Hard News: The United States of Surveillance?
143 Responses
First ←Older Page 1 2 3 4 5 6 Newer→ Last
-
Don’t overlook the Telecommunications Interception Bill, described in admirable and hair-raising detail by Thomas Beagle on the Tech Liberty blog here .
-
David Simon has reconsidered a bit:
For my part, I remain convinced that the Verizon call data should be used as a viable data base for counter-terror investigations and that its misuse should be greeted with the hyperbole that currently adorns the present moment. On the other hand, the arguments of others convinced me that while I still believe the differences between call data and a wiretap are profound, and that the standard for obtaining call data has been and should remain far more modest for law enforcement, the same basic privacy protections don’t yet exist for internet communication. There, the very nature of the communication means that once it is harvested, the content itself is obtained. And the law has few of the protections accorded telephonic communication, and so privacy and civil liberties are, at this moment in time, more vulnerable to legal governmental overreach. That’s a legislative matter, but it needs to be addressed. In this day and age, E-communication between individuals, if not public posts on public sites, should have the same measure of legal protection as telephonic communication. So that has shifted for me. This is not to say, of course, that I believe there aren’t legitimate and plausible reasons for law enforcement to sift the internet, or that a PRISM-like monitoring of the internet doesn’t have relevant counter-terror value, but that the acquistion of actual content — at least in the manner of interpersonal communications — should be subject to legal prerequisites comparable to telephonic surveillance. Thanks to those who made clear that PRISM and the telephone call data harvesting are proceeding under different standards.
-
I just want to say that at your big reveal where you tell us the logo they chose, I scrolled down and saw an ad for a Nautilus One Touch coffee machine. Which in some ways was a better gag.
-
And in case anyone wasn’t unnerved by this concept, it adopted this extraordinary logo:
That is the only surprising thing about this entire affair. What were they thinking?
-
BTW I take it SCIENTIA EST POTENTIA is "Knowledge is Power"?
-
And let us not forget the 1980's era United States Electronic Communications Privacy Act, with it's provision that email that has stayed on the providers servers for more than 180 days is "abandoned" so does not need a warrant (Note: there is some legal dispute about the status of messages that have been opened while keeping them on the server).
-
HORansome, in reply to
I'm of the firm belief that there are a host of people in the security sector who delight in coming up with logos and names which reflect contemporary conspiracy culture. In part I think they're playing games with certain conspiracy theorists but I also think it's just the natural result of living in a world where conspiracy theories get talked about all the time.
-
Russell Brown, in reply to
Don’t overlook the Telecommunications Interception Bill, described in admirable and hair-raising detail by Thomas Beagle on the Tech Liberty blog here .
Indeed. Yikes.
-
Sacha, in reply to
I take it SCIENTIA EST POTENTIA is "Knowledge is Power"?
or "Hey, that Science thing seems promising"
#nolatin -
Christopher Nimmo, in reply to
Clearly that's just what the illuminati want you to think!
-
-
Bart Janssen, in reply to
I loved that logo. It screamed to me of some of the actual geeks (the ones doing the work) designing a logo by which everyone in management would ultimately be embarrased.
-
BenWilson, in reply to
Clearly that's just what the illuminati want you to think!
Dude, he's a deep mole for the Illuminati.
-
Can we go back and tear up that contract we signed agreeing to free services in return for advertising and privacy?
-
So I’m not the only one astonished by the access Snowden seems to have had:
Some former CIA officials said they were troubled by aspects of Snowden’s background, at least as he described it to The Post and the Guardian.
For instance, Snowden said he did not have a high school diploma. One former CIA official said that it was extremely unusual for the agency to have hired someone with such thin academic credentials, particularly for a technical job, and that the terms Snowden used to describe his agency positions didn’t match internal job descriptions.
Snowden’s claim to have been placed under diplomatic cover for a position in Switzerland after an apparently brief stint at the CIA as a systems administrator also raised suspicion. “I just have never heard of anyone being hired with so little academic credentials,” the former CIA official said. The agency does employ technical specialists in overseas stations, the former official said, “but their breadth of experience is huge, and they tend not to start out as systems administrators.”
A former senior U.S. intelligence official cited other puzzling aspects of Snowden’s account, questioning why a contractor for Booz Allen at an NSA facility in Hawaii would have access to something as sensitive as a court order from the Foreign Intelligence Surveillance Court.
“I don’t know why he would have had access to those . . . orders out in Hawaii,” the former official said.
I guess there’s some possibility he’s not what he claims to be – the more likely alternative being that the security agency is really not secure.
-
Emma Hart, in reply to
I loved that logo. It screamed to me of some of the actual geeks (the ones doing the work) designing a logo by which everyone in management would ultimately be embarrased.
It looks remarkably like a Paranoia role badge.
-
Interesting post by Giovanni Tiso:
The map suggests that intelligence is still being gathered with a degree of selection, but bear in mind that the Utah data centre is not finished yet. When it comes on line, in September of this year, it might be possible to fulfil the vision suggested by PRISM: a world in which all social data that circulates is captured. It is the ultimate banality of our time to suggest that we engage in self-surveillance of our own volition, as a freely made consumer choice. Gates said of the electronically documented life that it would be ‘the ultimate diary and autobiography, if you want one’ but in fact soon enough being on Facebook or on an equivalent service will be about as optional as it was thirty years ago to have a phone (if it isn’t already). Yet how else you describe those geolocated tweets and status updates, or those situating statements – I’m at the supermarket, I’m on the bus – except as a participatory compulsion, a desire, a need perhaps to be plotted on such a map? That it should be a statement of banality is all the more unsettling. We are, each of us, most of us, boundless informants.
-
Although Snowden carefully distinguishes his own actions from the indiscriminate leaking of Pfc. Bradley Manning, one observation can be made of both of them: how on earth could relatively junior staff (more so Manning than Snowden) apparently have access to everything? It is quite extraordinary.
Their intelligence gathering appears to be based upon:
A - gather all info they can possibly obtain.
B - try to make sense of it.Part B isn't going to be a small task easily managed by few people, think collating the equivalent of the NZ census every what? Day, hour, minute... on a continual real time basis.
There are gaps in this story that could have been closed by its source and its puzzling that they haven't been.
It is more likely he doesn't know.
-
Have you seen this ?
"Why didn't tech company leaders blow the whistle?"
https://mailman.stanford.edu/pipermail/liberationtech/2013-June/008815.html
-
they tend not to start out as systems administrators.
No doubt the NSA runs a tighter ship than most people, but it's impossible to do your job as a sysadmin without being entrusted with access to things you wouldn't otherwise have access to.
-
didn't I already see this movie? ... except it was about Australia
-
In the end, WebFountain didn’t go far
Maybe...
Anyway, if the purpose of an activity would be defeated by making it public, then there is a long standing principle of law enforcement that secrecy can be required. Such powers were traditionally strongest in matters of national security.
I have observed these to include requiring a staff member to keep a matter from their superiors. So don't be too harsh on firms that may well try not to be evil. It could be that their security staff (often recruited from the public sector) may simply not have told anyone.
Of course Open Source platforms are a good defence (e.g. Truecrypt...) - sunlight...
-
Russell Brown, in reply to
Part B isn’t going to be a small task easily managed by few people, think collating the equivalent of the NZ census every what? Day, hour, minute… on a continual real time basis.
It's possible that the bigger private data-houses are doing some of the feds' chewing for them. This data-mining project at Google Research was actually tested by its authors on a global terrorism dataset.
There are gaps in this story that could have been closed by its source and its puzzling that they haven’t been.
It is more likely he doesn’t know.
I do wonder. A series of Powerpoint slides doesn't necessarily indicate proximity to the control room. But who knows? There are many unanswered questions here.
-
Russell Brown, in reply to
I have observed these to include requiring a staff member to keep a matter from their superiors. So don’t be too harsh on firms that may well try not to be evil. It could be that their security staff (often recruited from the public sector) may simply not have told anyone.
I hadn't thought of that.
-
nzlemming, in reply to
it's impossible to do your job as a sysadmin without being entrusted with access to things you wouldn't otherwise have access to.
Correct. When I started running IT for a small government agency (which meant me and a tech), I had no security clearance and I raised the matter with the CE.
He said "Why do you need one? We don't do any secret stuff."
I said "Do you have one?"
He said "Of course. Top Secret." (I think he was quite proud of that)
I said "I can read your files and email. How do you know you can trust me?"
He filed the paperwork the next day.
Post your response…
This topic is closed.