The Wyden Siren Goes Off Again: We’ll Be “Stunned” By What the NSA Is Doing

Reaction to “stunned” claim

  • Many say they would not be surprised by any new NSA revelations; they already assume mass surveillance of communications, finance, and medical data.
  • Several point out the article’s framing is misleading: the quoted senator says people will be “stunned” that it took so long to be declassified and debated, not necessarily by the conduct itself.
  • Some argue tech-savvy readers won’t be shocked, but the general public might be, once hard evidence and scale are visible.

Secret interpretation of Section 702

  • Strong criticism of “secret interpretations” of law; many see this as fundamentally incompatible with accountable democracy and akin to “secret law.”
  • Some expect the classified interpretation involves broad warrantless access to commercial data (e.g., adtech), and laundering that into domestic law enforcement leads.
  • Key worry: the government’s own policy documents and FISA opinions that define how 702 works are classified, leaving Congress and the public debating in the dark.

Oversight, FISA, and secret courts

  • FISA courts are widely viewed as inadequate oversight; references to a former FISA judge resigning and to a long-running “secret body of law.”
  • Concern that agencies and the FBI evade even current minimal record‑keeping and review, making abuse hard to detect or prove.

Scale and methods of surveillance

  • Posters assume the NSA has vast storage and search capabilities, possibly exabyte-scale, and extensive “hooks” into infrastructure.
  • Discussion includes alleged backdoors in cryptographic standards and hardware (e.g., Intel ME / TPM), though details are acknowledged as speculative or unproven.

Privacy, “nothing to hide,” and future regimes

  • Repeated rejection of the “nothing to hide, nothing to fear” argument; people emphasize:
    • You can’t predict future governments or changing laws.
    • Collected data can be hacked, misused, or weaponized for blackmail.
    • Surveillance chills speech and protest (e.g., facial/plate tracking at demonstrations).
  • Several note that many already assume “full surveillance,” but still see a difference between suspicion and documented proof.

Data quality, misidentification, and downstream harm

  • Multiple anecdotes about mistaken identity in medical, credit, and legal databases underscore the risk of garbage data feeding powerful surveillance systems.
  • Concern that such errors, in a national security context, could have severe and hard-to-correct consequences.

Congressional tools and political realities

  • Some argue the senator could use speech‑or‑debate immunity to disclose classified details; others counter that leadership could punish this (committee removal, loss of influence).
  • Filibuster is mentioned but seen as limited: needs numbers, depends on leadership bringing bills to the floor, and can be ended by cloture.