Berkeley CSUA MOTD:Entry 41561
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/23 [General] UID:1000 Activity:popular
5/23    

2006/1/27-28 [Politics/Domestic/911] UID:41561 Activity:high
1/26    Cringley on Wiretaps:
        http://www.pbs.org/cringely/pulpit/pulpit20060126.html
        \_ as usual, cringely provides more technical insight than
           probably any other journalist I read. so what do people think
           of this? while it assuages some of my concern about who is
           being tapped, and how egregious a disregard of the law it is,
           the basic issues still seems to be: why couldnt they jsut get
           the court orders? that is what I find troubling. the "we neednt
           be troubled by the law" mentality
           \_ cringely often gets details wrong or exhibits a general lack
              of clue, at least when he's writing about anything i know
              much about. this sort of makes me wonder how much to trust
              his details when he's writing about stuff i'm not that familiar
              with.
           \_ One of my profs who worked at justice said that most wiretaps
              were the pen register type. He told me that in most cases this
              type of "wiretap" could be done w/o a warrant. Usually the pen
              register info was the source of probable cause for a warrant.
           \_ The worst part about this concept is that it assumes a level
              of unsophistication from the terrorists. By now they should be
              tossing triple encrypted cyphers across the network on single
              use emails. It's an overreliance on tech vs. human resources.
              \_ uh, what, you use your emails multiple times?
                 \_ Sorry. Should be "email addresses".
              If there is anything I hate about the Bush admin it's their
              "don't worry your pretty little head about it, we know what's
              best" stance. Lotsa folks are okay with it, but it rubs me wrong.
              \_ Actually, I doubt that the terrorists would be using email.
                 More likely they will post a jpg or msg on a public anon
                 site at a specific time w/ specific content w/ the msg
                 embedded in the image or msg (the content itself could be
                 format of the msg or the subject matter of the image).
                 What the gov. is likely doing is correlating postings w/
                 specifically timed narrow searches to determine where the
                 terrorists are.
                 BTW, explain to me how 1 use email system would work. Would
                 you have a list of emails to use/check? What happens if one
                 end is caught and the list is revealed?
        \_ This is funny, I came to the same conclusion entirely on my own.
2025/05/23 [General] UID:1000 Activity:popular
5/23    

You may also be interested in these entries...
2012/5/9-6/4 [Politics/Domestic/911] UID:54384 Activity:nil
5/9     If U.S. doesn't do assissination, then what do you call
        Operation Neptune Spear aka "Mission Kill Bin Laden"?
        \_ I think theoretically the difference is that the goal of one is
           "kill him/her", while the goal of the other is "capture him/her,
           and don't hestitate to shoot with the possibly of killing if he/she
           and don't hesitate to shoot with the possibly of killing if he/she
	...
2009/12/5-26 [Politics/Domestic/911, Recreation/Humor] UID:53568 Activity:nil
12/4    you know the 1999 ending of ST:DS9 shows the protagonists working
        as terrorists, and all worried about a police state coming for the
        federation.  Funny timing, no?
        \_ At that point in time there was a bit of sympathy people were
           starting to extend to "freedom fighters"; vis a vis all the
           popular support many pro-palestine movements were going on -
	...
2009/8/12-9/1 [Politics/Domestic/California/Arnold, Politics/Domestic/California/Prop] UID:53268 Activity:moderate
8/12    Thanks for destroying the world's finest public University!
        http://tinyurl.com/kr92ob (The Economist)
        \_ Why not raise tuition? At private universities, students generate
           revenue. Students should not be seen as an expense. UC has
           been a tremendous bargain for most of its existence. It's time
           to raise tuition to match the perceived quality of the
	...
2009/5/18-26 [Politics/Foreign/MiddleEast/Iraq] UID:53007 Activity:kinda low
5/18    how come we interfere with Bosnia civil war, yet we don't even
        bother to raise complains about Sri Lankans' genocide toward
        their Tamili minorities?
        \_ it's a protest against recording artist M.I.A.
        \_ because our military capacity is overtaxed based on our
           insane implementation of PNAC's ridiculous vision of a
	...
2009/4/6-13 [Politics/Domestic/911] UID:52809 Activity:low
4/6     The Cybersecurity Act of 2009 gives the president the ability to
        "declare a cybersecurity emergency" and shut down or limit Internet
        traffic in any "critical" information network "in the interest of
        national security." The bill does not define a critical information
        network or a cybersecurity emergency. That definition would be left to
        the president.
	...
2009/2/5-10 [Politics/Foreign/Europe, Politics/Foreign/Asia/China] UID:52523 Activity:nil
2/5     Funny, the country that started WW 1 and 2, and killed millions
        are viewed as the most favoriable.
        http://news.bbc.co.uk/2/hi/americas/7873050.stm
        \_ They haven't killed as many Vietcongs, Korean commies, and
           Super EVIL Terrorists as America for the past 50 years.
           \_ Vietcong is already plural. You wouldn't say Chineses. --tt
	...
2009/1/9-13 [Politics/Foreign/MiddleEast/Israel] UID:52346 Activity:high
1/9     What You Don't Know About Gaza:
        http://www.nytimes.com/2009/01/08/opinion/08khalidi.html?em
        \_ "As the occupying power, Israel has the responsibility under the
            Fourth Geneva Convention to see to the welfare of the civilian
            population of the Gaza Strip."
           Rubbish. Hamas, as the elected government, is responsible for the
	...
2008/11/17 [Politics/Domestic/Election] UID:52015 Activity:high
11/17   How Obama got elected
        http://www.youtube.com/watch?v=mm1KOBMg1Y8
        \_ I'm not sure what asking people what they think of 150k for
           clothes, barney frank (here's a hint, HE IS GAY!!!! LULZ!!!!!)
           and harry reid accomplishes.
           You know why Obama won?  He's a good speaker, he has a good
	...
2008/10/24-28 [Politics/Domestic/Abortion, Politics/Domestic/Election] UID:51669 Activity:nil
10/24   Palin: "I don't know" if abortion clinic bombers are terrorists
        http://www.msnbc.msn.com/id/27343688
        http://www.youtube.com/watch?v=2hu1NeI4M1k
        \_ I am so pro Abortion.  Abortions for all!
           \_ Miniature american flags for others...
        \_ Bombing for Jesus! Talk about moral relativism!
	...
2008/10/8-9 [Politics/Domestic/Election] UID:51440 Activity:nil
10/8    Which candidate pals around with terrorists?
        http://preview.tinyurl.com/4zeonz
        \_ Wait, they're recycling this?  Wow, salon sure has dropped in
           quality.
           \_ Dittohead Desperation Level: Chartruse
            \_ With faint hints of perrywinkle.
	...
Cache (5975 bytes)
www.pbs.org/cringely/pulpit/pulpit20060126.html
i, cringely search cringely go The Frog The original Cringely frog mascot, circa 1998. January 26, 2006 The Falafel Connection All Those NSA Wiretaps Are Just a Friendster in Disguise By Robert X Cringely We'll get back to wiretapping in a moment, but first there's the obvious story this week of Disney buying Pixar, which nobody but me seems to think is about estate planning for Steve Jobs. That kind of holding is very difficult to sell on the open market. Remember this is someone who less than two years ago had a form of pancreatic cancer that has only a 50 percent five-year survival rate. I'm not saying Jobs is going to die, but I AM saying that he is in a position where he has to think about these things and his financial position at Pixar was untenable for his family, and left him too exposed if Cars turns out to be a lemon. So the sale to Disney gives Jobs a smaller piece of a bigger pie and therefore much easier liquidity. But it also gives him the chance to nag Disney into the 21st century, as I am sure he will. Strong minority shareholders tend to clash with management (look at Ross Perot with General Motors and Ted Turner with Time-Warner), and Jobs will do the same with Disney. He'll push to end Disney's partnership with Microsoft, to bring Disney into the Apple-Intel alliance, and potentially try for some partnership with Sony, too. It's the start of a grand amalgamation based around a combination of content, technology, and networking, and I wouldn't at all be surprised to see it end as a single huge company five years from now with Jobs at the helm. Just as Gil Amelio should have at Apple, Robert Iger from Disney had better be looking over his shoulder. After last week's column, a number of readers wrote to explain that the National Security Agency's problem with complying with the Foreign Intelligence Surveillance Act (FISA) had to do with the sheer volume of wiretaps involved, which they guessed numbers in the millions or billions. Evidently, these worried readers think, the NSA has been long listening-in to ALL of our calls, and thought that might not go down well with the secret court that issues FISA warrants. The NSA has a very advanced program called Echelon for monitoring radio communication around the world, and probably intercepts a lot of phone calls that way, but for FISA-type wiretaps they tend to use the same outsourcing firms the phone companies use, and these generally tiny outfits can only handle a few thousand taps per year each. By the way, if you are wondering whether YOUR phone could be easily tapped, just check to see if your phone company offers three-way dialing, because that's the feature we're talking about. And if you are wondering whether VoIP service can't be tapped, the answer is both yes and no. For the moment, SIP services like Skype can't be tapped but that will change soon. And if you are a Vonage or Packet8 user, well they already have your number. Here's what is most likely going on with the NSA and FISA from a guy who used to work for the NSA: "What I think is going on here is that they're using social network analysis. They get some numbers or endpoints of interest, and start out with classical traffic analysis, which can all be done (as I think you pointed out) with pen registers or their moral equivalent. They look for other numbers, and follow the graph of connections by transitivity. "It's well known that any graph of associations in the real world tends to generate cliques, and that the clique size for a social group of any sort tends to actually be fairly small. "I would guess that the SNA is used to identify people of interest -- although there would be some false positives, like if they all rented apartments from the same rental management firm, or all ordered from the same we-deliver falafel place. But someone who shows up in the transitive network of a lot of calls from overseas, and is also a high edge-count in the SNA graph, is definitely someone to be interested in. I wouldn't be at all surprised if that's when they apply for a FISA warrant and start actually intercepting." So what we have the NSA doing is probably data mining, calling records in order to identify the people they want to order intercepts on. They are doing it without warrants because they like being sneaky, don't think they could get past the FISA court a warrant for 100 million calling records, and because the FISA law from 1978 probably doesn't distinguish between a pen-trap and an intercept. If that's really the case, this doesn't sound quite as bad as we've feared. I feel better thinking that they are culling calling records rather than listening-in to my conversations. And it makes a lot more sense, from a pure technical capability standpoint. Why couldn't they have simply amended the FISA law to take such activities into account? Because they like to be sneaky, tend to distrust even the people who pay them (that's us), and because they for some reason think that the bad guys won't figure this out for themselves. This is far from the first instance of such unartful phone tapping, as my friend Mike Class reports from Chicago. Though I didn't know it until we'd been e-mailing back and forth for years, Mike is the Socius to the Provincial -- effectively the number two Jesuit in the Windy City: "Here's one more tidbit on wire-taps: They get you free phone service! The feds tapped the phone of the Sisters of Mercy in Washington DC because of some anti-war stance or something they took in the 1980s. The good sisters noticed some kind of clicking on the phone at times, and finally decided that someone must have tapped into their phone. Their solution: Don't pay the bill so the phone company will have to shut off the phone. The phone never went dead, and they quit sending them bills! The Feds wouldn't let Ma Bell shut them down, and probably began paying the bills. The sisters talked long and free with their friends across the country!"