Enter your email address to subscribe to Irregular Times and receive notifications of new posts by email.

Join 309 other subscribers

Irregular Times Newsletters

Click here to subscribe to any or all of our six topical e-mail newsletters:
  1. Social Movement Actions,
  2. Credulity and Faith,
  3. Election News,
  4. This Week in Congress,
  5. Tech Dispatch and
  6. our latest Political Stickers and Such

Contact Us

We can be contacted via retorts@irregulartimes.com

What the Congressional Progressive Caucus Has To Say About NSA Spying On Billions Of People

Yesterday, when it was revealed that the U.S. military National Security Agency has been engaged in daily spying on the movement of hundreds of millions, or even billions, of people, including many Americans, without any search warrant or suspicion of any crime, the Congressional Progressive Caucus responded by saying nothing.

Of course, it’s been less than a full day since the news broke, so perhaps it wouldn’t be fair, in this instance, to criticize the Congressional Progressive Caucus for failing to stand up for the progressive cause of preserving constitutional rights. Thinking this, I went to the official web page of the Congressional Progressive Caucus to search for every item of legislation and information that the caucus has produced concerning the NSA spying scandal since it began half a year ago.

Here’s what I found – a more complete summary of what the Congressional Progressive Caucus has had to say about the unconstitutional, abusive spying programs run by the NSA:

progressive caucus nada

For the sake of accuracy, I suggest that the Congressional Progressive Caucus rename itself, becoming the Congressional Progressive Except When Being A Progressive Is Politically Inconvenient To Barack Obama And The Democratic Party Caucus. That name is a bit wordy, perhaps, but on the upside, it provides more search terms for the soldier spies at the NSA to work with.

4 comments to What the Congressional Progressive Caucus Has To Say About NSA Spying On Billions Of People

  • Charles Manning

    Interesting. They’re all Democrats or Republicans, right? Or maybe all Democrats? Any of them from Texas, my home state?

  • Tom

    Oh, there’s a LOT more going on than just the NSA. Check this out:

    http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/

    In 2008, two security researchers at the DefCon hacker conference demonstrated a massive security vulnerability in the worldwide internet traffic-routing system — a vulnerability so severe that it could allow intelligence agencies, corporate spies or criminals to intercept massive amounts of data, or even tamper with it on the fly.

    The traffic hijack, they showed, could be done in such a way that no one would notice because the attackers could simply re-route the traffic to a router they controlled, then forward it to its intended destination once they were done with it, leaving no one the wiser about what had occurred.

    Now, five years later, this is exactly what has happened. Earlier this year, researchers say, someone mysteriously hijacked internet traffic headed to government agencies, corporate offices and other recipients in the U.S. and elsewhere and redirected it to Belarus and Iceland, before sending it on its way to its legitimate destinations. They did so repeatedly over several months. But luckily someone did notice.

    And this may not be the first time it has occurred — just the first time it got caught.

    Analysts at Renesys, a network monitoring firm, said that over several months earlier this year someone diverted the traffic using the same vulnerability in the so-called Border Gateway Protocol, or BGP, that the two security researchers demonstrated in 2008. The BGP attack, a version of the classic man-in-the-middle exploit, allows hijackers to fool other routers into re-directing data to a system they control. When they finally send it to its correct destination, neither the sender nor recipient is aware that their data has made an unscheduled stop.

    The stakes are potentially enormous, since once data is hijacked, the perpetrator can copy and then comb through any unencrypted data freely — reading email and spreadsheets, extracting credit card numbers, and capturing vast amounts of sensitive information.

    The attackers initiated the hijacks at least 38 times, grabbing traffic from about 1,500 individual IP blocks — sometimes for minutes, other times for days — and they did it in such a way that, researchers say, it couldn’t have been a mistake.

    Renesys Senior Analyst Doug Madory says initially he thought the motive was financial, since traffic destined for a large bank got sucked up in the diversion. But then the hijackers began diverting traffic intended for the foreign ministries of several countries he declined to name, as well as a large VoIP provider in the U.S., and ISPs that process the internet communications of thousands of customers.

    Although the intercepts originated from a number of different systems in Belarus and Iceland, Renesys believes the hijacks are all related, and that the hijackers may have altered the locations to obfuscate their activity.

    “What makes a man-in-the-middle routing attack different from a simple route hijack? Simply put, the traffic keeps flowing and everything looks fine to the recipient,…” Renesys wrote in a blog post about the hijacks. “It’s possible to drag specific internet traffic halfway around the world, inspect it, modify it if desired, and send it on its way. Who needs fiberoptic taps?”

    (read the rest)

  • J Clifford

    Another day, and the Congressional Progressive Caucus still hasn’t said anything about the new information. I guess they don’t think it’s important.

    Then again, the Libertarian Party and Green Party have also been silent on the revelation of CO-TRAVELER.

  • J Clifford

    The Green Party: Still silent on the NSA.
    The Congressional Progressive Caucus: Still silent on the NSA.
    The Libertarian Party: Still silent on the NSA… although the Libertarians have taken the time to advertise that they’ve got a brand new long sleeved tshirt for sale.

    With apathetic groups like these, what’s the point of having an alternative?

Leave a Reply

  

  

  

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>