a thoughtful web.
Good ideas and conversation. No ads, no tracking.   Login or Take a Tour!
comment by achughes
achughes  ·  3968 days ago  ·  link  ·    ·  parent  ·  post: 'Outrageous': Verizon reportedly forced to turn over customers' phone records

I'm not really sure why everybody has been so surprised by this. Its been well documented that the NSA has been doing this for years. Its not right and should stop but its nothing new.





mk  ·  3968 days ago  ·  link  ·  

Really? I was aware of what the Bush admin did after 9/11, but I hadn't read anywhere that the NSA was granted access to all phone communications in the US. I've read a number of stories about NSA overreach, but since the Bush incident, never anything as wide-ranging ragarding telecos as this.

AlderaanDuran  ·  3967 days ago  ·  link  ·  

http://en.wikipedia.org/wiki/ECHELON

    ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.

    Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[6][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.

http://www.washingtonpost.com/wp-srv/WPcap/1999-11/14/019r-1...

http://www.theatlantic.com/politics/archive/2013/06/what-we-.../

And this is just ONE program from the 60s... It's been around forever. This isn't conspiracy either, there's government reports from multiple countries on the books about ECHELON and it's capabilities. Supposed it's based on "keywords", like it won't ever record anything unless a string of keywords are picked up in its handling/scans of traffic, be it voice, fax, or microwave. This program was instituted before the internet, so that's why things like ADVISE (http://en.wikipedia.org/wiki/ADVISE) and Carnivore (http://en.wikipedia.org/wiki/Carnivore_%28software%29) and Narus (http://en.wikipedia.org/wiki/NarusInsight) exist. Essentially the same goals as ECHELON but for the new mediums.

After the cold war ended, they didn't shut these programs down, they just had more free time to monitor other people, be it citizens or foreigners. All they are doing is diversifying and getting more programs like this that are capable of breaking encryption as well. It sounds like something out of a Tom Clancy book, but it's all real.

The fact that Verizon was giving up meta-data is just the tip of the iceberg and nothing to worry about, when compared with the fact that they can intercept any form of any communication any time they want. They filter EVERYTHING, and it's all based on keywords. No one is tracking us now persay, but if you say a certain string of hot-button keywords on a forum, phone call, or messaging program, guess what, those communications are going to get someone looking into them and reviewing them and archiving them. It's mostly automated to reduce actual man power.

They don't care about overreach when few people even care that these programs exist, yet everyone freaks out when Verizon handed over meta-data because it affects them as a well defined customer group, but when people report on a program that monitors everyone and everything? It can't be personified so it passes with a whimper at best. Metadata they actually requests is one thing, the mass filtering they do of everything everyday is what needs to get out more. A lot of people are now talking about these programs more now that the NSA is in the news, which is good news for dialogue and informing people. But every agency has their signals intelligence programs, the NSA, the CIA, the FBI, private firms that get contracted by those groups, other countries programs that share data with us, and us with them, etc.

Carnivore:

http://www.cbsnews.com/8301-500609_162-289590.html

http://www.howstuffworks.com/carnivore.htm

http://www.foxnews.com/story/2005/01/18/fbi-ditches-carnivor.../

http://www.pcworld.com/article/119404/article.html

Narus: (what replaced it)

http://www.businessinsider.com/the-washington-post-backtrack...

Case against ATT when they let the NSA install these blackboxes on their network...

http://en.wikipedia.org/wiki/Hepting_v._AT%26T

http://www.aclu.org/national-security/hepting-v-att-challeng...

https://www.eff.org/cases/hepting

Bush admin Smush admin... This signals intelligence game has been around since the mid 50s. And no, I'm not a conspiracy nut, I'm just really into military programs and capabilities and stuff like this. And if you research it, it's all very real, and well documented dating back to the mid 50s. They can even record from the mic of a cellphone that is powered OFF remotely... Look up "batteries out meetings". This is something top officials do when discussing higher level information, because if we can do it, our enemies can probably do it to. You either aren't allowed to bring a cellphone into the meeting room, or everyone has to pull their batteries out before they start talking. (The atlantic article I linked up near the top talks about this is well).

They can do nearly anything. It's impressive and scary at the same time.

ecib  ·  3968 days ago  ·  link  ·  

Same here and I'm a news junkie.

ecib  ·  3968 days ago  ·  link  ·  

It's true that the leaked NSA "blackrooms" installed at the telcos have had the details leaked and reported, but this seems different as it looks like specific requests for domestic user information as opposed to wide-net scraping for later targeting, and at least seem like it could involve targeting domestic-to-domestic communications as opposed to just domestic-foreign. Also this is NSA warrantless

Maybe I'm not up to speed on all the reporting on the subject of the myriad ways they are eavesdropping, but this seems new to me, and it is certainly news to me, though it's nothing I didn't assume already.

achughes  ·  3968 days ago  ·  link  ·  

The reason that is doesn't fall under warrantless wiretapping is because there isn't any wiretapping going. The data that is being collected by the NSA isn't the actual conversation, but the metadata of that conversation (location, duration, etc). This is because in almost every case the conversation that is going on is unimportant and information that is most interesting is who people are talking to.

This information is important because by comparing all of the information they can build a graph of the various social networks which is particularly important when tracking terrorist networks. And by racking who is talking to they have a better understanding of the phones that they need to get warrants for and whose phones they need to tap (this is actually how the NSA figured out how the bin Laden network was operating).

Thats as much as I can figure out, because its illegal for the NSA to tap domestic phones. Anything domestic tapping comes under the FBIs jurisdiction.

mk  ·  3968 days ago  ·  link  ·  

I wonder what is the expectation of privacy regarding phone logs. Knowing who I call, when I call them, and for how long is potentially very significant private data. It can be evidence of an affair, or evidence helping to convict or acquit in a trial. It could also be used to target all kinds of networks, including political ones.