Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

History lessons on telecom and how we got here [gov spying on all citizens]
Vanity | 6/18/2013 | Vanity

Posted on 06/18/2013 10:38:27 AM PDT by Vendome

So I'm watching the news today and start seeing our illustrious Bureaucrats Out Right Lying about what they collect and what they don't.
 
They tell us today they don't collect locations of cell phone trawled for in pursuit of a target named in a warrant.
 
I want you to understand when they issue a warrant, many times, with "Reasonable Cause" They are violating the Constitution by:
1.  Using "Reasonable Cause" as the basis for a warrant.  The Constitution requires no Warrants shall issue, but upon probable cause.
 
2.  supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
 
As to point 2. above wrap your head around "Whole Pipe" Access.  Here they have granted themselves direct access to the Whole Pipe of transmission of information, be that voice or data and includes every last relevant part of a transmission, including location of cell phone at any time during transmission of wink/wink, keep alive, GPS, txt, email, incoming and outgoing calls.
 
Whole pipe access trawls every device transmitting during the time the NSA, DOJ, DEA and FBI is gathering information on a target.  There is a technical reason for why they do this but, I still believe it is against the law for them to gather information, especially as a matter of habit, course and intent, of innoccent people, organizations, enterprises and groups, who have not been named in the warrant haven't even a tangential relationship to the target named in the warrant.
 
Service providers are required by to provide all information transmitted by a cell phone, VoIP, PSTN, FAX, VPN, etc inclding CLLI and any and all information that would identify where a transmission geographically begins and ends, as well where the device is when idle.
 
Now, I purposely misspelled   searcches in the title of the thread.  Why?  Because frequently the information they are targeting is just that much incorrect.  Think about that and what I wrote as you delve into my article explaning the history, laws passed, and technical means.
 
You'll agree with me, that the NSA and the other alphabet agencies are flat out lying when they claim they don't don't do this or that.  They do because of the technical means they use to achieve their aims and also because they have less reason to not keep all that is caught in the trawling of a Whole Pipe, during their unConstitutional search and they, having no client to defend will, have, do and will continue to archive any all information they obtain unlawfully.
 


TOPICS: Business/Economy; Constitution/Conservatism; Crime/Corruption; FReeper Editorial; Miscellaneous; News/Current Events; Your Opinion/Questions
KEYWORDS: 4th; amendment; chat; duplicate; infringed; vanity; your
Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 last
To: Vendome

You are of course correct.

But how to make them stop?


41 posted on 06/25/2013 9:00:23 PM PDT by little jeremiah (Courage is not simply one of the virtues, but the form of every virtue at the testing point. CSLewis)
[ Post Reply | Private Reply | To 31 | View Replies]

To: little jeremiah

I don’t know. I’ve been thinking about that statement and how it might be accomplished.

Some ideas are in my head and I think by 4th of July I may have enough for a series of vanities exploring strategies .

I do know a founding member or two at EFF and I’m thinking they may have considered many of the same things I have but, need precedent to proceed on just one issue.

I’ll post my 1st answer to that question next week.


42 posted on 06/25/2013 9:33:20 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 41 | View Replies]

To: jurroppi1

Oh! I see. Sure. There are seems of publications on this.

Let me go back through my snide vanity and get back to you in a manner that won’t require any work.

Look FO a ping in a few days.

It’s the end of the month and I have to finish out and do paperwork.


43 posted on 06/25/2013 9:36:15 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 40 | View Replies]

To: Vendome

Not a big issue, if you have them handy and it doesn’t require a lot of effort on your part, no prob. Otherwise I will do some digging on my own and ping you back if I find items that look like they match to see if they ring any bells.

Your vanity post was the first thing I thought of when I heard the guy making such a broad brush adamant statement that Snowden was somehow a traitor for unveiling something a lot of us knew was going on well before (ala carnivore et al.).


44 posted on 06/25/2013 10:10:03 PM PDT by jurroppi1
[ Post Reply | Private Reply | To 43 | View Replies]

To: jurroppi1

It’s not a real problem but, I’m in the middle of closing out my month, getting orders straight and occasionally entertaining myself on FR.


45 posted on 06/25/2013 10:56:27 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies]

To: jurroppi1

Here are links to FISA and their reasonable cause arguments

https://www.google.com/search?q=%22Reasonable+Cause%22+fisa&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a&channel=fflb


46 posted on 06/25/2013 10:59:18 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies]

To: jurroppi1

https://www.eff.org/nsa-spying/faq

Excellent resource. Note the number of different technologies, databases used, etc.

This is how I know Snowden is full of Chit and cannot just type in a few commands to get access to this.


47 posted on 06/25/2013 11:05:00 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies]

To: jurroppi1

https://www.google.com/search?q=Whole+pipe+access+trawls+every+device+transmitting&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a&channel=fflb#client=firefox-a&hs=ffP&rls=org.mozilla:en-US%3Aofficial&channel=fflb&sclient=psy-ab&q=Whole+pipe+access+trawls+nsa&oq=Whole+pipe+access+trawls+nsa&gs_l=serp.3...12458.12657.0.12704.3.3.0.0.0.0.195.305.0j2.2.0...0.0...1c.1.18.psy-ab.AL4rUwST95E&pbx=1&bav=on.2,or.r_qf.&bvm=bv.48340889,d.cGE&fp=aa240c7ce24752ec&biw=1920&bih=952


48 posted on 06/25/2013 11:05:57 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies]

To: jurroppi1

Symopsis of 1934 Communications Act:
http://itlaw.wikia.com/wiki/Communications_Act_of_1934

The act itself:
http://www.fas.org/sgp/crs/misc/R41733.pdf

Article revealing what the 1934 Communications act made possible:
http://epic.org/privacy/wiretap/98-326.pdf

Pay attention to Olmstead.


49 posted on 06/25/2013 11:16:14 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies]

To: jurroppi1

NPR
http://www.npr.org/templates/story/story.php?storyId=5061834

Good graphic
http://www.whocalledmyphone.net/wire-tapping/

Here is one document I relied on for my research:
http://en.convdocs.org/download/docs-57665/57665.doc

You will need to enter a captcha to download but, it is very, very good and there are excellent footnotes there.


50 posted on 06/25/2013 11:24:09 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies]

To: jurroppi1

NPR
just perused the rest of my erstwhile article and much of it I adlibbed.

If you have a specific question let me know.

My article was nearly three times longer and I had to pare it down to what was at least relevant and could quickly make sense.

I’m looking for a few more links.


51 posted on 06/25/2013 11:26:20 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies]

To: jurroppi1

NSA Killed System That Sifted Phone Data Legally
http://www.commondreams.org/headlines06/0518-07.htm

The Whistle Blower Who Expossed Warrantless Wiretaps
http://web.archive.org/web/20081215105850/http://www.newsweek.com/id/174601

EFF articles on listening to your private communications
https://www.eff.org/search/site/listen

EFF on Backdoor surveillance
https://www.eff.org/search/site/listen?f[0]=field_issue%3A540

The Government Wants A Backdoor Into Your Online Communications
https://www.eff.org/deeplinks/2013/05/caleatwo
Local Cops Following Big Brother’s Lead, Getting Cell Phone Location Data Without a Warrant
https://www.eff.org/deeplinks/2012/04/local-cops-following-big-brothers-lead-getting-cell-phone-location-data-without

Another Court Says “National Security” Isn’t Blank Check for Illegal Spying
https://www.eff.org/deeplinks/2006/10/another-court-says-national-security-isnt-blank-check-illegal-spying

A Government-Mandated Backdoor for Every Network
https://www.eff.org/deeplinks/2004/10/government-mandated-backdoor-every-network

Taking the “Long View” on the Fourth Amendment
Stored Records and the Sanctity of the Home
http://stlr.stanford.edu/2008/02/taking-the-long-view-on-the-fourth-amendment/

Excellent, Excellent discussion about privacy rights as relates to an intangible such as electronic communications.

There is a synopsis at the link and at the bottom the full article:
http://stlr.stanford.edu/2008/01/the-olmsteadian-seizure-clause/

Some more stuff I posted that is related:
http://www.freerepublic.com/focus/news/3032709/posts?page=9#9

Does Big Data Make it legal?
http://www.huffingtonpost.com/mary-shannon-little/does-big-data-make-it-legal_b_3431381.html

Boundless Informant: The NSA’s Secret Tool To Track Global Surveillance Data
http://www.huffingtonpost.com/2013/06/08/boundless-informant-the-n_n_3409841.html

Boundless Informant
http://www.huffingtonpost.com/news/boundless-informant

Awesome sight with more information than you can shake a stick at
Boundless Informant-Augmented State Surveillance
http://thesocietypages.org/cyborgology/2013/06/14/boundless-informant-augmented-state-surveillance/

Washington Post
Stellar Wind/U.S. surveillance architecture includes collection of revealing Internet, phone metadata
http://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_print.html

Talk Left’s discussion of Prism and Stellar Wind
http://www.talkleft.com/story/2013/6/7/42840/79770/civilliberties/PRISM-and-Stellar-Wind-Programs

Green Star and early ATT project and very clever. Also, they were lucky to get away with it and they say so at the end of the article
http://cryptome.org/2013/01/att-greenstar-spy.htm

CNET
http://www.freerepublic.com/focus/f-news/3031810/posts

Surveillance Monitor
http://w2.eff.org/Privacy/Surveillance/surveillancemonitor.html

A ton of links here:
http://cryptome.org/0001/ms-spy-takedown.htm

JOINT REPLY COMMENTS OF THE UNITED STATES DEPARTMENT
OF JUSTICE, FEDERAL BUREAU OF INVESTIGATION AND DRUG ENFORCEMENT ADMINISTRATION
http://askcalea.fbi.gov/pet/docs/20040427_jper_reply.pdf

FBI Target Netphoning-CNET
http://news.cnet.com/2100-1028-5056424.html

The War on Terrorism: FBI Wants Expanded Wiretapping Authority -
http://technology.findlaw.com/modern-law-practice/the-war-on-terrorism-fbi-wants-expanded-wiretapping-authority.html#_edn23

Circuit Switching vs Packet Switching
http://voip.about.com/od/voipbasics/a/switchingtypes.htm

SISMI-Telecom scandal
http://en.wikipedia.org/wiki/SISMI-Telecom_scandal

Forced-access regulation
http://en.wikipedia.org/wiki/Forced-access_regulation

There’s a bunch more but, I have to get back to work.

Feel free to ping me if you need anything else.

I got more stuff in my head that just comes up when a cue calls it.


52 posted on 06/26/2013 12:03:39 AM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies]

To: Vendome

Thank you.

Ping me when you post stuff.


53 posted on 06/26/2013 11:03:38 AM PDT by little jeremiah (Courage is not simply one of the virtues, but the form of every virtue at the testing point. CSLewis)
[ Post Reply | Private Reply | To 42 | View Replies]

To: Vendome

Wow, that’s quite a lot to look at, thanks for all the links and the time you spent gathering them for me. I was just about to start digging, so I’m glad I checked here first!

Much appreciated. I may FRmail you in the near future to ask you something(s) a bit more direct about your article.


54 posted on 06/26/2013 12:58:19 PM PDT by jurroppi1
[ Post Reply | Private Reply | To 52 | View Replies]

To: Vendome

These guys didn’t present anything new, that I can see.

We knew about these issues for years and after The Telecommunications Act of 1996, SS7 was going to be an issue as follows:

2001 IEEE Proceedings United States Military Academy, West Point
http://www.daairatoulatif.com/admin/upload/10.1.1.121.6125.pdf

The protocol was originally designed for a closed telecommunications community; therefore, it possesses limited authentication facilities. However, deregulation now requires
phone companies to provide SS7 connections to any entity for a modest fee.

The Internet-PTN convergence allows attackers inroads
via entities with poorly secured SS7 networks.

ISDN connections are also points of unauthorized entry.

Once access to a PTN is gained, an attacker can perpetrate
modification, fabrication, interception and interruption on a potentially massive scale.

Fort example, during a terrorist bombing incident, an attacker can modify en- tries in a call forwarding database to re-route all phone calls to emergency services, disrupting them and possibly increasing the number of casualties


55 posted on 04/18/2016 10:09:25 PM PDT by Vendome (Don't take life so seriously-you won't live through it anyway - "Enjoy Yourself" ala Louis Prima)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Vendome

Ping again...


56 posted on 07/09/2016 8:13:38 PM PDT by Vendome (Don't take life so seriously-you won't live through it anyway - "Enjoy Yourself" ala Louis Prima)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Vendome

Ping a ling


57 posted on 07/09/2016 8:14:48 PM PDT by Vendome (Don't take life so seriously-you won't live through it anyway - "Enjoy Yourself" ala Louis Prima)
[ Post Reply | Private Reply | To 31 | View Replies]

To: Vendome

Aw shit.


58 posted on 03/22/2017 5:07:16 PM PDT by Lazamataz (The "news" networks and papers are bitter, dangerous enemies of the American people.)
[ Post Reply | Private Reply | To 57 | View Replies]

To: Vendome

Bump


59 posted on 03/22/2017 8:22:35 PM PDT by OrioleFan (Republicans believe every day is July 4th, Democrats believe every day is April 15th.)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson