| |
| ▲ | jeffbee 4 days ago | parent | next [-] | | What you're describing is a program from 20 years ago design to surveil limited parties in a limited geographic region overseas, during a war, in a place that enjoyed Stone Age information systems. That is not in the sense that the people in this discussion meant by blanket surveillance. They are talking about broad interception of all communications by U.S. persons, an undertaking that it should be obvious to you if you are in this industry would be economically if not thermodynamically impossible. | | |
| ▲ | timschmidt 4 days ago | parent [-] | | "After 9/11, they took one of the programs I had done, or the backend part of it, and started to use it to spy on everybody in this country. That was a program I created called Stellar Wind. That was seperate and compartmented from the regular activity which was ongoing because it was doing domestic spying. All the equipment was coming in, I knew something was happening but then when the contractors I had hired came and told me what they were doing, it was clear where all the hardware was going and what they were using it to do. It was simply a different input, instead of being foreign it was domestic." - William Binney https://www.youtube.com/watch?v=590cy1biewc | | |
| ▲ | jeffbee 4 days ago | parent [-] | | Civilian information systems have radically expanded in size since 2001, even if we take that ancient statement at face value. In the year 2025 it's crazy to believe that every newspaper is shouting that civilian information systems are destabilizing the national power grid and drying up the water table, but the government possesses a larger, far more capable information system that paradoxically has no observable physical presence. | | |
| ▲ | timschmidt 4 days ago | parent | next [-] | | "The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger." "The structure provides 1 to 1.5 million sq ft (93,000 to 139,000 m2), with 100,000 sq ft (9,300 m2) of data center space and more than 900,000 sq ft (84,000 m2) of technical support and administrative space." "The completed facility is expected to require 65 megawatts of electricity, costing about $40 million per year. Given its open-evaporation-based cooling system, the facility is expected to use 1.7 million US gal (6,400 m3) of water per day. An article by Forbes estimates the storage capacity as between 3 and 12 exabytes as of 2013, based on analysis of unclassified blueprints, but mentions Moore's Law, meaning that advances in technology could be expected to increase the capacity by orders of magnitude in the coming years." https://en.wikipedia.org/wiki/Utah_Data_Center | | |
| ▲ | LargoLasskhyfv 3 days ago | parent | next [-] | | There was an interesting connection I discovered once. The NSA's UDC is located here: https://en.wikipedia.org/wiki/Bluffdale,_Utah Then there was https://en.wikipedia.org/wiki/M-DISC which was located here: https://en.wikipedia.org/wiki/American_Fork,_Utah Open the two location articles in tabs, scroll down a little until you see the maps, or rather have them in good view, and then switch between them, fast, back and forth. See what I mean? There was more, but I don't have it ready ATM(storage long lost), and am too tired to research it again(reading many ugly government and business sites) but, shortly after it was officially known where that datacenter would be built, Millenniata (M-Disc) opened shop there. I can't recall exactly anymore ATM, they may have incorporated smaller, elsewhere, near there, but the move to the final location came shortly after public/official knowledge of where that data center would be built. Ain't that funny? :-) Edit: Got another one, but probably unrelated because of the timeframe, but interesting nonetheless. Very advanced and fast flash storage(for the time, and in some aspects still, like retention time and durability). https://en.wikipedia.org/wiki/Lehi,_Utah where one of IM-Flash's(Joint Venture of Intel & Micron) factories was/is located (sold to Texas Instruments, producing other stuff now). https://en.wikipedia.org/wiki/IM_Flash_Technologies https://en.wikipedia.org/wiki/3D_XPoint | |
| ▲ | jeffbee 4 days ago | parent | prev [-] | | Exactly. That is a toy-sized data center. It would fit in the janitor's closet of a real data center. | | |
| |
| ▲ | LargoLasskhyfv 3 days ago | parent | prev [-] | | Maybe just the metadata, of which phone-number calls which other when and where? Who messages whom by email, messenger, whatever, when and where? For the graph of communications over time, with interesting nodes appearing, showing emerging clusters around them, whose members then could be targeted by other means? |
|
|
| |
| ▲ | ginush 4 days ago | parent | prev [-] | | Yes, and this is the only feasible approach given the huge technical advances in communications over the past few decades. |
|
| |
| ▲ | lern_too_spel 2 days ago | parent [-] | | By access to FAANG, you mean they can issue court orders to surveil specific foreign accounts, right? Because that's what was in Snowden's docs. | | |
| ▲ | timschmidt a day ago | parent [-] | | "NSA Secretly Tapped Google, Yahoo Data Centers, Report Says" https://www.networkcomputing.com/data-center-networking/nsa-... "A striking feature of proceedings at the Foreign Intelligence Surveillance Court (FISC) is that the executive always wins. Between 1979 and 2012—the first thirty-three years of the FISC’s existence—federal agencies submitted 33,900 ex parte requests to the court. The judges denied eleven and granted the rest: a 99.97% rate of approval." https://www.stanfordlawreview.org/online/is-the-foreign-inte... "The newspaper reported that in "more than a dozen classified rulings, the nation's surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans"" https://en.wikipedia.org/wiki/United_States_Foreign_Intellig... So, by "court order" do you mean secret law and secret trials with a history of always deciding against those who are being surveilled? Because that's what was in Snowden's docs. | | |
| ▲ | lern_too_spel a day ago | parent [-] | | > "NSA Secretly Tapped Google, Yahoo Data Centers, Report Says" This was for extracting email envelope metadata to build a graph of who was contacting whom, a program that Snowden's leaks showed had already been shut down. > "A striking feature of proceedings at the Foreign Intelligence Surveillance Court (FISC) is that the executive always wins. Between 1979 and 2012—the first thirty-three years of the FISC’s existence—federal agencies submitted 33,900 ex parte requests to the court. The judges denied eleven and granted the rest: a 99.97% rate of approval." What do you think the approval rate for other court orders is? It's exactly the same. > "The newspaper reported that in "more than a dozen classified rulings, the nation's surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans" This reporting was at odds with what the leaked documents said and was later walked back. > So, by "court order" do you mean secret law and secret trials with a history of always deciding against those who are being surveilled? Because that's what was in Snowden's docs. That explicitly was not in Snowden's docs. The law is public, and warrants are almost always granted. In this case, as Snowden's docs said, the court orders are for foreigners, living outside the U.S. | | |
| ▲ | timschmidt a day ago | parent [-] | | > This was for extracting email envelope metadata to build a graph of who was contacting whom, a program that Snowden's leaks showed had already been shut down. "According to Victor Marchetti, a former special assistant to the deputy director of the Central Intelligence Agency (CIA), a limited hangout is "spy jargon for a favorite and frequently used gimmick of the clandestine professionals. When their veil of secrecy is shredded and they can no longer rely on a phony cover story to misinform the public, they resort to admitting—sometimes even volunteering—some of the truth while still managing to withhold the key and damaging facts in the case." https://en.wikipedia.org/wiki/Limited_hangout In fact, NSA's own slide deck, an excerpt of which can be viewed here: https://www.cnet.com/tech/services-and-software/fiber-optic-... indicate that all Google services including Gmail, Docs, Maps, and others were subject to interception. Additional NSA slides here: https://www.cnet.com/tech/tech-industry/new-slides-reveal-gr... detail email, chat, video, voice, photos, stored data, VoIP, file transfers, video conferencing, notifications, social networking details, and the ever ominous "Special Requests". > What do you think the approval rate for other court orders is? It's exactly the same. "Two wrongs make a right" is considered "one of the most common fallacies in Western philosophy". https://en.wikipedia.org/wiki/Two_wrongs_don%27t_make_a_righ... > This reporting was at odds with what the leaked documents said and was later walked back. The linked article: https://en.wikipedia.org/wiki/United_States_Foreign_Intellig... contains 96 references to reporting from 2004 to 2021 from a wide variety of sources. The word "retraction" does not appear once. Among the cited sources are many examples such as: A former federal judge who served on a secret court overseeing the National Security Agency's secret surveillance programs said Tuesday the panel is independent but flawed because only the government's side is represented effectively in its deliberations. "Anyone who has been a judge will tell you a judge needs to hear both sides of a case," said James Robertson, a former federal district judge based in Washington who served on the secret Foreign Intelligence Surveillance Act court for three years between 2002 and 2005. https://web.archive.org/web/20130711211028/https://abcnews.g... | | |
| ▲ | lern_too_spel a day ago | parent [-] | | > "According to Victor Marchetti, a former special assistant to the deputy director of the Central Intelligence Agency (CIA), a limited hangout is "spy jargon for a favorite and frequently used gimmick of the clandestine professionals. When their veil of secrecy is shredded and they can no longer rely on a phony cover story to misinform the public, they resort to admitting—sometimes even volunteering—some of the truth while still managing to withhold the key and damaging facts in the case." Then why didn't Snowden's doc show any illegal use of that data? Instead, he leaked many things that were perfectly legal as well as which high value targets were being surveilled in China in a transparent and failed attempt to get asylum in Hong Kong. > "Two wrongs make a right" is considered "one of the most common fallacies in Western philosophy". You are assuming it's wrong. Investigators aren't going to waste their time writing up court orders that aren't likely to be approved. Instead, we find that criminal defense attorneys rarely challenge the validity of warrants as issued but may challenge whether the warrant was followed. > "Anyone who has been a judge will tell you a judge needs to hear both sides of a case," said James Robertson, a former federal district judge based in Washington who served on the secret Foreign Intelligence Surveillance Act court for three years between 2002 and 2005. You're confusing multiple things here. You're confusing bulk metadata collection, which Robertson opposed, with individual surveillance warrants, which are always done without informing the person being surveilled. There was no opposing side to the bulk metadata collection, which was shut down. There was no record of mass domestic surveillance in Snowden's docs. | | |
| ▲ | timschmidt a day ago | parent [-] | | > There was no record of mass domestic surveillance in Snowden's docs. That's funny, because there's a full slide deck from NSA about it here: https://en.wikipedia.org/wiki/PRISM#The_slides Notably, all the glossy corporate logos pictured are of American companies with predominantly American users. Not foreign ones. "Its existence was leaked six years later by NSA contractor Edward Snowden" > Then why didn't Snowden's doc show any illegal use of that data? "Snowden's subsequent disclosures included statements that government agencies such as the United Kingdom's GCHQ also undertook mass interception and tracking of internet and communications data – described by Germany as "nightmarish" if true – allegations that the NSA engaged in "dangerous" and "criminal" activity by "hacking" civilian infrastructure networks in other countries such as "universities, hospitals, and private businesses", and alleged that compliance offered only very limited restrictive effect on mass data collection practices (including of Americans) since restrictions "are policy-based, not technically based, and can change at any time", adding that "Additionally, audits are cursory, incomplete, and easily fooled by fake justifications", with numerous self-granted exceptions, and that NSA policies encourage staff to assume the benefit of the doubt in cases of uncertainty." https://web.archive.org/web/20130626032506/http://news.yahoo... https://web.archive.org/web/20170103043118/https://www.thegu... https://web.archive.org/web/20170103043118/https://www.thegu... | | |
| ▲ | lern_too_spel a day ago | parent [-] | | > That's funny, because there's a full slide deck from NSA about it here: Did you look at the slides you linked to? They describe targeted surveillance on specific foreigners outside the U.S. > "Snowden's subsequent disclosures included statements that government agencies such as the United Kingdom's GCHQ also undertook mass interception and tracking of internet and communications data – described by Germany as "nightmarish" if true Not a U.S. domestic surveillance program. > allegations that the NSA engaged in "dangerous" and "criminal" activity by "hacking" civilian infrastructure networks in other countries such as "universities, hospitals, and private businesses", Not a U.S. domestic surveillance program. > and alleged that compliance offered only very limited restrictive effect on mass data collection practices (including of Americans) since restrictions "are policy-based, not technically based, and can change at any time", ... The single U.S. mass data collection program in Snowden's leaks was phone metadata collection. Use of any data collected by the government is policy-based. In this case, use was limited to finding associates of foreign targets, and the query interface was limited to that. If it had changed, that would have been breaking the law, but Snowden showed no evidence of that. One more time: that single possibly illegal U.S. program Snowden leaked was then shut down anyway. | | |
| ▲ | timschmidt a day ago | parent [-] | | > Did you look at the slides you linked to? Many times. They detail methods and partners used in mass surveillance on US soil involving US corporations and US routed internet backbone connections. No independently verifiable proof is provided that US persons are not targeted by this program. Instead we're gifted such lovely terms as LOVEINT: https://en.wikipedia.org/wiki/LOVEINT in which the NSA admits to warrant-less domestic spying for the most trivial of reasons. Further demonstrating a lack of appropriate controls or process around such capabilities. And testimony from "the agency official responsible for automating much of the NSA’s worldwide monitoring networks" indicating that mass surveillance infrastructure is used domestically: "After 9/11, they took one of the programs I had done, or the backend part of it, and started to use it to spy on everybody in this country. That was a program I created called Stellar Wind. That was seperate and compartmented from the regular activity which was ongoing because it was doing domestic spying. All the equipment was coming in, I knew something was happening but then when the contractors I had hired came and told me what they were doing, it was clear where all the hardware was going and what they were using it to do. It was simply a different input, instead of being foreign it was domestic." - William Binney https://www.youtube.com/watch?v=590cy1biewc > Not a U.S. domestic surveillance program. "However, in recent years, FVEY documents have shown that member agencies are intentionally spying on one another's private citizens and sharing the collected information with each other." https://en.wikipedia.org/wiki/Five_Eyes#Domestic_espionage_s... | | |
| ▲ | lern_too_spel a day ago | parent [-] | | > Many times. Clearly not. > They detail methods and partners used in mass surveillance on US soil involving US corporations and US routed internet backbone connections. PRISM is a data ingestion system whereby the NSA ingests data collected by the FBI Data Intercept Technology Unit that gets data from specific accounts under court order. The DITU is clearly labeled in the diagram on the slide showing how it works. The NSA has no integration with the companies at all. The "Internet backbone" has nothing to do with PRISM. > No independently verifiable proof is provided that US persons are not targeted by this program. If the FBI gives a section 702 court order to a company for an account that isn't for a foreigner outside the U.S., they are not going to comply. The FBI wouldn't even ask. The very idea that you think "verifiable proof" is needed shows you believed the ridiculous conspiracy theory that the NSA could directly fetch any account's data, which was supported by neither the law nor the leaked documents but only by Greenwald's fever dreams > Instead we're gifted such lovely terms as LOVEINT: https://en.wikipedia.org/wiki/LOVEINT in which the NSA admits to warrant-less domestic spying for the most trivial of reasons. Yet another document that you claim to have read but didn't. The cases where they were able to surveil the person they were stalking were foreigners outside the U.S. The domestic cases involved querying for associates using the metadata. Neither one is "domestic spying" and certainly don't show any evidence of domestic mass surveillance. > "However, in recent years, FVEY documents have shown that member agencies are intentionally spying on one another's private citizens and sharing the collected information with each other." Once again, if you bothered to read the source documents, you would find that this quote is not supported by the citations. The first citation shows that the U.S. The first is about how the U.S. is allowed to use UK phone numbers in its metadata collection for chaining analysis, not to share that data or analysis with the UK as the quote claims. The second is about how Australia is allowed to share data it collected outside the U.S. and the U.S. with the U.S. without first looking for and removing the data of Australians who happened to be abroad whose data was collected, not for the U.S. to spy on Australians as your quote claims. Lesson: If you see a claim that describes something that is clearly illegal, you should verify it before you repeat stuff that is very clearly nonsense and come off as a tin foil hat wearing conspiracy theorist. | | |
| ▲ | timschmidt a day ago | parent [-] | | Yes I am familiar with the official statements. They do not constitute "independently verifiable proof ... that US persons are not targeted by this program." and carry far less weight than the previously quoted and linked testimony which directly contradicts them when considered in context of the disclosures. The same folks you'd have us believe without question have lied repeatedly about these very programs: http://www.allgov.com/news/controversies/nsa-director-alexan... https://apnews.com/article/business-33a88feb083ea35515de3c73... Since the official statements aren't trustworthy, I'll accept independently verifiable (by a group like EFF) proof. I'd be a sillybilly to accept less. Should be pretty easy. NSA has EFF's contact information from that lawsuit ( https://en.wikipedia.org/wiki/Jewel_v._National_Security_Age... ) in which they destroyed evidence against a court order, and argued "state secrets" against every claim. You know, the one that explicitly avoided deciding the constitutionality of all this on procedural grounds. Totally trustworthy behavior. Everyone responds that way when asked to prove they're not mass surveilling Americans. | | |
| ▲ | lern_too_spel 19 hours ago | parent [-] | | > and carry far less weight than the previously quoted and linked testimony which directly contradicts them when considered in context of the disclosures Previously quoted testimony from someone who doesn't claim to have been there when it was implemented that does not match up with the documents that Snowden leaked? You would think that if there were something so blatantly illegal going on, that would be the first thing that Snowden leaked. Instead, there is not a whiff of corroborating evidence in Snowden's trove, and no oversight committee senator has asked for investigations based on Binney's mad ravings. > The same folks you'd have us believe without question have lied repeatedly about these very programs: So you would have us believe that Snowden's documents are lying too? The lies that were told weren't about what the programs did. Their statements were always consistent with the leaked documents and what the law allows. You are the one bringing up dark programs that go against the law and against all leaked evidence. > Since the official statements aren't trustworthy, I'll accept independently verifiable (by a group like EFF) proof. I'd be a sillybilly to accept less. The EFF doesn't claim anything like what you're claiming. The purpose of the Narus traffic analyzers in the Jewel case was revealed in Snowden's docs. Surprise, surprise. It turned out not to be mass domestic surveillance. | | |
| ▲ | timschmidt 19 hours ago | parent [-] | | > doesn't claim to have been there when it was implemented "After 9/11, they took one of the programs I had done, or the backend part of it, and started to use it to spy on everybody in this country. That was a program I created called Stellar Wind. That was seperate and compartmented from the regular activity which was ongoing because it was doing domestic spying. All the equipment was coming in, I knew something was happening but then when the contractors I had hired came and told me what they were doing, it was clear where all the hardware was going and what they were using it to do. It was simply a different input, instead of being foreign it was domestic." - William Binney https://www.youtube.com/watch?v=590cy1biewc > The EFF doesn't claim anything like what you're claiming. 2. This case challenges an illegal and unconstitutional program of dragnet
communications surveillance conducted by the National Security Agency (the “NSA”) and other
Defendants in concert with major telecommunications companies (“Defendants” is defined
collectively as the named defendants and the Doe defendants as set forth in paragraphs 25 through
38 below). 3. This program of dragnet surveillance (the “Program”), first authorized by Executive
Order of the President in October of 2001 (the “Program Order”) and first revealed to the public in
December of 2005, continues to this day. 4. Some aspects of the Program were publicly acknowledged by the President in
December 2005 and later described as the “terrorist surveillance program” (“TSP”). 5. The President and other executive officials have described theTSP’s activities, which
were conducted outside the procedures of the Foreign Intelligence Surveillance Act (“FISA”) and
without authorization by the Foreign Intelligence Surveillance Court (“FISC”), as narrowly targeting
for interception the international communications of persons linked to Al Qaeda. 6. The Attorney General and the Director of National Intelligence have since publicly
admitted that the TSP was only one particular aspect of the surveillance activities authorized by the
Program Order. 7. In addition to eavesdropping on or reading specific communications, Defendants
have indiscriminately intercepted the communications content and obtained the communications
records of millions of ordinary Americans as part of the Program authorized by the President. 8. The core component of the Program is Defendants’ nationwide network of
sophisticated communications surveillance devices, attached to the key facilities of
telecommunications companies such as AT&T that carry Americans’ Internet and telephone
communications. 9. Using this shadow network of surveillance devices, Defendants have acquired and
continue to acquire the content of a significant portion of the phone calls, emails, instant messages,
text messages, web communications and other communications, both international and domestic,
of practically every American who uses the phone system or the Internet, including Plaintiffs and
class members, in an unprecedented suspicionless general search through the nation’s
communications networks. 10. In addition to using surveillance devices to acquire the domestic and international
communications content of millions of ordinary Americans, Defendants have unlawfully solicited
and obtained from telecommunications companies such as AT&T the complete and ongoing
disclosure of the private telephone and Internet transactional records of those companies’ millions
of customers (including communications records pertaining to Plaintiffs and class members),
communications records indicating who the customers communicated with, when and for how long,
among other sensitive information. 11. This non-content transactional information is analyzed by computers in conjunction
with the vast quantity of communications content acquired by Defendants’ network of surveillance
devices, in order to select which communications are subjected to personal analysis by staff of the
NSA and other Defendants, in what has been described as a vast “data-mining” operation. 12. Plaintiffs and class members are ordinary Americans who are current or former
subscribers to AT&T’s telephone and/or Internet services. 13. Communications of Plaintiffs and class members have been and continue to be
illegally acquired by Defendants using surveillance devices attached to AT&T’s network, and
Defendants have illegally solicited and obtained from AT&T the continuing disclosure of private
communications records pertaining to Plaintiffs and class members. Plaintiffs’ communications or
activities have been and continue to be subject to electronic surveillance. 14. Plaintiffs are suing Defendants to enjoin their unlawful acquisition of the
communications and records of Plaintiffs and class members, to require the inventory and
destruction of those that have already been seized, and to obtain appropriate statutory, actual, and
punitive damages to deter future illegal surveillance. https://www.eff.org/files/filenode/jewel/jewel.complaint.pdf | | |
| ▲ | lern_too_spel 18 hours ago | parent [-] | | > All the equipment was coming in, I knew something was happening but then when the contractors I had hired came and told me what they were doing, it was clear where all the hardware was going In other words, he didn't know where it was going and speculated. No such program existed in Snowden's leaks, and no member of the SSCI or HPSCI believes Binney's wild hypothesis, or it would be the first thing they investigated. > [Old Jewel claims snipped] I very clearly stated the EFF doesn't (present tense) claim what you're claiming. The EFF saw the Narus analyzers in 641A and assumed the worst, which is in those old claims you pasted, and the judge said that the plaintiffs didn't have evidence to show that their data was collected, which would be the case if it were really mass domestic surveillance. Then Snowden's documents were released, conclusively showing the devices weren't used for domestic surveillance, which is why the EFF didn't bring that lawsuit again claiming standing. Snowden's docs proved they didn't have it. | | |
| ▲ | timschmidt 7 hours ago | parent [-] | | "After 9/11, they took one of the programs I had done, or the backend part of it, and started to use it to spy on everybody in this country. That was a program I created called Stellar Wind. That was seperate and compartmented from the regular activity which was ongoing because it was doing domestic spying. All the equipment was coming in, I knew something was happening but then when the contractors I had hired came and told me what they were doing, it was clear where all the hardware was going and what they were using it to do. It was simply a different input, instead of being foreign it was domestic." - William Binney https://www.youtube.com/watch?v=590cy1biewc Clear as day to me. Only reason to chop it up or not cite the source would be to misrepresent what he said. > I very clearly stated the EFF doesn't (present tense) claim what you're claiming. "In February 2015, Judge White dismissed the latest motion by the EFF, accepting the NSA's argument that the requirements placed upon the agency would engender the "impermissible disclosure of state secret information." White also held that the plaintiffs did not have standing to pursue their claims.[20] This procedural ruling allowed White to avoid addressing the constitutionality of the NSA's mass surveillance program.[21] Upon the disclosure of more information about the NSA's surveillance methods, the EFF filed another motion in May 2017 requesting that the agency disclose information about surveillance conducted against Carolyn Jewel and the other plaintiffs. Judge White granted this motion and ordered the government to hand over the information.[22][23] However, the NSA filed a motion in opposition to that order, claiming once again that the plaintiffs lacked the standing to sue. After further arguments, the District Court accepted this argument in April 2019.[24] The EFF appealed that ruling to the Ninth Circuit. In a memorandum opinion, that court ruled in favor of the NSA, once again on the matter of standing.[25] In June 2022, the EFF made a final request to the U.S. Supreme Court to take the case, but that court rejected the request and did not grant certiorari." https://en.wikipedia.org/wiki/Jewel_v._National_Security_Age... No retraction. A willingness to take it all the way to the supreme court. Procedurally dismissed without deciding any of the issues raised. Clear and present. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|