Category Archives: Big Government

TSA behavior detection officers’ ability to detect bad actors little better than chance, GAO study says

tsasecurityjpg-cb813765badfd334
A federal study that looked at hundreds of studies on identifying signs of deception concluded that behavior detection officers like those employed at Cleveland Hopkins International Airport fare no better or only slightly better than anyone else in accurately picking up cues. (Lynn Ischay/The Plain Dealer)

Plain Dealer | Nov 23, 2013

By Alison Grant

CLEVELAND, Ohio — On the eve of the busiest travel days of the year, a new report says the ability of behavior detection officers at airports to accurately identify a passenger with malicious intent is no better or only slightly better than chance.

The Transportation Security Administration has spent $900 million since 2007 to train and deploy guards at security checkpoints to observe whether passengers exhibit signs of fear, stress and deception and may be a risk. It has 3,000 behavior detection officers at airports nationwide, including at Cleveland Hopkins International Airport.

But a new government analysis of findings from over 400 studies conducted over the past 60 years, and interviews with experts in the field, calls into question whether checkpoint officers can reliably spot dangerous passengers by discerning suspect behaviors and catching verbal cues.

TSA’s billion-dollar blunder

“The ability of humans to accurately identify deception based on behaviors is the same, roughly — essentially the same as chance — slightly greater than chance — 54 percent,” Stephen Lord, director of the Office of Homeland Security, said in testimony last Thursday   before a House subcommittee.

TSA Administrator John Pistole, in written testimony to the same committee, defended the use of behavior detection officers. He said looking for anomalous behavior is a common-sense approach used by law enforcement agencies worldwide.

Terrorists have used underwear, shoe and toner-cartridge bombs, and liquid explosives, Pistole said, but they all have in common the malicious intent of an actor.

“Since we cannot always predict the form evolving threats will take, (behavior detection officers) provide a crucial layer of security,” Pistole said.

In 2012 alone, the specially-trained officers made 2,116 referrals to law enforcement, resulting in 30 boarding denials, 79 investigations by law enforcement groups and 183 arrests, he said.

The manager in charge of TSA operations at Hopkins referred a call to the agency’s Washington headquarters. There, spokesman Ross Feinstein confirmed only that there were behavior detection officers at the Cleveland airport. For security reasons, TSA doesn’t release details such as how many officers it has stationed at security lanes.

“Behavior detection is vital to TSA’s layered approach to deter, detect and disrupt individuals who pose a threat to aviation,” Feinstein said.

Rob Kneen, president and CEO of the Traveline agency in Willoughby, said behavior detection officers are a valuable addition to measures such as TSA’s PreCheck program, which lets pre-approved travelers move more quickly through security.

“I look at it at the very minimum as a great supplemental support,” Kneen said.

Douglas Laird, president of Laird and Associates, an aviation security firm based in Nevada, said behavior detection has potential. Some people are very intuitive and can look at a crowd and pick out someone who poses a threat, said Laird,  a former Secret Service agent and chief of security for Northwest Airlines.

The problem with airport behavior detection officers, he said — inadequate training.

“To even have a hope of being successful, I think you’re looking at several hundreds of hours of training and lots of observation,” Laird said.

TSA said officers in the SPOT program (Screening of Passengers by Observation Technique) get four days of classroom instruction in behavior observation and analysis and 24 hours of on-the-job training in an airport environment. TSA has about 30 behavior detection instructors, each with significant experience and rigorous training, the agency said.

The author of a recent book on aviation security and profiling, Embry-Riddle Aeronautical University Professor Richard Bloom, agreed with the GAO conclusion that there is insufficient validated research to support behavior detection as TSA has implemented it.

 

Bloom likened the debate over behavior detection at airports to the controversy over  polygraph tests. A huge “meta-analysis” of numerous studies in the 1980s and a similar examination a decade ago cast doubt on the reliability of lie detector tests, he said.

“Yet they continue to be used, especially for security clearances,” Bloom said. “The real issue is, can you find verbal or nonverbal characteristics that are associated with a state of mind? The answer to that, at least at the moment, is no.”

In his book “Foundations of Psychological Profiling: Terrorism, Espionage and Deception,” published earlier this year, Bloom says that lacking hard proof that behavior detection works, it might help to think in terms of techniques used to interpret literature, poetry and philosophy.

“Maybe we can look at how we get meaning from other information,” Bloom said, “and putting that together can lead to conclusions about the intent of a person.”

Union proposes armed TSA officers at every checkpoint in wake of LAX shooting

tsa checkpoint

news.medill.northwestern.edu | Nov 26, 2013

by Mallory Black

As autopsy results of a fallen TSA officer killed earlier this month were released Friday, union officials are outlining increased security measures for both the public and Congress to consider.

While a final report of the Nov. 1 shootings of TSA Officer Gerardo Hernandez and two other officers who were wounded has yet to be released, the American Federation of Government Employees has developed proposals for increased security measures for transportation security employees, which were released in a Nov. 14 statement.

One proposal suggests creating a separate unit of armed, law enforcement-trained TSA officers at security checkpoints.

“People don’t realize our TSA officers aren’t law enforcement officers,” said AFGE general counsel David Borer. “They don’t have that authority under the law; they don’t have arrest power; they don’t have the ability to detain people.”

The proposed special unit of Transportation Security Administration officers would be required to undergo law enforcement training as well as obtain proper weapons certifications. Though a call to arm all 45,000 TSA officers was never proposed, Borer said, officers wouldn’t replace existing airport authorities either.

“At O’Hare you’ll see Chicago Police Department officers in the terminal, but some airports have officers and some do not. This new unit would have to coordinate with whatever those existing programs are,” Borer said. “And we’re not proposing every officer should be armed, rather that every checkpoint should have an armed officer. Someone who is specifically there to protect those who work at the checkpoint or passengers who come through.”

Borer added that due to increasing harassment of TSA officers, employee safety at checkpoints has become a major concern.

“The event at LAX was the first time we’ve had an officer killed, but our officers are attacked both verbally and physically far too often.” Borer said. “We have officers punched, knocked out, kicked and tackled and spat upon on a fairly routine basis.”

AFGE’s second proposal involves implementing a raised platform or podium that would provide TSA employees better visibility around the checkpoint. Passengers would be able to better identify officers as well.

“A raised platform would go hand-in-hand with putting armed officers at those locations,” Borer said. “It’s a deterrent, but the platform can also be reinforced in a way that gives them a certain amount of protection if an event were to start and they needed a location from which to return fire, for example.”

The third proposal deals with airport exit lanes, and the restoration of TSA officers to these lanes with the addition of an armed officer. For budgetary reasons, the Transportation Security Administration began phasing out staffing at exit lanes in April, instead turning over jurisdiction to local airport authorities.

But Borer said this move was a mistake.

”Until we secure those exit lanes, that’s always going to be a point of vulnerability,” Borer said. “We need someone to stop any shooters, like the shooter in LA who allegedly killed Officer Hernandez and afterwards proceeded through the exit lane unimpeded down Terminal 3, where he shot three more people.”

Since it’s not considered part of the screening process, the TSA does not provide exit lane security at more than two-thirds of federalized airports, according to Ann Davis, regional TSA public affairs manager.

“To most efficiently use TSA’s limited resources and to focus on the priority of screening passengers and baggage, the TSA has proposed transferring exit lane access control responsibility to local airport authorities, reducing the agency’s budget request by $88.1 million for fiscal year 2014,” Davis wrote in an email.

Making the responsibility standard across all airport exit lanes, ensuring consistency with airport perimeter access controls and maintaining TSA’s compliance through its regulatory inspection program were additional reasons to eliminate TSA exit lane staffing, according to Davis.

AFGE’s last proposal entails the Behavior Detection Officer program, which was subject to a Nov. 14 House Subcommittee on Transportation Security meeting.

Behavior detection officers are trained to detect unusual or suspicious behaviors through the SPOT program – screening of passengers by observation techniques – and investigate situations in which someone poses a threat.

But a study released this month by the Government Accountability Office, “Aviation Security: TSA Should Limit Future Funding for Behavior Detection Activities,” indicated the program lacked scientific evidence of its effectiveness. The study recommends the Secretary of Homeland Security direct the TSA Administrator to limit future funding for the BDO program until it can demonstrate the program’s effectiveness in identifying passengers who pose an aviation security risk.

According to the study, the BDO program has spent $900 million since it was implemented in 2007.

The TSA isn’t cutting BDO programs at O’Hare and Midway airports, and there are no plans to eliminate the program at these airports at this time, according to Davis.

Though Borer thinks if enough behavior detection officers been present the day of the shooting, maybe the disaster could have been avoided. And contrary to the study’s recommendations, what AFGE proposes is an expansion of the Behavior Detection Officer program.

But it’s difficult to put a ballpark figure on how much it would cost to expand the BDO program, and implement each of AFGE’s three other proposals.

“Obviously there is not an unlimited amount of funds,” Borer said, “but if the government’s going to put officers in harm’s way, they need to give them enough backup to protect themselves.”

Former TSA supervisor charged with trafficking cocaine

tsa

USA TODAY | Nov 25, 2013

by Bart Jansen

A Transportation Security Administration supervisor has been indicted for allegedly helping smuggle at least 11 pounds of cocaine through the Virgin Islands, according to federal officials and court documents.

A former Transportation Security Administration supervisor has been indicted for allegedly helping smuggle at least 11 pounds of cocaine through the Virgin Islands, according to federal officials and court documents.

Former TSA Supervisor Dwight Iva Durant, 44, and Shawn Dowe, 29, both of the Virgin Islands, were charged with participating in a trafficking conspiracy, according to Wilfredo Ferrer, U.S. attorney for southern Florida.

The TSA Has Over $500,000 of Travelers’ Loose Change

Each defendant faces a mandatory sentence of 10 years to life in prison, if convicted.

The TSA said Durant no longer works for the agency and that agency officials and the Department of Homeland Security’s Office of Inspector General cooperated in his investigation and apprehension.

“The Transportation Security Administration has zero tolerance for unethical behavior in the workplace,” the agency said in a statement.

The indictment was unsealed Nov. 19, after being filed Nov. 14 – the same day a trial began in St. Thomas for several baggage handlers at Cyril King Airport, according to court records.

The baggage handlers were charged with smuggling drugs in luggage marked with colorful scarves for delivery to recipients in Miami and New York throughout most of 2012, according to their indictment.

The indictment against Durant and Dowe alleges that they helped traffic at least 11 pounds of cocaine during the first eight months of 2012.

Durant was arrested in St. Thomas on Nov. 19 and made his initial court appearance there Nov. 20, according to prosecutor Ferrer. Dowe was arrested in California and ordered held Nov. 20, according to court records.

Both defendants are scheduled to stand trial in U.S. District Court in Miami, where they were indicted.

World leaders in ‘secret society Bilderberg meeting’

653309-bilderberg
A person uses a copy of the Daily Mail newspaper to shield their identity from the demonstrators and the media as they arrive at The Grove hotel, which is hosting the annual Bilderberg conference.

AP | Jun 7, 2013

IT’S a busy weekend at the luxury Grove Hotel, favoured haunt of British soccer players and their glitz-loving spouses.

More than 100 of the world’s most powerful people are at the former manor house near London for a secretive annual gathering that has attained legendary status in the eyes of anti-capitalist protesters and conspiracy theorists.

The guest list for the Bilderberg meeting includes Google executive chairman Eric Schmidt, Amazon CEO Jeff Bezos, International Monetary Fund chief Christine Lagarde and former US Secretary of State Henry Kissinger. British Prime Minister David Cameron is due to drop by Friday.

The Bilderberg Group was set up in 1954 to support military and economic co-operation between Europe and North America during the Cold War.

Named for the site of its first meeting – the Bilderberg Hotel in Oosterbeek, Holland – the forum for prominent politicians, thinkers and business leaders has been held annually at a series of secluded venues in Europe and North America.

What happens at Bilderberg, stays at Bilderberg. There is no media access and the public is kept away by a large security operation. The group says that “there is no detailed agenda, no resolutions are proposed, no votes are taken, and no policy statements are issued.”

But in a move toward slightly more openness, the group now has a website, which lists attendees and key topics for discussion, including the economy, US foreign policy, “cyber warfare and the proliferation of asymmetric threats” and “major trends in medical research.”

Invitees include British Treasury chief George Osborne, Goldman Sachs chairman Peter Sutherland and Thomas Enders, CEO of aerospace company EADS.

Publication of these details has done little to ease the concerns of protesters, who sense a shadowy global elite at work in the secretive meeting.

“When 130 of the leaders from all across the West get together, and many of these are billionaires, they are people who are immensely wealthy and immensely powerful,” said Michael Meacher, a lawmaker from Britain’s Labour Party.

“And when they all get together, it’s not just to have a chat about the latest problem, it is to concert plans for the future of capitalism in the West. That is on a very different scale.”

Others go even further, putting Bilderberg at the heart of a global web of conspiracy. The protesters in Watford include US talk-radio host and September 11 “truther” Alex Jones, and former professional soccer player David Icke, who believes the world is run by a race of reptiles in human form.

Demonstrators plan to hold a “Bilderberg fringe” festival outside the hotel until the conference ends on Sunday.

A Bilderberg spokesman – reached by email since no phone number is listed – said there is nothing sinister about the gathering.

“We disclose the date, the location, the participants and the key topics of the conference,” Xander Heijnen said. “Many groups of people meet without announcing it publicly at all, without disclosing who is taking part and without giving any key topics.

“The meetings broaden the participants’ range of viewpoints, help them to gain insights and exchange views,” he said. “It seems illogical to argue that a meeting of individuals designed to give and obtain fresh insights, somehow ‘undermines democracy.'”

That message has not swayed protesters like Judd Charlton, a ventriloquist from London who showed up on Thursday to jeer at cars with blacked-out windows entering the hotel compound.

“We are basically here to bring down the parasites who are drug dealers and bank collapsers who seem to want to destroy this world,” he said.

NSA Prism program taps in to user data of Apple, Google and others

Prism

A slide depicting the top-secret PRISM program.

• Top-secret Prism program claims direct access to servers of firms including Google, Apple and Facebook

• Companies deny any knowledge of program in operation since 2007

Guardian | Jun 6, 2013    

by Glenn Greenwald and Ewen MacAskill

The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.

The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims “collection directly from the servers” of major US service providers.

Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.

In a statement, Google said: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”

Several senior tech executives insisted that they had no knowledge of Prism or of any similar scheme. They said they would never have been involved in such a program. “If they are doing this, they are doing it without our knowledge,” one said.

An Apple spokesman said it had “never heard” of Prism.

The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012.

Prism

The program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US.

It also opens the possibility of communications made entirely within the US being collected without warrants.

Disclosure of the Prism program follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of US customers.

The participation of the internet companies in Prism will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.

Some of the world’s largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan “Your privacy is our priority” – was the first, with collection beginning in December 2007.

It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.

Collectively, the companies cover the vast majority of online email, search, video and communications networks.

Prism

 

The extent and nature of the data collected from each company varies.

Companies are legally obliged to comply with requests for users’ communications under US law, but the Prism program allows the intelligence services direct access to the companies’ servers. The NSA document notes the operations have “assistance of communications providers in the US”.

The revelation also supports concerns raised by several US senators during the renewal of the Fisa Amendments Act in December 2012, who warned about the scale of surveillance the law might enable, and shortcomings in the safeguards it introduces.

When the FAA was first enacted, defenders of the statute argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

A chart prepared by the NSA, contained within the top-secret document obtained by the Guardian, underscores the breadth of the data it is able to obtain: email, video and voice chat, videos, photos, voice-over-IP (Skype, for example) chats, file transfers, social networking details, and more.

PRISM slide crop


The document is recent, dating to April 2013. Such a leak is extremely rare in the history of the NSA, which prides itself on maintaining a high level of secrecy.

The Prism program allows the NSA, the world’s largest surveillance organisation, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders.

With this program, the NSA is able to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real-time collection on targeted users.

The presentation claims Prism was introduced to overcome what the NSA regarded as shortcomings of Fisa warrants in tracking suspected foreign terrorists. It noted that the US has a “home-field advantage” due to housing much of the internet’s architecture. But the presentation claimed “Fisa constraints restricted our home-field advantage” because Fisa required individual warrants and confirmations that both the sender and receiver of a communication were outside the US.

“Fisa was broken because it provided privacy protections to people who were not entitled to them,” the presentation claimed. “It took a Fisa court order to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the United States. There were too many email accounts to be practical to seek Fisas for all.”

The new measures introduced in the FAA redefines “electronic surveillance” to exclude anyone “reasonably believed” to be outside the USA – a technical change which reduces the bar to initiating surveillance.

The act also gives the director of national intelligence and the attorney general power to permit obtaining intelligence information, and indemnifies internet companies against any actions arising as a result of co-operating with authorities’ requests.

In short, where previously the NSA needed individual authorisations, and confirmation that all parties were outside the USA, they now need only reasonable suspicion that one of the parties was outside the country at the time of the records were collected by the NSA.

The document also shows the FBI acts as an intermediary between other agencies and the tech companies, and stresses its reliance on the participation of US internet firms, claiming “access is 100% dependent on ISP provisioning”.

In the document, the NSA hails the Prism program as “one of the most valuable, unique and productive accesses for NSA”.

It boasts of what it calls “strong growth” in its use of the Prism program to obtain communications. The document highlights the number of obtained communications increased in 2012 by 248% for Skype – leading the notes to remark there was “exponential growth in Skype reporting; looks like the word is getting out about our capability against Skype”. There was also a 131% increase in requests for Facebook data, and 63% for Google.

The NSA document indicates that it is planning to add Dropbox as a PRISM provider. The agency also seeks, in its words, to “expand collection services from existing providers”.

The revelations echo fears raised on the Senate floor last year during the expedited debate on the renewal of the FAA powers which underpin the PRISM program, which occurred just days before the act expired.

Senator Christopher Coons of Delaware specifically warned that the secrecy surrounding the various surveillance programs meant there was no way to know if safeguards within the act were working.

“The problem is: we here in the Senate and the citizens we represent don’t know how well any of these safeguards actually work,” he said.

“The law doesn’t forbid purely domestic information from being collected. We know that at least one Fisa court has ruled that the surveillance program violated the law. Why? Those who know can’t say and average Americans can’t know.”

Other senators also raised concerns. Senator Ron Wyden of Oregon attempted, without success, to find out any information on how many phone calls or emails had been intercepted under the program.

When the law was enacted, defenders of the FAA argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

When the NSA reviews a communication it believes merits further investigation, it issues what it calls a “report”. According to the NSA, “over 2,000 Prism-based reports” are now issued every month. There were 24,005 in 2012, a 27% increase on the previous year.

In total, more than 77,000 intelligence reports have cited the PRISM program.

Jameel Jaffer, director of the ACLU’s Center for Democracy, that it was astonishing the NSA would even ask technology companies to grant direct access to user data.

“It’s shocking enough just that the NSA is asking companies to do this,” he said. “The NSA is part of the military. The military has been granted unprecedented access to civilian communications.

“This is unprecedented militarisation of domestic communications infrastructure. That’s profoundly troubling to anyone who is concerned about that separation.”

A senior administration official said in a statement: “The Guardian and Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. This law does not allow the targeting of any US citizen or of any person located within the United States.

“The program is subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. It involves extensive procedures, specifically approved by the court, to ensure that only non-US persons outside the US are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about US persons.

“This program was recently reauthorized by Congress after extensive hearings and debate.

“Information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.

“The Government may only use Section 702 to acquire foreign intelligence information, which is specifically, and narrowly, defined in the Foreign Intelligence Surveillance Act. This requirement applies across the board, regardless of the nationality of the target.”

PRISM scandal: tech giants flatly deny allowing NSA direct access to servers

Prism
Silicon Valley executives insist they did not know of secret PRISM program that grants access to emails and search history

guardian.co.uk | Jun 6, 2013

by Dominic Rushe and James Ball in New York

prism smallExecutives at several of the tech firms said they had never heard of PRISM until they were contacted by the Guardian

Two different versions of the PRISM scandal were emerging on Thursday with Silicon Valley executives denying all knowledge of the top secret program that gives the National Security Agency direct access to the internet giants’ servers.

The eavesdropping program is detailed in the form of PowerPoint slides in a leaked NSA document, seen and authenticated by the Guardian, which states that it is based on “legally-compelled collection” but operates with the “assistance of communications providers in the US.”

Each of the 41 slides in the document displays prominently the corporate logos of the tech companies claimed to be taking part in PRISM.

However, senior executives from the internet companies expressed surprise and shock and insisted that no direct access to servers had been offered to any government agency.

The top-secret NSA briefing presentation set out details of the PRISM program, which it said granted access to records such as emails, chat conversations, voice calls, documents and more. The presentation the listed dates when document collection began for each company, and said PRISM enabled “direct access from the servers of these US service providers: Microsoft, Yahoo, Google, Facebook, Paltalk, AOL, Skype, YouTube, Apple“.

Senior officials with knowledge of the situation within the tech giants admitted to being confused by the NSA revelations, and said if such data collection was taking place, it was without companies’ knowledge.

An Apple spokesman said: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers and any agency requesting customer data must get a court order,” he said.

Joe Sullivan, Facebook’s chief security officer, said it did not provide government organisation with direct access to Facebook servers. “When Facebook is asked for data or information about specific individuals, we carefully scrutinise any such request for compliance with all applicable laws, and provide information only to the extent required by law.”

A Google spokesman also said it did not provide officials with access to its servers. “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘backdoor’ into our systems, but Google does not have a ‘back door’ for the government to access private user data.”

Microsoft said it only turned over data when served with a court order: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”

A Yahoo spokesman said: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.

Within the tech companies, and talking on off the record, executives said they had never even heard of PRISM until contacted by the Guardian. Executives said that they were regularly contacted by law officials and responded to all subpoenas but they denied ever having heard of a scheme like PRISM, an information programme internal the documents state has been running since 2007.

Executives said they were “confused” by the claims in the NSA document. “We operate under what we are required to do by law,” said one. “We receive requests for information all the time. Say about a potential terrorist threat or after the Boston bombing. But we have systems in place for that.” The executive claimed, as did others, that the most senior figures in their organisation had never heard of PRISM or any scheme like it.

The chief executive of transparency NGO Index on Censorship, Kirsty Hughes, remarked on Twitter that the contradiction seemed to leave two options: “Back door or front?” she posted.

Bilderberg 2013: Secret Summit for World Domination…Live

Bilderberg 2013
(Clockwise from left) Christine Lagarde, a protester from the 2012 meeting in Virginia, Henry Kissinger, George Osborne and David Petraeus Photo: AP/Reuters

telegraph.co.uk | Jun 6. 2013

By Josie Ensor, and Matthew Holehouse

Bilderberg: The Secret Summit for World Domination

Four-day conference at Watford’s The Grove hotel begins
Millions spent on security as protesters demonstrate outside
Lord Healey: ‘the most useful of all the meetings I attend’

Latest

16.53 Well, as to be expected from the world’s most secretive conference, we have learnt nothing from today. The closest we managed to get was half-a-mile from the Watford hotel where the rich and powerful are gathered. We’ll therefore be wrapping it up here, but we leave you with this thought from Lord Healey:

“Lots of the stuff written about Bilderberg is a load of crap. Some people described it as a secret Communist organisation. Others said it was a secret American organisation. But it was balls.”

16.44 A great video from Alex Jones’s Youtube page of him being “provoked” by a BBC presenter.

15.45 Martin Taylor, a former secretary general of the Bilderbergs and businessman, who has been going on and off for the last 20 years, and is attending this year, spoke to the Telegraph’s Tom Rowley about the history of the conference.

“Bilderberg grew up in the early Fifties out of a feeling that if European leaders in all fields had been closer to their American counterparts before the Second World War, some trouble might have been avoided.

Related

Bilderberg Group: Secret 2013 meeting held amid tight security

Bilderberg: PM To Attend Secretive Meeting

Bilderberg group summit: Cameron attendance at ‘cliche fest’ damned

The Bilderberg Group is powerful, works in shadows

The Public-Facing Guestlist for Bilderberg 2013

Sean Hannity: I’ve Never Heard of the Bilderberg Group

“That was at a time when people didn’t cross the Atlantic very often. It was a kind of Cold War council. People got together once a year, sometimes twice, but it was usually once. The numbers originally were about 60 or 70, it is now about 120. You got people from Europe and the US. It has now been rather enlarged.”

15.37 Security is tight, people are being checked in a field, hundreds of yards away from the hotel:

15.32 Speaking to the Telegraph earlier this week, Lord Healey of Riddleden, who attended the first Bilderberg meeting in 1954 and sat on the steering committee for 40 years, said:

“Lots of the stuff written about it is a load of crap. Those who weren’t invited were very jealous. Some people described it as a secret Communist organisation. Others said it was a secret American organisation. But it was balls.”

Lord Healey, who served as chancellor to Harold Wilson and James Callaghan, added: “I found it the most useful of all the meetings I attended regularly. The Bilderberg was the best because the level of the people attending regularly was so much higher.”

15.15 American news channel CNBC is reporting that police have anti-terrorism traffic regulations and a no-fly zone in place, so worried are they that Henry Kissinger and his pals with be the subject of attacks.

14.43 More on Alex Jones, who has been the centre of many controversies. He has previously accused the US government of being involved in the Oklahoma City bombing, the September 11 attacks, and the filming of fake Moon landings to hide NASA’s secret technology.

The outspoken Texan locked horns with Piers Morgan earlier this year after arguing on his show that taking away people’s guns would lead to government tyranny.

He has told an ever-growing group of conspirists gathered today that the Bilderberg Group wants to exterminate 80 per cent of the world population and replace them with robots who will be their slaves.

14.11 That’s nice, a Bilderberg welcoming committee:

14.01 Our reporter, Matthew Holehouse, who is as close to the hotel as press are allowed to get, has said a well-known pastor-like US conspiracy theoriest has arrived on the scene. Alex Jones told the crowd of Americans gathered that he is there to “expose the puppet-masters for what they are to the world”.

He said he wanted the attendees to be put on trial for crimes against humanity. We’re not entirely convinced The Hague would find in his favour.

“It is very, very sinister,” warns Jones.

“Not everybody who goes to Bilderberg, from my research, is a scoundrel or a villain. But there are definitely villains who are there who are basically trying to organise government and business.”


Alex Jones and the scrum

14.00 Bilderberg, which formed in 1954, is making an attempt to change its reputation as one of the most clandestine and controversial meetings in the world; it is the first time the guest list and its limited agenda have been publicly released and journalists are allowed near the grounds.

13.00 David Icke, the world’s most famous conspiracy theorist, is set to come on Saturday – the third day of the conference and we hear he’s expected to bring a big crowd. He has written on his blog about the “proof” that the annual meetings dictate government policy.

12.36 Our reporter Matthew Holehouse is half a mile away from the hotel in a pen with other 50 other reporters. He says it is they are surrounded by a high steel fence that looks like the edge of a prison.

About 40 cars have gone in so far. Every time someone drives in with their luxury car, the crowds shout and heckle.

There are lots of elderly Americans, people wandering around with cameras and a man dressed up as a CCTV camera.

12.23 The cloak of secrecy surrounding the meetings, which ban journalists from attending, has fuelled conspiracy theories that so-called Bilderbergers are planning global domination and world unification.

People have been banned for booking into the hotel this week and reporters are being kept in a pen a long distance away from the entrance to the hotel.

12.14 Michael Meacher, Labour’s former Environment Minister, told our reporter Matthew Holehouse that the institution is shadowy and the public needs to know what is going on.

Michael Meacher addresses reporter in a field in Watford

When asked if it was a shadow government, Meacher replied, “You’re putting it into rather colourful language. I wouldn’t go that far but a gathering like this has that aura about it. It is a shadow organisation that the rest of us do not have access to.

“Most of them are multi-millionaires and billionaires. The idea they have a charity is a distortion.

“The people here are the leaders of the biggest banks, multi-nationals, EU commissioners, and a smattering of politicians from Europe and America. If you wanted to find a group which represented the western governance structure you would come up with a list like this.They are meeting here in secrecy with no transparency or accountability.

12.07 Delegates for the private conference of top politicians and businesspeople from around the world have started to arrive at the hotel in cars with blacked-out windows. Doesn’t look much like they’re up for a stop and chat.

We have a handy agenda and guest list. Some of the country’s politicians have managed to clear four days out of their busy schedules for the event, including:

George Osborne, Chancellor of the Exchequer
Ed Balls, Shadow Chancellor of the Exchequer
Kenneth Clarke, Cabinet Minister
John Kerr, Independent Member, House of Lords

Ed Balls is a confirmed guest of the Bilderberg Group

12:04 Good afternoon and welcome to our liveblog. We will be covering the mysterious goings-on of the annual Bilderberg Group meeting which starts today and is being held in the UK for the first time … in a hotel in Watford.