Earl Bockenfeld's Radio Weblog : America's real drug problem, is called television. --Greg Palast
Updated: 1/2/2006; 9:23:41 PM.

 

 
Looking for a Story? Check:
 
 


 
Work:
 
 

Archives:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Great Sites:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 


Subscribe to "Earl Bockenfeld's Radio Weblog" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.

Comments by: YACCS

« chicago blogs »

 
 

Thursday, December 22, 2005



The Onion: Coal Now Too Expensive To Put In Christmas Stockings



CHICAGO--With winter's onset driving the demand for surface coal to record-high levels, the mineral's cost is now beyond the reach of low- and middle-income Americans who wish to punish their naughty children. "Coal in one's stocking is meant to serve as an admonishment or warning, not as a dependable grade-B investment," said William Menchell, a commodities adviser for T. Rowe Price. "In today's market, children should only have their stockings stuffed with lumps of coal if they have been studious and obedient, and show an interest in long-term investments in the energy sector." For more affordable punitive options, analysts point to the relatively stagnant switch market, which could soon go the way of coal if demand increases for combustible wooden sticks.


categories: Humor
Other Stories according to Google: The Onion | America's Finest News Source | The Onion | America's Finest News Source | The answer to all things Tulane | Page Not Found | The AV Club | Democracy For Florida :: grassroots activists working for | Home | The Onion - America's Finest News Source | Page Not Found | The Onion - America's Finest News Source | How Very Special | The Onion - America's Finest News Source | Your Horoscope 4148 | The Onion - America's Finest News Source | Horoscopes 4147 | The Onion - America's Finest News Source

10:20:26 PM    



Technology At The Root Of The NSA Wiretap Scandal

12/20/2005 12:38:54 PM, by Hannibal

A good question was raised by a caller on TOTN (Talk of the Nation) yesterday. she asked if this technology was used by the administration during the 2004 election to spy on the kerry camp and peaceful protestors of the administration (i'm paraphrasing). without FISA/FISC oversight, and without any transparency, how can this be trusted? The FBI already missused such powers against civil rights leaders (including MLK).

The answer she got was "trust us"

ARS technica Article Link

When the NSA wiretapping story first hit the pages of the NYT a few days ago, there were clearly a huge number of unanswered questions. Is the wiretapping that the President has authorized illegal under the FISA act? Is it unconstitutional? If it's illegal, does the President have the authority to violate the law if he's acting in the best interests of the republic? And then there's the question of why the NYT sat on this story for over a year before going public with it.

I'm not really going to make any attempt to answer questions of legality and constitutionality, because the Internet is full of armchair constitutional scholars right now who're fighting tooth and nail over these questions, generating much heat but very little light. Instead, I'd like to point your attention to some later developments in this case that clearly indicate that there's much more going on here than we initially assumed. When the truth comes out (if it ever does), this NSA wiretapping story will almost certainly be a story not just about the Constitutional concept of the separation of powers, but about high technology.

To return to the last question in the first paragraph, let's take a look at the NYT's own answer. The quotes below are from NYT executive editor Bill Keller's statement on the matter:

A year ago, when this information first became known to Times reporters, the Administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country's security...
As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time.

"We also continued reporting, and in the ensuing months two things happened that changed our thinking... Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program -- withholding a number of technical details -- in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record.

(Emphasis in the above quote and in all subsequent quotes is added.)
So the NYT sat on this story for a year in part because they were concerned that they wouldn't be able to report it without revealing some crucial technical details of how the program works.

Now let's take a look a statement of former senator Bob Graham (D-FL), who was one of the few senators to be briefed on the program. From a new Washington Post article:

"I came out of the room with the full sense that we were dealing with a change in technology but not policy," Graham said, with new opportunities to intercept overseas calls that passed through U.S. switches.

Kevin Drum at the Washington Monthly has rounded up a few more quotes like those above (including the NYT quote), that also help make a very good case that what's at issue here is some kind of new NSA surveillance technology:

  • Attorney General Alberto Gonzales, telling reporters why Bush didn't simply ask Congress to pass a law making the program clearly legal: "We've had discussions with members of Congress, certain members of Congress, about whether or not we could get an amendment to FISA, and we were advised that that was not likely to be - that was not something we could likely get, certainly not without jeopardizing the existence of the program, and therefore, killing the program."
  • President Bush, answering questions at Monday's press conference: "We use FISA still....But FISA is for long-term monitoring....There is a difference between detecting so we can prevent, and monitoring. And it's important to know the distinction between the two....We used the [FISA] process to monitor. But also....we've got to be able to detect and prevent."
  • Senator Jay Rockefeller, in a letter to Dick Cheney after being briefed on the program in 2003: "As I reflected on the meeting today, and the future we face, John Poindexter's TIA project sprung to mind, exacerbating my concern regarding the direction the Administration is moving with regard to security, technology, and surveillance."
This last quote above, the one about TIA, is especially telling. TIA was a massive electronic intelligence gathering program designed to mechanically sift through phone calls, emails, and other electronic communications in order to build pictures of how individuals fit into larger networks. We covered TIA here on Ars, but of all the coverage I think Caesar's initial take on it seems the most directly applicable to the current situation:

This system's purpose would be to monitor communications and detect would-be terrorists and plots before they happen... This project is not interested in funding "evolutionary" changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws). According to DARPA, such data collection "increases information coverage by an order of magnitude," and ultimately "requires keeping track of individuals and understanding how they fit into models."
"Massive leaps in surveillance laws" indeed. TIA became public in 2002, and Congress quickly put the kibosh on it. This is right about the time that Bush secretly signed the executive order authorizing the new NSA wiretap program.

So, are TIA and the NSA wiretapping directive related? That probably depends on what you mean by "related." I doubt seriously they're the same thing, but it's entirely possible that the undescribed new technology used in the NSA wiretapping program was also going to be deployed as a part of TIA's massive data collection efforts.

My main point in bringing up TIA is twofold: 1) TIA-like efforts are still going on (Defensetech catalogs some), and 2) the government has been trying to use new technology, like database tech and voice recognition, for domestic surveillance for a long time. And when I say a long time, I mean well before the current administration came into office.

The domestic electronic surveillance ball really got rolling under the Clinton administration, with the 1994 Communications Assistance for Law Enforcement Act (CALEA). CALEA mandated that the telcos aid wiretapping by installing remote wiretap ports onto their digital switches so that the switch traffic would be available for snooping by law enforcement. After CALEA passed, the FBI no longer had to go on-site with wiretapping equipment in order to tap a line�they could monitor and digitally process voice communications from the comfort of the home office. (The FCC has recently ruled that CALEA covers VOIP services, which means that providers like Vonage will have to find a way to comply.)

CALEA opened up a huge can of worms, and PGP creator Phil Zimmermann sounded the alarm back in 1999 about where the program was headed:

A year after the CALEA passed, the FBI disclosed plans to require the phone companies to build into their infrastructure the capacity to simultaneously wiretap 1 percent of all phone calls in all major U.S. cities. This would represent more than a thousandfold increase over previous levels in the number of phones that could be wiretapped. In previous years, there were only about a thousand court-ordered wiretaps in the United States per year, at the federal, state, and local levels combined. It's hard to see how the government could even employ enough judges to sign enough wiretap orders to wiretap 1 percent of all our phone calls, much less hire enough federal agents to sit and listen to all that traffic in real time. The only plausible way of processing that amount of traffic is a massive Orwellian application of automated voice recognition technology to sift through it all, searching for interesting keywords or searching for a particular speaker's voice. If the government doesn't find the target in the first 1 percent sample, the wiretaps can be shifted over to a different 1 percent until the target is found, or until everyone's phone line has been checked for subversive traffic. The FBI said they need this capacity to plan for the future. This plan sparked such outrage that it was defeated in Congress. But the mere fact that the FBI even asked for these broad powers is revealing of their agenda.

Read the quote above carefully, and see if it doesn't ring any bells for you. The salient points that Zimmermann makes are these:
In 1995, back when the Pentium Pro was hot stuff, the FBI requested the legal authorization to do very high-volume monitoring of digital calls.
  • There's no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor.
  • The agency could never hire enough humans to be able to monitor that many calls simultaneously, which means that they'd have to use voice recognition technology to look for "hits" that they could then follow up on with human wiretaps.
It is entirely possible that the NSA technology at issue here is some kind of high-volume, automated voice recognition and pattern matching system. Now, I don't at all believe that all international calls are or could be monitored with such a system, or anything like that. Rather, the NSA could very easily narrow down the amount of phone traffic that they'd have to a relatively small fraction of international calls with some smart filtering. First, they'd only monitor calls where one end of the connection is in a country of interest. Then, they'd only need the ability to do a roving random sample of a few seconds from each call in that already greatly narrowed pool of calls. As Zimmermann describes above, you monitor a few seconds of some fraction of the calls looking for "hits," and then you move on to another fraction. If a particular call generates a hit, then you zero in on it for further real-time analysis and possible human interception. All the calls can be recorded, cached, and further examined later for items that may have been overlooked in the real-time analysis.

In a recent press conference, Deputy Director for National Intelligence Michael Hayden said the following (via Defensetech):

And here the key is not so much persistence as it is agility. It's a quicker trigger. It's a subtly softer trigger. And the intrusion into privacy -- the intrusion into privacy is significantly less. It's only international calls. The period of time in which we do this is, in most cases, far less than that which would be gained by getting a court order.

This sounds pretty much like what I've described above. And yes, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today's technology, especially when you have a budget like the NSA.

The "softer trigger" here is a phrase that's on a watch list, or a call with an abnormally high volume of a certain type of vocabulary. The "agility" bit is a reference to the technology's ability to move from call to call, taking small slices. That's also probably what's behind the claim that the technology is less intrusive than a traditional wiretap, because the time slices are very short.

Finally, I know a lot of people are bringing up Echelon here, and Echelon is indeed relevant. However, the relevance isn't in how the NSA program is connected to Echelon - it probably isn't - but in the fact that Echelon is yet another example of a government-run, high-volume, automated intelligence gathering project that looks for certain words or phrases in samples of electronic communications.This really goes to the crux of the matter. Any "terrorist" worth his salt would certainly have better tradecraft than to use any kind of "plainly spoken" phrase that would be picked up by the government filters. After all, we trained a lot of the people who trained these people during the Soviet war in Afganistan, and I can't imagine the CIA wouldn't teach them these simple principles of tradecraft.

You might catch some of the "stupid" ones. Or the non-trained ones. Or the home-grown ones not connected to a "professional" terrorist group. But, you could probably catch those people through legal means too, and not risk impeachment and public outrage. So, if not for terror (which seems to be the administration's "stock" response for everything since 9/11), then why?

The neo-con stated goal of ensuring Republican control of the country seems a likely candidate to me.

The implication of this type of surveillance is that you monitor everyone. Or at least a huge chunk of them.
Whether you think that is right, wrong, justifiable, etc. it's obviously a massive change which dictates a public discussion. But I suspect, or at least hope, that a significan number of Americans would be genuinely opposed to such a change in surveillence techniques. In my thinking, the fact that it might be computers listening instead of people doesn't change the nature of the privacy invasion. If anything, it makes it worse because what would have been impossible with humans (listen to every single phone call) because possible with computers.

Even if the article is wrong in guessing that this is what's behind the current tiff, I do think that this type of approach is coming if not already here. Take for example 'roving wiretaps'. I haven't seen any discussion of how exactly that works. It could very well involve tapping all phones in an area a scanning for the voiceprint of the wiretap subject.

Another example of late. The story about the student who got a visit from the government for requesting a book by Mao for inter-library loan. If you assume that the student was not already under surveillance, the only way for that to happen is if the governement is monitoring all inter-library loans. Which would certainly explain why they are so tight lipped about the library record provisions in the Patriot act.

So to take a stab at making a "real world" layman's example of this technology: This is basically like cops going around neighborhoods, opening up your front door, and glancing around real fast to see if there's anything suspicious. If they don't see anything, they move on to the next house. If something doesn't look right, they hang around and check things out more closely.

Sound about right? If that's the case, then yeah, I can see why they
A) wouldn't want to go to Congress to ask for a change in the law, and
B) wouldn't want to try to get a warrant for these.

In both cases, they'd be told to go fly a kite. So, if this is the case, it's probably what I expected when the story first broke. It's another case of "they might say no, so let's not ask."



categories: Outrages
Other Stories according to Google: The new technology at the root of the NSA wiretap scandal | Ars Technica - The PC Enthusiast's Resource | NSA wiretap followup: Why computer-automated mass surveillance is | President Bush, NSA accused of wiretap abuse | Ask Ars: routinely dropping WiFi connectivity | muthos megahertzos | Whitedust Security Portal - The new technology at the root of the | digg / technology | Indymedia Estrecho/Madiaq: inicio | New Hampshire IMC: mediacenters

8:02:15 PM    


© Copyright 2006 Earl Bockenfeld.



Click here to visit the Radio UserLand website.
 



December 2005
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Nov   Jan











Top 10 hits for Downing Street Memo on..
Google
1.The Downing Street Memo :: What is it?
2.The Downing Street Memos :: The text
3.The Secret Downing Street Memo
4.The Downing Street Memos :: Why Care?
5.The secret Downing Street memo - Sunday Times - Times Online
6.AfterDowningStreet.org | CensureBush.org
7.Downing Street memo - Wikipedia, the free encyclopedia
8.Why has ' Downing Street memo ' story been a 'dud' in US ...
9.The secret Downing Street memo
10.AfterDowningStreet.org | CensureBush.org

Help link 1/2/2006; 9:19:42 PM.


Story Categories:

Blogging

Body

Digital Media

Heart

Humor

Internet

Microsoft

Mind

Miscelleous

Politics

Outrages

Security

Software

Soul

Userland

Top 10 hits for spyware adware on..
Google
1.Ad-Aware SE Personal - Software - Lavasoft
2.Downloads - Support - Lavasoft
3.Adware , Spyware and Advertising Trojans - Info & Removal Procedures
4.PC Hell: Spyware and Adware Removal Help
5.How to Protect Your Computer from Spyware and Adware
6.NEW! Adware .info - Adware Spyware Software Quick Reference
7.Spyware / AdWare /Malware FAQ
8.Spyware Watch (UK) - spyware , adware , stealware - stay aware!
9.Wired News: Sick of Spam? Prepare for Adware
10.

Help link 1/2/2006; 9:19:43 PM.