Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

A TRAITOR, AN EAVESDROPPER, AND A MORAL DILEMMA
Free Republic Original Content | June 15, 2013 | by Laz A. Mataz

Posted on 06/15/2013 2:08:07 PM PDT by Lazamataz

Earlier this year, Edward Snowden went to The Guardian, who then published an article on June the 6th that had numerous damning revelations about the National Security Agency.

Edward Snowden broke an oath he had sworn, and revealed that the NSA had committed acts of domestic espionage far beyond anything most people had ever suspected. He revealed that data about the phone calls of millions of Americans, the entire customer base of Verizon, had been collected and stored in perpetiuty. Experts concluded that the same records were likely collected and stored by the NSA, from most or all of the other telephone carriers.

There are no white-hat-wearing good guys in this story.

Edward Snowden violated an oath of secrecy. Some, including the Speaker of the House John Boehner, have called him a traitor. While I cannot go that far, I do consider his actions unacceptable and unethical.

Yet the NSA has systematically violated the privacy of almost every American who use the telephone. These actions are also unacceptable and highly unethical.

And therein lies the moral dilemma. It seems there is no one to root for in this story. On one hand, we have a man who violated his personal integrity and his oath; and on the other, we have an agency who has overstepped the boundaries most Americans find tolerable with regards to privacy.

Few phone calls were listened to, although a small number were. However, much information can be gleaned by a complete record of who a person calls, and how often, and when. This information should never be collected or kept, unless a warrant is issued for a particular person and for a specific law enforcement reason. While a warrant is rumored to have been issued, if it exists, it was done in secret and it is unacceptably broad. It covers all Americans, even the vast majority who are not under suspicion. It amounts to a fishing expedition. It is not how America is supposed to operate.

These actions by the NSA are violations of all of our privacy, on a grand scale, remind us of nothing so much as the East German Stasi -- that secret-police group in the formerly Communist state that kept tabs on the entire population to ferret out the few lovers of freedom and free markets.

Snowden has said a few things about his revelations:

While the actions of Edward Snowden were underhanded and immoral, the actions of our government were even more so -- simply because of the scale and the number of people affected.

There is an underreported aspect to the story of the NSA intercepts: Text messages and electronic text communications are kept in their entirity. This means that if you have sent a password or a credit card via electronic media of nearly any flavor, it now sits in the data centers of the National Security Agency. Furthermore, the ability and the opportunity to abuse this information against political opponents is huge, and this administration has already demonstrated a great propensity to target its political opposition with any tool at their disposal (c.f., the targetting of 'Tea Party' and "Patriotic" 501-c political action organizations).

Congress must rein the NSA in. The President has already said he won't, and the Democrat-controlled Senate cannot be counted on to do the right thing.


TOPICS: Constitution/Conservatism; FReeper Editorial
KEYWORDS: benghazi; fastandfurious; impeachnow; irs
Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-123 last
To: Chaguito; Vendome; All

The important thing to take away from that three-party interview posted by Chaquito’s is that all three NSA alum think that Snowden is in the right for how he revealed this information.

They tell their tales of trying to stay within the channels, to “do the right thing the right way” and having nothing come of it, or worse, being persecuted for it. To quote Weibe, on the subject of whistleblowing: “We failed...”

The summary judgement of these three former NSA employees is: “We told you so.”

Vendome’s assessment of the law is correct and tracks exactly with what I saw when I worked for cisco, the company that makes the boxes that connect the Internet together. This posting is probably going through at least a dozen cisco boxes between me and anyone else on FR.

The CALEA issue was a Big Deal, because we had to start designing interfaces into routers to allow the FBI (and then the NSA, of course) to be able to divert a copy of any IP flow off a router and out the “back door” as it were.

Go into any business and look at their telephone sets. Many of them are IP phones now. They say “cisco Systems” on them. They’re very attractively molded black/grey plastic. They’re very versatile widgets, allowing a small business to have PBX-like features without owning a PBX.

Want to know what the NSA told us cisco engineers in an open meeting?

The shape of the very first cisco IP phone’s handset (that unit would have been shipping in 1998) and cradle made it an “excellent” whole-room bug.

NSA employees told us that. In the open, with a straight face. Our reaction was to look at each other with a wary eye and keep our mouths shut. Later, our reaction with each other was “WTF-ing F!?”

In other words, people, there are those of us who have worked at the edges of this issue for years, and from the limited details we have of what’s been going on, Snowden is a) right, b) exercised sound judgement in how he went about this to wake people up, and c) oh, all those people who tell us that it is “technically impossible to capture/examine/scan the full traffic load of the Internet” because it would “take too much?”

Yea, they’re full of crap too. I worked on systems that could scan gigabytes of traffic per second for intrusion detection in 2002/2003... the capabilities have gotten only bigger and better today. Furthermore, it is a problem where parallel processing works quite well, and if you don’t have the CPU/memory bandwidth in one system to perform the scanning, you merely need add more CPU’s and memory pools (MIMD style multi-processing, or a “cluster”) and then use minimal packet inspection to break out a gigabit packet interface into multiple “streams” of IP traffic. Assign a few streams to each CPU, then add CPU’s as necessary.

Then the vast majority of people have no idea what kind of speed you can get if you decide to use either FPGA’s or you spin your own chip (ASIC) to break out packets for processing. It isn’t a difficult problem to put into an ASIC or FPGA, and the NSA has a very large budget. The entire budget to create a whole new CPU, fab line, etc at Intel is a few billion dollars over a couple/three years.

The NSA’s budget is well north of $30B/year now. It’s almost all “black,” meaning we can only assume how large the budget is, and it’s unaccountable. They could easily fund the development of custom silicon to make this problem even more scalable than it is now.

Here’s the assessment of an NSA employee agreeing with my assessment of Snowden’s abilities as a root access manager:

“Q: As he said, he could tap the president’s phone?

Binney: As a super-user and manager of data in the data system, yes, they could go in and change anything.”

Here’s the nut of the issue now:

The NSA (et al) don’t “place a tap” on the subject’s phone when they get a warrant. They’re recording and archiving everything, ALL THE TIME. When they get a warrant, then they can query the system and bring up what they want. The “protection” of the warrant is entirely procedural. There is no longer any physical protection of not having your phone or communications tapped until the issuance of a warrant. “Tapping the president’s private phone” is no more difficult than making the right database queries.

The holster-sniffers have lost the argument, set, game, match. What’s more, the agencies latest claims that they’ve stopped “dozens” of terrorist attack plans are suspect and without any proof. If they want to make extraordinary claims, they require extraordinary proof. Let’s see the names, dates, faces, plans, dates, times and the intercept data. Absent that, there’s no reason to trust the government ever again. They’ve been lying for years, the people in Congress are, quite frankly, too stupid to understand what the NSA tells them in executive session. If people who know WTF they’re talking about in these oversight committee hearings (eg, Vendome or myself or many others here on FR in the telecom/networking industry), we could get some actual oversight.

But the hard truth is that there is no one in Congress with an IQ higher than that of a potted plant overseeing these programs. They’re stupid enough to be lied to (by fact or omission) and not even know when.


121 posted on 06/18/2013 8:57:44 AM PDT by NVDave
[ Post Reply | Private Reply | To 119 | View Replies]

To: Vendome
Image and video hosting by TinyPic
122 posted on 06/18/2013 1:30:20 PM PDT by b4its2late (A Liberal is a person who will give away everything he doesn't own.)
[ Post Reply | Private Reply | To 79 | View Replies]

To: Lazamataz

BFL...


123 posted on 06/18/2013 1:45:51 PM PDT by TurboZamboni (Marx smelled bad & lived with his parents most his life.)
[ Post Reply | Private Reply | To 3 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-123 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson