![]() |
I read this article yesterday, and it blew me away.
This 3-page article goes on and on with a new release of what NSA has been doing. It seems outlandish to spend so many resources on fear, ...yet they still MISSED the Boston Marathon bombing. Shouldn't there be something like a signal-to-noise ratio or a risk/benefit analysis. Washington Post Barton Gellman and Ashkan Soltani 10/14/13 NSA collects millions of e-mail address books globally Quote:
|
They can't prevent stuff, because there is too much data. They can only go back after the fact and use their info to round up the rest of the gang after an attack has occurred.
|
... maybe CDC could develop a vaccine ;)
|
To put it in context, all of these little bits of secondary information add up to an amazing picture of everyone. Bruce Schneier's summary is "metadata is surveillance," which I quite like:
https://www.schneier.com/blog/archiv...ta_equals.html Quote:
|
Quote:
But from most every leak is a pattern. Most all averted terrorist attacks were from similar sources that also saw and suspected 11 September. Information that resulted in a memo on the president's desk warning of such an attack. And it was ignored. Most terrorism was averted by using conventional investigative techniques. Most every failure was due to people not following up on their information (ie underwear bomber). If all this high tech spying on Americans was so useful, then where are all the leaks reporting on those successes? Even bin Laden was located using more conventional techniques. Conventional investigations: Diana Deans and three other officers - discovered the bomb for LAX. Therefore the word went out from President Clinton to look for other attacks. Using conventional investigation techniques, they probably averted the bombing of Time Square, of Toronto, of the Radisson Hotel in Amman Jordan, and the bombing of the USS The Sullivans. Because top management put out the word and took seriously information from conventional investigation sources. These advanced investigation tools have proven useful AFTER other information targets a specific threat. IOW every one should require a bench warrant. Currently, even that legal requirement has been bypassed because, well, this is the problem. We still have not defined the definition of the word 'privacy'. And have too many lawmakers who are so wacko extremist that no time remains to address this now serious problem. |
This is now on Google News...
Quote:
. |
The NSA is under the umbrella of the Department of Defense. So now that this guy is leaving DOD he will have no connection to the NSA.
Maybe you are thinking of the TSA? The TSA is under the Department of Homeland Security. |
That's probably my bad.
But is DOD under Homeland Security ? I'm just leery of lawyers in any top position... except DOJustice, etc. Advising is one thing, making top management decisions, ugh. I know this particular fellow has been a big help to Obama, but still. ETA: OK, I was, indeed, wrong. I looked it up and see the difference. Sorry about that. |
1 Attachment(s)
Apparently, Senator Diane Feinstein (D-Calif) believes she is Mr. Phelps:
Good Morning, Mr. Clapper: Your mission, should you choose to accept it, involves finding and storing each granule of data from everywhere in the world: Attachment 45939 As always, should you or any of your NSA Force be caught or killed, the Secretary will disavow any knowledge of your actions. This tape/disc will self-destruct in five seconds. Good luck, Jim |
Quote:
|
Quote:
|
Quote:
|
The Cellar Security Council is monitoring this thread.
|
George Bush Sr threatened to create a New World Order. Thank god we have citizens with assault rifles protecting us in our airports.
|
1 Attachment(s)
Quote:
Is there anyone in the country who likes the TSA? They have to be the most hated branch of the government. Well, maybe the IRS is more hated. Attachment 45947 Not saying I approve in any way of the actions of this murderous thug. He belongs in prison. But looking for a motive? Duh. |
| All times are GMT -5. The time now is 10:06 PM. |
Powered by: vBulletin Version 3.8.1
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.