{"id":70,"date":"2013-06-20T06:48:52","date_gmt":"2013-06-20T11:48:52","guid":{"rendered":"http:\/\/www.casualnotice.com\/?p=70"},"modified":"2013-06-20T11:27:26","modified_gmt":"2013-06-20T16:27:26","slug":"heresy-by-thought-part-2","status":"publish","type":"post","link":"https:\/\/www.casualnotice.com\/?p=70","title":{"rendered":"Heresy by Thought (part 2)"},"content":{"rendered":"<p>Of course everyone with a working concept of the enormity of the data involved in Project PRISM and the cell phone record grab is surprised that anyone would even want to do it.\u00a0 It would be more productive to buy a million monkeys and throw them in a room with a million typewriters to see if one can come up with a working script for <em>Hamlet II:\u00a0 the Revenge <\/em>than it would be to hire and maintain the staff necessary to trawl through the reams and\u00a0reams of minutiae generated by the Modern American Desperate Need for Contact (cheaper, too).<\/p>\n<p>Yes, I know that much of the grunt work is done by crawlers similar to webspiders that look for key words and country codes before passing them on to a human (or a more advanced program), but even with flag catchers, the resultant mountain of data has to be tremendous.\u00a0 Those crawlers don&#8217;t have discretion, so they can&#8217;t tell the difference between a Hezbollah operative contacting his handler in Tehran and a Persian immigrant calling his mother (assuming she&#8217;s allowed contact with an American phone number) any more than\u00a0your IT department&#8217;s traffic managing software\u00a0can tell the difference between your websearch for &#8220;kilts&#8221; because you promised a friend you&#8217;d dress up for the local Renn Fest and\u00a0Frank from Accounting&#8217;s\u00a0search for Catholic School Girl porn.<\/p>\n<p>The thing is, the point of data mining is not to acquire working evidence of any kind.\u00a0 The point is to justify other questionable methods of obtaining &#8220;evidence&#8221; after the fact.\u00a0 The Director of the CIA cited (actually, he only cited four, but he referenced) fifty separate potential incidents forestalled by the sweeping invasion-of-privacy programs.\u00a0 The Director of the NSA (notably, an Army General who was not asked to resign his commission before accepting a high-ranking seat in the civilian government) was less optimistic, say &#8220;at least ten&#8221; and &#8220;dozens&#8221; alternately during interviews and public appearances.<\/p>\n<p>But here&#8217;s the thing, of the four incidents he cited, he only gave details on two and even those details were sketchy and didn&#8217;t show evidence that supported his claim.\u00a0 The most noted one, a &#8220;planned attack on Wall Street that could have been as bad as 9\/11&#8221; resulted in a few arrests and one guilty plea, all for money laundering.\u00a0 The principal in this case, a naturalized citizen living in Kansas, had been funneling money to a Yemeni organization that General Alexander claimed was connected to Al &#8216;Qaeda.\u00a0 He didn&#8217;t name the organization, nor did he show any evidence that they had made any notable moves toward their alleged plan of bombing Wall Street.\u00a0 He simply said that the fact the accused parties were convicted by\u00a0a jury shows that they must have been serious.\u00a0 Except the accused parties were all convicted of monetary crimes under RiCO, not any sort of Terrorist activity.<\/p>\n<p>In any case, you catch the movement of money by tracking international bank transfers (this is a legal activity done every day by the Federal\u00a0Reserve, since \u00a0the full faith and trust of the US Treasury is put to the test every time US currency leaves the country in any way), not by tracking phone conversations.\u00a0 It&#8217;s far more likely that they used the data mining to compile ex post facto evidence for a jury to consider so they wouldn&#8217;t have to admit that they had been hacking into privacy-assured banking systems in other countries.<\/p>\n<p>The only other way to make efficient use of data mining is to use it to get a back-dated warrant for something you&#8217;ve already done.\u00a0 A wire-tap, say, or a tracking worm.\u00a0 Of course, the FISA courts were set up in the &#8217;80&#8217;s to check all that stuff an make sure it&#8217;s all on the up and up, right.\u00a0 I mean, if you can&#8217;t trust a secret court with no appeal or public regulation, who can you trust?\u00a0 Father Gustavo can&#8217;t use squassation as a means of getting your confession and a list of fellow heretics unless the Grand Inquisitor says it&#8217;s okay, right?<\/p>\n<p>But then, if you&#8217;ve done nothing\u00a0wrong, you don&#8217;t have anything to fear, do you?\u00a0 It&#8217;s not like making a donation to a foreign aid charity can be turned to look like anything bad.\u00a0 You know, unless that charity is located in Somalia, or, well anywhere with a foreign-sounding name.\u00a0 But it&#8217;ll probably be all right.\u00a0 Nobody really cares about the web research you&#8217;ve been doing for your planned vacation to Uruguay.<\/p>\n<p>You do realize that Uruguay has no extradition treaty with the United States don&#8217;t you?\u00a0 Why would you plan a &#8220;vacation&#8221; in a country with no extradition treaty?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of course everyone with a working concept of the enormity of the data involved in Project PRISM and the cell phone record grab is surprised that anyone would even want to do it.\u00a0 It would be more productive to buy a million monkeys and throw them in a room with a million typewriters to see [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,2],"tags":[],"class_list":["post-70","post","type-post","status-publish","format-standard","hentry","category-media","category-politics"],"_links":{"self":[{"href":"https:\/\/www.casualnotice.com\/index.php?rest_route=\/wp\/v2\/posts\/70","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.casualnotice.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.casualnotice.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.casualnotice.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.casualnotice.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=70"}],"version-history":[{"count":4,"href":"https:\/\/www.casualnotice.com\/index.php?rest_route=\/wp\/v2\/posts\/70\/revisions"}],"predecessor-version":[{"id":74,"href":"https:\/\/www.casualnotice.com\/index.php?rest_route=\/wp\/v2\/posts\/70\/revisions\/74"}],"wp:attachment":[{"href":"https:\/\/www.casualnotice.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=70"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.casualnotice.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=70"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.casualnotice.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}