12 thoughts on “Every move you make

  1. Well. Hhhmmm. That just might explain why our Congress Critters are so…careful…to take good care of the Powers That Be.

    Those with certain knowledge of this sort of “capture” of all digital communications just might know for certain that their calls are subject to being pulled out and used against them.

    I’m trying to imagine how many tera bytes are being held and where it’s being held. And then there’s the need for back up. Or…is it up to yetta bytes??

    Okay. I’m also thinking I’m probably just so small a speck of humanity, so powerless that for sure no one’s actually looking at what I say on the phone. Until, for whatever reason, I’m not just a little speck, but a speck they want to know about….

    Aw, crap.

    Privacy? Constitution?

    I guess we can now conclude that if the government and regulators wanted to take down the most egregious of, for one example, the Banksters and others in the FIRE sector, they damn well could, Or maybe the real evidence can’t be used in court. Only for control. Which seems to work two ways??? The PTBs control the regulators and prosecutors; the regulators and prosecutors make sure they take good care of the PTBs in order to get cushy jobs after their gubmint work? And for that, they can’t prosecute bad PTBs? Oh, maybe the occasional scapegoat or someone who offends the standards of the PTBs. But, never the main PTBs.

  2. Good analysis, Jawbone.
    The only thing that protects us, individually, is our insignificance, at least for the present.

  3. What makes this so damn scary is that it blows up my belief the government is too porous to contain a secret this big. It sure puts a scary after glow to Obama’s lie ass reversal on ATT. Just how big is this immunity grant? Proving once again that the enemy most in the eye of our government is us!

  4. http://www.guardian.co.uk/world/2013/feb/10/software-tracks-social-media-defence
    This article was linked to by a commenter on Glenn’s post at The Guardian. I think I kinda was aware of this, but given it came out when I was having really bad back problems I might have missed it.

    Raytheon said it has not sold it yet, but it was “shared with US government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analysing “trillions of entities” from cyberspace.”

    I would imagine it was to track Occupy members and those who began to look like leaders. Actually, Occupy Wall Street gave the testers a wonderful beta site, eh?

    Another article talked about how the patent office can deep six any patentably idea or technology that it thinks will endanger national security. Originator/inventor cannot talk about it or share his ideas with anyone else, under penalty of law. Whatev’ that means….

  5. For those interested in protecting their privacy you can use encrypting
    From comments:
    QUOTE
    Socrates_lives, 04 May 2013 2:00pm
    voice/video/chat software to speak to your friends with an app called Jitsi – get it at https://jitsi.org

    Another good solution, that may need to be checked out by open source transparent developers, is Silent Circle for your smart phones. It has the same high grade encryption that Jitsi has. See this web site for more info https://silentcircle.com
    END QUOTE

    This leads to several commenters saying that if an encryption becomes common, it will be broken, etc.

    This this link:
    http://www.pro-technix.com/information/crypto/pages/vernam_base.html

  6. Interesting comment from former AT&T employee (Bell Labs, maybe?)–
    QUOTE
    MRWmrw

    04 May 2013 3:42pm
    Recommend
    12

    They’ve been doing this that I know of since 1984. I should know. I taught four NSA engineers along with AT&T scientists how it worked and how to do it on AT&T’s Private Line Network [PLN) understood by only 100 AT&T scientists. The NSA attached their machines to the ten (at the time) major AT&T network nodes (Denver, SF, NJ, etc) and hoovered everything. Same system Klein reported about EXCEPT that a machine made by NARUS was inserted between NSA and AT&T so that both could say they didn’t spy. Klein saw the NARUS machine behind the locked door.

    It wasn’t the Patriot Act that unleashed this. It was CALEA in April 1994. I screamed bloody murder about this to anyone who would listen in early 1994, but people thought I was nutz. What CALEA–Communications Assistance for Law Enforcement Act–did was allow federal agencies to monitor everything in real time, AND it allowed the intel agencies to mandate that all things digital have unnecessary IDs to track the actual hardware, AND it allowed foreign companies to gain control of our national telecommunications systems and even park this info out of US jurisdiction, specifically Israel.
    These are two of the FOX NEWS reports on this that were removed from the web within a week of broadcast in December 2001 detailing it.
    http://www.informationclearinghouse.info/article7544.htm
    http://www.informationclearinghouse.info/article5133.htm

    NARUS was an Israeli company, started by Ori Cohen in 1997. Cohen used to brag about its capability and you could find still find a staggering description of the power of this thing–aided and abetted by NSA science–on the Wayback Machine until that, too, was wiped clean. Cohen disappeared from the masthead in the early aughts, they rearranged it as an American company replaced by WASPy-looking doughboys as Prez and a bunch of VPs. NARUS is now owned by Boeing, I think. But the damage was already done.
    Here’s an old DKos diary on it:
    http://www.dailykos.com/story/2006/04/08/200431/-All-About-NSA-s-and-AT-T-s-Big-Brother-Machine-the-Narus-6400

    How do you think Monica Lewinsky was found out? How do you think the blackmail of congressmen happens? I can’t remember the name of the Israeli firm that handled the White House telephone system specifically in 1996 as a result of CALEA’s undoing of America’s telecommunications security [it started with a F], but after an uproar, they quickly turned that into an American company as well…at least on the surface.

    I can tell you, because I witnessed it during the middle 80s that any duplex phone could be used as a microphone for what you are doing in a room, by using the phone’s microphone without your knowing it. Even before digital cellphones, federal agencies could call your old landline ten states away silently (a combination number of your ‘cable and pair’, the identifier, and other digits that bypassed the local carrier on the PLN), in the same way you could call a BBS in those days and the phone wouldn’t ring, and the feds could listen in to what you were doing. Phone in the bedroom? Part of that technology was put into answering/monitoring machines. The feds needed CALEA in 1994 to pull it off with digital handhelds, they needed a way to identify you on the network, a digital marker. As the cliché says, Americans fell for this security argument like cheap suits and gave it to them. No different than what Americans will no doubt give up as a result of Boston.

    What do you think the NSA monstrosity in somnambulant Utah is for? They’ve already filled the five or six underground floors of massive multi-football-sized fields of servers somewhere just outside DC.

    Start listening to Eben Moglen. Search out his videos. At least he’s highly entertaining,
    https://www.youtube.com/watch?v=QOEMv0S8AcA (45 min) Will give you the technical but easily understandable background to understand what we’re up against. This is the talk that started it all. Seminal.
    http://www.youtube.com/watch?v=gORNmfpD0ak (15 min) Don’t miss this.
    END QUOTE

  7. Another interesting comment:
    QUOTE
    MezzoSoprano, 04 May 2013 4:21pm

    Way, way back in 1970, forty-three years ago, Zbigniew Brzezinski was astonishingly prescient:

    The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen. These files will be subject to instantaneous retrieval by the authorities.

    Also prescient was his prediction about our evolving political culture and the vapid nature of our political races. He describes Obama’s handlers strategy:

    In the technotronic society the trend would seem to be towards the aggregation of the individual support of millions of uncoordinated citizens, easily within the reach of magnetic and attractive personalities exploiting the latest communications techniques to manipulate emotions and control reason.

    Between Two Ages: America’s Role in the Technetronic Era
    END QUOTE

  8. So privacy is reduced to something like this: If a whole forest falls and there is only one person listening, an individual tree doesn’t make a sound.

  9. “freaks.” You all have some interesting links and thoughts. I just assume all the time that anyone can find out anything about anybody if they put in the effort.
    I am looking for good roommates when “they” start rounding folks up for the FEMA camp…. (yuk, yuk)
    Seriously, I don’t think there is any privacy at all, anymore.

Comments are closed.