The Wyden Siren Goes Off Again: We’ll Be “Stunned” By What the NSA Is Doing
Reaction to “stunned” claim
- Many say they would not be surprised by any new NSA revelations; they already assume mass surveillance of communications, finance, and medical data.
- Several point out the article’s framing is misleading: the quoted senator says people will be “stunned” that it took so long to be declassified and debated, not necessarily by the conduct itself.
- Some argue tech-savvy readers won’t be shocked, but the general public might be, once hard evidence and scale are visible.
Secret interpretation of Section 702
- Strong criticism of “secret interpretations” of law; many see this as fundamentally incompatible with accountable democracy and akin to “secret law.”
- Some expect the classified interpretation involves broad warrantless access to commercial data (e.g., adtech), and laundering that into domestic law enforcement leads.
- Key worry: the government’s own policy documents and FISA opinions that define how 702 works are classified, leaving Congress and the public debating in the dark.
Oversight, FISA, and secret courts
- FISA courts are widely viewed as inadequate oversight; references to a former FISA judge resigning and to a long-running “secret body of law.”
- Concern that agencies and the FBI evade even current minimal record‑keeping and review, making abuse hard to detect or prove.
Scale and methods of surveillance
- Posters assume the NSA has vast storage and search capabilities, possibly exabyte-scale, and extensive “hooks” into infrastructure.
- Discussion includes alleged backdoors in cryptographic standards and hardware (e.g., Intel ME / TPM), though details are acknowledged as speculative or unproven.
Privacy, “nothing to hide,” and future regimes
- Repeated rejection of the “nothing to hide, nothing to fear” argument; people emphasize:
- You can’t predict future governments or changing laws.
- Collected data can be hacked, misused, or weaponized for blackmail.
- Surveillance chills speech and protest (e.g., facial/plate tracking at demonstrations).
- Several note that many already assume “full surveillance,” but still see a difference between suspicion and documented proof.
Data quality, misidentification, and downstream harm
- Multiple anecdotes about mistaken identity in medical, credit, and legal databases underscore the risk of garbage data feeding powerful surveillance systems.
- Concern that such errors, in a national security context, could have severe and hard-to-correct consequences.
Congressional tools and political realities
- Some argue the senator could use speech‑or‑debate immunity to disclose classified details; others counter that leadership could punish this (committee removal, loss of influence).
- Filibuster is mentioned but seen as limited: needs numbers, depends on leadership bringing bills to the floor, and can be ended by cloture.