![]() |
![]() |
#16 | ||
Franklin Pierce
Join Date: Oct 2006
Location: Minnesota
Posts: 3,695
|
Quote:
Regarding the argument, it hold just as much weight as your argument as well. Quote:
__________________
I like my perspectives like I like my baseball caps: one size fits all. |
||
![]() |
![]() |
![]() |
#17 |
still says videotape
Join Date: Feb 2001
Posts: 26,813
|
I can't tell you what privacy means in the electronic age. I do know that I choose to share on the cellar but I don't name a lot of names and am vague when I feel its warranted. My company forces me to use gmail so I keep that account pretty sterile. I don't fazebook but I have an unused lunkedin account with minimal info and few connections... The English version of privacy has government cameras rolling the Merican has private cameras rolling... Corporations spend a lot on collecting data to sell or to sell us stuff. The same data that sells me a subscription to Mother Earth News could put me on a nutter survivalist watch list. If we look at the drug war folks are killed by their government by accident all the time so what would make the WOT any different? I ask because I don't know. The fascination with secrecy displayed by our government is interesting, individuals have no expectation of privacy but the government that serves us has become extremely opaque.
__________________
If you would only recognize that life is hard, things would be so much easier for you. - Louis D. Brandeis |
![]() |
![]() |
![]() |
#18 |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
@PH45: Yes, we are in agreement
... my example was intended to be trivial and carries no weight. The problems are that with secrecy and "not on my watch", we (the public) will only know what we are told and/or what is leaked by insiders-with-their-own-motives and whistle blowers. |
![]() |
![]() |
![]() |
#19 | ||
Franklin Pierce
Join Date: Oct 2006
Location: Minnesota
Posts: 3,695
|
Quote:
I am pretty agnostic on the current practices but I do think this is a true slippery slope. Here is a good perspective on this slippery slope (I’m emphasizing certain parts): Quote:
__________________
I like my perspectives like I like my baseball caps: one size fits all. |
||
![]() |
![]() |
![]() |
#20 |
Radical Centrist
Join Date: Jan 2001
Location: Cottage of Prussia
Posts: 31,423
|
|
![]() |
![]() |
![]() |
#21 | |
UNDER CONDITIONAL MITIGATION
Join Date: Mar 2004
Location: Austin, TX
Posts: 20,012
|
Quote:
|
|
![]() |
![]() |
![]() |
#22 |
I love it when a plan comes together.
Join Date: Oct 2009
Posts: 9,793
|
Americans typically think that of part of their right to privacy is the government not being able to obtain their private communications without justification. That's not the way the government has seen it at least since I qualified as a bona fide US intelligence operative* in military service a quarter century ago. The government makes a distinction between information (raw data) and intelligence (data processed into a useful form). Government does not consider the gathering and accumulation of information to be a violation of the right to privacy because the data accumulation is not yet in the useful form of an intelligence collection that can be used to the detriment of citizens. An intelligence collection without proper authorization has been what constituted violation of privacy rights.
It's the citizens' responsibility to either exchange their private information in a way that can't be accessed by the government; or, via a third party willing render it unsalvageable. It is the government's responsibility to secure its caches of information from misuse. The first level of protection was classifying the information. That way most people wouldn't even know there's something to look for let alone try to exploit. That first level of security is gone. I don't object to the premise of caching bulk information that can be sifted through later, under a well defined warrant, and processed into intelligence in the pursuit of national security. I don't object to continuing the practice since I know there are remaining levels of security progressively more difficult to breach. I do object to any unauthorized individual deciding for everyone else that subverting a security measure implemented to protect them is what's best for them. The Bradley Manning treatment would be appropriate. *A condition of which is that federal law restricts my information gathering activities on US citizens for the rest of my life, not just for while I was in federal service. |
![]() |
![]() |
![]() |
#23 | |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
Quote:
"Pentagon Papers" would be well known to you, and since then you would have recognized the impact the events had on governmental policy. In my opinion, the publication brought about the end of the war in Viet Nam, demonstrating that an altruistic insider, such as Daniel Ellesberg, can make better decisions than those technically assigned to carry out governmental intentions. Ellsberg was wrong legally, but it made little difference, and that's the problem with trying to distinguish differences between "data gathering" and "intelligence accumulation". |
|
![]() |
![]() |
![]() |
#24 |
I love it when a plan comes together.
Join Date: Oct 2009
Posts: 9,793
|
I not sure about you Lamp. You put "data gathering" and "intelligence accumulation" in quotes. I talked about information (raw data) gathering and accumulation, the processing of information into an intelligence collection, and how government views the relation of information gathering to privacy differently from the relation of an intelligence collection to privacy. Where you got "intelligence accumulation" from I don't know.
Think of it this way: A guy regularly "gathers" loose "change" from his pockets and puts it in a jar where it becomes an "accumulation." He does this in anticipation of someday starting a "coin" "collection." Right now, he doesn't know if the "change" will be useful or not. When the time comes, he decides to collect just quarters. He takes only the quarters from the jar and organizes them by date and mintmark into a "coin collection". So far this scenario has been analogous to the difference between an information accumulation and an intelligence collection. The term you put in quotes, "intelligence accumulation", would in this analogy equate to something like an accumulation of coin collections! That's something a coin dealer might have; but, nobody would refer to it as that. They'd just call it inventory and it wouldn't really be a part of the story. I hope this helped. The contention that "an altruistic insider, such as Daniel Ell[e]sberg, can make better decisions than those technically assigned to carry out governmental intentions" is widely seen as bass ackwards. The career government workers in that field, the ones who stay regardless of which politicians are in power, are generally the good stewards of government. They know that for every altruistic Daniel Ellsberg, there are a thousand subversives, mercenaries, and attention whores who will give up classified information while claiming to be altruistic and collectively do more harm than all the genuine Ellsbergs can ever offset. They don't do what he did because they don't want to be part of making it more acceptable. There are better ways to deal with situations than betraying a trust. If you had said that an altruistic insider, such as Daniel Ellsberg, can make better decisions than those elected to form governmental intentions ... I would have agreed with you; but, still not with his methods. In any case, you seem to have created a fusion of two different topics when you said: "Ellsberg was wrong legally, but it made little difference, and that's the problem with trying to distinguish differences between "data gathering" and "intelligence accumulation"." The Ellsberg controversy was over his divulgence of government classified information and the government's classifying of information, not about the government gathering information, processing it into intelligence; or, the relation of these activities to privacy rights. But how nice you're of the opinion the Pentagon Papers brought about the end of the war in Viet Nam. If we had won the war, that opinion might have been worth something. |
![]() |
![]() |
![]() |
#25 |
Radical Centrist
Join Date: Jan 2001
Location: Cottage of Prussia
Posts: 31,423
|
TechCrunch: Tech Giants Built Segregated Systems For NSA Instead Of Firehoses To Protect Innocent Users From PRISM
Who's got your back? Google and Facebook |
![]() |
![]() |
![]() |
#26 | ||
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
@Sexabon: Such an attempt distinguish between "gathering" and "accumulation"
is akin to something Humpty Dumpty might have said to Alice. Your lead paragraph essentially uses the words interchangeably Quote:
Your analogy of a "coin collection" is essentially misleading for PRISM, because each individual coin is not "linked" to any other individual coin. The properties of any one coin does not lead to the discovery of any other specific coin in the collection. If we are to carry on a discussion of what we think we know of PRISM, let us focus on "data" and "intelligence", because I think they come closer to your attempt to distinguish between the constitutional and unconstitutional activity of our government. But first my assumption: The government is obtaining raw data from service providers and storing it in some logical format. We (you and I) don't yet know if this format is file cabinets of paper, databases of virtual data, or a Sheldon Cooper who simply remembers everything. But I strongly doubt it is anything other than a database, and I also doubt such database is just a non-sequential data dump of phone numbers, dates and durations. Instead, I suspect it is more likely to be a relational database, organized by caller-ID, recipient-ID, which are in turn linked via date/time with their durations and maybe even other kinds of data. If my suspicions are correct, this meets your definition of "intelligence", because it is the processing of raw data into a useful form. Quote:
just combining raw data from multiple providers across phone ID's would constitute your definition of an unconstitutional collection. And yes, this may be "legal" via the FISA court, but now we are back to talking about altruistic leaks of classified information and whistle blowers. |
||
![]() |
![]() |
![]() |
#27 | ||||
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
Quote:
was referring to in the YouTube video posted above. .. not just PRISM, as we are hearing about it now, but it's correlation with other virtual data of businesses, etc. NY Times Quote:
That would be 2.5 x 10^21 bytes (letters or characters) That would be 2,500,000,000,000,000,000,000 Quote:
Quote:
|
||||
![]() |
![]() |
![]() |
#28 |
I love it when a plan comes together.
Join Date: Oct 2009
Posts: 9,793
|
Lamp, I can better see where your coming from; but, you still have some gross misconceptions. I never tried to distinguish between "gathering" and "accumulation." I used "gathering" as a verb and "accumulation" as a noun both in regard to information (raw data). The distinction I made, in both actual and analogous form, was between "accumulation" and "collection" as nouns in which accumulation applies to information [loose change] and collection applies to intelligence [coin collection]. I can't break in down much further that; but, I can notice the ease with which you've previously misquoted me and misrepresent what I've said. That's why I don't interact with you much.
Don't worry that "Your analogy of a "coin collection" is essentially misleading for PRISM,". It wasn't leading to PRISM, that's what the plain language was for. It was merely to help explain the relationship between the terms I was using. Not everyone can see that correlation; but, that doesn't mean they're bad people and I won't think any less of you. Non sequitur here Lamp: "... because each individual coin is not "linked" to any other individual coin. The properties of any one coin does not lead to the discovery of any other specific coin in the collection." I already know what coins are in the "collection." What I don't know specifically is what other coins are among the "accumulation" in the change jar. If my "collection" is arranged in chronological order and I'm missing a date, I go to the "accumulation" in the change jar to look for that date (i.e. not to the other coins in the "collection"). If there's only one - BINGO. If there's more than one, then I have other discriminating criteria with which to choose the best one. Ref: "let us focus on "data" and "intelligence", because I think they come closer to your attempt to distinguish between the constitutional and unconstitutional activity of our government." How nice of you to regurgitate what I've previously said and present it as your own idea. Imitation is the sincerest form of flattery. When I visit people in the old folks home they flatter me like that all the time. "If my suspicions are correct, this meets your definition of "intelligence", because it is the processing of raw data into a useful form. ... Even if you are squeamish about this level of "processing", just combining raw data from multiple providers across phone ID's would constitute your definition of an unconstitutional collection." Nopes, processing for easier access and processing into a useful form for a particular application yield individual results which may converge, diverge, or make no difference. I can take all the change out of my change jar an divide it into multiple change jars separated by denomination; but, I still don't have a coin collection. Apples and oranges. "And yes, this may be "legal" via the FISA court, but now we are back to talking about altruistic leaks of classified information and whistle blowers." But at least now you may have gleaned some insight into why it was deemed legal. Perhaps you could start another thread devoted to whistle blowers. I already know you to be a person for whom the end justifies the means from your positions on other topics right down to your methodology in debate; so, I wouldn't be inclined to join in. Good day. |
![]() |
![]() |
![]() |
#29 |
Read? I only know how to write.
Join Date: Jan 2001
Posts: 11,933
|
Too many make conclusions before defining what is actually being collected. We have long known that metadata was being collected. After all, phone companies already have those records. The difference is that NSA can hold those same records BUT not view them without a 'secret' court order.
The problem is that NSA does not need those records. Phone companies have them. Violations of court orders can easily occur when those records are freely available without going to another party. Who is holding the data is the problem. Meanwhile, we have long suspected that all conversations that go international are also stored. That is properly also legal. But again, the conversations cannot be 'listened to' without a court order. That's why this has all changed. The laws never considered stored conversation. The public also does not understand the difference between actual data and metadata. Some local gossip reporters clearly have no grasp of that important concept. Creating fears that are unjustified. And lack of any serious call to actually define the problem |
![]() |
![]() |
![]() |
#30 |
Doctor Wtf
Join Date: Oct 2007
Location: Badelaide, Baustralia
Posts: 12,861
|
Just noticed, the chap who did the leak made sure he was in Hong Kong before decloaking.
Hmmm.
__________________
Shut up and hug. MoreThanPretty, Nov 5, 2008. Just because I'm nominally polite, does not make me a pussy. Sundae Girl. |
![]() |
![]() |
![]() |
Tags |
securitycouncilmonitored |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|
|