Skip to comments.
History lessons on telecom and how we got here [gov spying on all citizens]
Vanity
| 6/18/2013
| Vanity
Posted on 06/18/2013 10:38:27 AM PDT by Vendome
So I'm watching the news today and start seeing our illustrious Bureaucrats Out Right Lying about what they collect and what they don't.
They tell us today they don't collect locations of cell phone trawled for in pursuit of a target named in a warrant.
I want you to understand when they issue a warrant, many times, with "Reasonable Cause" They are violating the Constitution by:
1. Using "Reasonable Cause" as the basis for a warrant. The Constitution requires no Warrants shall issue, but upon probable cause.
2. supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
As to point 2. above wrap your head around "Whole Pipe" Access. Here they have granted themselves direct access to the Whole Pipe of transmission of information, be that voice or data and includes every last relevant part of a transmission, including location of cell phone at any time during transmission of wink/wink, keep alive, GPS, txt, email, incoming and outgoing calls.
Whole pipe access trawls every device transmitting during the time the NSA, DOJ, DEA and FBI is gathering information on a target. There is a technical reason for why they do this but, I still believe it is against the law for them to gather information, especially as a matter of habit, course and intent, of innoccent people, organizations, enterprises and groups, who have not been named in the warrant haven't even a tangential relationship to the target named in the warrant.
Service providers are required by to provide all information transmitted by a cell phone, VoIP, PSTN, FAX, VPN, etc inclding CLLI and any and all information that would identify where a transmission geographically begins and ends, as well where the device is when idle.
Now, I purposely misspelled searcches in the title of the thread. Why? Because frequently the information they are targeting is just that much incorrect. Think about that and what I wrote as you delve into my article explaning the history, laws passed, and technical means.
You'll agree with me, that the NSA and the other alphabet agencies are flat out lying when they claim they don't don't do this or that. They do because of the technical means they use to achieve their aims and also because they have less reason to not keep all that is caught in the trawling of a Whole Pipe, during their unConstitutional search and they, having no client to defend will, have, do and will continue to archive any all information they obtain unlawfully.
TOPICS: Business/Economy; Constitution/Conservatism; Crime/Corruption; FReeper Editorial; Miscellaneous; News/Current Events; Your Opinion/Questions
KEYWORDS: 4th; amendment; chat; duplicate; infringed; vanity; your
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-59 next last
To: Vendome
Late 90’s to 2002. CALEA.
21
posted on
06/18/2013 6:11:19 PM PDT
by
chesty_puller
(Viet Nam 1970-71 He who shed blood with me shall forever be my brother. Shak.)
To: Vendome
Sorry, I worked for General Telephone/GTE/Verizon from 78 to 02.
22
posted on
06/18/2013 6:14:16 PM PDT
by
chesty_puller
(Viet Nam 1970-71 He who shed blood with me shall forever be my brother. Shak.)
To: chesty_puller
Called it!!!
Most people have no idea what x.25 is.
23
posted on
06/18/2013 6:38:26 PM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
To: Vendome
Most people have no idea what x.25 is The FBI sure as hell didn't.
24
posted on
06/18/2013 7:00:16 PM PDT
by
chesty_puller
(Viet Nam 1970-71 He who shed blood with me shall forever be my brother. Shak.)
To: Vendome
Thank you for taking your time to write this.....even in layman's terms some of this is very difficult to understand...but you made it much more understandable.
The idea is that they've been able to track us for many years now...and meta trolling as well.. the phone companies are seen as partners to the FBI and now NSA in whatever information they want to get.
I was aware anything on line was open for whoever wanted to get the information before i had my computer...I also knew the telephone company had means to tap onto your line unknown to you ..many years ago.
So the news wasn't new to me...even if i didn’t understand how they obtained the information. They could get it in more ways then one as well.
25
posted on
06/20/2013 8:13:38 PM PDT
by
caww
To: Vendome
Just bumping this...important for people to read...explains much.
Glad Jim put it in the header too or I would have missed it!
26
posted on
06/21/2013 9:04:01 AM PDT
by
caww
To: Vendome
Thank you - I read most of it, understood the last part where you summarized.
I especially understood this sentence:
You are so screwed.
So I guess the next few steps might involve something akin to star chambers and gulags, maybe more Breitbarting? Or am I just crazy?
27
posted on
06/21/2013 8:35:38 PM PDT
by
little jeremiah
(Courage is not simply one of the virtues, but the form of every virtue at the testing point. CSLewis)
To: little jeremiah
Nope. You’re right. In fact, PA II has elements of star chamber and FISA as well.
They can arrest you and not give cause but, being charged under PA II you are barred from discussing even your arrest with an attorney .
Further, NSA can search your private communications at will and does not have to inform you before hand.
28
posted on
06/21/2013 9:46:30 PM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
To: Vendome
What’s going to happen, Vendome? It’s as though we’re all on a boat and the huge falls are coming up closer and closer and we can see the spray and the roar of the falls is getting louder and louder, and the current of the river is getting faster and faster....
29
posted on
06/21/2013 10:01:10 PM PDT
by
little jeremiah
(Courage is not simply one of the virtues, but the form of every virtue at the testing point. CSLewis)
To: Vendome
The company I worked for had a closed network till the mid nineties. Large national bank. We were told that it was a cost decision to go over the internet. Makes me think how much the government was involved in making it cheaper or influencing large companies such as bank to leave closed networks. They could monitor both with the right access but it would be a lot easier to over the internet. I makes me wonder why highly sensitive sites such as the power grids are not on a closed network.
30
posted on
06/21/2013 10:21:24 PM PDT
by
ThomasThomas
(A bad hair day is not a mental issue, or is it?)
To: little jeremiah
Eventually someone has to come to my side of the argument and force the government to back off and properly go through the warrant and the”probable cause process.
Right now they operate outside the 4th with their own”reasonable” cause and they wrongly presume your billing information is not sacrosanct .
I say it is.
You buy a phone, the service provider issues you a new number or ports your old number, they manage your number, which you own and take to any other carrier, they provide a service to you based on your number for which you force over mucho diners.
Now their argument fails on the basis of private individuals contracting with the private people and/or private entities.
How can they find permision to do to you what an ordinary person cannot Do without sanction?
So, they a Law Enforcement? Does that give them the authority to abuse any other rights by merely meeting a greater good? I think not.
They can’t enter a house in which I contract with a private entity for the loa, ,
31
posted on
06/21/2013 11:30:27 PM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
To: Vendome
32
posted on
06/22/2013 12:28:46 AM PDT
by
Albion Wilde
("Remember... the first revolutionary was Satan."--Russian Orthodox Archpriest Dmitry Smirnov)
To: Vendome
Every body is asking each other; “HOW DID WE GET HERE”? Hey people, that is a very stupid question. My answer is “LOOK IN THE MIRROR”, if you want to know who got us here. We voted for them. Instead of asking pertinent questions during election time, we, like sheep, listened to the propaganda. Anyone that said anything against the propaganda were laughed at and called all kinds of names. Even today, there are more and more people that are shouting warnings of what these politicians are doing to all of us, and, I’m sorry to say, it’s still falling on deaf ears. Why? Because these politicians are telling the people; “IF YOU LISTEN TO THOSE PEOPLE AND VOTE US OUT, YOU WILL LOOSE ALL YOUR “GOODIES” AND YOU WILL BE LEFT ON YOUR OWN”.
To: Vendome
34
posted on
06/22/2013 9:31:25 AM PDT
by
SgtBilko
(Petition to the the Obama administration)
To: Vendome
OUTSTANDING!!! forwarded link to my non-Freeper group
35
posted on
06/23/2013 6:37:53 AM PDT
by
Chode
(Stand UP and Be Counted, or line up and be numbered - *DTOM* -ww- NO Pity for the LAZY)
To: Vendome
Do you have actual citations for all of the source info (links to the quotes, article excerpts, etc... that you used in this vanity)?
To: jurroppi1
UHmmmm.... Pretty sure they are in the body of the post but, you can google anything you question.
I recalled most of it off the top of my head and confirmed my recollection googling my thoughts.
I am correct and the post is right.
37
posted on
06/25/2013 11:16:05 AM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
To: Vendome
I wasn’t questioning the veracity of it, I was just looking for referenced citations (like a wiki of sorts). I was hoping you had some or all of them handy to do this with.
No problem, I was just asking to see if you had them is all.
To: jurroppi1
Oh, sorry. do you have specific questions or do you want a generalized footnotes?
39
posted on
06/25/2013 6:06:40 PM PDT
by
Vendome
(Don't take life so seriously, you won't live through it anyway)
To: Vendome
I guess I was looking for footnotes with linked citations to items like this:
Quote "The existence of Carnivore first came to light in the April 6 testimony of Attorney Robert Corn-Revere to the Constitution Subcommittee. Its operation was further detailed in a report that appeared in today's Wall Street Journal (copy attached). According to these reports, the Carnivore system -- essentially a computer running specialized software-- is attached directly to an Internet Service Provider's (ISP) network. Carnivore is attached either when law enforcement has a Title III order from a court permitting it to intercept in real time the contents of the electronic communications of a specific individual, or a trap and trace or pen register order allowing to it obtain the "numbers" related to communications from or to a specified target.
I think that would ultimately help with something I had in mind. In a nutshell, I wanted to email it to one of the local talk radio hosts because he was asking for proof that anyone knew this was going on before Snowden "leaked" information on PRISM.
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-59 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson