Skeptic Ginger
Nasty Woman
- Joined
- Feb 14, 2005
- Messages
- 96,955
This is a discussion split from the two threads currently discussing Bush's actions in the White House which ignored Constitutional separation of powers. I made the rash claim Bush had been monitoring all domestic phone conversations to which many people, rightly so, found that to be one of those extraordinary claims and probably one belonging in the CT threads.
So let me qualify that, the Bush administration was data mining all communications. That presumes all calls are basically screened, those flagged are further screened, and so on down to those which are actually wiretapped and transcribed by a person.
But, two things turn that from just data mining who calls whom, to data mining actual conversations.
It will take considerable time here to support what I've said. So if you have a short attention span for this kind of thing, see if you can get the gist from the bolded sections and the last 3 paragraphs.(All the bolding in the following is mine.)
One is access to the communications. A law passed back in 1994.
The new technology at the root of the NSA wiretap scandal; Jon Stokes, Directing Editor, ars technica
NSA has massive database of Americans' phone calls
Additional access to Internet communications was installed by Bush.
Room 641A
Two, the needed technology exists to store and data mine vast quantities of information including conversations.
The new technology at the root of the NSA wiretap scandal; Jon Stokes, Directing Editor, ars technica
Schneier on Security - A blog covering security and security technology; September 17, 2008; NSA Snooping on Cell Phone Calls - From CNet:
Hepting v. AT&T
Narus product, NarusInsight
Speech recognition data mining:
Introduction to the Special Issue on Data Mining of Speech, Audio, and Dialog; 09/05
TECHNOLOGY NEWS - Let's Hear It for Audio Mining
Then there is storing the vast amount of data.
Data Warehouses
And finally what about evidence this is what Bush was doing? I posted some of this already in the other threads. There is evidence news reporters were targeted looking to stop whistle blowers, not national security leakers. I don't want to debate that here because people cannot get past the belief or disbelief Bush purposefully lied to gain public support for his planned war with Iraq.
But there is more that can be discussed.
Secret Spy Court Repeatedly Questions FBI Wiretap Network
NSA has massive database of Americans' phone calls; Updated 5/11/2006
And that little matter of only tapping calls between foreign and domestic sources...
Blog - Greg Downey, associate professor [tenured, summer 2006] at the University of Wisconsin-Madison; December 24, 2005; The geography of "wiretapping" labor
Is this proof? No. Is it absolutely certain no one could make a legal case for this data mining? No, a number of NeoCon leaning lawyers and judges exist within the system. It comes down to, do you trust the government not to spy on citizens for political gain? I find that scenario way less probable than the scenario where they would spy. The little stuff is overlooked but history reveals the bigger stuff. Nixon was caught spying for political gain in a big way. And the FBI spied on antiwar protesters in a big way at the behest of the Nixon government. Only a fraction of this spying involved radical groups. Daniel Berrigan's disclosure of the Pentagon Papers was politically damaging more than anything else.
Bush has sent undercover operatives into political activist groups. No terrorism was suspected. He used the DoJ to initiate politically motivated prosecutions. That is not in question, only whether anyone will be prosecuted for it is. And if you believe the evidence, Bush manipulated the press to gain political support. His administration said publicly they wanted to stop White House leaks. These were politically damaging leaks, not leaks that threatened national security. Spying on reporters phone calls to catch the leakers is strongly suspected and has been testified to by one whistle blower.
Obviously there is not yet any reason to fear an Orwellian crack down on political dissent. The importance of discussing these events is to prevent them going any further. The ability to track everything we do and say is technologically inevitable. Vigilance is critical.
So let me qualify that, the Bush administration was data mining all communications. That presumes all calls are basically screened, those flagged are further screened, and so on down to those which are actually wiretapped and transcribed by a person.
But, two things turn that from just data mining who calls whom, to data mining actual conversations.
It will take considerable time here to support what I've said. So if you have a short attention span for this kind of thing, see if you can get the gist from the bolded sections and the last 3 paragraphs.(All the bolding in the following is mine.)
One is access to the communications. A law passed back in 1994.
The new technology at the root of the NSA wiretap scandal; Jon Stokes, Directing Editor, ars technica
It's no secret, the Bush admin obtained access to phone systems from the major carriers. At first calls made by Qwest customers were not included, but I believe they are now.The domestic electronic surveillance ball really got rolling under the Clinton administration, with the 1994 Communications Assistance for Law Enforcement Act (CALEA). CALEA mandated that the telcos aid wiretapping by installing remote wiretap ports onto their digital switches so that the switch traffic would be available for snooping by law enforcement. After CALEA passed, the FBI no longer had to go on-site with wiretapping equipment in order to tap a line—they could monitor and digitally process voice communications from the comfort of the home office. (The FCC has recently ruled that CALEA covers VOIP services, which means that providers like Vonage will have to find a way to comply.)
NSA has massive database of Americans' phone calls
According to sources familiar with the events, Qwest's CEO at the time, Joe Nacchio, was deeply troubled by the NSA's assertion that Qwest didn't need a court order — or approval under FISA — to proceed. Adding to the tension, Qwest was unclear about who, exactly, would have access to its customers' information and how that information might be used....
The NSA told Qwest that other government agencies, including the FBI, CIA and DEA, also might have access to the database, the sources said. As a matter of practice, the NSA regularly shares its information — known as "product" in intelligence circles — with other intelligence groups. Even so, Qwest's lawyers were troubled by the expansiveness of the NSA request, the sources said.
The NSA, which needed Qwest's participation to completely cover the country, pushed back hard.
Trying to put pressure on Qwest, NSA representatives pointedly told Qwest that it was the lone holdout among the big telecommunications companies. It also tried appealing to Qwest's patriotic side: In one meeting, an NSA representative suggested that Qwest's refusal to contribute to the database could compromise national security, one person recalled.
In addition, the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government. Like other big telecommunications companies, Qwest already had classified contracts and hoped to get more.
Unable to get comfortable with what NSA was proposing, Qwest's lawyers asked NSA to take its proposal to the FISA court. According to the sources, the agency refused.
The NSA's explanation did little to satisfy Qwest's lawyers. "They told (Qwest) they didn't want to do that because FISA might not agree with them," one person recalled. For similar reasons, this person said, NSA rejected Qwest's suggestion of getting a letter of authorization from the U.S. attorney general's office. A second person confirmed this version of events.
Additional access to Internet communications was installed by Bush.
Room 641A
Room 641A is an alleged intercept facility operated by AT&T for the U.S. National Security Agency, beginning in 2003. Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T. The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic and, therefore, presumably has access to all Internet traffic that passes through the building.
The room measures about 24 by 48 feet (7.3 m × 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]
The existence of the room was revealed by a former AT&T technician, Mark Klein, and is the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[2] Klein claims he was told that similar black rooms are operated at other facilities around the country.
Room 641A and the controversies surrounding it were subjects of an episode of "Frontline", the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS's NOW on March 14, 2008.
Two, the needed technology exists to store and data mine vast quantities of information including conversations.
The new technology at the root of the NSA wiretap scandal; Jon Stokes, Directing Editor, ars technica
CALEA opened up a huge can of worms, and PGP creator Phil Zimmermann sounded the alarm back in 1999 about where the program was headed: ...
...The only plausible way of processing that amount of traffic is a massive Orwellian application of automated voice recognition technology to sift through it all, searching for interesting keywords or searching for a particular speaker's voice. If the government doesn't find the target in the first 1 percent sample, the wiretaps can be shifted over to a different 1 percent until the target is found, or until everyone's phone line has been checked for subversive traffic. The FBI said they need this capacity to plan for the future. This plan sparked such outrage that it was defeated in Congress. But the mere fact that the FBI even asked for these broad powers is revealing of their agenda. ...
...It is entirely possible that the NSA technology at issue here is some kind of high-volume, automated voice recognition and pattern matching system. Now, I don't at all believe that all international calls are or could be monitored with such a system, or anything like that. Rather, the NSA could very easily narrow down the amount of phone traffic that they'd have to a relatively small fraction of international calls with some smart filtering. First, they'd only monitor calls where one end of the connection is in a country of interest. Then, they'd only need the ability to do a roving random sample of a few seconds from each call in that already greatly narrowed pool of calls. As Zimmermann describes above, you monitor a few seconds of some fraction of the calls looking for "hits," and then you move on to another fraction. If a particular call generates a hit, then you zero in on it for further real-time analysis and possible human interception. All the calls can be recorded, cached, and further examined later for items that may have been overlooked in the real-time analysis. ... And yes, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today's technology, especially when you have a budget like the NSA.
Schneier on Security - A blog covering security and security technology; September 17, 2008; NSA Snooping on Cell Phone Calls - From CNet:
In a Web demo (PDF) (mirrored here) to potential customers back in May, ThorpeGlen's vice president of global sales showed off the company's tools by mining a dataset of a single week's worth of call data from 50 million users in Indonesia, which it has crunched in order to try and discover small anti-social groups that only call each other.
Hepting v. AT&T
A former AT&T engineer, Mark Klein, attested that a supercomputer built by Narus was installed for the purpose, and that similar systems were also installed in at least Seattle, San Jose, Los Angeles and San Diego. Wired News states Klein said he came forward "because he does not believe that the Bush administration is being truthful about the extent of its extrajudicial monitoring of Americans' communications":
"Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA's spying program is really limited to foreign communications or is otherwise consistent with the NSA's charter or with FISA [...] And unlike the controversy over targeted wiretaps of individuals' phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens."
Narus product, NarusInsight
Carrier-class scalability and reliability with over 2.7 petabytes of IP traffic processed at a single customer, driving 100 billion packet records per day (greater than 7 terabytes) to upstream security applications
Speech recognition data mining:
Introduction to the Special Issue on Data Mining of Speech, Audio, and Dialog; 09/05
With the advent of inexpensive storage space and faster processing over the past decade or so, data mining research has started to penetrate new grounds in areas of speech and audio processing as well as spoken language dialog. It has been fueled by the influx of audio data that are becoming more widely available from a variety of multimedia sources including webcasts, conversations, music, meetings, voice messages, lectures, television, and radio. Algorithmic advances in automatic speech recognition have also been a major, enabling technology behind the growth in data mining. Current state-of-the-art, large-vocabulary, continuous speech recognizers are now trained on a record amount of data—several hundreds of millions of words and thousands of hours of speech. Pioneering research in robust speech processing, large-scale discriminative training, finite state automata, and statistical hidden Markov modeling have resulted in real-time recognizers that are able to transcribe spontaneous speech with a word accuracy exceeding 85%. With this level of accuracy, the technology is now highly attractive for a variety of speech mining applications.
TECHNOLOGY NEWS - Let's Hear It for Audio Mining
Users want to make the most of this material by searching and indexing the digitized audio content. In the past, companies had to create and manually analyze written transcripts of audio content because using computers to recognize, interpret, and analyze digitized speech was difficult. However, the development of faster microprocessors, larger storage capacities, and better speech-recognition algorithms has made audio mining easier.
Then there is storing the vast amount of data.
Data Warehouses
The drop in price of data storage has given companies willing to make the investment a tremendous resource: Data about their customers and potential customers stored in "Data Warehouses." Data warehouses are becoming part of the technology. ...
And finally what about evidence this is what Bush was doing? I posted some of this already in the other threads. There is evidence news reporters were targeted looking to stop whistle blowers, not national security leakers. I don't want to debate that here because people cannot get past the belief or disbelief Bush purposefully lied to gain public support for his planned war with Iraq.
But there is more that can be discussed.
Secret Spy Court Repeatedly Questions FBI Wiretap Network
Among other things, the declassified documents reveal that lawyers in the FBI's Office of General Counsel and the Justice Department's Office of Intelligence Policy Review queried FBI technology officials in late July 2006 about cellphone tracking. The attorneys asked whether the FBI was obtaining and storing real-time cellphone-location data from carriers under a "pen register" court order that's normally limited to records of who a person called or was called by.
...According to the documents, which the EFF obtained in a Freedom of Information Act lawsuit, an FBI general counsel lawyer asked on July 21, 2006: "Can we at the collection end tell the equipment NOT to receive the cell site location information?"
The lawyer added a note of concern that phone companies might be sending along cell-site data even when they aren't asked for it. "Do we get it all or can we, when required, tell the equipment to not collect the cell-site location data?," the lawyer asked.
Separately, the secret court questioned if the FBI was using pen register orders to collect digits dialed after a call is made, potentially including voicemail passwords and account numbers entered into bank-by-phone applications.
Using a pen register order, the FBI can force a phone company to turn over records of who a person calls, or is called by, simply by asserting the information would be relevant to an investigation. But existing case law holds that those so-called "post-cut-through dialed digits" count as the content of a communication, and thus to collect that information, the FBI would need to get a full-blown wiretapping warrant based on probable cause....
...The documents (.pdf) show that the majority of FBI offices surveyed internally were collecting that information without full-blown wiretap orders, especially in classified investigations. The documents also indicate that the information was being uploaded to the FBI's central repository for wiretap recordings and phone records, where analysts can data-mine the records for decades.
EFF's Bankston says it's clear that FBI offices had configured their digit-recording software, DCS 3000, to collect more than the law allows.
NSA has massive database of Americans' phone calls; Updated 5/11/2006
Last month, U.S. Attorney General Alberto Gonzales alluded to that possibility. Appearing at a House Judiciary Committee hearing, Gonzales was asked whether he thought the White House has the legal authority to monitor domestic traffic without a warrant. Gonzales' reply: "I wouldn't rule it out." His comment marked the first time a Bush appointee publicly asserted that the White House might have that authority.
And that little matter of only tapping calls between foreign and domestic sources...
Blog - Greg Downey, associate professor [tenured, summer 2006] at the University of Wisconsin-Madison; December 24, 2005; The geography of "wiretapping" labor
Further, when mining this data at the level of the "telecom switch," even within one particular corporation's control at a time, it is not always apparent whether the geography of the telephone call or Internet transaction is intended to involve the US, or whether it simply reaches US-based equipment as a consequence of decisions made about the topological efficiency and market cost of global corporate communication networks: "The switches are some of the main arteries for moving voice and some Internet traffic into and out of the United States, and, with the globalization of the telecommunications industry in recent years, many international-to-international calls are also routed through such American switches."...
..."One outside expert on communications privacy who previously worked at the N.S.A. said that to exploit its technological capabilities, the American government had in the last few years been quietly encouraging the telecommunications industry to increase the amount of international traffic that is routed through American-based switches." In other words, actions taken unilaterally by the US government in pursuit of its own definition of a "War on Terror" are helping to change the geography of information flow, information surveillance, and information profit on a global scale.
Is this proof? No. Is it absolutely certain no one could make a legal case for this data mining? No, a number of NeoCon leaning lawyers and judges exist within the system. It comes down to, do you trust the government not to spy on citizens for political gain? I find that scenario way less probable than the scenario where they would spy. The little stuff is overlooked but history reveals the bigger stuff. Nixon was caught spying for political gain in a big way. And the FBI spied on antiwar protesters in a big way at the behest of the Nixon government. Only a fraction of this spying involved radical groups. Daniel Berrigan's disclosure of the Pentagon Papers was politically damaging more than anything else.
Bush has sent undercover operatives into political activist groups. No terrorism was suspected. He used the DoJ to initiate politically motivated prosecutions. That is not in question, only whether anyone will be prosecuted for it is. And if you believe the evidence, Bush manipulated the press to gain political support. His administration said publicly they wanted to stop White House leaks. These were politically damaging leaks, not leaks that threatened national security. Spying on reporters phone calls to catch the leakers is strongly suspected and has been testified to by one whistle blower.
Obviously there is not yet any reason to fear an Orwellian crack down on political dissent. The importance of discussing these events is to prevent them going any further. The ability to track everything we do and say is technologically inevitable. Vigilance is critical.