Federal Subpoena Seeks Names – and Lots More – of Web Posters
June 9th, 2009THE FEDS ALREADY HAVE THE DATA. Spend a few hours going through my Surveillance archive if you doubt it. Read about the Narus Intercept Suite, the Mark Klein-AT&T-NSA case and MAIN CORE.
This is a little over two years old, but it describes the “full pipe” surveillance that federal law enforcement is doing: FBI turns to broad new wiretap method:
The FBI appears to have adopted an invasive Internet surveillance technique that collects far more data on innocent Americans than previously has been disclosed.
Instead of recording only what a particular suspect is doing, agents conducting investigations appear to be assembling the activities of thousands of Internet users at a time into massive databases, according to current and former officials. That database can subsequently be queried for names, e-mail addresses or keywords.
Such a technique is broader and potentially more intrusive than the FBI’s Carnivore surveillance system, later renamed DCS1000. It raises concerns similar to those stirred by widespread Internet monitoring that the National Security Agency is said to have done, according to documents that have surfaced in one federal lawsuit, and may stretch the bounds of what’s legally permissible.
Call it the vacuum-cleaner approach. It’s employed when police have obtained a court order and an Internet service provider can’t “isolate the particular person or IP address” because of technical constraints, says Paul Ohm, a former trial attorney at the Justice Department’s Computer Crime and Intellectual Property Section. (An Internet Protocol address is a series of digits that can identify an individual computer.)
That kind of full-pipe surveillance can record all Internet traffic, including Web browsing–or, optionally, only certain subsets such as all e-mail messages flowing through the network. Interception typically takes place inside an Internet provider’s network at the junction point of a router or network switch.
Intelligence agencies have point and click access to this information. Don’t doubt it for even one second. Yet, the story below maintains the appearance that the information isn’t available.
Is the subpoena just meant to send a chilling effect down the pipe while the feds are actually already in possession of the information they’re requesting? Or do they really not have it?
The above ramble is just hair splitting at this stage of the game. In any event, if you thought that maniac fascism wasn’t already in force and this doesn’t rattle your chicklets, you might as well start digging your own hole.
Via: Las Vegas Review Journal.
Research Credit: ltcolonelnemo
Hello Fellow Brothers of Intellect, How are you this fine spring evening? Here in the northern hemisphere its 21-9= 12 days to the Summer Solstice.
Those words are harmless. AS a string, probably not something that would be picked up on a word string search.
But post words that start with a t and end with an x; or start with a g and end with an n; these are the WORDS in the search. Among many others ad naseum.
Don’t think we can’t post what we think any more. Just BELIEVE in the power of your WORD USAGE. Just think what someone looking for words – for lack of better a better description, uh, the language of fraternity antics- would be searching for in their string search. Have to learn to speak in 4 letter words that start with
C and end in E.
If you “get” this message GREAT.
I have not learned to text message nor do I want to. But avoid certain words. If you will.
HAVE A NICE DAY.
Several points:
1. There is a distinction between having the data for intelligence purposes and having the data for evidentiary purposes. Does it really matter if the police gather intelligence but then a court rules that it cannot be used to convict someone of something? They still use it for intelligence purposes, which range from surveillance to various forms of life disruption, ranging from nuisance to outright murder. The police don’t really care about indicting every last dissident; they care mainly about thwarting dissidents with as little effort as possible. The indictments are a show for the public to make it look like that is what the bulk of the resources are placed. In reality, they spend more of their time spying, targeting, and subtly interfering with various activist groups.
Therefore, people should be more concerned about data being gathered for the purposes of interfering with people’s lives, than with regard to arrests. Arrests draw negative publicity and create martyrs. Better to sabotage discreetly than initiate a public beat-down. People might start retaliating, but if everything is in the shadows, there is plausible deniability.
That being said, I think the strongest weapon is to banish fear. Don’t be intimidated. Keep posting. Do what you’re going to do. Remember, you only live once and living a life of meekness could just as easily lead to the slaughterhouse as a life of angry muck-raking.