Spies, lies and your lost privacy

Sharyl Attkisson – former CBS investigative reporter, and five-time Emmy winner – has been surveilled, her computer hacked, her career threatened, all because of her exposes of government and political corruption.

Last week she reported on a meeting with “a small group of reliable, formerly high-placed intelligence officials who have dropped a few interesting tidbits on me of late.”

This was her understanding of methods used by the government, based on the discussions:

  • SharylAtkisson_Top2It’s not true that wiretaps and/or electronic surveillance of U.S. citizens can “only” be done with a FISA (Foreign Intelligence Surveillance Act) court order.
  • Besides the FISA court, “wiretapping” or electronic surveillance can also be done under Title III authority. The government used this authority, for example, in the Justice Department’s secret Fast and Furious “gunwalking” case.
  • Additionally, U.S. Presidents have the power to issue secret presidential directives that can authorize otherwise illegal acts (theoretically in the country’s best interests). These directives may come with pre-planned cover stories to be used in the event the operation is exposed, and they come with indemnity for those involved, giving them permission to lie about the operation or their involvement without fear of prosecution.
  • The public will rarely know about such presidential directives since most who see them must sign agreements that promise nondisclosure and consent to polygraphs.

Attkisson said that “computer surveillance is a grey area in the intelligence community where many insiders argue the traditional privacy restrictions and surveillance rules don’t necessarily apply.”

In another revelation she supported the possibility of President Donald Trump’s claim that the opposition “wiretapped” Trump Tower.

“The term wiretapping is used in a general sense to refer to electronic eavesdropping, even though the actual tapping of wires is not routinely necessary with today’s technology and tradecraft,” she explained.

Attkisson said that there are ways to avoid privacy rules for American citizens:

  • Surveillance of domestic communications can be conducted in international waters where U.S. law doesn’t apply.
  • There are “back-door” ways to collect and report on a target without Title III or FISA court authority. If it’s for political purposes or blackmail, this may consist of “inventing” an excuse to surveil the target.
  • If the work of targeting an individual cannot be accomplished by government intel officers, it can be contracted out to third parties or to foreign parties who aren’t bound by U.S. law.

“Incidental collection of a U.S. citizen target may be orchestrated for political reasons by those who have tools and tradecraft available to them because of their positions of power,” she explained, adding “there are ways to do it with no fingerprints.”

She offered the following example:

  1. Locate a foreign target already under CIA surveillance.
  2. Have a government agent use the foreign target’s phone and/or computer to make it look like the foreigner contacted the U.S. citizen whose communications are sought. The contacts can be benign, but they establish a record that falsely implies a relationship exists between the U.S. citizen and the foreign target.
  3. The government agent can also mimic a communication back from the U.S. citizen to the foreign target, creating an appearance that the U.S. citizen initiated contacts. This could be favorable to justifying a warrant on the U.S. citizen later.
  4. The U.S. citizen is now tied to the foreign entity and is now an “incidental” collection target that can be surveilled in a “masked” format. Although “masked,” the surveilling agency knows the U.S. citizen’s identity.
  5. If the U.S. citizen does anything that can be construed as illegal or suspicious, it’s possible the intel agency can then receive approval to surveil him directly rather than only “incidentally.”

Attkisson’s latest book The Smear: How Shady Political Operatives and Fake News Control What You See, What You Think, and How You Vote will be published June 17.


For more information on CIA surveillance methods and tools, Wikileaks has recently published Vault 7. Other related articles include: the Russian Dossier, and its text and images.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: