The Attorney General of a Republic does not have the power to give permission to the press to do their job. Those are the actions of a despotic regime and require immediate action, including impeachment and indictment.
Glenn Greenwald, a columnist on civil liberties and US national security issues for the Guardian, spoke with Piers Morgan last night on the top secret PRISM program that has direct access to servers of firms including Google, Facebook and Apple.
Greenwald told Piers Morgan the Obama administration “has been very aggressive about bullying and threatening anybody” who thinks about exposing the program.
“There is a massive apparatus within the United States government that with complete secrecy has been building this enormous structure that has only one goal,” Greenwald said on CNN’s “Piers Morgan Live” on Thursday.
“And that is to destroy privacy and anonymity not just in the United States but around the world.”
Greenwald’s subsequent comments came just hours after The Guardian and The Washington Post both broke another bombshell report detailing a program dubbed as “PRISM.” According to the reports, the program involves the National Security Agency and FBI tapping into the servers of nine leading Internet companies to extract information.
Greenwald jump-started Thursday’s discussion over civil liberties and government surveillance with a report late Wednesday night that detailed the NSA’s collection of data from millions of Americans’ phone records.
“It’s well past time that we have a debate about whether that’s the kind of country and world in which we want to live,” Greenwald said on CNN. “We haven’t had that debate because it’s all done in secrecy and the Obama administration has been very aggressive about bullying and threatening anybody who thinks about exposing it or writing about it or even doing journalism about it. It’s well past time that that come to an end.”
A chart prepared by the NSA, contained within the top-secret document obtained by the Guardian, underscores the breadth of the data it is able to obtain: email, video and voice chat, videos, photos, voice-over-IP (Skype, for example) chats, file transfers, social networking details, and more. (The Guardian)