Go Back   Novahq.net Forum > Off-Topic > General Chat
FAQ Community Calendar Today's Posts Search

General Chat Talk about anything that does not fit into other topics here.

Reply
 
Thread Tools Search this Thread Display Modes
  #1  
Old 12-24-2005, 09:20 AM
DevilDog#1 is offline DevilDog#1

Join Date: Jul 2002
Posts: 7,040

Spy Agency Mined Vast Data Trove, Officials Report

Quote:
By ERIC LICHTBLAU and JAMES RISEN
Published: December 24, 2005

WASHINGTON, Dec. 23 - The National Security Agency has traced and analyzed large volumes of telephone and Internet communications flowing into and out of the United States as part of the eavesdropping program that President Bush approved after the Sept. 11, 2001, attacks to hunt for evidence of terrorist activity, according to current and former government officials.

The volume of information harvested from telecommunication data and voice networks, without court-approved warrants, is much larger than the White House has acknowledged, the officials said. It was collected by tapping directly into some of the American telecommunication system's main arteries, they said.

As part of the program approved by President Bush for domestic surveillance without warrants, the N.S.A. has gained the cooperation of American telecommunications companies to obtain backdoor access to streams of domestic and international communications, the officials said.

The government's collection and analysis of phone and Internet traffic have raised questions among some law enforcement and judicial officials familiar with the program. One issue of concern to the Foreign Intelligence Surveillance Court, which has reviewed some separate warrant applications growing out of the N.S.A.'s surveillance program, is whether the court has legal authority over calls outside the United States that happen to pass through American-based telephonic "switches," according to officials familiar with the matter.

"There was a lot of discussion about the switches" in conversations with the court, a Justice Department official said, referring to the gateways through which much of the communications traffic flows. "You're talking about access to such a vast amount of communications, and the question was, How do you minimize something that's on a switch that's carrying such large volumes of traffic? The court was very, very concerned about that."

Since the disclosure last week of the N.S.A.'s domestic surveillance program, President Bush and his senior aides have stressed that his executive order allowing eavesdropping without warrants was limited to the monitoring of international phone and e-mail communications involving people with known links to Al Qaeda.

What has not been publicly acknowledged is that N.S.A. technicians, besides actually eavesdropping on specific conversations, have combed through large volumes of phone and Internet traffic in search of patterns that might point to terrorism suspects. Some officials describe the program as a large data-mining operation.

The current and former government officials who discussed the program were granted anonymity because it remains classified.

Bush administration officials declined to comment on Friday on the technical aspects of the operation and the N.S.A.'s use of broad searches to look for clues on terrorists. Because the program is highly classified, many details of how the N.S.A. is conducting it remain unknown, and members of Congress who have pressed for a full Congressional inquiry say they are eager to learn more about the program's operational details, as well as its legality.

Officials in the government and the telecommunications industry who have knowledge of parts of the program say the N.S.A. has sought to analyze communications patterns to glean clues from details like who is calling whom, how long a phone call lasts and what time of day it is made, and the origins and destinations of phone calls and e-mail messages. Calls to and from Afghanistan, for instance, are known to have been of particular interest to the N.S.A. since the Sept. 11 attacks, the officials said.

This so-called "pattern analysis" on calls within the United States would, in many circumstances, require a court warrant if the government wanted to trace who calls whom.

The use of similar data-mining operations by the Bush administration in other contexts has raised strong objections, most notably in connection with the Total Information Awareness system, developed by the Pentagon for tracking terror suspects, and the Department of Homeland Security's Capps program for screening airline passengers. Both programs were ultimately scrapped after public outcries over possible threats to privacy and civil liberties.

But the Bush administration regards the N.S.A.'s ability to trace and analyze large volumes of data as critical to its expanded mission to detect terrorist plots before they can be carried out, officials familiar with the program say. Administration officials maintain that the system set up by Congress in 1978 under the Foreign Intelligence Surveillance Act does not give them the speed and flexibility to respond fully to terrorist threats at home.

A former technology manager at a major telecommunications company said that since the Sept. 11 attacks, the leading companies in the industry have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists.

"All that data is mined with the cooperation of the government and shared with them, and since 9/11, there's been much more active involvement in that area," said the former manager, a telecommunications expert who did not want his name or that of his former company used because of concern about revealing trade secrets.

Such information often proves just as valuable to the government as eavesdropping on the calls themselves, the former manager said.

"If they get content, that's useful to them too, but the real plum is going to be the transaction data and the traffic analysis," he said. "Massive amounts of traffic analysis information - who is calling whom, who is in Osama Bin Laden's circle of family and friends - is used to identify lines of communication that are then given closer scrutiny."

Several officials said that after President Bush's order authorizing the N.S.A. program, senior government officials arranged with officials of some of the nation's largest telecommunications companies to gain access to switches that act as gateways at the borders between the United States' communications networks and international networks. The identities of the corporations involved could not be determined.

The switches are some of the main arteries for moving voice and some Internet traffic into and out of the United States, and, with the globalization of the telecommunications industry in recent years, many international-to-international calls are also routed through such American switches.

One outside expert on communications privacy who previously worked at the N.S.A. said that to exploit its technological capabilities, the American government had in the last few years been quietly encouraging the telecommunications industry to increase the amount of international traffic that is routed through American-based switches.

The growth of that transit traffic had become a major issue for the intelligence community, officials say, because it had not been fully addressed by 1970's-era laws and regulations governing the N.S.A. Now that foreign calls were being routed through switches on American soil, some judges and law enforcement officials regarded eavesdropping on those calls as a possible violation of those decades-old restrictions, including the Foreign Intelligence Surveillance Act, which requires court-approved warrants for domestic surveillance.

Historically, the American intelligence community has had close relationships with many communications and computer firms and related technical industries. But the N.S.A.'s backdoor access to major telecommunications switches on American soil with the cooperation of major corporations represents a significant expansion of the agency's operational capability, according to current and former government officials.

Phil Karn, a computer engineer and technology expert at a major West Coast telecommunications company, said access to such switches would be significant. "If the government is gaining access to the switches like this, what you're really talking about is the capability of an enormous vacuum operation to sweep up data," he said.

Source: NYT - Washington - Article 1
Some more reading on the topic.
__________________








Quote:
If I don't do that doesn't mean I can't - DD#1
Reply With Quote
  #2  
Old 12-24-2005, 09:31 AM
BADDOG is offline BADDOG
resigned

Join Date: Mar 2002
Posts: 7,050

eek

Who watches on the data collectors I wonder.....interesting stuff indeed.

Warm Regards
Reply With Quote
  #3  
Old 12-24-2005, 09:39 AM
Hellfighter is offline Hellfighter
Hellfighter's Avatar
Chief ADFP

Join Date: Jun 2002
Location: San Jose Calif 95111
Posts: 21,150

Send a message via ICQ to Hellfighter
will now i know why the internet been lagging so badly of late, many even people having ADSL been saying it lagging more too.
__________________
* altnews sources [getmo & others news] not found main FNN: realrawnews.com
*Discord: Unknown77#7121
Playing now days: EA Games> swtor [star wars old republic]
Reply With Quote
  #4  
Old 12-24-2005, 09:49 AM
DevilDog#1 is offline DevilDog#1

Join Date: Jul 2002
Posts: 7,040

Datamining doesn't cause significant lag.

What NSA is doing running queries based on certain filters and then hopefully dumping the extracted data in a secured Database for further analysis.
__________________








Quote:
If I don't do that doesn't mean I can't - DD#1
Reply With Quote
  #5  
Old 12-24-2005, 09:52 AM
DevilDog#1 is offline DevilDog#1

Join Date: Jul 2002
Posts: 7,040

Did little more digging on the topic.
__________________








Quote:
If I don't do that doesn't mean I can't - DD#1
Reply With Quote
  #6  
Old 12-24-2005, 10:03 AM
DevilDog#1 is offline DevilDog#1

Join Date: Jul 2002
Posts: 7,040

Quote:
Originally posted by BADDOG
Who watches on the data collectors I wonder.....interesting stuff indeed.

Warm Regards
Well, I feel kind a uneasy about that what you asked. Read below why?

Quote:
January 20, 2003


Beware of Total Information Awareness
by Gene Healy

Gene Healy is senior editor at the Cato Institute.

John Poindexter, head of the Pentagon's Office of Information Awareness, is developing a vast surveillance database to track terror suspects. The Total Information Awareness (TIA) system will, according to Poindexter, "break down the stovepipes" that separate commercial and government databases, allowing OIA access to citizens' credit card purchases, travel itineraries, telephone calling records, email, medical histories and financial information. It would give government the power to generate a comprehensive data profile on any U.S. citizen.

Adm. Poindexter assures us that TIA will be designed to respect constitutional guarantees of privacy and shield law-abiding citizens from the Pentagon's all-seeing eye. But if the history of military surveillance of civilians is any indication, accepting that assurance amounts to the triumph of hope over experience.

Opponents of new government surveillance measures such as TIA or Operation TIPS, the Justice Department's aborted plan to utilize citizen informants, often invoke the specter of the East German secret police and communist Cuba's block watch system. But we don't have to look to totalitarian states for cautionary tales. There's a long and troubling history of military surveillance in this country. That history suggests that we should loathe allowing the Pentagon access to our personal information.

During World War I, concerns about German saboteurs led to unrestrained domestic spying by U.S. Army intelligence operatives. Army spies were given free reign to gather information on potential subversives, and were often empowered to make arrests as special police officers. Occasionally, they carried false identification as employees of public utilities to allow them, as the chief intelligence officer for the Western Department put it, "to enter offices or residences of suspects gracefully, and thereby obtain data." In her book "Army Surveillance in America," historian Joan M. Jensen notes, "What began as a system to protect the government from enemy agents became a vast surveillance system to watch civilians who violated no law but who objected to wartime policies or to the war itself."

The War Department relied heavily on a quasi-private volunteer organization, the American Protective League, composed of self-styled patriots who agreed to inform on their fellow citizens. America's experience with the APL makes clear that civil libertarian concerns about Operation TIPS are, if anything, understated. APL volunteers carried identification cards and tin badges and responded to requests from the War Department for investigation of civilians. By the end of the war the APL had close to a quarter of a million members and had carried out some six million investigations.

At the War Department's request, APL volunteers harassed labor organizers, intimidated and arrested opponents of the draft, and investigated such potential subversives as Mexican-American leaders in Los Angeles, pacifist groups, and antiwar religious sects. Through it all, the army caught exactly one German spy, a naval officer who tried to enter the United States via Nogales, Arizona.

The Army's domestic surveillance activities were substantially curtailed after the end of World War I. But throughout the 20th Century, in periods of domestic unrest and foreign conflict, army surveillance ratcheted up again, most notably in the 1960s. During that tumultuous decade, President Johnson repeatedly called on federal troops to quell riots and restore order. To better perform that task, Army intelligence operatives began compiling thousands of dossiers on citizens, many of whom had committed no offense beyond protesting government policy. Reviewing the files, the Senate Judiciary Committee noted that "comments about the financial affairs, sex lives and psychiatric histories of persons unaffiliated with the armed forces appear throughout the various records systems." Justice William O. Douglas called army surveillance "a cancer in our body politic."

Adm. Poindexter seeks to bring Pentagon surveillance into the 21st Century, replacing the low-tech, labor intensive system relied on in the past with high-tech data-mining techniques. He maintains that "we can achieve the necessary security we need and still have privacy." But given the military's legacy of privacy abuses, such vague assurances are cold comfort.

Some have suggested that Poindexter's record as a former Iran-Contra defendant convicted of five felony counts of lying to Congress disqualify him from his position. But the question isn't whether Poindexter's the right man for the job; it's whether that job should exist in the first place
__________________








Quote:
If I don't do that doesn't mean I can't - DD#1
Reply With Quote
  #7  
Old 12-24-2005, 10:06 AM
DevilDog#1 is offline DevilDog#1

Join Date: Jul 2002
Posts: 7,040

And if all fails go to Wikipedia
__________________








Quote:
If I don't do that doesn't mean I can't - DD#1
Reply With Quote
  #8  
Old 12-25-2005, 07:03 PM
DevilDog#1 is offline DevilDog#1

Join Date: Jul 2002
Posts: 7,040

Sorry couldn't resist this one.
Attached Images
File Type: jpg i read your email.jpg (34.7 KB, 7 views)
__________________








Quote:
If I don't do that doesn't mean I can't - DD#1
Reply With Quote
  #9  
Old 12-25-2005, 07:51 PM
Hellfighter is offline Hellfighter
Hellfighter's Avatar
Chief ADFP

Join Date: Jun 2002
Location: San Jose Calif 95111
Posts: 21,150

Send a message via ICQ to Hellfighter
Quote:
Originally posted by DevilDog#1
Datamining doesn't cause significant lag.

What NSA is doing running queries based on certain filters and then hopefully dumping the extracted data in a secured Database for further analysis.
i don't think they limited on what area they be listing too ether, even game servers having players in there they do chat to each other, so why not think some terrorist be using it in a password area.

i don't see they filter out game area they be on top of the listing.
__________________
* altnews sources [getmo & others news] not found main FNN: realrawnews.com
*Discord: Unknown77#7121
Playing now days: EA Games> swtor [star wars old republic]
Reply With Quote
  #10  
Old 12-26-2005, 07:19 AM
BADDOG is offline BADDOG
resigned

Join Date: Mar 2002
Posts: 7,050

Plain

I must admit it's all food for thought however I find myself unsurprised as to what is done in our name after all we vote for the people who do these things so are we not culpable in some way?


Regards
Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Hijacked handheld turns data spy katana*GFR* General Chat 4 08-10-2006 02:05 AM
The Rose Bowl Sucks! The Officials Suck! Trojan General Chat 5 01-07-2006 05:25 PM
=EFA= European Fighter Agency need new player =EFA=Ares Gaming Talk 0 05-10-2004 08:18 PM
ks.spy Skin Sigs and Graphics 3 02-15-2004 12:03 AM
DELTA SPY OR..... BAAL <LOL> Delta Force 1 06-29-2002 05:12 PM


All times are GMT -5. The time now is 01:28 AM.




Powered by vBulletin®