Posted on 06/18/2013 10:38:27 AM PDT by Vendome
You are of course correct.
But how to make them stop?
I don’t know. I’ve been thinking about that statement and how it might be accomplished.
Some ideas are in my head and I think by 4th of July I may have enough for a series of vanities exploring strategies .
I do know a founding member or two at EFF and I’m thinking they may have considered many of the same things I have but, need precedent to proceed on just one issue.
I’ll post my 1st answer to that question next week.
Oh! I see. Sure. There are seems of publications on this.
Let me go back through my snide vanity and get back to you in a manner that won’t require any work.
Look FO a ping in a few days.
It’s the end of the month and I have to finish out and do paperwork.
Not a big issue, if you have them handy and it doesn’t require a lot of effort on your part, no prob. Otherwise I will do some digging on my own and ping you back if I find items that look like they match to see if they ring any bells.
Your vanity post was the first thing I thought of when I heard the guy making such a broad brush adamant statement that Snowden was somehow a traitor for unveiling something a lot of us knew was going on well before (ala carnivore et al.).
It’s not a real problem but, I’m in the middle of closing out my month, getting orders straight and occasionally entertaining myself on FR.
Here are links to FISA and their reasonable cause arguments
https://www.eff.org/nsa-spying/faq
Excellent resource. Note the number of different technologies, databases used, etc.
This is how I know Snowden is full of Chit and cannot just type in a few commands to get access to this.
Symopsis of 1934 Communications Act:
http://itlaw.wikia.com/wiki/Communications_Act_of_1934
The act itself:
http://www.fas.org/sgp/crs/misc/R41733.pdf
Article revealing what the 1934 Communications act made possible:
http://epic.org/privacy/wiretap/98-326.pdf
Pay attention to Olmstead.
NPR
http://www.npr.org/templates/story/story.php?storyId=5061834
Good graphic
http://www.whocalledmyphone.net/wire-tapping/
Here is one document I relied on for my research:
http://en.convdocs.org/download/docs-57665/57665.doc
You will need to enter a captcha to download but, it is very, very good and there are excellent footnotes there.
NPR
just perused the rest of my erstwhile article and much of it I adlibbed.
If you have a specific question let me know.
My article was nearly three times longer and I had to pare it down to what was at least relevant and could quickly make sense.
I’m looking for a few more links.
NSA Killed System That Sifted Phone Data Legally
http://www.commondreams.org/headlines06/0518-07.htm
The Whistle Blower Who Expossed Warrantless Wiretaps
http://web.archive.org/web/20081215105850/http://www.newsweek.com/id/174601
EFF articles on listening to your private communications
https://www.eff.org/search/site/listen
EFF on Backdoor surveillance
https://www.eff.org/search/site/listen?f[0]=field_issue%3A540
The Government Wants A Backdoor Into Your Online Communications
https://www.eff.org/deeplinks/2013/05/caleatwo
Local Cops Following Big Brother’s Lead, Getting Cell Phone Location Data Without a Warrant
https://www.eff.org/deeplinks/2012/04/local-cops-following-big-brothers-lead-getting-cell-phone-location-data-without
Another Court Says “National Security” Isn’t Blank Check for Illegal Spying
https://www.eff.org/deeplinks/2006/10/another-court-says-national-security-isnt-blank-check-illegal-spying
A Government-Mandated Backdoor for Every Network
https://www.eff.org/deeplinks/2004/10/government-mandated-backdoor-every-network
Taking the Long View on the Fourth Amendment
Stored Records and the Sanctity of the Home
http://stlr.stanford.edu/2008/02/taking-the-long-view-on-the-fourth-amendment/
Excellent, Excellent discussion about privacy rights as relates to an intangible such as electronic communications.
There is a synopsis at the link and at the bottom the full article:
http://stlr.stanford.edu/2008/01/the-olmsteadian-seizure-clause/
Some more stuff I posted that is related:
http://www.freerepublic.com/focus/news/3032709/posts?page=9#9
Does Big Data Make it legal?
http://www.huffingtonpost.com/mary-shannon-little/does-big-data-make-it-legal_b_3431381.html
Boundless Informant: The NSA’s Secret Tool To Track Global Surveillance Data
http://www.huffingtonpost.com/2013/06/08/boundless-informant-the-n_n_3409841.html
Boundless Informant
http://www.huffingtonpost.com/news/boundless-informant
Awesome sight with more information than you can shake a stick at
Boundless Informant-Augmented State Surveillance
http://thesocietypages.org/cyborgology/2013/06/14/boundless-informant-augmented-state-surveillance/
Washington Post
Stellar Wind/U.S. surveillance architecture includes collection of revealing Internet, phone metadata
http://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_print.html
Talk Left’s discussion of Prism and Stellar Wind
http://www.talkleft.com/story/2013/6/7/42840/79770/civilliberties/PRISM-and-Stellar-Wind-Programs
Green Star and early ATT project and very clever. Also, they were lucky to get away with it and they say so at the end of the article
http://cryptome.org/2013/01/att-greenstar-spy.htm
CNET
http://www.freerepublic.com/focus/f-news/3031810/posts
Surveillance Monitor
http://w2.eff.org/Privacy/Surveillance/surveillancemonitor.html
A ton of links here:
http://cryptome.org/0001/ms-spy-takedown.htm
JOINT REPLY COMMENTS OF THE UNITED STATES DEPARTMENT
OF JUSTICE, FEDERAL BUREAU OF INVESTIGATION AND DRUG ENFORCEMENT ADMINISTRATION
http://askcalea.fbi.gov/pet/docs/20040427_jper_reply.pdf
FBI Target Netphoning-CNET
http://news.cnet.com/2100-1028-5056424.html
The War on Terrorism: FBI Wants Expanded Wiretapping Authority -
http://technology.findlaw.com/modern-law-practice/the-war-on-terrorism-fbi-wants-expanded-wiretapping-authority.html#_edn23
Circuit Switching vs Packet Switching
http://voip.about.com/od/voipbasics/a/switchingtypes.htm
SISMI-Telecom scandal
http://en.wikipedia.org/wiki/SISMI-Telecom_scandal
Forced-access regulation
http://en.wikipedia.org/wiki/Forced-access_regulation
There’s a bunch more but, I have to get back to work.
Feel free to ping me if you need anything else.
I got more stuff in my head that just comes up when a cue calls it.
Thank you.
Ping me when you post stuff.
Wow, that’s quite a lot to look at, thanks for all the links and the time you spent gathering them for me. I was just about to start digging, so I’m glad I checked here first!
Much appreciated. I may FRmail you in the near future to ask you something(s) a bit more direct about your article.
These guys didn’t present anything new, that I can see.
We knew about these issues for years and after The Telecommunications Act of 1996, SS7 was going to be an issue as follows:
2001 IEEE Proceedings United States Military Academy, West Point
http://www.daairatoulatif.com/admin/upload/10.1.1.121.6125.pdf
The protocol was originally designed for a closed telecommunications community; therefore, it possesses limited authentication facilities. However, deregulation now requires
phone companies to provide SS7 connections to any entity for a modest fee.
The Internet-PTN convergence allows attackers inroads
via entities with poorly secured SS7 networks.
ISDN connections are also points of unauthorized entry.
Once access to a PTN is gained, an attacker can perpetrate
modification, fabrication, interception and interruption on a potentially massive scale.
Fort example, during a terrorist bombing incident, an attacker can modify en- tries in a call forwarding database to re-route all phone calls to emergency services, disrupting them and possibly increasing the number of casualties
Ping again...
Ping a ling
Aw shit.
Bump
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.