20 Jun


Category:Events, Privacy, Security

Credibility… It’s the only currency that means anything on this kind of playing field. Dean’s got the tape, and he’s gonna come out with it. And when he does, I want his credibility. I want people to know he’s lying before they hear what he says.

That’s a quote from the 1998 movie ‘Enemy of the State’, spoken by NSA man ‘Thomas Reynolds’, played by Jon Voight. To miss the parallels between this movie and what is happening to Edward Snowden, Bradley Manning and others, would be foolish! Foolish I say.

Is the general public so blind as to get completely sidetracked from the real issues by the media and the government throwing us crap about how Snowden never graduated from high-school, or how his girlfriend is a pole-dancer? Or how Manning is a homosexual or whatever? What does that have to do with.. well anything? Credibility. If you break the character, anything he or she says will be interpreted in that broken light. Surely anything that stinking homo-sexual says can’t be taken seriously! (/sarcasm, in case it wasn’t clear enough).

On the note of credibility, this week saw former vice president of the United States Dick Cheney call Edward Snowden a ‘traitor’ and possibly a spy for china. That’s rich! Coming from a man who lied to an entire nation about the reasons to go to war in Iraq. How come he has credibility enough to spew crap like that? Well for one, he’s a politician. He’s wealthy. He has a name for himself. Snowden on the other hand is a nobody, and therefore easier to break.

This week we also had the Director of the NSA, General Keith Alexander testifying in front of the House Intelligence Committee (part of the US Congress as I understand). The gist of the thing was denial, of course, but behind it all, I (and others) sense a play on words and semantics. Gen. Alexander is denying that the NSA is actually actively looking at the data. Quote:

“It’s a very deliberate process,” Alexander said. “We don’t get to look at the data. We don’t get to swim through the data.”

This has been repeated multiple times, worded differently.. This doesn’t say the NSA doesn’t collected the data. It says they don’t actively look at the data. They are separating collection from examination. The key issue is that you can’t look at data that you never collected. Once you have that data, it’s easier to go back and say “Ok, let’s see what we have”. This is the same as with many other issues, some of which I have discussed on this blog in the past (such as the Finnish national fingerprint database for passport holders).

Other comments of note are:

“I think what we’re doing to protect American citizens here is the right thing,” he said. “We aren’t trying to hide it. We’re trying to protect America.”

Ding ding ding. Protect America. After that we can just do whatever the hell. And you’re not trying to hide it? That’s probably why the program (and I’m sure) many other such programs are classified, and legal permissions to do this are decided in a secret court. Actually, it’s called the Foreign Intelligence Surveillance Court, which is apparently the place where they rubber stamp approvals for NSA surveilance. Rubber stamping you say? Doesn’t the court actually review the warrants before accepting them? They may. We don’t know. Because it’s like, classified. This list here, by the EPIC (eletronic privacy information center) tells a story. Observe closely the columns “Applications Presented” and “Applications approved”.

Another play on words happens during the hearing when some questions presented to Gen. Alexander, namely “Is the NSA on private companies servers as defined under these two programs?”, “Does the NSA have the ability to listen to Americans phone calls or read their emails under these two programs?”, and “Does the NSA have the ability to flip a switch by some analyst to listen to Americans phone calls or read their emails?”. These questions were asked by the chairman of the Intelligence Committee. The answers to all three questions were “No”. But not just a simple no, the answers were, “The NSA does not have the authority to do so.” The question was whether the NSA has the ability or not. The answer was about the authority to do so. Also note the phrasing of the first question: Is the NSA on company servers? I could think of a number of ways that they could look at the data without being “on their servers”. He’s most certainly being truthful. If that was a real hearing, say in a court of law, there would have been a follow-up question to General Alexander, something like: “Sir, please answer the question as asked?”. The answer to the question of whether the NSA has the ability, is most probably yes. Is this the whole “We are not trying to hide it”-part? The two programs mentioned in the question are ‘215’ and ‘702’, the former being the “Verizon-wiretapping“-thing, and the latter being Prism.

That whole Verizon thing is curious, too. It seems to do exactly the opposite of what Gen. Alexander said. Except there was another play on words. “Can they listen to phone calls” -“No”. Okay, let’s pretend for a moment that’s the case. The Verizon wiretapping was about the meta-data of the phone calls, not the audio of the call itself. I would argue the meta-data can be even more harmful, because it tells you locations of potentially both parties, it tells you information on the handset etc. I would venture that once you know the cell-site your target is in, the discussions could then be captured using any number means (other than wiretapping, which I do not believe for a second they aren’t doing), like your standard parabolic microphone, HUMINT resources, boots on the ground, you know that sort of thing? Like somebody said (it’s too late in the night (2:12) for me to dig up the source for this one, sorry), “In order to find a needle in a haystack, you first need to have a haystack.”

But according to General Alexander, these programs have prevented “50+” terrorist attacks. Which attacks? Oh well. Attacks. Just general attacks. Around. Two of the planned attacks were mentioned (the plans to attack the New York subway, and the financial district). That leaves “48+” attacks. Where is the transparency? What is the damage in telling the public exactly which terror attacks, by which terrorists, in which countries? What can the terrorists gain by knowing which terroris attacks were prevented by US Surveilance programs? I’m pretty sure it’s not a secret that the US conducts foreign and domestic surveilance. I think there was the comment that “talking about the specifics of the cases would reveal details about the surveilance programs, which would help terrorists circumvent the surveilance”. If I was an American, I would have some questions for my elected officials.

Ok before I’m completely wrapped in tinfoil, let me conclude this post by saying: There’s credibility, and then there is credibility. When you reach a certain position, you can do or say whatever you want.

Leave a Reply

Your email address will not be published. Required fields are marked *