose to act. "What they're doing" poses "an existential threat to democracy", he said.
A matter of principle
As strong as those beliefs are, there still remains the question: why did he do it? Giving up his freedom and a privileged lifestyle? "There are more important things than money. If I were motivated by money, I could have sold these documents to any number of countries and gotten very rich."For him, it is a matter of principle. "The government has granted itself power it is not entitled to. There is no public oversight. The result is people like myself have the latitude to go further than they are allowed to," he said.
His allegiance to internet freedom is reflected in the stickers on his laptop: "I support Online Rights: Electronic Frontier Foundation," reads one. Another hails the online organisation offering anonymity, the Tor Project.
Asked by reporters to establish his authenticity to ensure he is not some fantasist, he laid bare, without hesitation, his personal details, from his social security number to his CIA ID and his expired diplomatic passport. There is no shiftiness. Ask him about anything in his personal life and he will answer.
He is quiet, smart, easy-going and self-effacing. A master on computers, he seemed happiest when talking about the technical side of surveillance, at a level of detail comprehensible probably only to fellow communication specialists. But he showed intense passion when talking about the value of privacy and how he felt it was being steadily eroded by the behaviour of the intelligence services.
His manner was calm and relaxed but he has been understandably twitchy since he went into hiding, waiting for the knock on the hotel door. A fire alarm goes off. "That has not happened before," he said, betraying anxiety wondering if was real, a test or a CIA ploy to get him out onto the street.
Strewn about the side of his bed are his suitcase, a plate with the remains of room-service breakfast, and a copy of Angler, the biography of former vice-president Dick Cheney.
Ever since last week's news stories began to appear in the Guardian, Snowden has vigilantly watched TV and read the internet to see the effects of his choices. He seemed satisfied that the debate he longed to provoke was finally taking place.
He lay, propped up against pillows, watching CNN's Wolf Blitzer ask a discussion panel about government intrusion if they had any idea who the leaker was. From 8,000 miles away, the leaker looked on impassively, not even indulging in a wry smile.
Snowden said that he admires both Ellsberg and Manning, but argues that there is one important distinction between himself and the army private, whose trial coincidentally began the week Snowden's leaks began to make news.
"I carefully evaluated every single document I disclosed to ensure that each was legitimately in the public interest," he said. "There are all sorts of documents that would have made a big impact that I didn't turn over, because harming people isn't my goal. Transparency is."
He purposely chose, he said, to give the documents to journalists whose judgment he trusted about what should be public and what should remain concealed.
As for his future, he is vague. He hoped the publicity the leaks have generated will offer him some protection, making it "harder for them to get dirty".
He views his best hope as the possibility of asylum, with Iceland – with its reputation of a champion of internet freedom – at the top of his list. He knows that may prove a wish unfulfilled.
But after the intense political controversy he has already created with just the first week's haul of stories, "I feel satisfied that this was all worth it. I have no regrets."
Data Source Provided From : From Guardian
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
Barack Obama defends US surveillance tactics
President
Barack Obama has defended newly revealed US government phone and
internet surveillance programmes, saying they are closely overseen by
Congress and the courts.
Mr Obama said his administration had struck "the right balance" between security and privacy.He also stressed US internet communications of US citizens and residents were not targeted.
And he tried to reassure the US "nobody is listening to your phone calls".
Mr Obama was commenting on revelations this week in the Guardian and Washington Post newspapers that the US National Security Agency (NSA) was collecting or tapping into vast amounts of telephone and internet communications data.
Facebook denial The news accounts - subsequently confirmed by officials - roiled Washington DC, with privacy advocates criticising the surveillance as an unlawful intrusion and many in Congress defending the programmes as appropriate counter-terrorism tools.
Continue reading the main story
But after managing to keep words like Prism out of the public eye for one and a bit terms, he's having to grapple with how to explain some scary-sounding stuff to the American public.
He still believes that he's successfully navigated between the requirements of security and the need to uphold the Constitution, even if he admits that there are "trade-offs." Those trade-offs have been the subject of rumour and speculation for years but are now glaringly apparent. Mr Obama says he welcomes the debate.
Analysis
President Obama said he experienced some "healthy scepticism" about some of the national security operations he inherited when he took office. He's hardly the first American president to realise that it's easier to stick to your core principles outside the White House than inside.But after managing to keep words like Prism out of the public eye for one and a bit terms, he's having to grapple with how to explain some scary-sounding stuff to the American public.
He still believes that he's successfully navigated between the requirements of security and the need to uphold the Constitution, even if he admits that there are "trade-offs." Those trade-offs have been the subject of rumour and speculation for years but are now glaringly apparent. Mr Obama says he welcomes the debate.
On Wednesday night, the UK's
Guardian newspaper reported a secret court had ordered phone company
Verizon to hand over to the NSA millions of records on telephone call
"metadata".
That report was followed by revelations in both the
Washington Post and Guardian that the NSA tapped directly into the
servers of nine internet firms including Facebook, Google, Microsoft and
Yahoo to track online communication in a programme known as Prism.Mark Zuckerberg, founder of Facebook, said the press reports were "outrageous" and denied Facebook's participation in the programme.
His statement echoed those of other internet companies, who said they had not given the government direct access to their servers.
Mr Zuckerberg said: "We have never received a blanket request or court order from any government agency asking for information or metadata in bulk, like the one Verizon reportedly received.
"And if we did, we would fight it aggressively. We hadn't even heard of Prism before yesterday."
And on Friday, the Guardian reported that the UK's electronic surveillance agency, GCHQ, had been able to see user communications data from the American internet companies, because it had access to Prism.
The Guardian reported that GCHQ had access to the system since June 2010 and information from Prism had contributed to 197 British intelligence reports last year.
In California on Friday, Mr Obama noted both NSA programmes had been authorised repeatedly by Congress and were subject to continual oversight by congressional intelligence committees and by secret intelligence courts.
The president said he had come into office with a "healthy scepticism" of both programmes, but after evaluating them and establishing further safeguards, he decided "it was worth it".
"You can't have 100% security, and also then have 100% privacy and zero inconvenience," Mr Obama said.
Acknowledging "some trade-offs involved", he said, "We're going to have to make some choices."
Continue reading the main story
What this highlights is the way we now entrust our data and our privacy almost entirely to American companies, storing it in their "clouds" - vast data centres located in the US.
What this highlights is the way we now entrust our data and our privacy almost entirely to American companies, storing it in their "clouds" - vast data centres located in the US.
Senior US Senator Dianne
Feinstein confirmed on Thursday that the Verizon phone records order
published by the Guardian was a three-month extension of an ongoing
request to Verizon. Intelligence analysts say there are likely similar
orders for other major communications firms.
The data requested includes telephone numbers, calling card
numbers, the serial numbers of phones used and the time and duration of
calls. It does not include the content of a call or the callers'
addresses or financial information.'Assault on Constitution' Prism was reportedly developed in 2007 out of a programme of domestic surveillance without warrants that was set up by President George W Bush after the 9/11 attacks.
Continue reading the main story
WHAT THE PAPERS SAY
- The Washington Post says one of the many things still unclear about the phone surveillance programme is why Americans didn't know about it. In an editorial, the paper says the public needs more explanation to be able to make a reasonable assessment of whether such programmes are worth the security benefits.
- The New York Times says President Barack Obama "is proving the truism that the executive branch will use any power it is given and very likely abuse it". The Patriot Act should be sharply curtailed if not repealed, it says.
- The Los Angeles Times says this week's disclosures underscore how US intelligence and law enforcement now "secretly glean vast amounts of information from communications technology".
- The San Francisco Chronicle says the collection of phone records "conducted with only the barest legal oversight" is "another policy disappointment from a president who came to office promising to ease the worst of the panicky, ill-considered policies launched after the Sept. 11 attacks 13 years ago".
Prism reportedly does not collect user data, but is able to pull out material that matches a set of search terms.
James Clapper, director of US national intelligence, said in a
statement on Thursday the internet communications surveillance
programme was "designed to facilitate the acquisition of foreign
intelligence information concerning non-US persons located outside the
United States"."It cannot be used to intentionally target any US citizen, any other US person, or anyone located within the United States," he added.
But while US citizens were not intended to be the targets of surveillance, the Washington Post says large quantities of content from Americans are nevertheless screened in order to track or learn more about the target.
The Prism programme has become a major contributor to the president's daily intelligence briefing and accounts for almost one in seven intelligence reports, it adds.
Mr Clapper said the programme, under Section 702 of the Foreign Intelligence Surveillance Act, was recently reauthorised by Congress after hearings and debate.
In Congress, reaction to the revelations was split.
"As a result of the disclosures that came to light today, now we're going to have a real debate in the Congress and the country and that's long overdue."
Republican Senator Rand Paul called the programmes "an astounding assault on the Constitution''.
But his colleagues Republican Senator Lindsay Graham and Democratic Senator Dianne Feinstein both defended the phone records practice on Thursday.
Related Stories
Data Source Provided From : From bbc uk
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
US confirms Verizon phone records collection
The
US National Security Agency (NSA) is collecting the telephone records
of tens of millions of Americans, US officials have confirmed.
The practice, first reported by the Guardian newspaper, has
been used to stop a "significant" terrorist attack on the US, a senior
congressman said.On Wednesday, the newspaper published the secret order directing the Verizon company to hand over telephone data.
Civil liberties groups said the details of the report were "stunning".
Senior US Senator Dianne Feinstein on Thursday confirmed the secret court order was a three-month renewal of an ongoing practice.
US House intelligence committee chairman Mike Rogers told reporters collecting Americans' phone records was legal, authorised by Congress and had not been abused by the Obama administration.
He said it had prevented a "significant" attack on the US "within the past few years" but declined to offer more information.
Later, White House spokesman Josh Earnest described the practice as a "critical tool" enabling US authorities to monitor suspected terrorists.
'Indefensible'
Continue reading the main story
The breadth of this dragnet is breathtaking. The thought that the phone records of millions, this reporter included, have been collected on an order of the secretive Foreign Intelligence Surveillance Court is a little creepy, to say the least.
Should we demand action to stop it? Some civil rights activists say absolutely.
Such behaviour, they argue, simply runs counter to the letter of the Fourth Amendment to the US Constitution, which says there has to be "probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized", before any of this can happen.
The reality is that since 9/11, the national security establishment and telecommunications firms, with the aid of Congress, have constructed a new surveillance environment.
We just haven't been told about it.
Analysis
After years of allegations, lawsuits and sporadic, vaguely-worded warnings from members of Congress, finally there is a piece of hard evidence, a window into the reality of post-9/11 intelligence surveillance.The breadth of this dragnet is breathtaking. The thought that the phone records of millions, this reporter included, have been collected on an order of the secretive Foreign Intelligence Surveillance Court is a little creepy, to say the least.
Should we demand action to stop it? Some civil rights activists say absolutely.
Such behaviour, they argue, simply runs counter to the letter of the Fourth Amendment to the US Constitution, which says there has to be "probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized", before any of this can happen.
The reality is that since 9/11, the national security establishment and telecommunications firms, with the aid of Congress, have constructed a new surveillance environment.
We just haven't been told about it.
The security agencies and Verizon have not commented.
The document published by the Guardian was signed by Judge
Roger Vinson of the secret Foreign Intelligence Surveillance Court on 25
April and lasts until 19 July.It falls under a section of the Bush-era Patriot Act, which allows access to business records for "foreign intelligence and international terrorism investigations".
The order requires Verizon - one of the largest phone companies in the US - to disclose to the NSA the metadata of all calls it processes, both domestic and international, in which at least one party is in the US.
Such metadata includes telephone numbers, calling card numbers, the serial numbers of phones used and the time and duration of calls. It does not include the content of a call or the callers' addresses or financial information.
The White House has emphasised the court order did not authorise US government agents to listen in on Americans' telephone conversations.
But the government could request a wiretap of specific suspicious numbers from the court, which would allow the government to monitor the calls in real time, record and store them.
The measure also contains a gagging order, requiring that "no person shall disclose to any other person that the FBI or NSA has sought or obtained tangible things under this Order".
Reaction for and against the practice has cut across party lines.
"To simply say in a blanket way that millions and millions of Americans are going to have their phone records checked by the US government is to my mind indefensible and unacceptable," Senator Bernie Sanders, a liberal independent, said.
Republican Senator Rand Paul said in a statement he would introduce a bill to prevent security agencies from searching phone records without probable cause on Friday.
But Republican Senator Lindsey Graham said he had no problem with the practice.
"If we don't do it, we're crazy," he said. "If you're not getting a call from a terrorist organisation, you've got nothing to worry about."
'Millions of people'
Continue reading the main story
The court order
- Verizon is required to hand over data "on an ongoing, daily basis" until 19 July
- Covers all local and domestic US phone calls, and calls from the US abroad, but not calls made wholly in foreign countries
- Metadata to be provided includes telephone numbers, handset identifying numbers, calling cards used and the time and duration of calls
- Prohibits disclosure of the order's existence
Mark Rumold, a staff attorney at
the Electronic Frontier Foundation, told the BBC the court order covered
the telephone calls of "millions and millions of people".
He said the law provided for narrower ways for US officials
to gain access to the calls of persons of interest and those who contact
them."This isn't that," Mr Rumold said.
"I believe the NSA has a running map of domestic communications" enabling officials to track the phone calls of foreign targets to US numbers and then any subsequent calls placed from those numbers.
The EFF has suspected authorities had been conducting such surveillance for years. A report appeared in the USA Today newspaper in 2006.
Mr Rumold believes the firms do not challenge these orders.
The US government has previously said obtaining metadata does not require a warrant because it does not constitute personal information.
But rights groups have fiercely criticised the order, with the American Civil Liberties Union (ACLU) describing it as "beyond Orwellian".
"It provides further evidence of the extent to which basic democratic rights are being surrendered in secret to the demands of unaccountable intelligence agencies," said Jameel Jaffer, ACLU's deputy legal director.
'Stunned' Two Democratic senators have been pressing the Obama administration to clarify the scope of its public surveillance.
Last year, Mark Udall and Ron Wyden wrote to US Attorney General Eric Holder saying they believed "most Americans would be stunned" by the government's "secret legal interpretations" of the Patriot Act.
The White House came under heavy criticism last month after papers were leaked showing it had gathered the phone records of journalists at the Associated Press.
The story prompted questions from both Republicans and Democrats in Washington about how the White House was balancing the need for national security with privacy rights.
The Obama administration has aggressively investigated disclosures of classified information to the media, bringing more cases against people suspected of leaking such material than any previous administration, correspondents say.
Related Stories
Data Source Provided From : From bbc uk
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
Profile: Edward Snowden
Former
CIA technical worker Edward Snowden has been identified by the UK's
Guardian newspaper as the person who leaked sensitive information about
US surveillance programmes.
Mr Snowden, 29, had been living with his girlfriend in Hawaii
before flying to Hong Kong where is staying in a hotel, the newspaper
said.The journalists who interviewed him at the secret location described him as "quiet, smart, easy-going and self-effacing. A master on computers".
Explaining why he decided to leave the US, he told the paper: "I don't want to live in a society that does these sort of things… I do not want to live in a world where everything I do and say is recorded."
He said that he chose Hong Kong because "they have a spirited commitment to free speech and the right of political dissent".
He also believes it is one of the few places in the world that would resist pressure from the US government.
Mr Snowden is reported to have grown up in Elizabeth City, North Carolina, and later moved to Maryland, near the headquarters of the National Security Agency (NSA) at Fort Meade.
Describing himself as a less than stellar student, he is said to have studied computing at a Maryland community college to get the necessary credits to obtain a high school diploma. However, he never finished the course.
In 2003, he joined the US Army and began training with the Special Forces only to be discharged after breaking both his legs in a training accident.
His first job with the NSA was as a security guard for one of the agency's secret facilities at the University of Maryland. He then worked on IT security at the CIA.
Despite his lack of formal qualifications, his computer wizardry allowed him to quickly rise through intelligence ranks.
By 2007, he was given a CIA post with diplomatic cover in Geneva.
The Guardian said Mr Snowden had been working at the NSA since 2009 as an employee of various outside contractors, including consulting giant Booz Allen.
In a statement, the company confirmed he had been an employee of the firm for less than three months, assigned to a team in Hawaii.
"News reports that this individual has claimed to have leaked classified information are shocking, and if accurate, this action represents a grave violation of the code of conduct and core values of our firm, it said.
"We will work closely with our clients and authorities in their investigation of this matter."
Related Stories
Data Source Provided From : From bbc uk
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
Edward Snowden was NSA Prism leak source - Guardian
A
former CIA technical worker has been identified by the UK's Guardian
newspaper as the source of leaks about US surveillance programmes.
Edward Snowden, 29, is described by the paper as an ex-CIA technical assistant, currently employed by defence contractor Booz Allen Hamilton. The Guardian said his identity was being revealed at his own request.
The recent revelations are that US agencies gathered millions of phone records and monitored internet data.
A spokesman for the Office of the Director of National Intelligence said the matter had now been referred to the Department of Justice as a criminal matter.
Continue reading the main story
“Start Quote
I don't want to live in a society that does these sort of things”
The Guardian quotes Mr Snowden as saying he flew to Hong Kong on 20 May, where he holed himself up in a hotel.
He told the paper: "I don't want to live in a society that
does these sort of things… I do not want to live in a world where
everything I do and say is recorded."Asked what he thought would happen to him, he replied: "Nothing good."
He said he had gone to Hong Kong because of its "strong tradition of free speech".
Hong Kong signed an extradition treaty with the US shortly before the territory returned to Chinese sovereignty in 1997.
However, Beijing can block any extradition if it believes it affects national defence or foreign policy issues.
Mr Snowden has expressed an interest in seeking asylum in Iceland.
Continue reading the main story
An editorial in the Chicago Tribune argues that "some new restrictions" in the US intelligence gathering programme may be in order, adding: "If the government is looking for, say, calls between the United States and terrorists in Pakistan or Yemen, why can't it simply demand records of calls to certain foreign countries. Is there no way to narrow the search to leave most Americans out of it?"
Robert O'Harrow in the Washington Post writes that the growing reliance on contractors in US intelligence gathering "reflects a massive shift toward outsourcing over the past 15 years, in part because of cutbacks in the government agencies". He argues that this "has dramatically increased the risk of waste and contracting abuses... but given the threat of terrorism and the national security mandates from Congress, the intelligence community had little choice".
US media response
A USA Today editorial accepts that "the primary result of Snowden's actions is a plus. He has forced a public debate on the sweepingly invasive programs that should have taken place before they were created". But, it goes on, "pure motives and laudable effects don't alter the fact that he broke the law".An editorial in the Chicago Tribune argues that "some new restrictions" in the US intelligence gathering programme may be in order, adding: "If the government is looking for, say, calls between the United States and terrorists in Pakistan or Yemen, why can't it simply demand records of calls to certain foreign countries. Is there no way to narrow the search to leave most Americans out of it?"
Robert O'Harrow in the Washington Post writes that the growing reliance on contractors in US intelligence gathering "reflects a massive shift toward outsourcing over the past 15 years, in part because of cutbacks in the government agencies". He argues that this "has dramatically increased the risk of waste and contracting abuses... but given the threat of terrorism and the national security mandates from Congress, the intelligence community had little choice".
However, Hong Kong's South China
Morning Post quoted Iceland's ambassador to China as saying that
"according to Icelandic law a person can only submit such an application
once he/she is in Iceland".
'Core values'
In a statement, Booz Allen Hamilton confirmed Mr Snowden had been an employee for less than three months."If accurate, this action represents a grave violation of the code of conduct and core values of our firm," the statement said.
The first of the leaks came out on Wednesday night, when the Guardian reported a US secret court had ordered phone company Verizon to hand over to the National Security Agency (NSA) millions of records on telephone call "metadata".
The metadata include the numbers of both phones on a call, its duration, time, date and location (for mobiles, determined by which mobile signal towers relayed the call or text).
That report was followed by revelations in both the Washington Post and Guardian that the NSA tapped directly into the servers of nine internet firms including Facebook, Google, Microsoft and Yahoo to track online communication in a programme known as Prism.
All the internet companies deny giving the US government access to their servers.
Prism is said to give the NSA and FBI (Federal Bureau of Investigation) access to emails, web chats and other communications directly from the servers of major US internet companies.
The data are used to track foreign nationals suspected of terrorism or spying. The NSA is also collecting the telephone records of American customers, but not recording the content of their calls.
'Gut-wrenching' On Saturday, US director of national intelligence James Clapper called the leaks "literally gut-wrenching".
"I hope we're able to track down whoever's doing this, because it is extremely damaging to, and it affects the safety and security of this country," he told NBC News on Saturday.
Continue reading the main story
How surveillance came to light
- 5 June: The Guardian reports that the National Security Agency (NSA) is collecting the telephone records of millions of US customers of Verizon under a top secret court order
- 6 June: The Guardian and The Washington Post report that the NSA and the FBI are tapping into US Internet companies to track online communication in a programme known as Prism
- 7 June: The Guardian reports President Obama has asked intelligence agencies to draw up a list of potential overseas targets for US cyber-attacks
- 7 June: President Obama defends the programmes, saying they are closely overseen by Congress and the courts
- 8 June: US director of national intelligence James Clapper calls the leaks "literally gut-wrenching"
- 9 June: The Guardian names former CIA technical worker Edward Snowden as the source of the leaks
Prism was reportedly established
in 2007 in order to provide in-depth surveillance on live communications
and stored information on foreigners overseas.
The NSA has filed a criminal report with the US Justice Department over the leaks.The content of phone conversations - what people say to each other when they are on the phone - is protected by the Fourth Amendment to the US Constitution, which forbids unreasonable searches.
However, information shared with a third party, such as phone companies, is not out of bounds.
That means that data about phone calls - such as their timing and duration - can be scooped up by government officials.
Mr Clapper's office issued a statement on Saturday, saying all the information gathered under Prism was obtained with the approval of the secret Foreign Intelligence Surveillance Act Court (Fisa).
Prism was authorised under changes to US surveillance laws passed under President George W Bush and renewed last year under Barack Obama.
On Friday, Mr Obama defended the surveillance programmes as a "modest encroachment" on privacy, necessary to protect the US from terrorist attacks.
"Nobody is listening to your telephone calls. That's not what this program is about," he said, emphasising that the programmes were authorised by Congress.
Related Stories
Data Source Provided From : From bbc uk
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
NSA whistleblower Edward Snowden: 'I do not expect to see home again'
Source for the Guardian's NSA files on why he carried out the biggest intelligence leak in a generation – and what comes next
Edward Snowden was interviewed over several days in Hong Kong by Glenn Greenwald and Ewen MacAskill.
Q: Why did you decide to become a whistleblower?
A: "The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards.
"I don't want to live in a society that does these sort of things … I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under."
Q: But isn't there a need for surveillance to try to reduce the chances of terrorist attacks such as Boston?
A: "We have to decide why terrorism is a new threat. There has always been terrorism. Boston was a criminal act. It was not about surveillance but good, old-fashioned police work. The police are very good at what they do."
Q: Do you see yourself as another Bradley Manning?
A: "Manning was a classic whistleblower. He was inspired by the public good."
Q: Do you think what you have done is a crime?
A: "We have seen enough criminality on the part of government. It is hypocritical to make this allegation against me. They have narrowed the public sphere of influence."
Q: What do you think is going to happen to you?
A: "Nothing good."
Q: Why Hong Kong?
A: "I think it is really tragic that an American has to move to a place that has a reputation for less freedom. Still, Hong Kong has a reputation for freedom in spite of the People's Republic of China. It has a strong tradition of free speech."
Q: What do the leaked documents reveal?
A: "That the NSA routinely lies in response to congressional inquiries about the scope of surveillance in America. I believe that when [senator Ron] Wyden and [senator Mark] Udall asked about the scale of this, they [the NSA] said it did not have the tools to provide an answer. We do have the tools and I have maps showing where people have been scrutinised most. We collect more digital communications from America than we do from the Russians."
Q: What about the Obama administration's protests about hacking by China?
A: "We hack everyone everywhere. We like to make a distinction between us and the others. But we are in almost every country in the world. We are not at war with these countries."
Q: Is it possible to put security in place to protect against state surveillance?
A: "You are not even aware of what is possible. The extent of their capabilities is horrifying. We can plant bugs in machines. Once you go on the network, I can identify your machine. You will never be safe whatever protections you put in place."
Q: Does your family know you are planning this?
A: "No. My family does not know what is happening … My primary fear is that they will come after my family, my friends, my partner. Anyone I have a relationship with …
I will have to live with that for the rest of my life. I am not going to be able to communicate with them. They [the authorities] will act aggressively against anyone who has known me. That keeps me up at night."
Q: When did you decide to leak the documents?
A: "You see things that may be disturbing. When you see everything you realise that some of these things are abusive. The awareness of wrong-doing builds up. There was not one morning when I woke up [and decided this is it]. It was a natural process.
"A lot of people in 2008 voted for Obama. I did not vote for him. I voted for a third party. But I believed in Obama's promises. I was going to disclose it [but waited because of his election]. He continued with the policies of his predecessor."
Q: What is your reaction to Obama denouncing the leaks on Friday while welcoming a debate on the balance between security and openness?
A: "My immediate reaction was he was having difficulty in defending it himself. He was trying to defend the unjustifiable and he knew it."
Q: What about the response in general to the disclosures?
A: "I have been surprised and pleased to see the public has reacted so strongly in defence of these rights that are being suppressed in the name of security. It is not like Occupy Wall Street but there is a grassroots movement to take to the streets on July 4 in defence of the Fourth Amendment called Restore The Fourth Amendment and it grew out of Reddit. The response over the internet has been huge and supportive."
Q: Washington-based foreign affairs analyst Steve Clemons said he overheard at the capital's Dulles airport four men discussing an intelligence conference they had just attended. Speaking about the leaks, one of them said, according to Clemons, that both the reporter and leaker should be "disappeared". How do you feel about that?
A: "Someone responding to the story said 'real spies do not speak like that'. Well, I am a spy and that is how they talk. Whenever we had a debate in the office on how to handle crimes, they do not defend due process – they defend decisive action. They say it is better to kick someone out of a plane than let these people have a day in court. It is an authoritarian mindset in general."
Q: Do you have a plan in place?
A: "The only thing I can do is sit here and hope the Hong Kong government does not deport me … My predisposition is to seek asylum in a country with shared values. The nation that most encompasses this is Iceland. They stood up for people over internet freedom. I have no idea what my future is going to be.
"They could put out an Interpol note. But I don't think I have committed a crime outside the domain of the US. I think it will be clearly shown to be political in nature."
Q: Do you think you are probably going to end up in prison?
A: "I could not do this without accepting the risk of prison. You can't come up against the world's most powerful intelligence agencies and not accept the risk. If they want to get you, over time they will."
Q: How to you feel now, almost a week after the first leak?
A: "I think the sense of outrage that has been expressed is justified. It has given me hope that, no matter what happens to me, the outcome will be positive for America. I do not expect to see home again, though that is what I want."
Data Source Provided From : From guardian
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
Edward Snowden: no guarantee Hong Kong will protect NSA whistleblower
Edward Snowden's decision to flee to Hong Kong as he prepared to expose the US government's secret surveillance programs may not save him from prosecution due to an extradition treaty in force since 1998.
A 29-year-old former CIA employee, Mr Snowden has identified himself as the
person who gave
the Guardian and the Washington Post classified documents about
how the US National Security Agency obtained data from US
telecom and internet companies.
While preparing his leaks, Mr Snowden left Hawaii for Hong Kong on May 20 so
he would be in a place that might be able to resist US prosecution attempts,
he told the Guardian.
"Mainland China does have significant restrictions on free speech but the
people of Hong Kong have a long tradition of protesting in the streets,
making their views known," Mr Snowden, a US citizen, said in a video
interview posted on the Guardian's website.
"I believe that the Hong Kong government is actually independent in
relation to a lot of other leading Western governments," he said from
his hotel in the territory.
The NSA has requested a criminal probe into the leaks and on Sunday, the US
Justice Department said it was in the initial stages of a criminal
investigation.
Republican politicians have called for him to be extradited.
Any prosecution of Mr Snowden would likely come under the Espionage Act of 1917, the same law the US government has used against other civilians who have disclosed classified information without authorization.
The United States and Hong Kong signed their extradition treaty in 1996, a year before the former British colony was returned to China. It allows for the exchange of criminal suspects in a formalized process that may also involve the Chinese government.
The treaty went into force in 1998 and provides that Hong Kong authorities can hold Mr Snowden for 60 days, following a US request that includes probable cause, while Washington prepares a formal extradition request.
Some lawyers with expertise in extraditions said it would be a challenge for Mr Snowden to circumvent the treaty if the US government decides to prosecute him.
"They're not going to put at risk their relationship with the US over Mr. Snowden, and very few people have found that they have the clout to persuade another country to go out of their way for them," said Robert Anello, a New York lawyer who has handled extradition cases.
That is especially true when, as in this case, there is no third country to object. "If you're an American citizen, fleeing the US isn't such an easy thing," Mr Anello said.
Because Hong Kong is under the ultimate control of China, the treaty also allows for the refusal of transfers that would implicate the "defense, foreign affairs or essential public interest or policy" of China. The US consulate and Hong Kong officials have so far declined to comment.
Another defense for Mr Snowden, lawyers said, would be to argue a lack of "dual-criminality" - for a person to be extradited, the alleged act must be a crime in both countries.
While that will be for a Hong Kong court to decide, it might be a long shot, Mr Anello said. "My guess is they will be able to find a law in Hong Kong that is very similar" to the US Espionage Act, he said.
It was not immediately clear whether Mr Snowden had a lawyer.
Asked if he had a plan in place, Mr Snowden told the Guardian: "The only thing I can do is sit here and hope the Hong Kong government does not deport me ... My predisposition is to seek asylum in a country with shared values. The nation that most encompasses this is Iceland. They stood up for people over internet freedom. I have no idea what my future is going to be."
Edited by Bonnie Malkin for telegraph.co.uk
By:
- Bhupesh Kumar Mandal
Any prosecution of Mr Snowden would likely come under the Espionage Act of 1917, the same law the US government has used against other civilians who have disclosed classified information without authorization.
The United States and Hong Kong signed their extradition treaty in 1996, a year before the former British colony was returned to China. It allows for the exchange of criminal suspects in a formalized process that may also involve the Chinese government.
The treaty went into force in 1998 and provides that Hong Kong authorities can hold Mr Snowden for 60 days, following a US request that includes probable cause, while Washington prepares a formal extradition request.
Some lawyers with expertise in extraditions said it would be a challenge for Mr Snowden to circumvent the treaty if the US government decides to prosecute him.
"They're not going to put at risk their relationship with the US over Mr. Snowden, and very few people have found that they have the clout to persuade another country to go out of their way for them," said Robert Anello, a New York lawyer who has handled extradition cases.
That is especially true when, as in this case, there is no third country to object. "If you're an American citizen, fleeing the US isn't such an easy thing," Mr Anello said.
Because Hong Kong is under the ultimate control of China, the treaty also allows for the refusal of transfers that would implicate the "defense, foreign affairs or essential public interest or policy" of China. The US consulate and Hong Kong officials have so far declined to comment.
Another defense for Mr Snowden, lawyers said, would be to argue a lack of "dual-criminality" - for a person to be extradited, the alleged act must be a crime in both countries.
While that will be for a Hong Kong court to decide, it might be a long shot, Mr Anello said. "My guess is they will be able to find a law in Hong Kong that is very similar" to the US Espionage Act, he said.
It was not immediately clear whether Mr Snowden had a lawyer.
Asked if he had a plan in place, Mr Snowden told the Guardian: "The only thing I can do is sit here and hope the Hong Kong government does not deport me ... My predisposition is to seek asylum in a country with shared values. The nation that most encompasses this is Iceland. They stood up for people over internet freedom. I have no idea what my future is going to be."
Edited by Bonnie Malkin for telegraph.co.uk
Data Source Provided From : From telegraph
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
NSA call database
The United States' National Security Agency (NSA) maintains a database containing hundreds of billions of records of telephone calls made by U.S. citizens from the four largest telephone carriers in the United States: AT&T, SBC, BellSouth (all three now called AT&T), and Verizon.[1]
The existence of this database and the NSA program that compiled it was unknown to the general public until USA Today broke the story on May 10, 2006.[1] It is estimated that the database contains over 1.9 trillion call-detail records.[2] According to Bloomberg News, the effort began approximately seven months before the September 11, 2001 attacks.[3] As of June 2013, the database is codenamed MARINA and stores the metadata for at least five years.[4] A similar database to MARINA exists for email and its code name is Pinwale.
The records include detailed call information (caller, receiver, date/time of call, length of call, etc.) for use in traffic analysis and social network analysis, but do not include audio information or transcripts of the content of the phone calls.
The database's existence has prompted fierce objections. It is often viewed as an illegal warrantless search and a violation of the pen register provisions of the Foreign Intelligence Surveillance Act and (in some cases) the Fourth Amendment of the United States Constitution.
The George W. Bush administration neither confirmed nor denied the existence of the domestic call record database. This contrasts with a related NSA controversy concerning warrantless surveillance of selected telephone calls; in that case they did confirm the existence of the program of debated legality. The program's code name is Stellar wind.[5]
Similar programs exist or are planned in other countries, including Sweden (Titan traffic database) and Great Britain (Interception Modernisation Programme)
Contents |
Lawsuit
A Wikinews article about the 2006 allegation about telephone records
|
|
Problems listening to this file? See media help. |
Internet monitoring
On May 22, 2006, it was revealed by investigative reporter Seymour Hersh and Wired magazine that the program involved the NSA setting up splitters to the routing cores of many telecoms companies and to major Internet traffic hubs. These provided a direct connection via an alleged "black room" known as Room 641A. This room allows most U.S. telecoms communications and Internet traffic to be redirected to the NSA. The NSA used them to eavesdrop and order police investigations of tens of thousands of ordinary Americans without judicial warrants.According to a security consultant who worked on the program, "What the companies are doing is worse than turning over records ... they’re providing total access to all the data", and a former senior intelligence official said, "This is not about getting a cardboard box of monthly phone bills in alphabetical order ... the N.S.A. is getting real-time actionable intelligence." [11][12]
On June 30, 2006 USA Today printed a partial retraction about its controversial article the prior month saying: "... USA TODAY also spoke again with the sources who had originally provided information about the scope and contents of the domestic calls database. All said the published report accurately reflected their knowledge and understanding of the NSA program, but none could document a contractual relationship between BellSouth or Verizon and the NSA, or that the companies turned over bulk calling records to the NSA. Based on its reporting after the May 11 article, USA TODAY has now concluded that while the NSA has built a massive domestic calls record database involving the domestic call records of telecommunications companies, the newspaper cannot confirm that BellSouth or Verizon contracted with the NSA to provide bulk calling records to that database ..." [13]
Denials
Five days after the story appeared, BellSouth officials said they could not find evidence of having handed over such records. "Based on our review to date, we have confirmed no such contract exists and we have not provided bulk customer calling records to the NSA," the officials said. USA Today replied that BellSouth officials had not denied the allegation when contacted the day before the story was published.[7] Verizon has also asserted that it has not turned over such records.[14]Companies are permitted by US securities law (15 U.S.C. 78m(b)(3)(A)) to refrain from properly accounting for their use of assets in matters involving national security, when properly authorized by an agency or department head acting under authorization by the President.[10] This legalese essentially means that companies can falsify their accounting reports and lie about their activities when the President decides that it is in the interests of national security to do so. President Bush issued a presidential memorandum on May 5, 2006 delegating authority to make such a designation to Director of National Intelligence John Negroponte, just as the NSA call database scandal appeared in the media.[15]
Qwest Communications
The USA Today report indicated that Qwest's then CEO, Joseph Nacchio, doubted the NSA's assertion that warrants were unnecessary. In negotiations, the NSA pressured the company to turn over the records. Qwest attorneys asked the NSA to obtain approval from the United States Foreign Intelligence Surveillance Court. When the NSA indicated they would not seek this approval, Qwest's new CEO Richard Notebaert declined NSA's request for access. Later, T-Mobile explicitly stated they do not participate in warrantless surveillance.[16]Contents of the database
According to the article, the database is "the largest database ever assembled in the world", and contains call-detail records (CDRs) for all phone calls, domestic and international. A call-detail record consists of the phone numbers of the callers and recipients along with time and duration of the call. While the database does not contain specific names or addresses, that information is widely available from non-classified sources.[1]According to the research group TeleGeography, AT&T (including the former SBC), Verizon, and BellSouth connected nearly 500 billion telephone calls in 2005 and nearly 2 trillion calls since late 2001.[17] It is reported that all four companies were paid to provide the information to the NSA.[18][19]
Uses of the database
Although such a database of phone records would not be useful on its own as a tool for national security, it could be used as an element of broader national security analytical efforts and data mining. These efforts could involve analysts using the data to connect phone numbers with names and links to persons of interest.[20][21] Such efforts have been the focus of the NSA's recent attempts to acquire key technologies from high tech firms in Silicon Valley and elsewhere. Link analysis software, such as Link Explorer or the Analyst's Notebook, is used by law enforcement to organize and view links that are demonstrated through such information as telephone and financial records, which are imported into the program from other sources.[22] Neural network software is used to detect patterns, classify and cluster data as well as forecast future events.[23]Using relational mathematics it is possible to find out if someone changes their telephone number by analyzing and comparing calling patterns.[citation needed]
ThinThread, a system designed largely by William Binney, which pre-dated this database, but was discarded for the Trailblazer Project, may have introduced some of the technology which is used to analyze the data [3]. Where ThinThread encrypted privacy data, however, no such measures have been reported with respect to the current system.
Government and public response
- In response, the Bush administration defended its activities, while neither specifically confirming or denying the existence of the potentially illegal program.[24] According to the Deputy White House Press Secretary, "The intelligence activities undertaken by the United States government are lawful, necessary and required to protect Americans from terrorist attacks."[1]
- Senator Arlen Specter has said that he will hold hearings with the telecommunications CEOs involved. The Senate Intelligence Committee is expected to question Air Force General Michael Hayden about the data-gathering during his confirmation hearings as Director of the Central Intelligence Agency. Hayden was in charge of the NSA from 1999 through 2005.[25]
- Commenting on the apparent incompatibility of the NSA call database with previous assurances by President Bush, former Republican Speaker of the House Newt Gingrich told Fox News,
"I’m not going to defend the indefensible. The Bush administration has
an obligation to level with the American people... I don’t think the way
they’ve handled this can be defended by reasonable people." [26]
- Later on Meet the Press, Gingrich stated that "everything that has been done is totally legal," and he said the NSA program was defending the indefensible, "because they refuse to come out front and talk about it."[27]
- Republican Senator Lindsey Graham told Fox News, "The idea of collecting millions or thousands of phone numbers, how does that fit into following the enemy?"[28]
- House Republican Caucus chairwoman Deborah Pryce said, "While I support aggressively tracking al-Qaida, the administration needs to answer some tough questions about the protection of our civil liberties." [29]
- Former Republican House Majority Leader John Boehner said, "I am concerned about what I read with regard to NSA databases of phone calls."[30]
- Democratic senator Patrick Leahy, ranking member of the Senate Judiciary Committee, said "Are you telling me that tens of millions of Americans are involved with al-Qaida? These are tens of millions of Americans who are not suspected of anything. ... Where does it stop?"[29]
- On May 15, 2006, FCC Commissioner Copps called for the FCC to open an inquiry into the lawfulness of the disclosure of America's phone records.[31]
- In May, 2006, Pat Robertson called the NSA wire-tapping a "tool of oppression." [32]
- In May 2006, former majority leader Trent Lott stated "What are people worried about? What is the problem? Are you doing something you're not supposed to?" [33]
- On May 16, 2006, both Verizon[34] and BellSouth[35] stated not only did they not hand over records, but that they were never contacted by the NSA in the first place.
- On June 30, 2006, Bloomberg reported the NSA "asked AT&T Inc. to help it set up a domestic call monitoring site seven months before the Sept. 11, 2001 attacks," citing court papers filed June 23, 2006 by lawyers in McMurray v. Verizon Communications Inc., 06cv3650, in the Southern District of New York.[36]
Polls
- In a new Newsweek poll of 1007 people conducted between May 11 and May 12, 2006, 53% of Americans said that "the NSA's surveillance program goes too far in invading privacy " and 57% said that in light of the NSA data-mining news and other executive actions the Bush-Cheney Administration has “gone too far in expanding presidential power" while 41% see it as a tool to "combat terrorism" and 35% think the Administration’s actions were appropriate.[37]
- According to a Washington Post telephone poll of 502 people, conducted on May 11, 63% of the American public supports the program, 35% do not; 66% were not bothered by the idea of the NSA having a record of their calls, while 34% were; 56% however thought it was right for the knowledge of the program to be released while 42% thought it was not.[38] These results were later contradicted by further polls on the subject, specifically a USA Today/Gallup poll showing 51% opposition and 43% support for the program.[39]
Political action
The Senate Armed Services Committee was scheduled to hold hearings with NSA whistle-blower Russell Tice the week following the revelation of the NSA call database. Tice indicated that his testimony would reveal information on additional illegal activity related to the NSA call database that has not yet been made public, and that even a number of NSA employees believe what they are doing is illegal. Tice also told the National Journal that he "will not confirm or deny" if his testimony will include information on spy satellites being used to spy on American citizens from space.[40] However, these hearings did not occur and the reason why is unknown.Lawsuits
Claims
- New Jersey
- Oregon
- Maine
- California (E.F.F.)
Justice Department response
The Los Angeles Times reported on May 14, 2006, that the U.S. Justice Department called for an end to an eavesdropping lawsuit against AT&T Corp., citing possible damage from the litigation to national security.[44][46]The US government indicated in an April 28 Statement of Interest in the AT&T case, that it intends to invoke the State Secrets Privilege in a bid to dismiss the action.
Legal status
The NSA call database was not approved by the Foreign Intelligence Surveillance Court (FISC) as required by the Foreign Intelligence Surveillance Act (FISA). The FISC was established in 1978 to secretly authorize access to call-identifying information and interception of communications of suspected foreign agents on U.S. soil.[44] Stanford Law School's Chip Pitts has a good overview of the relevant legal concerns in The Washington Spectator.[47]Separate from the question of whether the database is illegal under FISA, one may ask whether the call detail records are covered by the privacy protection of the Fourth Amendment of the U.S. Constitution. This is unclear. As the U.S. has no explicit constitutional guarantee on the secrecy of correspondence, any protection on communications is an extension by litigation of the privacy provided to "houses and papers".[48] This again is dependent on the flexuous requirement of a reasonable expectation of privacy.
The most relevant U.S. Supreme Court case is Smith v. Maryland.[49] In that case, the Court addressed pen registers, which are mechanical devices that record the numbers dialed on a telephone; a pen register does not record call contents. The Court ruled that pen registers are not covered by the Fourth Amendment: "The installation and use of a pen register, [...] was not a 'search,' and no warrant was required." More generally, "This Court consistently has held that a person has no legitimate expectation of privacy in information he [...] voluntarily turns over to third parties."
The data collecting activity may however be illegal under other telecommunications privacy laws.
The Stored Communications Act
The 1986 Stored Communications Act (18 U.S.C. § 2701) forbids turnover of information to the government without a warrant or court order, the law gives consumers the right to sue for violations of the act.[50][51]- "A governmental entity may require the disclosure by a provider of electronic communication service of the contents of a wire or electronic communication...only pursuant to a warrant issued using the procedures described in the Federal Rules of Criminal Procedure"[52]
- [Telephone providers] are authorized to...intercept...communications or to conduct electronic surveillance...if such provider...has been provided with a certification in writing by...the Attorney General of the United States that no warrant or court order is required by law, that all statutory requirements have been met, and that the specified assistance is required.[53]
Finally, the act allows any customer whose telephone company provided this information to sue that company in civil court for (a) actual damages to the consumer, (b) any profits by the telephone company, (c) punitive damages, and (d) attorney fees. The minimum amount a successful customer will recover under (a) and (b) is $1,000:
- "The court may assess as damages in a civil action under this section the sum of the actual damages suffered by the plaintiff and any profits made by the violator as a result of the violation, but in no case shall a person entitled to recover receive less than the sum of $1,000. If the violation is willful or intentional, the court may assess punitive damages. In the case of a successful action to enforce liability under this section, the court may assess the costs of the action, together with reasonable attorney fees determined by the court." (18 U.S.C. § 2707(c) damages)[52]
Communications Assistance for Law Enforcement Act
President Clinton signed into law the Communications Assistance for Law Enforcement Act of 1994, after it was passed in both the House and Senate by a voice vote. That law is an act "to make clear a telecommunications carrier's duty to cooperate in the interception of communications for law enforcement purposes, and for other purposes." The act states that a court order isn't the only lawful way of obtaining call information, saying, "A telecommunications carrier shall ensure that any interception of communications or access to call-identifying information effected within its switching premises can be activated only in accordance with a court order or other lawful authorization."[54]Historical background
Main article: Church Committee
The FISC was inspired by the recommendations of the Church Committee,[55]
which investigated a wide range of intelligence and
counter-intelligence incidents and programs, including some U.S. Army
programs and the FBI program COINTELPRO.In 1971, the US media reported that COINTELPRO targeted thousands of Americans during the 1960s, after several stolen FBI dossiers were passed to news agencies.[56] The Church Committee Senate final report, which investigated COINTELPRO declared that:
“ | Too many people have been spied upon by too many Government agencies and too much information has been collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret informants, but also using other intrusive techniques such as wiretaps, microphone "bugs," surreptitious mail opening, and break-ins, has swept in vast amounts of information about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous -- and even of groups suspected of associating with potentially dangerous organizations -- have continued for decades, despite the fact that those groups did not engage in unlawful activity.[57][58] | ” |
Legality
The legality of blanket wiretapping has never been sustained in court, but on July 10, 2008 the US Congress capitulated to the administration in granting blanket immunity to the administration and telecom industry for potentially illegal domestic surveillance. [59] The bill was passed during the crucible of the 2008 presidential campaign, and was supported by then-Sen. Barack Obama, D-Ill., who was campaigning against Sen. John McCain, R-Ariz., for the presidency.[59]Obama provided qualified support for the bill. He promised to "carefully monitor" the program for abuse, but said that, "Given the legitimate threats we face, providing effective intelligence collection tools with appropriate safeguards is too important to delay. So I support the compromise."[59] It is difficult to argue that appropriate safeguards are in place, when CDRs from all the major telecommunications companies are provided to the NSA.
Data Source Provided From : From Wikipedia
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
NSA warrantless surveillance controversy
The NSA warrantless surveillance controversy (AKA "Warrantless Wiretapping") concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the "terrorist surveillance program",[1] part of the broader President's Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court.[2] Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.
During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines.[3] However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in "overcollection" of domestic communications in excess of the FISA court's authority, but claimed that the acts were unintentional and had since been rectified.[4]
Overview
All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an "apparently accidental" "glitch" resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation's major telecommunication companies' major interconnect locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such "domestic" intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]
After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times.[16] The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.[17]
Gonzales said the program authorizes warrantless intercepts where the government "has a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda." and that one party to the conversation is "outside of the United States".[18] The revelation raised immediate concern among elected officials, civil right activists, legal scholars and the public at large about the legality and constitutionality of the program and the potential for abuse. Since then, the controversy has expanded to include the press's role in exposing a classified program, the role and responsibility of Congress in its executive oversight function and the scope and extent of Presidential powers under Article II of the Constitution.[19]
Developments
In mid-August 2007, a three-judge panel of the United States Court of Appeals for the Ninth Circuit heard arguments in two lawsuits challenging the surveillance program. The appeals were the first to reach the court after dozens of civil suits against the government and telecommunications companies over NSA surveillance were consolidated last year before the chief judge of the United States District Court for the Northern District of California, Vaughn R. Walker. One of the cases is a class-action lawsuit against AT&T, focusing on allegations that the company provided the NSA with its customers' phone and Internet communications for a vast data-mining operation. Plaintiffs in the second case are the al-Haramain Foundation Islamic charity and two of its lawyers.[20][21]On November 16, 2007, the three judges — M. Margaret McKeown, Michael Daly Hawkins, and Harry Pregerson — issued a 27-page ruling that the charity, the Al-Haramain Islamic Foundation, could not introduce a key piece of evidence in its case because it fell under the government's claim of state secrets, although the judges said that "In light of extensive government disclosures, the government is hard-pressed to sustain its claim that the very subject matter of the litigation is a state secret."[22][23]
In an August 14, 2007, question-and-answer session with the El Paso Times newspaper which was published on August 22, Director of National Intelligence Mike McConnell confirmed for the first time that the private sector helped the warrantless surveillance program. McConnell argued that the companies deserved immunity for their help: "Now if you play out the suits at the value they're claimed, it would bankrupt these companies".[24] Plaintiffs in the AT&T suit subsequently filed a motion with the court to have McConnell's acknowledgement admitted as evidence in their case.[25]
The program may face an additional legal challenge in the appeal of two Albany, New York, men convicted of criminal charges in an FBI anti-terror sting operation. Their lawyers say they have evidence the men were the subjects of NSA electronic surveillance, which was used to obtain their convictions but not made public at trial or made available in response to discovery requests by defense counsel at that time.[26]
In an unusual related legal development, on October 13, 2007, The Washington Post reported that Joseph P. Nacchio, the former CEO of Qwest Communications, is appealing an April 2007 conviction on 19 counts of insider trading by alleging that the government withdrew opportunities for contracts worth hundreds of millions of dollars after Qwest refused to participate in an unidentified National Security Agency program that the company thought might be illegal. According to court documents unsealed in Denver in early October as part of Nacchio's appeal, the NSA approached Qwest about participating in a warrantless surveillance program more than six months before the Sept. 11, 2001, attacks which have been cited by the government as the main impetus for its efforts. Nacchio is using the allegation to try to show why his stock sale should not have been considered improper.[27] According to a lawsuit filed against other telecommunications companies for violating customer privacy, AT&T began preparing facilities for the NSA to monitor "phone call information and Internet traffic" seven months before 9/11.[28]
On August 17, 2007, the Foreign Intelligence Surveillance Court said it would consider a request filed by the American Civil Liberties Union which asked the intelligence court to make public its recent, classified rulings on the scope of the government's wiretapping powers. Judge Colleen Kollar-Kotelly, presiding judge of the FISC, signed an order calling the ACLU's motion "an unprecedented request that warrants further briefing."[29] The FISC ordered the government to respond on the issue by August 31, saying that anything involving classified material could be filed under court seal.[30][31] On the August 31 deadline, the National Security Division of the Justice Department filed a response in opposition to the ACLU's motion with the court.[32]
In previous developments, the case ACLU v. NSA was dismissed on July 6, 2007 by the United States Court of Appeals for the Sixth Circuit.[33] The court did not rule on the spying program's legality. Instead, its 65-page opinion declared that the American Civil Liberties Union and the others who brought the case - including academics, lawyers and journalists - did not have the legal standing to sue because they could not demonstrate that they had been direct targets of the clandestine surveillance.[34] Detroit District Court judge Anna Diggs Taylor had originally ruled on August 17, 2006 that the program is illegal under FISA as well as unconstitutional under the First and Fourth Amendments of the United States Constitution.[35][36][37] Judicial Watch, a watchdog group, discovered that at the time of the ruling Taylor "serves as a secretary and trustee for a foundation that donated funds to the ACLU of Michigan, a plaintiff in the case."[38] On February 19, 2008, the U.S. Supreme Court, without comment, turned down an appeal from the American Civil Liberties Union, letting stand the earlier decision dismissing the case.[39]
On September 28, 2006 the U.S. House of Representatives passed the Electronic Surveillance Modernization Act (H.R. 5825).[40] That bill now has been passed to the U.S. Senate where three competing, mutually-exclusive, bills—the Terrorist Surveillance Act of 2006 (S.2455) (the DeWine bill), the National Security Surveillance Act of 2006 (S.2455) (the Specter bill), and the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S.3001) (the Specter-Feinstein bill) -- were themselves referred for debate to the full Senate by the Senate Judiciary Committee on September 13, 2006.[41] Each of these bills would in some form broaden the statutory authorization for electronic surveillance, while still subjecting it to some restrictions. The Specter-Feinstein bill would extend the peacetime period for obtaining retroactive warrants to seven days and implement other changes to facilitate eavesdropping while maintaining FISA court oversight. The DeWine bill, the Specter bill, and the Electronic Surveillance Modernization Act (passed by the House) would all authorize some limited forms or periods of warrantless electronic surveillance subject to additional programmatic oversight by either the FISC (Specter bill) or Congress (DeWine and Wilson bills).
On January 17, 2007, Attorney General Alberto Gonzales informed U.S. Senate leaders by letter that the program would not be reauthorized by the President.[2] "Any electronic surveillance that was occurring as part of the Terrorist Surveillance Program will now be conducted subject to the approval of the Foreign Intelligence Surveillance Court," according to his letter.[42]
On September 18, 2008, the Electronic Frontier Foundation (EFF), an Internet-privacy advocacy group, filed a new lawsuit against the NSA, President George W. Bush, Vice President Dick Cheney, Cheney's chief of staff David Addington, former Attorney General and White House Counsel Alberto Gonzales and other government agencies and individuals who ordered or participated in the warrantless surveillance. They sued on behalf of AT&T customers to seek redress for what the EFF alleges to be an illegal, unconstitutional, and ongoing dragnet surveillance of their communications and communications records. An earlier, ongoing suit by the EFF may be bogged down by the recent changes to FISA provisions, but these are not expected to impact this new case.[43][44]
On January 23, 2009, the administration of President Barack Obama adopted the same position as his predecessor when it urged U.S. District Judge Vaughn Walker to set aside a ruling in Al-Haramain Islamic Foundation et al. v. Obama, et al.[45] The Obama administration also sided with the former administration in its legal defense of July, 2008 legislation that immunized the nation's telecommunications companies from lawsuits accusing them of complicity in the eavesdropping program, according to testimony by Attorney General Eric Holder.[46]
On March 31, 2010, Judge Vaughn R. Walker, chief judge of the Federal District Court in San Francisco, ruled that the National Security Agency’s program of surveillance without warrants was illegal when it intercepted phone calls of Al Haramain. Declaring that the plaintiffs had been "subjected to unlawful surveillance", the judge said the government was liable to pay them damages.[47]
Trailblazer and whistleblowing prosecution
The Trailblazer Project, an NSA IT project that began in 2000, has also been linked to warrantless surveillance. It was chosen over ThinThread, which had included some privacy protections. Three ex-NSA staffers, William Binney, J. Kirke Wiebe, and Ed Loomis, all of whom had quit NSA over concerns about the legality of the agency's activities, teamed with Diane Roark, a staffer on the House Intelligence Committee, to ask the Inspector General to investigate. A major source for the IG report was Thomas Andrews Drake, an ex-Air Force senior NSA official with an expertise in computers. Siobhan Gorman of The Baltimore Sun published a series of articles about Trailblazer in 2006-2007.The FBI agents investigating the 2005 The New York Times story eventually made their way to The Baltimore Sun story, and then to Binney, Wiebe, Loomis, Roark, and Drake. In 2007 armed FBI agents raided the houses of Roark, Binney, and Wiebe. Binney claimed they pointed guns at his head. Wiebe said it reminded him of the Soviet Union. None were charged with crimes except for Drake. In 2010 he was indicted under the Espionage Act of 1917, as part of Obama's unprecedented crackdown on leakers.[48][49] The charges against him were dropped in 2011 and he pled to a single misdemeanor.
Background
FISA
Main article: Foreign Intelligence Surveillance Act
The 1978 Foreign Intelligence Surveillance Act (FISA)
regulates U.S. government agencies' carrying out of physical searches,
and electronic surveillance, wherein a significant purpose is the
gathering of foreign intelligence information. "Foreign intelligence
information" is defined in 50 U.S.C. § 1801 as information necessary to protect the U.S. or its allies against actual or potential attack from a foreign power, sabotage or international terrorism. FISA defines a "foreign power" as a foreign government
or any faction(s) of a foreign government not substantially composed of
US persons, or any entity directed or controlled by a foreign
government. FISA provides for both criminal and civil liability for intentional electronic surveillance under color of law except as authorized by statute.FISA provides two documents for the authorization of surveillance. First, FISA allows the Justice Department to obtain warrants from the Foreign Intelligence Surveillance Court (FISC) before or up to 72 hours after the beginning of the surveillance. FISA authorizes a FISC judge to issue a warrant for the electronic cameras if "there is probable cause to believe that… the target of the electronic surveillance is a foreign power or an agent of a foreign power." 50 U.S.C. §1805(a)(3). Second, FISA permits the President or his delegate to authorize warrantless surveillance for the collection of foreign intelligence if "there is no substantial likelihood that the surveillance will acquire the contents of any communication to which a United States person is a party". 50 U.S.C. §1802(a)(1).[50]
NSA surveillance program
Main article: NSA electronic surveillance program
Soon after the September 11, 2001 attacks U.S. President George W. Bush issued an executive order that authorized the National Security Agency (NSA) to conduct surveillance of certain telephone calls without obtaining a warrant from the FISC as stipulated by FISA (see 50 U.S.C. § 1802 50 U.S.C. § 1809 ). The complete details of the executive order are not known, but according to statements by the administration,[51]
the authorization covers telephone calls originating overseas from or
to a person suspected of having links to terrorist organizations such as
al-Qaeda or its affiliates even when the other party to the call is within the US. The legality
of surveillance involving US persons and extent of this authorization
is at the core of this controversy which has steadily grown to include:- Constitutional issues concerning the separation of powers and the Fourth Amendment immunities.
- The effectiveness[52] and scope[53] of the program.
- The legality of the leaking and publication of classified information and the implications for U.S. national security arising from the disclosure.
- Adequacy of FISA as a tool for fighting terrorism
Authorization for Use of Military Force (AUMF) Resolution
About a week after the 9/11 attacks, Congress passed the Authorization for Use of Military Force Against Terrorists (AUMF) which authorized the President to "use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons."The administration has argued that the language used in the AUMF implicitly authorized the President to exercise those powers "incident to the waging of war", including the collection of enemy intelligence, FISA provisions notwithstanding.[8]
On January 20, 2006, Senator Patrick Leahy (D-VT), the ranking Democrat on the Senate Judiciary Committee along with lone co-sponsor Senator Ted Kennedy (D-MA) introduced S. Res. 350, a resolution "expressing the sense of the Senate that Senate Joint Resolution 23 (107th Congress), as adopted by the Senate on September 14, 2001, and subsequently enacted as the Authorization for Use of Military Force does not authorize warrantless domestic surveillance of United States citizens."[54][55] This non-binding resolution died in the Senate without being brought up for debate or being voted upon.[56]
Legal issues
The NSA surveillance controversy involves legal issues that fall into two broad disciplines: statutory interpretation and Constitutional law. Statutory interpretation is the process of interpreting and applying legislation to the facts of a given case. Constitutional law is the body of law that governs the interpretation of the United States Constitution and covers areas of law such as the relationship between the federal government and state governments, the rights of individuals, and other fundamental aspects of the application of government authority in the United States.[57]Statutory interpretation issues
A court of law faced with determining the legality of the NSA program would have to first grapple with the statutory interpretation of FISA itself[58] Since FISA has the potential to raise certain Constitutional conflicts relating to the powers assigned to Congress and the Executive in Articles I and II respectively, the canon of constitutional avoidance requires a court to first determine if the FISA statutes can be "fairly read" to avoid Constitutional conflict.[59] Assuming such an interpretation can be found, the question then turns to whether or not the NSA wiretap authorizations were violative of the statute as so read. Without knowing how a court would resolve the first issue and the classified specifics of the program itself, it is not possible to predict the outcome.FISA exclusivity provision
This section may contain original research. (January 2010) |
The U.S. Supreme Court faced a similar issue in Hamdi v. Rumsfeld where the government claimed that the AUMF authorized the President to detain U.S. citizens designated as an enemy combatant despite its lack of specific language to that intent and notwithstanding the provisions of 18 U.S.C. § 4001(a) which requires that the United States government cannot detain an American citizen except by an act of Congress. In that case, the Court ruled:the DOJ’s argument rests on an unstated general “implication” from the AUMF that directly contradicts express and specific language in FISA. Specific and “carefully drawn” statutes prevail over general statutes where there is a conflict. Morales v. TWA, Inc., 504 U.S. 374, 384-85 (1992) (quoting International Paper Co. v. Ouelette, 479 U.S. 481, 494 (1987)). In FISA, Congress has directly and specifically spoken on the question of domestic warrantless wiretapping, including during wartime, and it could not have spoken more clearly.
In Hamdan v. Rumsfeld however, the court rejected the government's argument that the AUMF implicitly authorized the President to establish military commissions in violation of the UCMJ. The opinion of the Court held:[B]ecause we conclude that the Government’s second assertion ["that §4001(a) is satisfied, because Hamdi is being detained "pursuant to an Act of Congress" [the AUMF] is correct, we do not address the first. In other words, for the reasons that follow, we conclude that the AUMF is explicit congressional authorization for the detention of individuals .. and that the AUMF satisfied §4001(a)'s requirement that a detention be "pursuant to an Act of Congress"
Determining when explicit congressional authorization is and is not required appears by this decision to require a court to first determine whether an implicit authorization would amount to a "repeal by implication" of the governing Act.Neither of these congressional Acts, [AUMF or ATC] however, expands the President’s authority to convene military commissions. First, while we assume that the AUMF activated the President’s war powers, see Hamdi v. Rumsfeld, 542 U. S. 507 (2004) (plurality opinion), and that those powers include the authority to convene military commissions in appropriate circumstances, see id., at 518; Quirin, 317 U. S., at 28–29; see also Yamashita, 327 U. S., at 11, there is nothing in the text or legislative history of the AUMF even hinting that Congress intended to expand or alter the authorization set forth in Article 21 of the UCMJ. Cf. Yerger, 8 Wall., at 105 (“Repeals by implication are not favored”)
The exclusivity clause also raises a separation of powers issue. (See Constitutional law issues below)
Domestic versus foreign intelligence
The arguments against the legality of the NSA fall into two broad categories, those who argue that FISA raises no Constitutional issues and therefore the NSA program is illegal on its face[61][62] and those who argue that FISA (perhaps purposefully) raises a Constitutional conflict, one which they believe should be resolved in Congress' favor.[63]Common to both of these views is the argument that the participation of "US persons" as defined in FISA 50 U.S.C. § 1801 renders the objectional intercepts "domestic" in nature.[64] Those advocating the "no constitutional issue" position, argue that Congress has the authority it needs to legislate in this area under Article I and the Fourth Amendment[65] while those who see a constitutional conflict[63] acknowledge that the existing delineation between Congressional and Executive authority in this area is not clear[66] but that Congress, in including the exclusivity clause in FISA, meant to carve out a legitimate role for itself in this arena.
The administration holds that an exception to the normal warrant requirements exists when the purpose of the surveillance is to prevent attack from a foreign threat. Such an exception has been upheld at the Circuit Court level when the target was a foreign agent residing abroad,[67][68] a foreign agent residing in the US,[69][70][71][72] and a US citizen abroad.[73] The warrantless exception was struck down when both the target and the threat was deemed domestic.[74] The legality of targeting US persons acting as agents of a foreign power and residing in this country has not been addressed by the US Supreme Court, but has occurred at least once, in the case of Aldrich Ames.[75]
Administration's statutory position
The Administration's position with regard to statutory interpretation, as outlined in the DOJ whitepaper, is to avoid what it has termed the "difficult Constitutional questions" by- interpreting the FISA "except as authorized by statute" clause to mean that Congress allowed for future legislative statute(s) to provide exceptions to the FISA warrant requirements,[76]
- that the AUMF was such a statute, and
- as such, implicitly provided executive authority to authorize warrantless interception of enemy communication.
The administration also adds that the program is legal under Title II of the USA PATRIOT Act entitled Enhanced Surveillance Procedures,[citation needed] although it is not relying upon the domestic law enforcement provisions of the PATRIOT Act for authorization of any of the NSA program activities.[citation needed] The President had said prior to this, that Americans' civil liberties were being protected and that purely domestic wiretapping was being conducted pursuant to warrants under applicable law, including the Patriot Act.[77][Be it resolved] [t]hat the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.
These arguments must be compared to the language of the FISA itself, which states:
Because the law only authorizes the President to bypass the FISA court during the first 15 days of a war declared by Congress (see "Declaration of war"), the administration's argument rests on the assumption that the AUMF gave the President more power than was understood as absolutely implicit in any Congressional "declaration of war" at the time of the statute's enactment. However, as a "declaration of war by the Congress" encompasses all military actions so declared, no matter how small, brief or otherwise constrained by Congress, the above citation could be seen as setting not a default or typical level of Presidential wartime authority, but instead a presumptive minimum, which might more often than not be extended (explicitly or implicitly) by Congress's war declaration.Notwithstanding any other law, the President, through the Attorney General, may authorize electronic surveillance without a court order under this subchapter to acquire foreign intelligence information for a period not to exceed fifteen calendar days following a declaration of war by the Congress.—[78]
Duty to notify Congress
According to Peter J. Wallison, former White House Counsel to President Ronald Reagan: "It is true, of course, that a president's failure to report to Congress when he is required to do so by law is a serious matter, but in reality the reporting requirement was a technicality that a President could not be expected to know about."[79] In regard to this program, a Gang of Eight (eight key members of Congress, thirteen in this case between the 107th and 109th Congressional Sessions) have been kept informed to some degree:- Speaker of the House: (Dennis Hastert (R-IL))
- House Minority Leader: (Dick Gephardt (D-MO); Nancy Pelosi (D-CA))
- Chair and Ranking Member of House Permanent Select Committee on Intelligence: (Porter Goss (R-FL); Peter Hoekstra (R-MI); Jane Harman (D-CA))
- Senate Majority Leader: (Trent Lott (R-MS); Bill Frist (R-TN))
- Senate Minority Leader: (Tom Daschle (D-SD); Harry Reid (D-NV))
- Chair and Vice Chair of Senate Select Committee on Intelligence: (Pat Roberts (R-KS); Bob Graham (D-FL); Jay Rockefeller (D-WV))
The administration contends that with regard to the NSA surveillance program, the administration fulfilled its notification obligations by briefing key members of Congress (thirteen individuals in this case between the 107th and 109th Congressional sessions) have been briefed on the NSA program more than a dozen times[citation needed] but they were forbidden from sharing information about the program with other members or staff.[citation needed]
On January 18, 2006 the Congressional Research Service released a report, "Statutory Procedures Under Which Congress Is To Be Informed of U.S. Intelligence Activities, Including Covert Actions".[82][83] That report found that "[b]ased upon publicly reported descriptions of the program, the NSA surveillance program would appear to fall more closely under the definition of an intelligence collection program, rather than qualify as a covert action program as defined by statute", and, therefore, concluded there was no specific statutory basis for limiting briefings on the terrorist surveillance program to the Gang of Eight.[84] However, the report goes on to note in its concluding paragraph that limited disclosure is also permitted under the statute "in order to protect intelligence sources and methods".[85]
Thus, although the specific statutory "Gang of Eight" notification procedure for covert action would not seem to apply to the NSA program, it is not clear if a limited notification procedure intended to protect sources and methods is expressly prohibited. Additionally, should the sources and methods exception apply it will require a factual determination as to whether it should apply to disclosure of the program itself or only to specific sensitive aspects.
Constitutional law issues
The constitutional debate surrounding executive authorization of warrantless surveillance is principally about separation of powers ("checks and balances"). If, as discussed above, no "fair reading" of FISA can be found in satisfaction of the canon of avoidance, these issues will have to be decided at the appellate level, by United States courts of appeals. It should be noted that in such a separation of powers dispute, the burden of proof is placed upon the Congress to establish its supremacy in the matter: the Executive branch enjoys the presumption of authority until an Appellate Court rules against it.[citation needed]Article I and II
Article I vests Congress with the sole authority "To make Rules for the Government and Regulation of the land and naval Forces" and "To make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof." The U.S. Supreme Court has used the "necessary and proper" clause of Article I to affirm broad Congressional authority to legislate as it sees fit in the domestic arena[citation needed] but has limited its application in the arena of foreign affairs. In the landmark Curtiss-Wright decision, Justice Sutherland writes in his opinion of the Court:Article II vests the President with power as "Commander in Chief of the Army and Navy of the United States," and requires that he "shall take Care that the Laws be faithfully executed".The ["powers of the federal government in respect of foreign or external affairs and those in respect of domestic or internal affairs"] are different, both in respect of their origin and their nature. The broad statement that the federal government can exercise no powers except those specifically enumerated in the Constitution, and such implied powers as are necessary and proper to carry into effect the enumerated powers, is categorically true only in respect of our internal affairs.
The U.S. Supreme Court has historically used Article II to justify wide deference to the President in the arena of foreign affairs.[citation needed] Two historical and recent Supreme Court cases define the secret wiretapping by the NSA. Quoting again from the Curtiss-Wright decision:
The extent of the President's power as Commander-in-Chief has never been fully defined, but two U.S. Supreme Court cases are considered seminal in this area:[86][87] Youngstown Sheet and Tube Co. v. Sawyer and Curtiss-Wright.It is important to bear in mind that we are here dealing not alone with an authority vested in the President by an exertion of legislative power, but with such an authority plus the very delicate, plenary and exclusive power of the President as the sole organ of the federal government in the field of international relations–a power which does not require as a basis for its exercise an act of Congress, but which, of course, like every other governmental power, must be exercised in subordination to the applicable provisions of the Constitution.
In addition, two relatively new cases, Hamdi v. Rumsfeld and Hamdan v. Rumsfeld, have clarified, and in the case of Hamdan limited, the scope of executive power to detain and try suspected terrorists as enemy combatants.
In Hamdan, the Court's opinion in footnote 23, rejected the notion that Congress is impotent to regulate the exercise of executive war powers:
Whether "proper exercise" of Congressional war powers includes authority to regulate the gathering of foreign intelligence, which in other rulings[citation needed] has been recognized as "fundamentally incident to the waging of war", is a historical point of contention between the Executive and Legislative branches.[8][88]Whether or not the President has independent power, absent congressional authorization, to convene military commissions, he may not disregard limitations that Congress has, in proper exercise of its own war powers, placed on his powers. See Youngstown Sheet & Tube Co. v. Sawyer, 343 U. S. 579, 637 (1952) (Jackson, J., concurring). The Government does not argue otherwise.
As noted in "Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information", published by The Congressional Research Service:
The same report makes clear the Congressional view that intelligence gathered within the U.S. and where "one party is a U.S. person" qualifies as domestic in nature and as such completely within their purview to regulate, and further that Congress may "tailor the President’s use of an inherent constitutional power":A review of the history of intelligence collection and its regulation by Congress suggests that the two political branches have never quite achieved a meeting of the minds regarding their respective powers. Presidents have long contended that the ability to conduct surveillance for intelligence purposes is a purely executive function, and have tended to make broad assertions of authority while resisting efforts on the part of Congress or the courts to impose restrictions. Congress has asserted itself with respect to domestic surveillance, but has largely left matters involving overseas surveillance to executive self-regulation, subject to congressional oversight and willingness to provide funds.
The passage of FISA and the inclusion of such exclusivity language reflects Congress’s view of its authority to cabin the President’s use of any inherent constitutional authority with respect to warrantless electronic surveillance to gather foreign intelligence. The Senate Judiciary Committee articulated its view with respect to congressional power to tailor the President’s use of an inherent constitutional power:
- The basis for this legislation [FISA] is the understanding — concurred in by the Attorney General — that even if the President has an “inherent” constitutional power to authorize warrantless surveillance for foreign intelligence purposes, Congress has the power to regulate the exercise of this authority by legislating a reasonable warrant procedure governing foreign intelligence surveillance
Fourth Amendment issues
The Fourth Amendment to the United States Constitution is part of the Bill of Rights and helps guard against "unreasonable" searches and seizures by agents of the government. It is solely a right of the people that neither the Executive nor Legislative branch can lawfully abrogate, not even if acting in concert: no statute can make an unreasonable search reasonable, nor a reasonable search unreasonable.The term "unreasonable" is deliberately imprecise but connotes the sense that there is a rational basis for the search and that it is not an excessive imposition upon the individual given the motivation for and circumstances of the search, and is in accordance with customary societal norms. It is conceived that a judge will be sufficiently distanced from the authorities seeking a warrant that they can render an impartial decision unaffected by any prejudices or improper motivations they (or the legislators who enacted a law they are seeking to enforce) may harbor.
An individual who believes their Fourth Amendment rights have been violated by an unreasonable search or seizure may file a civil suit for monetary compensation and seek a court-ordered end to a pattern or practice of such unlawful activities by government authorities. Such civil rights violations are sometimes punishable by state or federal law. Evidence obtained in an unlawful search or seizure is generally inadmissible in a criminal trial.
The law countenances searches without warrant as "reasonable" in numerous circumstances, among them (see below): the persons, property, and papers of individuals crossing the border of the United States and those of paroled felons; in prisons, public schools and government offices; and of international mail. Although these are undertaken as a result of statute or Executive order, they should not be seen as deriving their legitimacy from these, rather, the Fourth Amendment explicitly allows reasonable searches, and the government has instituted some of these as public policy.
The Supreme Court held in Katz v. United States (1967), that the monitoring and recording of private conversations within the United States constitutes a "search" for Fourth Amendment purposes, and therefore the government must generally obtain a warrant before undertaking such domestic recordings.
The protection of "private conversations" has been held to apply only to conversations where the participants have not only manifested a desire but also a reasonable expectation that their conversation is indeed private and that no other party is listening in. In the absence of such a reasonable expectation, the Fourth Amendment does not apply, and surveillance without warrant does not violate it. Privacy is clearly not a reasonable expectation in communications to persons in the many countries whose governments openly intercept electronic communications, and is of dubious reasonability in countries against which the United States is waging war.
The law also recognizes a distinction between domestic surveillance taking place within U.S. borders and foreign surveillance of non-U.S. persons either in the U.S. or abroad.[89] In United States v. Verdugo-Urquidez, the Supreme Court reaffirmed the principle that the Constitution does not extend protection to non-U.S. persons located outside of the United States, so no warrant would be required to engage in even physical searches of non-U.S. citizens abroad.
The U.S. Supreme Court has never ruled on the constitutionality of warrantless searches targeting foreign powers or their agents within the US. There have been, however, a number of Circuit Court rulings upholding the constitutionality of such warrantless searches.[90] In USA v. Osama bin Laden, the Second Circuit noted that "no court, prior to FISA, that was faced with the choice, imposed a warrant requirement for foreign intelligence searches undertaken within the United States." Assistant Attorney General William Moschella in his written response to questions from the House Judiciary Committee explained that in the administration's view, this unanimity of pre-FISA Circuit Court decisions vindicates their argument that warrantless foreign-intelligence surveillance authority existed prior to FISA and since, as these ruling indicate, that authority derives from the Executive's inherent Article II powers, they may not be encroached by statute.[91] In 2002, the United States Foreign Intelligence Surveillance Court of Review (Court of Review) met for the first time and issued an opinion (In Re Sealed Case No. 02-001) which seems to echo that view. They too noted all the Federal courts of appeal having looked at the issue had concluded that there was constitutional power for the president to conduct warrantless foreign intelligence surveillance. Furthermore, based on these rulings it "took for granted such power exits" and ruled that under this presumption, "FISA could not encroach on the president's constitutional power." Professor Orin Kerr argues in rebuttal that the part of In Re Sealed Case that dealt with FISA (rather than the Fourth Amendment) was nonbinding obiter dicta and that the argument does not restrict Congress's power to regulate the executive in general.[92]
Harold Koh, dean of Yale Law School, Suzanne Spaulding, former general counsel for the Intelligence Committees of the House and Senate, and former Counsel to the President John Dean, contend that FISA clearly makes the wiretapping illegal and subject to the criminal penalties of FISA,[62] (in seeming disagreement with the FISA Court of Review finding above) and that the president's own admissions already constitute sufficient evidence of a violation of the Fourth Amendment, without requiring further factual evidence. Professor John C. Eastman, in his analysis, prepared at the behest of the House Judiciary Committee, comparing the CRS and DOJ reports, concluded instead that under the Constitution and ratified by both historical and Supreme Court precedent, "the President clearly has the authority to conduct surveillance of enemy communications in time of war and of the communications to and from those he reasonably believes are affiliated with our enemies. Moreover, it should go without saying that such activities are a fundamental incident of war."[93]
Border search exception
Orin S. Kerr, associate professor of law at The George Washington University Law School[94] and a leading scholar in the subjects of computer crime law and internet surveillance,[95] points to an analogy between the NSA intercepts and searches allowed by the Fourth Amendment under the border search exception.The border search exception permits searches at the border of the United States "or its functional equivalent." (United States v. Montoya De Hernandez, 473 U.S. 531, 538 (1985)). The idea here is that the United States as a sovereign nation has a right to inspect stuff entering or exiting the country as a way of protecting its sovereign interests, and that the Fourth Amendment permits such searches. Courts have applied the border search exception in cases of PCs and computer hard drives; if you bring a computer into or out of the United States, the government can search your computer for contraband or other prohibited items at the airport or wherever you are entering or leaving the country. See, e.g., United States v. Ickes, 393 F.3d 501 (4th Cir. 2005) (Wilkinson, J.)...At the same time, I don't know of a rationale in the case law for treating data differently than physical storage devices. The case law on the border search exception is phrased in pretty broad language, so it seems at least plausible that a border search exception could apply to monitoring at an ISP or telephone provider as the "functional equivalent of the border," much like airports are the functional equivalent of the border in the case of international airline travel...the most persuasive case on point: United States v. Ramsey, [held] that the border search exception applies to all international postal mail, permitting all international postal mail to be searched.
Criminal prosecution under the NSA program
Evidence gathered without warrant may raise significant Fourth Amendment issues which could preclude its use in a criminal trial. As a general rule of law, evidence obtained improperly without lawful authority, may not be used in a criminal prosecution.[citation needed] The U.S. Supreme Court has never addressed the constitutionality of warrantless searches (which has been broadly defined by the court to include surveillance) targeting foreign powers or their agents, the admissibility of such evidence in a criminal trial nor whether it is permissible to obtain or use evidence gathered without warrant against US persons acting as agents of a foreign power.[citation needed]Presidential findings
The National Security Act of 1947[96] requires Presidential findings for covert acts. SEC. 503. [50 U.S.C. 413b] (a) (5) of that act states: "A finding may not authorize any action that would violate the Constitution or any statute of the United States."District Court findings
On August 17, 2006, Judge Anna Diggs Taylor of the United States District Court for the Eastern District of Michigan ruled in ACLU v. NSA that the Terrorist Surveillance Program was unconstitutional under the Fourth and First Amendments and enjoined the NSA from using the program to conduct electronic surveillance "in contravention of [FISA or Title III]".[36] In her ruling,[97] she wrote:Even some legal experts who agreed with the outcome have criticized the reasoning set forth in the opinion.[98] Others have argued that the perceived flaws in the opinion in fact reflect the Department of Justice's refusal to argue the legal merits of the program (they chose to focus solely on arguments about standing and state secrets grounds).[99]The President of the United States, a creature of the same Constitution which gave us these Amendments, has indisputably violated the Fourth in failing to procure judicial orders as required by FISA, and accordingly has violated the First Amendment Rights of these Plaintiffs as well.
On October 4, 2006, a panel of the United States Court of Appeals for the Sixth Circuit unanimously ruled that the government can continue the program while it appeals the lower court decision.[100][101]
On July 6, 2007 the Sixth Circuit dismissed the case, finding that the plaintiffs had no standing.
The Court found that:[102]
[T]he plaintiffs do not — and because of the State Secrets Doctrine cannot — produce any evidence that any of their own communications have ever been intercepted by the NSA, under the TSP, or without warrants. Instead, they assert a mere belief, which they contend is reasonable and which they label a “well founded belief,”...
Implicit in each of the plaintiffs' alleged injuries is the underlying possibility — which the plaintiffs label a "well founded belief" and seek to treat as a probability or even a certainty — that the NSA is presently intercepting, or will eventually intercept, communications to or from one or more of these particular plaintiffs, and that such interception would be detrimental to the plaintiffs' clients, sources, or overseas contacts. This is the premise upon which the plaintiffs' entire theory is built. But even though the plaintiffs' beliefs — based on their superior knowledge of their contacts' activities — may be reasonable, the alternative possibility remains that the NSA might not be intercepting, and might never actually intercept, any communication by any of the plaintiffs named in this lawsuit.
Corporate confidentiality analysis
Corporate secrecy is also an issue. Wired reported: In a letter to the EFF, AT&T objected to the filing of the documents in any manner, saying that they contain sensitive trade secrets and could be "used to 'hack' into the AT&T network, compromising its integrity."[103] However, Chief Judge Vaughn Walker stated, during the September 12, 2008 hearing in the class-action lawsuit filed by the EFF, that the Klein evidence could be presented in court, effectively ruling that AT&T's trade secret and security claims were unfounded.Third-party legal analytical arguments
Arguing that the program is legal or probably legal based upon War Powers Resolution
The majority of legal arguments supporting the NSA warrantless surveillance program have been based on the War Powers Resolution. There have not been any other noteworthy types of supporting legal arguments. The War Powers Resolution has been questioned as unconstitutional since its creation, and its adaptation to the NSA warrantless surveillance program has been questionable.- John C. Eastman, Chapman Law professor and Director of the Claremont Institute Center for Constitutional Jurisprudence, wrote in a letter to House Judiciary Committee Chairman James Sensenbrenner on January 27, 2006, that the Congressional Research Service's assessment was institutionally biased against the President, ignored key constitutional text and Supreme Court precedent, and that the case made by the Department of Justice in support of the President's authority to conduct surveillance of enemy communications in time of war was compelling.[93]
- Robert Turner, Associate Director of the Center for National Security Law at the University of Virginia, testified before Congress on March 31, 2006, that "I believe the President has this authority by virtue of his “executive Power” vested in him by Article II, Section 1, of the Constitution. And if he needed any additional authority, the AUMF statute—enacted with but a single dissenting vote in the entire Congress—clearly empowers him to exercise the intelligence-gathering component of his Commander in Chief power as well."[104]
- Michael Stokes Paulsen, Professor at the University of St. Thomas, in a debate with Professors Heidi Kitrosser and Dale Carpenter of University of Minnesota Law School entitled Presidential Powers in Time of War[105]
The president’s power as military commander in chief, in time of constitutionally authorized war, of course includes the power to intercept enemy communications, including enemy communications with persons here in the United States who may be in league with the enemy, and to follow the chain of such communications where it leads, in order to wage the war against the enemy and, of vital importance, to protect the nation against further attacks.
- Letter from Senator Pat Roberts to Senator Arlen Specter Senator defending NSA program legality, February 3, 2006[106]
War Powers Resolution used against US citizens in an undeclared war and without Authorization for Use of Military Force is unconstitutional
Some people assert that the Patriot Act is not unconstitutional as pertaining to its implications on US citizens. Their arguments are based on the assertion that government has unlimited powers to protect against enemies during wartime. There have been no Declarations of war by the US that could include a direct declaration of war against US citizens. Under the War Powers Resolution the only option otherwise was to enact an authorization of the use of military force (which has been seen as unconstitutional since its creation. Under the War Powers Resolution Authorization for Use of Military Force Against Terrorists (AUMF) was enacted. The AUMF has been used as a basis for justifying the Patriot Act and related laws. The AUMF strictly states in Section 2: (a) IN GENERAL- That the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons. This declaration of war only goes so far though. Since it clearly identifies the enemy "nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons" & it states a war-time goal of "in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons." Therefore these "nations, organizations or persons" would have had to have been identified as having "planned, authorized, committed, or aided the (9/11) terrorist attacks... or harbored such organizations or persons." Since the language in the declaration of war clearly states that the declared enemy had to have been involved with a specific aspect of causing (planned, authorized, committed, aided, or harbored) 9/11, the enforcement of such policies is legally limited to those parties as well. The application of wartime powers worldwide (and within USA) assumed under these pretenses can be seen as an implicit interpretation of the law, although it explicitly states that the enemies must have been involved with 9/11.Since no US citizens have been identified as being involved in the 9/11 attacks, and since AUMF strictly states that war-time enemies are those who were involved in 9/11, extending these war-time powers to US citizens can be seen as unconstitutional or an undeclared war.
While the Patriot Act does not explicitly state that its powers are based on the AUMF, the opinions that its resulting actions are constitutional are. Without a wartime declaration or Authorization for Use of Military Force against a particular group, the US government would not have the ability to adopt limitless constitution-breaking powers, as such is strictly forbidden in the constitution. The Tenth Amendment explicitly states that powers not granted to the federal government nor prohibited to the states by the Constitution of the United States are reserved to the states or the people." The Ninth Amendment states that "The enumeration in the Constitution of certain rights shall not be construed to deny or disparage others retained by the people."
The Ninth Amendment bars denial of unenumerated rights if the denial is based on the enumeration of certain rights in the Constitution, but does not bar denial of unenumerated rights if the denial is based on the enumeration of certain powers in the Constitution.[107] Hence since the war-time powers have not been legally enacted against US citizens the enumeration of certain powers does not override the enumeration of certain rights. Without the backing of a declaration of war stating the US citizens as an enemy, the powers that have been enacted against US citizens under the Patriot Act are unconstitutional (as they violate 1st, 4th and other amendments).
Arguing that the program is illegal or probably illegal
The arguments against the legality of the NSA fall into two broad categories: those who argue that FISA raises no Constitutional issues and therefore the NSA program is illegal on its face,[62] and those who argue that FISA (perhaps purposefully) raises a Constitutional conflict which should be resolved in Congress' favor.[63]- On February 13, 2006, the American Bar Association (ABA) denounced the warrantless domestic surveillance program, accusing the President of exceeding his powers under the Constitution. The ABA also formulated a policy opposing any future government use of electronic surveillance in the United States for foreign intelligence purposes without obtaining warrants from a special secret court as required by the 1978 Foreign Intelligence Surveillance Act.[108]
- According to a report in The Boston Globe on February 2, 2006 three law professors, David D. Cole (Georgetown University), Richard Epstein (University of Chicago), and Philip Heymann (Harvard), said that what Bush is doing is unprecedented. Bush's claim that other presidents asserted that wartime powers supersede an act of Congress, "is either intentionally misleading or downright false," Cole said. He said Bush is misstating the In Re Sealed Case No. 02-001 ruling which supported Congressional regulation of surveillance. Epstein believes the United States Supreme Court would reject the Administration's argument and said, "I find every bit of this legal argument disingenuous...The president's position is essentially that (Congress) is not doing the right thing, so I'm going to act on my own." Professor Heymann, a former deputy US attorney general said, "The bottom line is, I know of no electronic surveillance for intelligence purposes since the Foreign Intelligence Surveillance Act was passed that was not done under the . . . statute."[109]
- Cole, Epstein, Heynmann and eleven other prominent legal scholars (Beth Nolan, Curtis Bradley, Geoffrey Stone, Harold Hongju Koh, Kathleen Sullivan, Laurence Tribe, Martin Lederman, Ronald Dworkin, Walter Dellinger, William S. Sessions and William Van Alstyne) wrote a letter to Congress that appeared in the New York Review of Books on February 9, 2006.[110]
They wrote that "the Justice Department's defense of what it concedes
was secret and warrantless electronic surveillance of persons within the
United States fails to identify any plausible legal authority for such
surveillance. Accordingly the program appears on its face to violate
existing law." They summarized:
In conclusion, the DOJ letter fails to offer a plausible legal defense of the NSA domestic spying program. If the administration felt that FISA was insufficient, the proper course was to seek legislative amendment, as it did with other aspects of FISA in the Patriot Act, and as Congress expressly contemplated when it enacted the wartime wiretap provision in FISA. One of the crucial features of a constitutional democracy is that it is always open to the President—or anyone else—to seek to change the law. But it is also beyond dispute that, in such a democracy, the President cannot simply violate criminal laws behind closed doors because he deems them obsolete or impracticable.
- Professor Peter Swire, the C. William O’Neill Professor of Law at the Ohio State University Moritz College of Law and Visiting Senior Fellow at the Center for American Progress, wrote a detailed "Legal FAQs on NSA Wiretaps" concluding that "[b]ased on the facts available to date, the wiretap program appears to be clearly illegal."[111] Prof. Swire has previously written a very detailed history and analysis of the Foreign Intelligence Surveillance Act, published in Volume 72 of the George Washington Law Review, at 1306 (2004) and previously chaired a White House Working Group, including the intelligence agencies, on how to update electronic surveillance law for the Internet Age.
- Robert Reinstein, dean of the law school at Temple University, has asserted that the warrantless domestic spying program is
a pretty straightforward case where the president is acting illegally... When Congress speaks on questions that are domestic in nature, I really can't think of a situation where the president has successfully asserted a constitutional power to supersede that... This is domestic surveillance over American citizens for whom there is no evidence or proof that they are involved in any illegal activity, and it is in contravention of a statute of Congress specifically designed to prevent this.
- Mr. Reinstein asserted that the broad consensus among legal scholars and national security experts is similar to his own analysis, and he predicted that the courts will rule that the program is unconstitutional.[112]
- Edward Lazarus, author, law professor and former U.S. Supreme Court clerk and federal prosecutor, has argued in articles such as "Warrantless Wiretapping: Why It Seriously Imperils the Separation of Powers, And Continues the Executive's Sapping of Power From Congress and the Courts", that "Unilateral executive power is tyranny, plain and simple".[113]
- Orin S. Kerr, a professor at The George Washington University Law School, prominent blogger and scholar of the legal framework of electronic surveillance has opined that the issues are complex, but that after his first analysis he concluded that the wiretapping probably does not infringe on Fourth Amendment constitutional rights, though it probably does violate FISA. President Bush has maintained he acted within "legal authority derived from the constitution" and that Congress "granted [him] additional authority to use military force against al Qaeda".[114] However, while the President may argue that the necessary statutory authority to override FISA's warrant provisions is provided by the authorization to use "all necessary force" in the employment of military resources to protect the security of the United States, and that the use of wiretapping is a qualifying use of force (under the terms of the authorization for the use of military force against al-Qaida as found in Senate Joint Resolution 23, 2001), Kerr believes that this justification is ultimately unpersuasive, as is the argument that the President's power as the Commander-in-Chief (as derived from Article Two of the United States Constitution) provides him with the necessary constitutional authority to circumvent FISA during a time of war.[115] Kerr cautiously estimates that about eight of the nine Supreme Court justices would agree with him that Article Two cannot trump statutes like FISA.[116]
- Robert M. Bloom, Professor of Law at Boston College, says this in a paper entitled "The
Constitutional Infirmity of Warrantless NSA Surveillance: The Abuse of
Presidential Power and the Injury to the Fourth Amendment,"
published on February 19, 2007, which he co-authored with William J.
Dunn, a former Defense Department intelligence analyst, also of BC Law
School:[117]
President Bush argues that the surveillance program passes constitutional inquiry based upon his constitutionally delegated war and foreign policy powers, as well as from the congressional joint resolution passed following the September 11, 2001 terrorist attacks. These arguments fail to supersede the explicit and exhaustive statutory framework provided by Congress and amended repeatedly since 2001 for judicial approval and authorization of electronic surveillance. The specific regulation by Congress based upon war powers shared concurrently with the President provides a constitutional requirement that cannot be bypassed or ignored by the President. The President’s choice to do so violates the Constitution and risks the definite sacrifice of individual rights for the speculative gain from warrantless action.
- Glenn Greenwald, constitutional lawyer, author and prominent blogger (Greenwald's legal blog)[118] arguing that the NSA program is illegal summarized:[119]
Ultimately, though, the entire legal debate in the NSA scandal comes down to these few, very clear and straightforward facts: Congress passed a law in 1978 making it a criminal offense to eavesdrop on Americans without judicial oversight. Nobody of any significance ever claimed that that law was unconstitutional. The Administration not only never claimed it was unconstitutional, but Bush expressly asked for changes to the law in the aftermath of 9/11, thereafter praised the law, and misled Congress and the American people into believing that they were complying with the law. In reality, the Administration was secretly breaking the law, and then pleaded with The New York Times not to reveal this. Once caught, the Administration claimed it has the right to break the law and will continue to do so.
- After the Supreme Court's judgment in Hamdan v. Rumsfeld, Greenwald wrote: "The administration’s theories to justify the President’s lawbreaking have always been frivolous. But for those pretending not to recognize that fact, the Supreme Court has so ruled."[120]
- Jordan Paust, Mike and Teresa Baker College Professor of Law at the University of Houston Law Center, rejected the administration's legal arguments for the NSA program writing:[121]
George W. Bush and US Attorney General Alberto Gonzales claim that domestic spying in manifest violation of the Foreign Intelligence Surveillance Act (FISA) was authorized by Congress in broad language in the 2001 Authorization for Use of Military Force (AUMF) regarding persons responsible for the 9/11 attacks. Similar claims have been made in a December 22 letter from Assistant Attorney General William Moschella to the leaders of the House and Senate Intelligence Committees. The claims are patently false... ... Moreover, any so-called inherent presidential authority to spy on Americans at home (perhaps of the kind denounced in Youngstown (1952) and which no strict constructionist should pretend to recognize), has been clearly limited in the FISA in 18 U.S.C. § 2511(2)(f) and 50 U.S.C. § 1809(a)(1), as supplemented by the criminal provisions in 18 U.S.C. § 2511(1).
- William C. Banks, Professor of Law and Director of the Institute for National Security and Counterterrorism at Syracuse University argued that the NSA program is unconstitutional, writing that "in the unlikely event that legal authority for the NSA program can be found, this domestic spying violates the Fourth Amendment."[122]
- John Dean, Author and former White House Counsel to President Richard Nixon testified before Congress on March 31, 2006, on the issue of censuring George Bush for authorizing the NSA wiretap program, saying "I hope... you will not place the president above the law by inaction. As I was gathering my thoughts yesterday to respond to the hasty invitation, it occurred to me that had the Senate or House, or both, censured or somehow warned Richard Nixon, the tragedy of Watergate might have been prevented. Hopefully the Senate will not sit by while even more serious abuses unfold before it."[123]
Technical and operational details
Because of its highly classified status, little is publicly known about the actual implementation of the NSA domestic electronic surveillance program. Mark Klein, a retired AT&T communications technician, submitted an affidavit including limited technical details known to him personally in support of a class-action lawsuit filed by the Electronic Frontier Foundation in federal district court in San Francisco in January 2006 on behalf of AT&T customers who alleged that they had been damaged by the telecommunications corporation's cooperation with the NSA. The lawsuit is called Hepting v. AT&T.[126][127]A January 16, 2004 statement by Mr. Klein includes additional technical details regarding the secret 2003 construction of an NSA-operated monitoring facility in Room 641A of 611 Folsom Street in San Francisco, the site of a large SBC phone building, three floors of which are occupied by AT&T. [128][129]
According to Klein's affidavit, the NSA-equipped room uses equipment built by Narus Corporation to intercept and analyze communications traffic, as well as perform data-mining functions.[130]
In an article appearing in the January/February 2008 issue of the Institute of Electrical and Electronics Engineers journal of Security and Privacy, noted technology experts from academia and the computing industry analyzed potential security risks posed by the NSA program, based on information contained in Klein's affidavits as well as those of expert witness J. Scott Marcus, a designer of large-scale IP-based data networks, former CTO at GTE Internetworking and at Genuity, and former senior advisor for Internet Technology at the US Federal Communications Commission.[131] They concluded that the likely architecture of the system created serious security risks, including the danger that such a surveillance system could be exploited by unauthorized users, criminally misused by trusted insiders, or abused by government agents.[132]
Journalist Barton Gellman reported in the Washington Post that David Addington - who was at that time legal counsel to former Vice President Dick Cheney - was the author of the controlling legal and technical documents for the NSA surveillance program, typing the documents on a Tempest-shielded computer across from his desk in room 268 of the Eisenhower Executive Office Building and storing them in a vault in his office.[133]
Related issues
Warrantless wiretaps and the history of FISA
Main article: Warrantless searches in the United States
The administration has compared the NSA warrantless surveillance
program with historical wartime warrantless searches in the United
States, going back to George Washington.[51]Critics have pointed out that Washington's surveillance occurred before the existence of the U.S. Constitution, and the other historical precedents cited by the administration were before the passage of FISA, and therefore did not directly contravene federal law.[63] Abuses of electronic surveillance by the federal government such as Project SHAMROCK led to reform legislation in the 1970s.[134] Advancing technology began to present questions not directly addressed by the legislation as early as 1985.[135]
Executive orders by previous administrations including Clinton's and Carter's authorized the attorneys general to exercise authority with respect to both options under FISA.[136][137] In Clinton's executive order, he authorized his attorney general "[pursuant] to section 302(a)(1)" to conduct physical searches without court order "if the Attorney General makes the certifications required by that section".
Sufficiency of FISA in the war on terror
On December 19, 2005, U.S. Dept. of Justice Assistant Attorney General for Legislative Affairs, William Moschella, wrote a letter to the Chairs and Ranking Members of the U.S. Senate and House of Representatives, defending the NSA program:U.S. District Judge Dee Benson of Utah, also of the FISC, stated that he was unclear on why the FISC's emergency authority would not meet the administration's stated "need to move quickly." He and fellow judges on the court attended a briefing in January, called by presiding Judge Colleen Kollar-Kotelly.[138][139] Reportedly, the court was also concerned about "whether the administration had misled their court about its sources of information on possible terrorism suspects . . . [as this] could taint the integrity of the court's work."[140]As explained above, the President determined that it was necessary following September 11 to create an early warning detection system. FISA could not have provided the speed and agility required for the early warning detection system. In addition, any legislative change, other than the AUMF, that the President might have sought specifically to create such an early warning system would have been public and would have tipped off our enemies concerning our intelligence limitations and capabilities. Nevertheless, I want to stress that the United States makes full use of FISA to address the terrorist threat, and FISA has proven to be a very important tool, especially in longer-term investigations. In addition, the United States is constantly assessing all available legal options, taking full advantage of any developments in the law.
In part to address this problem, several commentators have raised the issue of whether, regardless how one feels about the authorization issue, FISA needs to be amended to address specific foreign intelligence needs, current technology developments, and advanced technical methods of intelligence gathering, in particular to provide for programmatic approvals of general or automated surveillance of foreign terrorist communications, the results of which could then legally be used as predicate for FISA warrants. In a recent essay, Judge Richard A. Posner opined that FISA "retains value as a framework for monitoring the communications of known terrorists, but it is hopeless as a framework for detecting terrorists. [FISA] requires that surveillance be conducted pursuant to warrants based on probable cause to believe that the target of surveillance is a terrorist, when the desperate need is to find out who is a terrorist."[141] For other examples, see Fixing Surveillance;[142] Why We Listen,[143] The Eavesdropping Debate We Should be Having;[144] A New Surveillance Act;[145] and A historical solution to the Bush spying issue[146] (the latter setting out a historical perspective on the need for programmatic approval in foreign intelligence surveillance generally). And see Whispering Wires and Warrantless Wiretaps[147] (discussing how FISA is inadequate to address certain technology developments).
During the investigational phase of the 9/11 Commission, a letter written by Special Agent Coleen Rowley, in her capacity as legal council to the FBI's Minneapolis Field Office, to FBI Director Robert Mueller came to the attention of the committee.[148] In that letter and in subsequent testimony before the commission and the Senate Judiciary Committee, SA Rowley recounted among other things, the manner in which FISA procedural hurdles had hampered the FBI's investigation of Zacarias Moussaoui (the so-called "20th hijacker") prior to the 9/11 attacks. Among the factors she cited were the complexity of the application and the detailed information required and confusion by field operatives about the standard of probable cause required by the FISC and the strength of the required link to a foreign power. At his appearance before the Senate Judiciary Committee in June, 2002, Director Mueller in response to questions about the Rowley allegations testified that unlike normal criminal procedures, FISA warrant applications are "complex and detailed", requiring the intervention of FBI Headquarters (FBIHQ) personnel trained in a specialized procedure (the "Woods" procedure) to ensure accuracy.[149]
FISA exclusivity controversy
On January 19, 2006 the Department of Justice published a memorandum that stated in part:The following day, Senator Patrick Leahy (D-VT), the ranking Democrat on the Senate Judiciary Committee along with lone co-sponsor Senator Ted Kennedy (D-MA) introduced S. Res. 350, a resolution "expressing the sense of the Senate that Senate Joint Resolution 23 (107th Congress), as adopted by the Senate on September 14, 2001, and subsequently enacted as the Authorization for Use of Military Force does not authorize warrantless domestic surveillance of United States citizens."[54][55] This non-binding resolution died in the Senate without being brought up for debate or being voted upon, so cannot be considered the "sense of the Senate."[56]For the foregoing reasons, the President—in light of the broad authority to use military force in response to the attacks of September 11 and to prevent further catastrophic attack expressly conferred on the President by the Constitution and confirmed and supplemented by Congress in the AUMF—has legal authority to authorize the NSA to conduct the signals intelligence activities he has described. Those activities are authorized by the Constitution and by statute, and they violate neither FISA nor the Fourth Amendment.
On February 2, 2006 the same 14 constitutional scholars and former government officials responded:
On June 29, 2006, in a detainee case Hamdan v. Rumsfeld, the Supreme Court rejected an analogous AUMF argument. Writing for the majority, Justice Stevens, while ruling that "the AUMF activated the President’s war powers, and that those powers include the authority to convene military commissions in appropriate circumstances" (citations omitted), held there was nothing in the AUMF language "even hinting that Congress intended to expand or alter the authorization set forth in Article 21 of the Uniform Code of Military Justice. The distinction drawn by J. Stevens in Hamdan between that case and Hamdi, where the AUMF language was found to override the explicit language regarding detention in 18 U.S.C. § 4001(a) is that the instant case would require a "Repeal by implication" of the UCMJ. How this distinction would be drawn in future cases involving the NSA program is unclear.In sum, we remain as unpersuaded by the DOJ's 42-page attempt to find authority for the NSA spying program as we were of its initial five-page version. The DOJ's more extended discussion only reaffirms our initial conclusion, because it makes clear that to find this program statutorily authorized would requires rewriting not only clear specific federal legislation, but major aspects of constitutional doctrine. Accordingly, we continue to believe that the administration has failed to offer any plausible legal justification for the NSA program.
Separation of powers and Unitary Executive theory
The administration argues that the power to conduct the warrantless surveillance within U.S. borders was granted by the Constitution and by a statutory exemption, as is advocated by the Unitary Executive theory using the interpretation of John Yoo et al.. He argues that the President had the "inherent authority to conduct warrantless searches to obtain foreign intelligence information."[150][151]The United States Court of Appeals for the District of Columbia Circuit has ruled that the President's authority as commander-in-chief extends to the "independent authority to repel aggressive acts...without specific congressional authorization" and without court review of the "level of force selected."[152] Whether such declarations applying to foreign intelligence are in compliance with FISA has been examined by few courts since the passage of the act in 1978.
It is also uncertain whether the allegation that surveillance involves foreign parties suffices to extend law governing the president's military and foreign affairs powers to cover domestic activities. The Supreme Court voiced this concern in Hamdi v. Rumsfeld, ruling that "a state of war is not a blank check for the President when it comes to the rights of the Nation's citizens."
The Congressional Research Service, a nonpartisan research arm of the Library of Congress, released a detailed report on NSA electronic surveillance, "Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information," on January 5, 2006, which concluded:
From the foregoing analysis, it appears unlikely that a court would hold that Congress has expressly or impliedly authorized the NSA electronic surveillance operations here under discussion, and it would likewise appear that, to the extent that those surveillances fall within the definition of “electronic surveillance” within the meaning of FISA or any activity regulated under Title III, Congress intended to cover the entire field with these statutes. To the extent that the NSA activity is not permitted by some reading of Title III or FISA, it may represent an exercise of presidential power at its lowest ebb, in which case exclusive presidential control is sustainable only by “disabling Congress from acting upon the subject.” While courts have generally accepted that the President has the power to conduct domestic electronic surveillance within the United States inside the constraints of the Fourth Amendment, no court has held squarely that the Constitution disables the Congress from endeavoring to set limits on that power. To the contrary, the Supreme Court has stated that Congress does indeed have power to regulate domestic surveillance, and has not ruled on the extent to which Congress can act with respect to electronic surveillance to collect foreign intelligence information.
Classified information
Leaking of classified information
There is no single law that criminalizes the leaking of all classified information. There are certain statutes that prohibit certain types of classified information being leaked under certain circumstances. One such law is ; it was tacked on to the Espionage Act of 1917 during the Second Red Scare in 1950. It is the 'SIGINT' statute, meaning signals intelligence. This statute says thatThis statute is not limited in application to only federal government employees. However, the Code of Federal Regulations suggests the statute may apply primarily to the "[c]ommunication of classified information by Government officer or employee". 50 USCS §783 (2005).... whoever knowingly and willfully communicates, furnishes, transmits, or otherwise makes available to an unauthorized person, [including by publication,] classified information [relating to] the communication intelligence activities of the United States or any foreign government, [shall be fined or imprisoned for up to ten years.]
There is a statutory procedure[155] for a "whistleblower" in the intelligence community to report concerns with the propriety of a secret program, The Intelligence Community Whistleblower Protection Act of 1998, Pub. L. 105-272, Title VII, 112 Stat. 2413 (1998). Essentially the Act provides for disclosure to the agency Inspector General, and if the result of that is unsatisfactory, appeal to the Congressional Intelligence Committees. A former official of the NSA, Russ Tice, has asked to testify under the terms of the Intelligence Community Whistleblower Protection Act, in order to provide information to these committees about "highly classified Special Access Programs, or SAPs, that were improperly carried out by both the NSA and the Defense Intelligence Agency."[156]
Executive Order 13292, which sets up the U.S. security classification system, provides (Sec 1.7) that "[i]n no case shall information be classified in order to conceal violations of law".
Given doubts about the legality of the overall program, the classification of its existence may not have been valid under E.O. 13292.
VERY Publication of classified information
It is unlikely that the New York Times could be held liable for publishing its article under established Supreme Court precedent. In Bartnicki v. Vopper, 532 U.S. 514,[157] the Supreme Court held that the First Amendment precluded liability for a media defendant for publication of illegally obtained communications that the media defendant itself did nothing illegal to obtain if the topic involves a public controversy. The high court in Bartnicki accepted due to the suit's procedural position, that interception of information which was ultimately broadcast by the defendant radio station was initially illegal (in violation of ECPA), but nonetheless gave the radio station a pass because it did nothing itself illegal to obtain the information.Nor could the government have prevented the publication of the classified information by obtaining an injunction. In the Pentagon Papers case, (New York Times Co. v. U.S. (403 US 713)),[158] the Supreme Court held in a 6-3 decision that injunctions against the New York Times publication of classified information (United States-Vietnam Relations, 1945-1967: A Study Prepared by The Department of Defense, a 47 volume, 7,000-page, top-secret United States Department of Defense history of the United States' political and military involvement in the Vietnam War from 1945 to 1971) were unconstitutional prior restraints and that the government had not met the heavy burden of proof required for prior restraint.
The 1917 Espionage Act, aside from the SIGINT statute discussed above, only criminalizes 'national defense' information, not 'classified' information. Although the Justice Department as a matter of law sees no exemption for the press, as a matter of fact it has refrained from prosecuting:
On the other hand, Sean McGahan of Northeastern University, told the Washington Post,A prosecution under the espionage laws of an actual member of the press for publishing classified information leaked to it by a government source would raise legitimate and serious issues and would not be undertaken lightly, indeed, the fact that there has never been such a prosecution speaks for itself.
There's a tone of gleeful relish in the way they talk about dragging reporters before grand juries, their appetite for withholding information, and the hints that reporters who look too hard into the public's business risk being branded traitors.
Responses and analyses
Administration response to press stories
On December 17, 2005, President George W. Bush addressed the growing controversy in his weekly radio broadcast.[160] He stated that he was using his authority as President, as Commander in Chief of the US military, and such authority as the United States Congress had given him, to intercept international communications of "people with known links to al Qaeda and related terrorist organizations". He added that before intercepting any communications, "the government must have information that establishes a clear link to these terrorist networks." He speculated that had the right communications been intercepted, perhaps the 9/11 attacks could have been prevented. He said the NSA program was re-authorized every 45 days, having at that time been reauthorized "more than 30 times"; it was reviewed by the Justice Department and NSA lawyers "including NSA's general counsel and inspector general", and Congress leaders had been briefed "more than a dozen times".[161]In a speech in Buffalo, New York on April 20, 2004, he had said that:
And again, during a speech at Kansas State University on January 23, 2006, President Bush mentioned the program, and added that it was "what I would call a terrorist surveillance program", intended to "best... use information to protect the American people",[163] and that:Secondly, there are such things as roving wiretaps. Now, by the way, any time you hear the United States government talking about wiretap, it requires -- a wiretap requires a court order. Nothing has changed, by the way. When we're talking about chasing down terrorists, we're talking about getting a court order before we do so. It's important for our fellow citizens to understand, when you think Patriot Act, constitutional guarantees are in place when it comes to doing what is necessary to protect our homeland, because we value the Constitution.
During a speech[164] in New York on January 19, 2006 Vice President Dick Cheney commented on the controversy, stating that a "vital requirement in the war on terror is that we use whatever means are appropriate to try to find out the intentions of the enemy," that complacency towards further attack was dangerous, and that the lack of another major attack since 2001 was due to "round the clock efforts" and "decisive policies", and "more than luck." He stated that:What I'm talking about is the intercept of certain communications emanating between somebody inside the United States and outside the United States; and one of the numbers would be reasonably suspected to be an al Qaeda link or affiliate. In other words, we have ways to determine whether or not someone can be an al Qaeda affiliate or al Qaeda. And if they're making a phone call in the United States, it seems like to me we want to know why. This is a -- I repeat to you, even though you hear words, "domestic spying," these are not phone calls within the United States. It's a phone call of an al Qaeda, known al Qaeda suspect, making a phone call into the United States [...] I told you it's a different kind of war with a different kind of enemy. If they're making phone calls into the United States, we need to know why -- to protect you.
In a press conference on December 19 held by both Attorney General Alberto Gonzales and General Michael Hayden, the Principal Deputy Director for National Intelligence, General Hayden claimed, "This program has been successful in detecting and preventing attacks inside the United States." He stated that even an emergency authorization under FISA required marshaling arguments and "looping paperwork around". Hayden also implied that decisions on whom to intercept under the wiretapping program were being made on the spot by a shift supervisor and another person, but refused to discuss details of the specific requirements for speed.[18][B]ecause you frequently hear this called a 'domestic surveillance program.' It is not. We are talking about international communications, one end of which we have reason to believe is related to al Qaeda or to terrorist networks affiliated with al Qaeda.. a wartime measure, limited in scope to surveillance associated with terrorists, and conducted in a way that safeguards the civil liberties of our people.
Beginning in mid-January 2006 there was an increase in public discussion on the legality of the terrorist surveillance program by the Administration.[165]
The United States Department of Justice sent a 42 page white paper to Congress on January 19, 2006 stating the grounds upon which it was felt the NSA program was entirely legal, which restates and elaborates on reasoning Attorney General Alberto Gonzales used at the December press conference when the legality of the program was questioned.[166] Gonzales spoke further at Georgetown University January 24, claiming that Congress had given the President the authority to order the surveillance without going through the courts, and that normal procedures to order surveillance were too slow and cumbersome.[167]
General Hayden stressed the NSA respect for the Fourth Amendment, stating at the National Press Club on January 23, 2006 that, "Had this program been in effect prior to 9/11, it is my professional judgment that we would have detected some of the 9/11 al Qaeda operatives in the United States, and we would have identified them as such."[168]
Some sources state that despite the NSA program, "[t]he agency ... still seeks warrants to monitor entirely domestic communications."[169] An article from February 5, 2006 in the Washington Post reported that the program had netted few suspects.[53]
In a speech on January 25, 2006, Bush said, "I have the authority, both from the Constitution and the Congress, to undertake this vital program,"[170] telling the House Republican Caucus at their February 10 conference in Maryland that "I wake up every morning thinking about a future attack, and therefore, a lot of my thinking, and a lot of the decisions I make are based upon the attack that hurt us."[171]
President Bush reacted to a May 10 domestic call records article in USA Today by restating his position, that it is "not mining or trolling through the personal lives of millions of innocent Americans."[172]
Congressional response
Three days after news broke about the warrantless wiretapping program, a bipartisan group of Senators—Democrats Dianne Feinstein of California, Carl Levin of Michigan, Ron Wyden of Oregon and Republicans Chuck Hagel of Nebraska and Olympia Snowe of Maine, sent a letter dated December 19, 2005 to Judiciary and Intelligence Committees chairmen and ranking members requesting the two committees to "seek to answer the factual and legal questions" about the program.On January 20, 2006, in response to the administration's asserted legal justification of the NSA program being based in part on the AUMF, Senators Leahy (D-VT) and Kennedy (D-MA) introduced Resolution 350 to the Judiciary Committee that purported to express a "sense of the Senate" that the AUMF "does not authorize warrantless domestic surveillance of United States citizens".[54][55] Resolution 350 was never reported out of committee and has no effect.[56]
In introducing their resolution to committee,[173] they quoted Justice O'Connor's opinion that even war "is not a blank check for the President when it comes to the rights of the Nation's citizens."
Additionally, they asserted their opinion that the US DOJ legal justification for the NSA program was a "manipulation of the law" similar to other "overreaching" and "twisted interpretations" in recent times. Leahy and Kennedy also asserted that Attorney General Gonzales "admitted" at a press conference on December 19, 2005, that the Administration did not seek to amend FISA to authorize the NSA spying program because it was advised that "it was not something we could likely get." (However, as noted below under "Proposed Amendments to FISA", Gonzales has made clear that what he actually said was that such an amendment was "not something [they] could likely get" without disclosing the nature of the program and operational limitations and that it was believed that such disclosure would be damaging to national security.)
Leahy and Kennedy also asserted that in their view the procedures being followed in the NSA program, specifically, the ongoing 45 day reapproval by the Attorney General, the White House Counsel and the Inspector General of the National Security Agency, was "not good enough" because each of these is an executive branch appointees who in turn report directly to the Executive. Finally, they concluded that Congressional and Judicial oversight were fundamental and should not be unilaterally discarded. Resolution 350 has not been reported out of committee.
Senate Judiciary Committee Chairman Arlen Specter, in a three-page letter dated June 7, 2006 to Vice President Dick Cheney, to prompt the Administration to provide: input on his proposed legislation, briefings to his committee about the program, and more cooperation with Congressional oversight. Specter also wrote about the Vice President lobbying the other Republican members of the Judiciary Committee about compelling telephone companies to testify about classified information.
In February 2008, the Bush Administration backed a new version of the Foreign Intelligence Surveillance Act (FISA) that would grant telecom companies retroactive immunity from lawsuits stemming from the alleged surveillance. On March 13, 2008 the U.S. House of Representatives held a secret session to discuss classified information relating to the new FISA. On March 14, the House passed a bill that would not grant the immunity sought by the Bush administration.
Legal developments
Congressionally proposed FISA amendments
The Administration has contended that amendment was unnecessary because they believe that the President had inherent authority to approve the NSA program, and that the process of amending FISA might require disclosure of classified information that could harm national security. In response, Senator Leahy said, "If you do not even attempt to persuade Congress to amend the law, you must abide by the law as written."[174] President Bush claims that he can ignore the law because he claims that the Constitution gives him "inherent authority" to do so.[175][176]However, Attorney General Alberto Gonzales has stated that the Bush administration chose not to ask Congress for an amendment to FISA to authorize such wiretaps explicitly because it would have been difficult to get such an amendment without compromising classified information relating to operational details. "This is not a backdoor approach. We believe Congress has authorized this kind of surveillance. We have had discussions with Congress in the past -- certain members of Congress -- as to whether or not FISA could be amended to allow us to adequately deal with this kind of threat, and we were advised that that would be difficult, if not impossible."[18] Some politicians and commentators have used this statement -- “would be difficult, if not impossible”—to argue that the Administration declined to seek a specific amendment to FISA because the administration believed Congress would have rejected it. However, later in the same briefing Gonzales clarified his earlier remark to say that the administration had been advised that amendment was something they were not likely to get "without jeopardizing the existence of the program." At another briefing, two days later, Gonzales made this point again:[177]
Finally, in his written Responses to Questions from Senator Specter in which Specter specifically asked why the administration had not sought to amend FISA to accommodate the NSA program,[178] Gonzales wrote:What I said, or what I surely intended to say, if I didn't say, is that we consulted with leaders in the congress about the feasibility of legislation to allow this type of surveillance. We were advised that it would be virtually impossible to obtain legislation of this type without compromising the program. And I want to emphasize the addition of, without compromising the program. That was the concern.
Nevertheless, competing legislative proposals to authorize the NSA program subject to Congressional or FISA court oversight have been proposed and have been the subject of Congressional hearings throughout the summer.[179][W]e were advised by members of Congress that it would be difficult, if not impossible to pass such legislation without revealing the nature of the program and the nature of certain intelligence capabilities. That disclosure would likely have harmed our national security, and that was an unacceptable risk we were not prepared to take.
On March 16, 2006, Senators Mike DeWine (R-OH), Lindsey Graham (R-SC), Chuck Hagel (R-NE), and Olympia Snowe (R-ME) introduced the Terrorist Surveillance Act of 2006 (S.2455),[180][181] under which the President would be given certain additional limited statutory authority to conduct electronic surveillance of suspected terrorists in the United States subject to enhanced Congressional oversight. Also on March 16, 2006, Senator Arlen Specter (R-PA) introduced The National Security Surveillance Act of 2006 (S.2453),[182][183] which would amend FISA to grant retroactive amnesty[184] for warrantless surveillance conducted under presidential authority and provide FISA court (FISC) jurisdiction to review, authorize, and oversight "electronic surveillance programs." On May 24, 2006, Senator Specter and Senator Dianne Feinstein (D-CA) introduced the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S.3001) asserting FISA as the exclusive means to conduct foreign intelligence surveillance.
On September 13, 2006, the Senate Judiciary Committee voted to approve all three mutually exclusive bills, thus, leaving it to the full Senate to resolve.[41]
On July 18, 2006, U.S. Representative Heather Wilson (R-NM) introduced the Electronic Surveillance Modernization Act (H.R. 5825). Wilson's bill would give the President the authority to authorize electronic surveillance of international phone calls and e-mail linked specifically to identified terrorist groups immediately following or in anticipation of an armed or terrorist attack on the United States. Surveillance beyond the initial authorized period would require a FISA warrant or a presidential certification to Congress. On September 28, 2006 the House of Representatives passed Wilson's bill and it was referred to the Senate.[40]
Each of these bills would in some form broaden the statutory authorization for electronic surveillance, while still subjecting it to some restrictions. The Specter-Feinstein bill would extend the peacetime period for obtaining retroactive warrants to seven days and implement other changes to facilitate eavesdropping while maintaining FISA court oversight. The DeWine bill, the Specter bill, and the Electronic Surveillance Modernization Act (already passed by the House) would all authorize some limited forms or periods of warrantless electronic surveillance subject to additional programmatic oversight by either the FISC (Specter bill) or Congress (DeWine and Wilson bills).
FISA court order
On January 18, 2007, Attorney General Alberto Gonzales told the Senate Judiciary Committee "Court orders issued last week by a Judge of the Foreign Intelligence Surveillance Court will enable the government to conduct electronic surveillance – very specifically, surveillance into or out of the United States where there is probable cause to believe that one of the communicants is a member or agent of al Qaeda or an associated terrorist organization – subject to the approval of the FISA Court. We believe that the court’s orders will allow the necessary speed and agility the government needs to protect our Nation from the terrorist threat."[185] The ruling by the FISA Court was the result of a two-year effort between the White House and the court to find a way to obtain court approval that also would "allow the necessary speed and agility" to find terrorists, Gonzales said in a letter to the top committee members. The "innovative" court order on Jan. 10 will do that, Gonzales wrote. Senior Justice department officials would not say whether the orders provided individual warrants for each wiretap or whether the court had given blanket legal approval for the entire NSA program. The American Civil Liberties Union said in a statement that "without more information about what the secret FISA court has authorized, there is no way to determine whether the NSA's current activities are lawful."[186] Chip Pitts of Stanford Law School argues that substantial legal questions remain regarding the core NSA program as well as the related data mining program (and the use of National Security Letters), despite the government's apparently bringing the NSA program within the purview of the FISA law.[187]FISCR Ruling of August 2008
In August 2008, the United States Foreign Intelligence Surveillance Court of Review (FISCR) affirmed the constitutionality of the Protect America Act of 2007 in a heavily redacted opinion released on January 15, 2009, which is only the second such public ruling since the enactment of the FISA Act.[188][189][190][191][192]See also
- Clapper v. Amnesty International – 2013 Supreme Court decision
- Communications Assistance for Law Enforcement Act
- Criticism of the War on Terror
- Data mining
- Deep packet inspection
- ECHELON
- Foreign Intelligence Surveillance Act
- General Michael Hayden
- Hepting v. AT&T
- HTLINGUAL – a CIA project to intercept mail destined for the Soviet Union and China that operated from 1952 until 1973.
- Information Awareness Office
- Mark Riebling
- Mass surveillance
- NSA call database
- NSA wiretapping programs
- Omnibus Crime Control and Safe Streets Act of 1968
- PRISM – the program that replaced the warrantless surveillance program
- Reichstag Fire Decree
- Room 641A
- Secure communication
- Terrorist Surveillance Program – details of the program itself
- In the First Circle, Alexander Solzhenytsin
Data Source Provided From : From Wikipedia
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
Data Source Provided From : From Wikipedia
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
Terrorist Surveillance Program
The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the wake of the September 11, 2001, attacks. It was part of the President's Surveillance Program, which was in turn conducted under the overall umbrella of the War on Terrorism. The NSA, a signals intelligence agency, implemented the program to intercept al Qaeda communications overseas where at least one party is not a U.S. person. In 2005 The New York Times disclosed that technical glitches resulted in some of the intercepts including communications were "purely domestic" in nature, igniting the NSA warrantless surveillance controversy. [1] Later works, such as James Bamford's The Shadow Factory, describe how the nature of the domestic surveillance was much, much more widespread than initially disclosed. In a 2011 New Yorker article, former NSA employee Bill Binney said that his colleagues told him that the NSA had begun storing billing and phone records from "everyone in the country."[2]
The program was named the Terrorist Surveillance Program by the George W. Bush administration[3] in response to the NSA warrantless surveillance controversy following disclosure of the program. It is claimed that this program operated without the judicial oversight mandated by Foreign Intelligence Surveillance Act (FISA), and legal challenges to the program are currently undergoing judicial review. Because the technical specifics of the program have not been disclosed, it is unclear if the program is subject to FISA. It is unknown if this is the original name of the program; the term was first used publicly by President Bush in a speech on January 23, 2006.[4]
On August 17, 2006, U.S. District Judge Anna Diggs Taylor ruled the program unconstitutional and illegal. On appeal, the decision was overturned on procedural grounds and the lawsuit was dismissed without addressing the merits of the claims,[5] although one further challenge is still pending in the courts. On January 17, 2007, Attorney General Alberto Gonzales informed U.S. Senate leaders by letter [6] that the program would not be reauthorized by the president, but would be subjected to judicial oversight. "Any electronic surveillance that was occurring as part of the Terrorist Surveillance Program will now be conducted subject to the approval of the Foreign Intelligence Surveillance Court," according to his letter.[7]
On June 6, 2013, it was revealed that the Terrorist Surveillance Program was replaced by a new NSA program, referred to by its codeword, PRISM.[8]
Contents |
Description
While no specific information has been offered, the Bush Administration has indicated that the wiretapping program targets communications where at least one party is outside the United States, and where it asserts that there are reasonable grounds to believe that one or more parties involved in the communication have ties to al Qaeda. However, anonymous sources have come forward stating a small number of instances where purely domestic calls were intercepted. These sources said the NSA accidentally intercepted these calls, apparently caused by technical glitches in determining whether a communication was in fact "international," probably due to the use of international cell phones.[1]The complete details of the program are not known, as the Bush Administration contended that security concerns did not allow it to release details, and limit judicial authorization and review.[citation needed] Implemented sometime after the September 11, 2001, attacks, the existence of the program was not made public until a 2005 New York Times article. Additional details came to light in a May 2006 USA Today article.[9]
President Bush stated that he had reviewed and reauthorized the program approximately every 45 days since it was implemented. The leadership of the intelligence committees of the House or Representatives and Senate were briefed a number of times since initiation of the program.[10] They were not, however, allowed to make notes or confer with others to determine the legal ramifications, or even to mention the existence of the program to the full membership of the intelligence committees. Further, the administration even refused to identify to the public which members of the committees were briefed; it has, however, provided a complete list of these members to the Senate Intelligence Committee.[11]
Pen Register Tap
Prominent legal scholar and blogger Orin Kerr has argued that the program is probably not a wiretap or call database, but more likely to be a pen register (or tap and trace) tap.[12] Unlike wiretaps, where the actual content of the call is monitored, or listened to, a pen register is a limited form of wiretap where only basic call data such as originating and receiving telephone numbers, time of call and duration are logged. Because of the limited nature of the data, frequently characterized as "outside the envelope," pen register taps have much lower legal standards than conventional wiretaps, and are not subject to Fourth Amendment protection.
Main article: Pen register
The only physical evidence of the NSA program are documents accidentally leaked to lawyers for an al-Qaeda front group the Al-Haramain Foundation.
These documents contain only logs of phone calls being placed, but not
actual transcripts, suggesting the wiretapping program is merely a
pen-register tap.[13]Call database
Main article: NSA call database
On May 10, 2006, USA Today reported that the NSA has had a separate, previously undisclosed program in place since 9/11 to build a database of information about calls placed within the United States, including phone numbers, and the date and duration of the calls.[9] According to the article, phone companies AT&T, Verizon, and Bell South disclosed the records to the NSA, while Qwest
did not. The article quotes an unnamed source that "it's the largest
database ever assembled in the world." Most reports indicate that this
program is different from the Terrorist Surveillance Program. The
administration has not confirmed the existence of this aspect of the
program.[14]News reporting
December 16, 2005
On December 16, 2005, The New York Times printed a story asserting that following 9/11, "President Bush secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without the court-approved warrants ordinarily required for domestic spying" as part of the War on Terror.[15]Under a presidential order signed in 2002, the intelligence agency monitored the international telephone calls and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without warrants over the past three years in an effort to track possible "dirty numbers" linked to Al Qaeda, the officials said. The agency, they said, still seeks warrants to monitor entirely domestic communications.According to the Times:
The White House asked The New York Times not to publish this article, arguing that it could jeopardize continuing investigations and alert terrorists that they might be under scrutiny. After meeting with senior administration officials to hear their concerns, the newspaper delayed publication for a year to conduct additional reporting. Some information that administration officials argued could be useful to terrorists has been omitted.White House press secretary Scott McClellan refused to comment on the story on December 16, exclaiming "there’s a reason why we don’t get into discussing ongoing intelligence activities, because it could compromise our efforts to prevent attacks from happening." [16] The next morning, the president gave a live eight-minute television address instead of his normal weekly radio address, during which he addressed the wiretap story directly:[17]
I authorized the National Security Agency, consistent with U.S. law and the Constitution, to intercept the international communications of people with known links to al Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks.In the address, President Bush implied he had approved the tracing of domestic calls originating or terminating overseas, stating the program would "make it more likely that killers like these 9/11 hijackers will be identified and located in time." He forcefully defended his actions as "crucial to our national security" and claimed that the American people expected him to "do everything in my power, under our laws and Constitution, to protect them and their civil liberties" as long as there was a "continuing threat" from al Qaeda. The president also had harsh words for those who broke the story, saying that they acted illegally. "The unauthorized disclosure of this effort damages our national security and puts our citizens at risk," he said.[18]
The FBI began an investigation into the leaks surrounding this program in 2005, with 25 agents and 5 prosecutors on the case. [19]
January 1, 2006
On January 1, 2006, The New York Times printed a story revealing that aspects of the program were suspended for weeks in 2004. The Times story said the U.S. Attorney General's office, then headed by John Ashcroft, balked in 2004 when asked to give approval of the program, and that then Deputy Attorney General James B. Comey "played a part in overseeing the reforms that were put in place in 2004." According to the Times, however, the oversight by the NSA shift supervisor continued to be unfettered by any pre-approval requirement. The story also pointed out that even some NSA employees thought that the warrantless surveillance program was illegal.[20]The Times had withheld the article from publication for over a year. Both editor in chief Bill Keller and publisher Arthur Sulzberger Jr. were summoned by the president and White House officials to persuade the paper not to publish the story. The Times ran the story shortly before it would have been scooped by publication of its own reporter's book. The Times ombudsman speculates that the reason the backstory isn't being revealed is to protect sources.[21] Russ Tice claims he was a source for the story.[22]
January 3, 2006
On January 3, the independent news program Democracy Now!, and later on January 10 ABC news ran a story that according to NSA whistleblower Russell Tice, the number of Americans affected by the range of NSA surveillance programs could be in the millions if the full extent of secret NSA programs is considered:[23]Tice says the technology exists to track and sort through every domestic and international phone call as they are switched through centers, such as one in New York, and to search for key words or phrases that a terrorist might use. "If you picked the word 'jihad' out of a conversation," Tice said, "the technology exists that you focus in on that conversation, and you pull it out of the system for processing." According to Tice, intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect's phone number to hundreds or even thousands more. "That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum," Tice said.
January 17, 2006
On January 17 the New York Times reported, "more than a dozen current and former law-enforcement and counterterrorism officials," some of whom knew of the domestic spying program, "said the torrent of tips [from NSA wiretapping] led them to few potential terrorists inside the country they did not know of from other sources and diverted agents from counterterrorism work they viewed as more productive."[24]February 5, 2006
On February 5, The Washington Post noted that "fewer than 10 U.S. citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their (purely) domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause." Also in the article: "The minimum legal definition of probable cause, said a government official who has studied the program closely, is that evidence used to support eavesdropping ought to turn out to be 'right for one out of every two guys at least.' Those who devised the surveillance plan, the official said, 'knew they could never meet that standard—that's why they didn't go through'" the Foreign Intelligence Surveillance Court.[25]Also on February 5, USA Today ran a story reporting that according to seven telecommunications executives, the NSA had secured the cooperation of the main telecommunications companies in charge of international phone calls, including AT&T, MCI, and Sprint, in its efforts to eavesdrop without warrants on international calls.[26]
May 22, 2006
In its issue dated May 22, 2006, Newsweek put the controversy on the cover of its magazine and ran several stories inside summarizing what is known and speculations about it.[27]On May 22, 2006, Wired Magazine released the text of AT&T documents, currently under court seal in the EFF case, that allegedly describe NSA wiretap arrangements.[28]
Legality of the program
Main article: NSA warrantless surveillance controversy
The NSA's electronic surveillance operations are governed primarily by four legal sources: the Fourth Amendment to the U.S. Constitution; the Foreign Intelligence Surveillance Act of 1978 (FISA); Executive Order 12333; and United States Signals Intelligence Directive 18.[29] The primary legal challenge to the program currently in US courts is the suit brought by the Al-Haramain Foundation.[30] All other challenges to the program have been dismissed by U.S. courts.Critics of the Bush administration have regularly compared the current NSA surveillance program to those of Richard Nixon during the Vietnam War (i.e., Operation Shamrock, Operation Minaret, Church committee).[31] However, these programs occurred prior to the 1978 Foreign Intelligence Surveillance Act (FISA), which was passed into law in response to widespread concern over these abuses of domestic surveillance activities. According to opponents of this program that is exactly what the current program is doing and why FISA was enacted.
The American Civil Liberties Union filed an ultimately unsuccessful lawsuit against the program in 2006 on behalf of journalists, scholars, and lawyers. In the initial trial, U.S. District Judge Anna Diggs Taylor on August 17, 2006, ruled the program was unconstitutional and imposed an injunction against it.[32] The Justice Department filed an appeal within hours of the ruling and requested a stay of the injunction pending appeal. While opposing the stay, the ACLU agreed to delay implementation of the injunction until September 7 to allow time for the judge to hear the appeal.[33] On appeal, the U.S. Court of Appeals for the Sixth Circuit dismissed the case without addressing the merits of the claims, holding 2–1 that the plaintiffs lacked standing to bring the suit.[5]
Controversy
Main article: NSA warrantless surveillance controversy
When classified details were leaked to the press at some point in 2005, critics began to question the legality of the program. The crux of the debate over legality is twofold, the main issues being- Are the parameters of this program subject to FISA and
- If so, did the president have authority, inherent or otherwise, to bypass FISA.
- "The argument that conduct undertaken by the commander in chief that has some relevance to 'engaging the enemy' is immune from congressional regulation finds no support in, and is directly contradicted by, both case law and historical precedent. Every time the Supreme Court has confronted a statute limiting the commander in chief’s authority, it has upheld the statute. No precedent holds that the president, when acting as commander in chief, is free to disregard an Act of Congress, much less a criminal statute enacted by Congress, that was designed specifically to restrain the president as such." (Emphasis in original.)[34]
See also
- Hepting v. AT&T
- NSA warrantless surveillance controversy
- Surveillance
- Mass surveillance
- Communications Assistance for Law Enforcement Act
- Stellar Wind (code name)
- ThinThread
- Trailblazer Project
- Utah Data Center
- Whistleblowers
- William Binney
- Thomas Andrews Drake
- Ed Loomis
- Diane Roark, House Permanent Select Committee on Intelligence staffer
- Russ Tice
- Thomas Tamm
- J. Kirk Wiebe
Data Source Provided From : From Wikipedia
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
PRISM (surveillance program)
|
Documents leaked by NSA contractor Edward Snowden[6] in June 2013 describe the PRISM program as enabling in-depth surveillance on live communications and stored information. It provides for the targeting of any customers of participating corporations who live outside the United States, or American citizens whose communications include web content of people outside the United States. Data which the NSA is able to obtain under PRISM allegedly includes email, video and voice chat, videos, photos, voice over IP conversations, file transfers, login notifications and social networking details.[7]
According to the Director of National Intelligence James Clapper, PRISM cannot be used intentionally to target any Americans or anyone in the United States. Clapper said a secret court, Congress and the executive branch oversee the program and extensive procedures ensure the acquisition, retention and dissemination of data accidentally collected about Americans is kept to a minimum.[8]
The Washington Post noted that the leaked document indicated that the PRISM SIGAD is "the number one source of raw intelligence used for NSA analytic reports."[9] The President's Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[10] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers' telephone calls on an ongoing daily basis.[2][11]
NSA whistleblower William Binney has stated that PRISM is just another source of input of information. "The telecoms were giving NSA access to their communication lines. The Narus devices that the NSA put in different rooms around the AT&T fiber-optic network, or Verizon's network, couldn’t collect everything. They could get most of it, but they couldn’t get it all. So in order to get all the data, they had to go to the service providers to fill in the blanks. That’s what the PRISM program is for—to fill in the blanks. It also gives the FBI basis for introducing evidence into court."[12]
Contents |
History
PRISM is a "Special Source Operation" in the tradition of NSA's intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[13] PRISM was launched in December 2007 to replace the Terrorist Surveillance Program. The latter was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[14][15][16][17] PRISM was authorized by an order of the FISC.[9] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[7][18] According to The Register, the FISA Amendments Act of 2008 "specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant" when one of the parties is outside the U.S.[18]PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to the Washington Post and The Guardian by NSA insider Edward Snowden.[7][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][7] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[19] The speaker's notes in the briefing document reviewed by the Washington Post indicated that "98 percent of PRISM production is based on Yahoo, Google and Microsoft."[1]
The slide presentation stated that much of the world's electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world's internet infrastructure is based in the United States.[9] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[7][9]
According to the Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, "it's nothing to worry about."[1]
Response from companies
The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data "directly from the servers" of several major internet services providers.[7][1] Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[7][20] Statements of several of the companies named in the leaked documents were reported by TechCrunch as follows:[21]- Facebook: "We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law."[21]
- Google: "Google cares deeply about the security of our users' data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door' into our systems, but Google does not have a backdoor for the government to access private user data."[21]
- Apple: "We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order."[22]
- Microsoft: "We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don't participate in it."[21]
- Yahoo!: "Yahoo! takes users' privacy very seriously. We do not provide the government with direct access to our servers, systems, or network."[21]
- Dropbox: "We've seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users' privacy."[21]
On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[25] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said "I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order."[26]
The New York Times reported on June 7, 2013 that "Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations."[27] The other companies held discussions with national security personnel on how to make available data more efficiently and securely.[27] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[27] The dialogues have continued in recent months, as Martin E. Dempsey, Chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[27] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states "Collection directly from the servers"[28] and the companies" initial denials.[27]
While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide enhanced access to its systems.[27] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[27] Facebook, for instance, built such a system for requesting and sharing the information.[27]
Response from United States government
Shortly after publication of the reports by the Guardian and the Washington Post, the United States Director of National Intelligence, James Clapper, released a statement confirming that for nearly 6 years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[2] The statement read in part, "The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies."[29] He went on to say, "Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States."[29] Clapper concluded his statement by stating "The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans."[29] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does "not wittingly" collect any type of data on millions or hundreds of millions of Americans.[30]Clapper also stated that "the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed."[8]
On June 8, 2013, Clapper issued an additional statement and fact sheet about PRISM, emphasizing that "the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress."[31][32] The fact sheet described PRISM as "an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a)." It further stated that "the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence." It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, "provid[ing] an unprecedented degree of accountability and transparency."[32]
The President of the United States, Barack Obama, defended the government's surveillance programs, saying that they were legally authorized and had helped prevent terrorist attacks. "What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout."[33] He also said that having a debate about how to balance security issues with privacy concerns is healthy for democratic government, but he cautioned, "You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society."[33] In separate statements, senior Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[34]
In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens' telephone records, Congressional leaders had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[35] and others said that they had not been aware of the program.[36]
Investigative journalist Russ Baker has commented on the government statement in an interview on RT "Claims that the NSA is not spying on Americans are absurd because anybody could potentially commit a terrorist act. The reality is they're looking at all of us. They're trying to establish networks of communication but it's kind of ridiculous because you're looking for a needle in a haystack. You're looking at virtually the entire world trying to find just a handful of plots and, as we know, many of these plots turn out to be more complicated, with FBI informants involved right from the beginning."[37]
On June 8, 2013 questioned regarding PRISM, highly placed NSA intelligence official , turned whistleblower William Binney confirmed and clarified U.S Senators Mark Udall and Ron Wyden 2011 allegation[38] by stating "the government is using a secret interpretation of Section 215 of the Patriot Act which allows the government to obtain any data in any third party, like any service provider… any third party… any commercial company – like a telecom or internet service provider, libraries, medical companies – holding data about anyone, any U.S. citizen or anyone else. In other words, the government was using the antiquated, bogus legal argument that it was not acting (under) color of law using governmental powers, and that it was private companies just doing their thing (which the government happened to order all of the private companies to collect and fork over)".[39]
Authorized by Foreign Intelligence Surveillance Act
On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM was conducted "under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a)."[32] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information."[40] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order."[40] When asking for an order, the A.G. and DNI must certify to FICS that “a significant purpose of the acquisition is to obtain foreign intelligence information.” [40] They do not need to specify which facilities or property that the targeting will be directed at. [40]After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret. [40] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.
If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[40]
If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[40] A provider that fails to comply with FISC’s order can be punished with contempt of court. [40]
Finally, a provider can petition FISC to reject the directive. [40] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[40] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[40]
Involvement of other countries
In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[41][42]Germany did not receive any raw PRISM data, according to a Reuters report.[43]
Israeli newspaper Calcalist was discussing the Business Insider article, about the possible involvement of technologies from two secretive Israeli companies in the PRISM program.[44][45]
International responses
- The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as "monstrous".[46]
- Sophie in 't Veld, a Dutch Member of the European Parliament, called PRISM "a violation of EU laws".[47]
Related government internet surveillance programs
"A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[48]A related program, a big data or data mining system based on cloud computing and Free and Open Source Software (FOSS) technology known as "Boundless Informant", was disclosed in top secret documents leaked to the Guardian and reported on June 8, 2013.[49]
See also
- Anonymous (group)
- Boundless Informant
- Communications Assistance for Law Enforcement Act
- Edward Snowden
- Information Awareness Office
- Lawful interception
- Mass surveillance
- NSA call database
- NSA warrantless surveillance controversy
- NSA electronic surveillance program
- NSA Whistleblowers: Thomas Andrews Drake, Mark Klein, William Binney, Thomas Tamm, Russ Tice
- Room 641A, Hepting v. AT&T
- Signals intelligence
- SORM
- Stellar Wind, Trailblazer, Thinthread, Turbulence, ECHELON, MINARET, SHAMROCK, FBI Index, DCSNet
- UKUSA SIGINT Agreement
- Utah Data Center
Data Source Provided From : From Wikipedia
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
Edward Snowden
From Wikipedia, the free encyclopedia
|
Edward Joseph Snowden | |
---|---|
Snowden as seen on the cover of The Guardian, 10 June 2013 |
|
Born | 1983 (age 29–30) Elizabeth City, North Carolina, United States |
Residence | Hawaii. Currently in Hong Kong. |
Nationality | American |
Occupation | System administrator |
Employer | Booz Allen Hamilton |
Known for | PRISM whistleblower |
Contents |
Early life and career
Snowden was brought up in Elizabeth City, North Carolina, later moving with his family to Ellicott City, Maryland where he studied computing at community college.[6][7]In 2003, Snowden enlisted in the United States Army with the hope of eventually joining the Special Forces. He was discharged after breaking both of his legs in a training accident. He then went to work as a security guard for a covert NSA facility at the University of Maryland. After that he went to the Central Intelligence Agency (CIA), where he worked on IT security. In 2007, the CIA stationed him with diplomatic cover in Geneva, Switzerland, where he was responsible for maintaining computer network security. Leaving the CIA in 2009, he worked for a private contractor inside an NSA facility on a United States military base in Japan.[6]
At the time of his departure from the US in May 2013, he had been working for defense contractor Booz Allen Hamilton for less than three months, as a system administrator inside of the NSA in Hawaii.[8][9] He described his life as "very comfortable", living with his girlfriend and earning a salary of "roughly US$200,000."[6]
The Guardian describes Snowden as intensely passionate about the value of privacy; his laptop is adorned with stickers supporting internet freedom organizations including the Electronic Frontier Foundation (EFF) and the Tor Project.[6] Although he says he "believed in Obama's promises", he "voted for a third party" in the 2008 election.[10] Political donation records indicate that he contributed to the primary campaign of Ron Paul.[11]
Whistleblowing
In May 2013, Snowden was granted temporary leave from his work as a contractor for the NSA in Hawaii, on the premise of receiving treatment for his epilepsy.[6] On May 20, he flew to Hong Kong and began living in a hotel room, from which he leaked documents and provided an interview to The Guardian.[6]The Washington Post reported that the motive behind the leaks was to expose the United States ‘surveillance state’.[1] Explaining his justification for the disclosure, Snowden remarked that he "can't in good conscience allow the U.S. government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building."[12]
“ | I don't want to live in a society that does these sort of things … I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under. | ” |
—Edward Snowden, speaking to The Guardian in June 2013[10]
|
He has said that he has a "predisposition to seek asylum in a country with shared values," and that his ideal choice would be Iceland.[5][6] The International Modern Media Institute, an Icelandic freedom of speech advocacy organisation, on the day his identity was revealed issued a statement offering Snowden legal advice and assistance in gaining asylum.[13]
Response
This article is about Edward Snowden personally. For response to the PRISM program itself, see PRISM (surveillance program).
The National Security Agency has requested a criminal probe into Snowden's actions from the United States Department of Justice. James R. Clapper, Director of National Intelligence, said that his "reckless disclosures" have resulted in "significant misimpressions" in the media.[14] Speaking before Snowden was named, chairman of the US Select Committee on Intelligence Mike Rogers said of the whistleblower: "I absolutely think they should be prosecuted".[15]Snowden's employer Booz Allen Hamilton released a statement condemning his actions as "shocking" and "a grave violation of the code of conduct and core values of our firm".[8] The statement says he had been with the firm for under three months.
Amy Davidson, writing in The New Yorker, said Snowden "is the reason our country has, in the last week, been having a conversation on privacy and the limits of domestic surveillance. That was overdue, and one wishes it had been prompted by self-examination on the part of the Obama Administration or real oversight by Congress." She went on to say "We also learned that James Clapper, the Director of National Intelligence, flat-out lied to the Senate when he said that the N.S.A. did not 'wittingly' collect any sort of data on millions of Americans. And we were reminded of how disappointing President Obama can be. These were all things the public deserved to know."[16]
Shortly after Snowden revealed his identity, a petition[17] was posted on the White House website, asking for "a full, free, and absolute pardon for any crimes [Snowden] has committed or may have committed related to blowing the whistle on secret NSA surveillance programs."[18][19]
Daniel Ellsberg, the whistleblower and leaker of the top-secret Pentagon Papers in 1971, stated in an interview with CNN that he thought Snowden had done an "incalculable" service to his country and that his leaks might prevent America from becoming a surveillance state. He said Snowden had acted with the same sort of courage and patriotism as a soldier in battle.[20]
See also
- Thomas Andrews Drake, Mark Klein, William Binney, Thomas Tamm, Russ Tice (NSA Whistleblowers)
- James Bamford (Author of three books on the NSA)
- PRISM (surveillance program), NSA electronic surveillance program, NSA warrantless surveillance controversy, NSA call database, Stellar Wind (code name)
- Classified information in the United States
- Information sensitivity
- Hepting v. AT&T, NSA warrantless surveillance controversy (2005)
- Espionage Act of 1917, McCarran Internal Security Act (1950)
Data Source Provided From : From Wikipedia
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
अमरीका: ख़बर लीक करने वाले की पहचान ज़ाहिर
सोमवार, 10 जून, 2013 को 07:16 IST तक के समाचार
अमरीका में निगरानी कार्यक्रम की
जानकारी लीक करने वाले की पहचान ब्रिटेन के गार्डियन अखबार ने सीआईए के एक
पूर्व तकनीकी कर्मचारी के रूप में ज़ाहिर की है.
अखबार के मुताबिक 29 वर्षीय एडवर्ड स्नोडेन सीआईए
के पूर्व तकनीकी सहायक हैं और फिलहाल रक्षा विभाग के एक ठेकेदार बूज़ एलेन
हैमिल्टन के कर्मचारी हैं.गार्डियन के अनुसार स्नोडेन की पहचान उन्हीं के अनुरोध पर सार्वजनिक की जा रही है.
"मैं उस समाज में नहीं रहना चाहता जहां ऐसा काम किया गया. मैं उस दुनिया में नहीं रहना चाहता जहां मेरे सारे काम और मेरी बातें रिकॉर्ड की जाती हों"
स्नोडेन, सीआई के पूर्व कर्मचारी
स्नोडेन ने अखबार को बताया, “मैं उस समाज में नहीं रहना चाहता जहां ऐसा काम किया गया... मैं उस जगह नहीं रहना चाहता जहां मेरे सारे काम और मेरी बातें रिकॉर्ड की जाती हों.”
स्नोडेन ने गार्डियन अखबार के ग्लेन ग्रीनवैल्ड और लॉरा पोइट्रास को बताया, “कोई भी विश्लेषक किसी भी समय किसी को भी निशाना बना सकता है. हालांकि सभी विश्लेषकों के पास ये क्षमता नहीं है लेकिन मैं अपनी डेस्क पर बैठकर किसी के भी निजी वार्तालाप को जान सकता हूं.”
ब्रितानी अखबार गार्डियन ने खबर प्रकाशित की थी कि अमेरिकी राष्ट्रीय सुरक्षा एजेंसी बड़े पैमाने पर क्लिक करें फोन और इंटरनेट की निगरानी कर रही है.
अखबार के अनुसार अमेरिकी खुफिया एजेंसी इस कार्यक्रम के माध्यम से लोगों के निजी वीडियो, तस्वीरें और ईमेल तक निकाल लेती है ताकि विशिष्ट लोगों पर नजर रखी जा सके.
बाद में अमरीका की राष्ट्रीय सुरक्षा एजेंसी के निदेशक क्लिक करें जेम्स क्लैपर ने स्वीकार किया था कि सरकार इंटरनेट कंपनियों से उपभोक्ताओं की बातचीत के रिकॉर्ड प्राप्त करती है लेकिन उन्होंने कहा कि सूचना प्राप्त करने की नीति का लक्ष्य केवल गैर अमेरिकी लोगों के बारे में जानकारी लेना है.
अभिव्यक्ति की आज़ादी
गार्डियन अखबार के अनुसार जब एडवर्ड से पूछा गया कि उन्हें क्या लगता है, उनके साथ अब क्या होगा तो उनका जवाब था 'कुछ भी अच्छा नहीं.’एडवर्ड ने कहा कि वह हॉन्ग कॉन्ग इसलिए गए क्योंकि वहाँ अभिव्यक्ति की आज़ादी है.
गौरतलब है कि अमरीकी राष्ट्रपति बराक ओबामा ने इस कार्यक्रम का बचाव करते हुए कहा था कि उनके प्रशासन ने सुरक्षा और गोपनीयता के बीच सही संतुलन बनाए रखा है.
राष्ट्रपति ओबामा ने कहा था कि एनएसए कार्यक्रम को मंजूरी अमरीकी संसद ने दी और संसद की खुफिया समितियां और गुप्त जासूसी की अदालतें इस कार्यक्रम की लगातार निगरानी करते हैं.
गौरतलब है कि अमरीकी अखबार वॉशिंगटन पोस्ट ने खबर दी थी कि अमरीकी खुफिया एजेंसियां इंटरनेट की नौ बड़ी कंपनियों के सर्वर से उपयोगकर्ताओं के बारे में सीधे जानकारी प्राप्त कर रही हैं. इन कंपनियों में फेसबुक, यूट्यूब, स्काइप, एप्पल, पॉल टॉक, गूगल, माइक्रोसॉफ्ट और याहू भी शामिल हैं.
कंपनियों का इंकार
हालांकि इन सभी कंपनियों ने इस बात से इंकार किया था कि उन्होंने अपने सर्वर तक अमरीकी सरकार की पहुंच सुनिश्चित की थी.कहा जा रहा है कि क्लिक करें प्रिज़्म के जरिए एनएसए और एफबीआई ने ईमेल्स, वेब चैट और दूसरे संचार माध्यमों तक अपनी पहुंच बनाई.
प्रिज़्म की स्थापना साल 2007 में दूसरे देशों के लोगों के बारे में गहराई से जानकारी लेने के मकसद से की गई थी.
इन खबरों के बाद वर्ल्डवाइड वेब यानी डब्ल्यू डब्ल्यू डब्ल्यू के निर्माता सर टिम बरनर्ज़ ने प्रिज़्म कार्यक्रम पर नाराजगी व्यक्त करते हुए कहा था कि अमेरिकी सरकार की ओर से यह कदम बुनियादी मानवाधिकारों का उल्लंघन है.
उन्होंने इंटरनेट उपयोगकर्ताओं से कहा कि वह व्यक्तिगत रूप में इस मामले पर आवाज उठाएँ और विरोध करें.
दूसरी ओर फेसबुक के निर्माता मार्क ज़करबर्ग और गूगल के मालिक लैरी पेज ने अमेरिका खुफिया एजेंसी को उपभोक्ता जानकारी देने से इनकार किया था.
इससे पहले एप्पल और याहू भी किसी भी सरकारी एजेंसी को अपने सर्वर तक सीधी पहुँच देने के आरोप से इनकार कर चुके हैं.
Data Source Provided From : From बीबीसी हिन्दी
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
मोदी ने दिया कांग्रेस मुक्त भारत का नारा
गुजरात के
मुख्यमंत्री नरेंद्र मोदी 2014 चुनाव अभियान समिति के अध्यक्ष घोषित
रविवार, 9 जून, 2013 को 19:09 IST तक के समाचार
गोवा में हुई भारतीय जनता पार्टी
की कार्यकारिणी में पार्टी अध्यक्ष राजनाथ सिंह ने रविवार को गुजरात के
मुख्यमंत्री नरेंद्र मोदी को 2014 चुनाव अभियान समिति का अध्यक्ष घोषित कर
दिया.
घोषणा के कुछ देर बाद नरेंद्र मोदी ने ट्विटर पर
लिखा, "वरिष्ठ नेताओं ने मुझमें विश्वास जताया है. हम कांग्रेस मुक्त भारत
निर्माण बनाने में कोई कसर बाकी नहीं छोड़ेंगे. आपके समर्थन और आशीर्वाद के
लिए धन्यवाद."मोदी को चुनाव समिति अध्यक्ष बनाए जाने के बाद भाजपा नेताओं ने कार्यकर्ताओं को संबोधित किया. मोदी ने अपने भाषण में कांग्रेस और प्रधानमंत्री मनमोहन को कई बार निशाने पर लिया.
'कांग्रेस मुक्त भारत'
इससे पहले राजनाथ सिंह ने गोवा में दोपहर को बेहद संक्षिप्त बयान में कहा, "मैं आपको महत्वपूर्ण जानकारी देना चाहता हूँ. हर राजनीतिक पार्टी चुनाव को अपने लिए बड़ी चुनौती मानती है. क्लिक करें भारतीय जनता पार्टी भी आगामी लोक सभा चुनाव को बड़ी चुनौती मानकर चल रही है. पूरे चुनावी अभियान को ध्यान में रखते हुए मैने गुजरात के मुख्यमंत्री नरेंद्र मोदी को चुनाव अभियान समिति का अध्यक्ष घोषित किया है."
क्लिक करें मोदी का जीवन परिचय
राजनाथ सिंह ने ये भी कहा कि जो कुछ भी हुआ है सबकी सहमति के आधार पर हुआ है. हालांकि घोषणा के वक़्त क्लिक करें मोदी ख़ुद मौजूद नहीं थे. घोषणा के वक़्त राजनाथ सिंह के साथ मंच पर सुषमा स्वराज और अरुण जेटली मौजूद थे.
लेकिन अपने बयान के तुरंत बाद राजनाथ सिंह उठकर चले गए और पत्रकारों के सवाल नहीं लिए. बाद में कई कार्यकर्ता मोदी के नाम के नारे लगाते हुए नज़र आए.
बधाईयों का तांता
"वरिष्ठ नेताओं ने मुझमें विश्वास जताया है. हम कांग्रेस मुक्त भारत निर्माण बनाने में कोई कसर बाकी नहीं छोड़ेंगे. मैने आडवाणी जी से फोन पर बात की. उन्होंने मुझे अपना आशीर्वाद दिया. उनका आशीर्वाद पाकर मैं सम्मानित महसूस कर रहा हूँ."
नरेंद्र मोदी
नरेंद्र मोदी को नया रोल दिए जाने के बाद मध्यप्रदेश के मुख्यमंत्री शिवराज सिंह चौहान ने भी अपनी प्रतिक्रिया दी.
गोवा में पत्रकारों से बातचीत में उनका कहना था, "मुझे यकीन है कि इस फैसले का लाभ न सिर्फ भाजपा को मिलेगा बल्कि पूरे देश को मिलेगा. आडवाणी जी का आशिर्वाद सबके साथ हैं चाहे वो मोदी हों या दूसरे नेता. हम पूरा प्रयास करेंगे कि मिलकर काम करके भाजपा के नेतृत्व में 2014 में हमारी सरकार बने."
शिवराज सिंह चौहान ने टिवटर पर भी मोदी को बधाई दी है. कुछ दिन पहले ही लालकृष्ण आडवाणी ने मोदी के बजाए मध्य प्रदेश के मुख्यमंत्री शिवराज सिंह चौहान की तारीफ़ों के पुल बाँध दिए थे.
जब शिवराज सिंह चौहान से आडवाणी के बारे में पूछा गया तो उन्होंने कहा कि ये सब मीडिया की बनाई बातें हैं.
पार्टी कार्यकारिणी से आडवाणी के अलावा उमा भारती और यशवंत सिन्हा जैसे नेताओं ने भी दूरी बनाए रखी.
Data Source Provided From : From बीबीसी हिन्दी
By:
-Kosulla India Ltd
- Bhupesh Kumar Mandal
-(kosullaindialtd.blogspot.com)
NSA slides explain the PRISM data-collection program
Breaking News From America
Warning!!!
For those who use internet for Chatting , Social sites and mail servers...
You Know Our privacy is destroyed...?
Imagine if your sensitive private data will Leaked or some one will black-mail you for it through those data which one you think are protected from gmail, facebook ,yahoo , aol ...etc.
Through
a top-secret program authorized by federal judges working under the
Foreign Intelligence Surveillance Act (FISA), the U.S. intelligence
community can gain access to the servers of nine Internet companies for a
wide range of digital data. Documents describing the previously
undisclosed program, obtained by The Washington Post, show the breadth
of U.S. electronic surveillance capabilities in the wake of a widely
publicized controversy over warrantless wiretapping of U.S. domestic
telephone communications in 2005. These slides, annotated by The
Washington Post, represent a selection from the overall document, and
certain portions are redacted. Read related article.
Introducing the program
A
slide briefing analysts at the National Security Agency about the
program touts its effectiveness and features the logos of the companies
involved.
The program is called PRISM, after the prisms used to split light, which is used to carry information on fiber-optic cables.
This note indicates that the program is the number one source of raw intelligence used for NSA analytic reports.
The seal of
Special Source Operations, the NSA term for alliances with trusted U.S. companies.
Special Source Operations, the NSA term for alliances with trusted U.S. companies.
Monitoring a target's communication
This diagram shows how the bulk of the world’s electronic communications move through companies based in the United States.
Providers and data
The PRISM program collects a wide range of data from the nine companies, although the details vary by provider.
Participating providers
This
slide shows when each company joined the program, with Microsoft being
the first, on Sept. 11, 2007, and Apple the most recent, in October
2012.
No comments:
Post a Comment