Skip to comments.
How the NSA Violates your Constitutional rights(Despite what you are seeing on Fox)
Vanity
| 6/18/2013
| Vendome
Posted on 06/18/2013 8:50:16 AM PDT by Vendome
The government scanning and archiving your personal telephone number and any calls associated with it are privately owned.
READ THIS CAREFULLY!
The Post Office is a government owned entity.
Your phone number and any phone you use are privately owned.
As are the service providers.
As is the equipment of anyone you call.
Private Property, Ingringement of your 4th amendment and 1st, which will lead to jeopardy of your 5th and 2nd amendment.
TOPICS: Business/Economy; Constitution/Conservatism; Crime/Corruption; FReeper Editorial; News/Current Events
KEYWORDS: 4th; infringed; lies; obfuscation; vanity
There is no way the government can say they have the right to that which is privately owned.
It is pure bunk and obfuscation, a slight of hand, for these guys to sit in a hearing and say they only collect a phone number or numbers attached to activity associate with a target attached in a warrant.
They do not search only a single target.
FACT!!!
They use a process called "Whole Pipe" Access.
What is Whole Pipe Access?
I'll answer that after I bring up another point MINIMIZATION.
What's Minimization and how does that relate to Whole Pipe Access?
The claim this morning is that NSA, DOJ, FBI and DEA do in fact keep huge swaths of information, NOT related to a warrant or request.
BULL-ONY!!!
It's the friggin government and they act as all government do. With ferocity and ever more piercings of your rights, which in this case ought to be protected by the Bill of Rights.
Here is what actually happens:
Think about this and Im going to make it a simple explanation so anyone can understand why the US government has no legitimate, legal or lawful right to any and all information about us.
When you get a cell phone you pay for it.
Along with the cell phone you agree in contract to service with a wireless carrier.
Wireless carrier are what we call Responsible Organizations or RespOrgs. With your service you get a telephone number WHICH belongs to you. In other words, you own the phone, the telephone number and the RespOrg manages your number and the service you contract them for associated with that that number.
So, you fork out some money up front and then every month you fork over money for service you contracted with through a private firm to manage your communications.
Now, when you make a call, text or email, using your fancy new phone that is your private property, using your private number which again, you own, the first transmission signal you send is the ID of your phone, subscriber ID and telephone number.
You own all those as do all the people you communicate with.
When you call them they first time they know its you is when they see your telephone number displayed on their phone.
This is called Automatic number identification (ANI). Each phone connect to each other using a means of wink/wink letting each other know and the users there is a connection established.
Whether anyone answers the phone, two devices connected and a message was sent, at a minimum your telephone number but, it may also include a favorite ringtone and picture ID.
This demonstrates further just how much ownership you have over your phone and the information you receive. Further, being able to customize that information, direct calls to another number or send voicemails to text or have text manipulated so that it is machine read back to you.
These things you can do because someone manufactured a phone with these capabilities for end users and for service providers to provide to their customers, who are contracted to them for private service.
No matter how your call is routed within a carriers network or if it transits another carriers network or if it is routed to edge devices who are contracted to the carrier so that the call routing decisions are made automatically based on priorities and decisions that you a private citizen makes as well the decisions of Wireless service providers, which are also owned privately.
They, like you, purchase equipment through various means of financing, barter, trade and outright capital expenditures.
1
posted on
06/18/2013 8:50:16 AM PDT
by
Vendome
To: Vendome
These guys are just reading from the manual created by the Bush Admin ,they are telling how the Obama does things
2
posted on
06/18/2013 8:53:28 AM PDT
by
molson209
To: Vendome
Further!
They are saying when they do “Accidentally” access anyone named in NOT named in a warrant or request, they keep the records, for ONLY (5) five years!
Not Kidding! You only keep my private and very personal records for only (5) five years?!??
WTF authorized you to keep it more than about a nano second?
You swiped the private records, of a private citizen, who paid for private property, who owns a private telephone number and contracted for services through a Privately owned company, who routes information ie my telephone number, txt, email, date, voice calls, etc. to another private citizen, who also owns the equipment on their end, the telephone number, etc.
No government brown shirt has the right to keep my or your records.
The whole communications process is conducted by private individuals and private companies.
This is a 4th amendment issue wholly and completely.
3
posted on
06/18/2013 8:57:11 AM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
To: Vendome
Your posts this week have been very enlightening.
Listening to hearings and I’m somewhat confused since it seems to conflict with what Snowden has told us.
4
posted on
06/18/2013 8:59:12 AM PDT
by
SE Mom
(Proud mom of an Iraq war combat vet)
To: Vendome
Does the Post Office maintain a record of the sender and recipient of EVERY piece of mail that passes through their system? Does the Post Office open and scan all envelope contents whether anyone (including machines) EVER reads it or not? Anyone who does without a specific court order is violating the 4th. Why are publicly-owned (or private) data carriers any different?
To: Vendome
The erosion of privacy of private property has of course been going on for a long time. I think of the demise of the zero-coupon bond, which lead to a lot of things, not the least of which is the enabling of the IRS to become all powerful.
6
posted on
06/18/2013 9:04:36 AM PDT
by
C210N
(When people fear government there is tyranny; when government fears people there is liberty)
To: Vendome; Jim Robinson; maggief; penelopesire; thouworm; SE Mom; kristinn; Nachum
7
posted on
06/18/2013 9:06:55 AM PDT
by
hoosiermama
(Obama: "Born in Kenya" Lying now or then!)
To: mikey_hates_everything
Does the Post Office maintain a record of the sender and recipient of EVERY piece of mail that passes through their system? YUP!
8
posted on
06/18/2013 9:11:00 AM PDT
by
Roccus
To: Vendome
The government forced cell carriers to use weak encryption for cell data.
It’s perfectly obvious why they did this.
It is however possible to add very strong public key encryption to the audio of cell phones.
I suggest there is much money to be made now by a smart guy who starts manufacturing devices to secure cell data.
You don’t need to modify the phone itself (although that can be done) all that’s needed is a shell that clips to the phone like a case. Clear voice in one mic, encrypted hash noise out the other side and into the phone mic. ditto for the phones speaker.
The hash noise will make it impossible for any clear voice data to be picked up by the phone’s mic.... like two people talking head to head standing next to a waterfall...all anyone nearby can hear is a white noise racket.
Such an encryption device for phones is not even complicated to manufacture. It’s also cheap to make.
2 mics. 2 speakers, a microcontroller, and a battery...that is about all. And use a VERY long randomly created key for each call... exchange the generated public keys at the call start and everything else is simple and secure.
Call audio will suffer just a tad and sometimes the phones will have to re-negotiate the connection. But at least it will be private.
No keys will exist after each call... only the public key blocks could be recorded somewhere and if the key is LONG there is no way to generate the private key which will be erased at calls end.
STU4ALL :-)
9
posted on
06/18/2013 9:19:13 AM PDT
by
Bobalu
(It is not obama we are fighting, it is the media.)
To: Vendome
This erosion of our constitutionally guaranteed rights began when Lincoln suspended Habeus Corpus during the ‘War of Northern Aggression.’ It went unchallenged because “It was for our own good” and the rape of the Constitution has proceed apace ever since, unchecked and with vengeance.
10
posted on
06/18/2013 9:19:58 AM PDT
by
Don Corleone
("Oil the gun..eat the cannoli. Take it to the Mattress.")
To: Bobalu
Problem is they are collecing MetaData, your private call information, sent over a private network, to a private communications device.
They are at the switch where any electronic communications is captured.
Your phone number and the distant end number are always captured.
You can encrypt your call but, the number you called from and to are always captured.
11
posted on
06/18/2013 9:35:21 AM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
To: Roccus
...and you know what I don’t like about that? Some shipments through UPS, FedEx, DHL, etc. end up going through the post office, so even if it starts out from the right place (private company) it still goes through government cameras/hands.
To: mikey_hates_everything
Yes but, that is a government owned entity and you lose a certain amount of privacy once your mail passes through a government facility or service.
The government invested $500 million in Communications equipment manufacturers and service providers.
That investment, in their view, made them legitament partners who have the right to access and design.
Clever huh?
13
posted on
06/18/2013 9:37:35 AM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
To: Vendome
Private property is an illusion. they ‘allow’ us to have property, but they take a small amount each year (the property tax, quoted in mills so we won’t know the actual percentage)
14
posted on
06/18/2013 10:27:46 AM PDT
by
I want the USA back
(If I Pi$$ed off just one liberal today my mission has been accomplished.)
To: Vendome
Bottom line, everything needs to be strongly encrypted end-to-end. Blowfish, PGP and AES-256 (or higher) are pretty strong. Nothing is impossible to break (other than maybe a one-time pad) but the more time it takes to break and the smaller the message that is broken, the better. It takes a lot of time and resources to decode these ciphers and most of the time you get worthless plain-text junk. The processing power exists to key change frequently enough to maintain a perpetual snipe hunt and overload the decoding system. Sort of a Piven-Cloward’ing of NSA’s monitoring machine. 2^^1024 is a very, very large number space but the key is small so guessing or mathematically deriving the key to only be able to decode 100 packets of a 100,000 packet IP flow becomes very, very time consuming and expensive. Right now we are handing them the info in the clear so it’s easy.
To: Vendome
Yes, of course they will have the meta data.
It’s the actual voice data they crave though. It’s the voice data that they did all in their power to keep weakly encrypted.
They don’t need the big data warehouse in Utah to store the metadata. That’s a small amount of data... plus the fact the phone carriers already store all that. They could just get a warrant to get the meta data and not store any of it themselves.
They want to hear your voice... if you encrypt it they won’t have access to anything but the meta data and that’s not the data they crave.
It’s EASY to write very, very strong public key software for the new powerful 32bit controllers (Like ARM Cortex) Not some weak crap like the encryption that protects your credit card data when you buy something at Amazon. Use the right algorithm and make no flaw in its implementation and all the super computers on the planet can’t decrypt it before the end of the universe comes along.
If NSA could decrypt all the powerful codes they would not have opposed strong crypto in cell phones. Really strong crypto scares the $hit out of them.
They want every one to think they could possibly be decrypting strong crypto. They have a huge problem though. It’s just so easy to test for exactly what crypto they can and cannot break. Nation states do this all the time to be certain of what their enemies can decrypt. Just run a false operation and encrypt all the data using strong crypto... if the data is acted upon by the adversary then they can decode it, if not then that is a type of encryption it is safe to use.
16
posted on
06/18/2013 11:14:10 AM PDT
by
Bobalu
(It is not obama we are fighting, it is the media.)
To: Bobalu
STOP using that word, meta data, as some benign term.
Not yelling at you but, attempting to get everyone to see what that term actually means and encompasses.
MetaDate included your phone number, the location, the method of how your device is connected to a network, etc.
They are outright lying when they say they are not collecting any more than a phone number.
In fact, they are collecting your phone number and the number of anyone you called.
You are constantly communicating information that is private and 4th amendment protected.
See my next post and please don’t take offense at my strident response.
I’m trying to help everyone understand in simple layman terms what is being collected, how it is collected and why it is an abuse of your privacy.
See next post please.
17
posted on
06/18/2013 11:18:41 AM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
To: Bobalu
Quick excerpt:
capable of monitoring billions of bits of Internet traffic a second, including the playback of telephone calls routed on the Internet, and thus in effect spying upon the entirety of the communication of many or all American citizens and businesses who use the Internet.
18
posted on
06/18/2013 11:19:09 AM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
To: Bobalu
The government scanning and archiving your personal telephone number and any calls associated with it are privately owned.
READ THIS CAREFULLY!
The Post Office is a government owned entity.
Your phone number and any phone you use are privately owned.
As are the service providers.
As is the equipment of anyone you call.
Private Property, Ingringement of your 4th amendment and 1st, which will lead to jeopardy of your 5th and 2nd amendment.
There is no way the government can say they have the right to that which is privately owned.
It is pure bunk and obfuscation, a slight of hand, for these guys to sit in a hearing and say they only collect a phone number or numbers attached to activity associate with a target attached in a warrant.
They do not search only a single target.
FACT!!!
They use a process called "Whole Pipe" Access.
What is Whole Pipe Access?
I'll answer that after I bring up another point MINIMIZATION.
What's Minimization and how does that relate to Whole Pipe Access?
The claim this morning is that NSA, DOJ, FBI and DEA do in fact keep huge swaths of information, NOT related to a warrant or request.
BULL-ONY!!!
It's the friggin government and they act as all government do. With ferocity and ever more piercings of your rights, which in this case ought to be protected by the Bill of Rights.
Here is what actually happens and why your private communiction are being violated:
Think about this and Im going to make it a simple explanation so anyone can understand why the US government has no legitimate, legal or lawful right to any and all information about us.
When you get a cell phone you pay for it.
Along with the cell phone you agree in contract to service with a wireless carrier.
Wireless carrier are what we call Responsible Organizations or RespOrgs. With your service you get a telephone number WHICH belongs to you. In other words, you own the phone, the telephone number and the RespOrg manages your number and the service you contract them for associated with that that number.
So, you fork out some money up front and then every month you fork over money for service you contracted with through a private firm to manage your communications.
Now, when you make a call, text or email, using your fancy new phone that is your private property, using your private number which again, you own, the first transmission signal you send is the ID of your phone, subscriber ID and telephone number.
You own all those as do all the people you communicate with.
When you call them they first time they know its you is when they see your telephone number displayed on their phone.
This is called Automatic number identification (ANI). Each phone connect to each other using a means of wink/wink letting each other know and the users there is a connection established.
Whether anyone answers the phone, two devices connected and a message was sent, at a minimum your telephone number but, it may also include a favorite ringtone and picture ID.
This demonstrates further just how much ownership you have over your phone and the information you receive. Further, being able to customize that information, direct calls to another number or send voicemails to text or have text manipulated so that it is machine read back to you.
These things you can do because someone manufactured a phone with these capabilities for end users and for service providers to provide to their customers, who are contracted to them for private service.
No matter how your call is routed within a carriers network or if it transits another carriers network or if it is routed to edge devices who are contracted to the carrier so that the call routing decisions are made automatically based on priorities and decisions that you a private citizen makes as well the decisions of Wireless service providers, which are also owned privately.
They, like you, purchase equipment through various means of financing, barter, trade and outright capital expenditures.
19
posted on
06/18/2013 11:20:23 AM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson