Spies in the Forests 119
Adam Jenkins writes "More info on the NSA patent has been reported in The Independent.
Specifically they have been lab-testing software that can sift
through calls and e-mails in search of key phrases." Can you say 'Echelon'? Anyone who still harbors any doubts about whether the network could exist should read this.
Re:What's the problem with "Allah"? (Score:1)
You have no idea how many people named Jesus are out there committing crimes right now... But probably none the NSA would be interested in.
Echelon Watch Web Site (Score:1)
Echelon Watch [aclu.org]
Patent? (Score:2)
I think not.
If they were ever to be asked they would simply deny that they're doing it, and if some sort of legal pursuit occurred it would be deflected by the veil of NATIONAL SECURITY.
I saw Phil Zimmerman speak in Syracuse NY many years ago when the US Gov't was still pursuing their investigation of him, and he spoke about the potential collision of technology, and privacy rights.
At that time (1993-ish) Phil mentioned that the NSA had just released some of their speech recognition code into the public domain, and it was several generations ahead of what the best civilian code looked like.
What does this say about the code that they're actually using.
The NSA's motto is to be 5 years ahead of EVERYONE else's technology, and I believe they are.
Bottom line:
The NSA HAS BEEN developing and using speech recognition software for more than 10 years, and will continue to do so regardless of what congress attempts to do to curtail their trampling of people's privacy rights, and regardless of who patents what.
Re:NSA patents something - huh? MS Plot? (Score:1)
Re:What's the problem with "Allah"? (Score:1)
What makes you think that Allah is a word that the NSA would need to listen for? He's the God we believe in. Almost every Muslim mentions his name numerous times throughout the day, and good luck to NSA if they are actually monitoring for any phrase containing his holy name. They will need boatloads of signal processing power.
Get over this, guys. Smart people do not have racial stereotypes and prejudices. Slashdot is all about smart people and free exchange of opinions. The word "Allah" has no more relation to terrorism or anything illegal than, say, "Jesus", or "Jehovah".
I doubt that the poster meant to imply that Muslims are terrorists, just that the NSA might think they are. Such religious stereotyping would not be at all unprecedented for our government. In the 1950s, for example, atheism was strongly associated with communism. Of course, as you correctly point out, filtering conversations for "Allah" would be useless because it would flag most conversations by Muslims.
Echelon killfiles? (Score:1)
I suspect that if you try this, it'll get noticed the first time and then, after you've been looked at manually and deemed to be un-dangerous, a killfile of sorts will be set to ignore your pet phrases.
That is, of course, assuming nothing strange happens to you in the meantime...
identifying all Muslims? (Score:1)
I'd like to see the NSA keep track of them all. hehe...
Re:Uh oh! (Score:2)
Re:NSA line eater (Score:1)
Back in the early 1980s - I don't recall the exact year, call it 1983ish - I played briefly with a speech recognition system one of the profs at Concordia U (where I worked at the time) was developing. It ran on a VAX 11/780 (under VMS), input was via an A/D converter (I used the D/A side of it for sound effects for the game I programmed). It could recognize and parse continuous speech from a random speaker. The catch was that it couldn't do it in realtime, it took about fifteen minutes of processing for about five seconds of speech. Taking out the overhead of printing out all the steps it was taking in the analysis might have shaved a couple of minutes off of that.
But that was fifteen years ago, on a one MIPS machine. Modern machines with some preprocessing of the signal via DSP could do better than realtime. Add in the neural net system that can recognize certain keywords from the background noise even better than humans (mentioned on
Screening text messages by comparison is a piece of cake. A bit more of a challenge is the high volume of binary packets on the net -- most of them probably jpeg fragments from pr0n sites -- but those will have characteristic formats/patterns that distinguish them from, say, encrypted text. (Of course, steganography is becoming popular...)
Why patents? (Score:1)
Bozo! moderate me down ..... (Score:1)
Re:Uh oh! (Score:2)
I wish I had a nickel for every time someone said "Information wants to be free".
Re:NSA patents something - huh? (Score:1)
Perhaps NSA knows that a conservative congress will pry open the secrets, and make it all public, and the NSA just wants to protect what it can before the end.
HAW! HAW! HAW!!!
I wish I had a nickel for every time someone said "Information wants to be free".
Technology != Intelligence (Score:1)
There is no doubt that concern about the increasing invasion of privacy is appropriate, especially when it is unclear which information is intercepted by whom for what purpose. Credit ratings, AIDS, credit card nos. are just the tip of the iceberg.
To put this into perspective, though,
remember that all the electronic sophistication of the NSA and all the president's CIA men failed miserably in predicting, for example, Saddam's invasion of Kuweit in 1990. Similar intelligence failures abound, e.g. the Nairobi/Daressalaam and the Atlanta bombings.
Most telling of all is the case of East Germany, where the Stasi had unlimited powers inside the country, had a spy in every house plus spys spying on spys, had innumerable sleepers and moles in various Western governments -- and yet the state collapsed in a miserable heap anyway, simply because no amount of spying on your own people saves a bad system in the long run.
So, I would not overrate the effectiveness even of a technologically advanced system. Technology is just one of many factors, including the overall state of the economy and the intelligence of the intelligence gatherers.
Re:From small snoops spring large killer systems (Score:1)
The American Government is based on a system of checks and balances to prevent one branch from gaining too much power. I have yet to realize how an intelligence agency is monitored. I think this might fall under the auspices of the National Security Council. You can't just come right out and say, "I'm Joe Spy. I work for the NSA. I'm spying on the radio signals coming out of the Blahovian Embassy in Washington." In order to supervise the efforts of such an organization, you have to be in the system.
Self-Monitoring has proven easy to circumvent, and is reflective of the current administration of an organization.
Point is, there is no clear, black and white answer to these issues.
Employers (Score:1)
There is a whole industry based on surveilance, selling technology to the following groups:
Bosses who spy on employees to increase productivity
School Boards who spy on students to keep them safe
Prisons who spy on inmates to keep the dirtbags in
Local law enforcement who want to arrest and convict criminals
Re:NSA patents something - huh? (Score:1)
By patenting it, they guarantee themselves exclusive control of the ideas in the patent for the next couple decades. It prevents somebody else from coming up with and using it on their own.
Why would they need to prevent this? I honestly don't know. But it's a thought, at least.
Public Lives (Score:1)
It might be the guy next to you on the bus who does the "Shoulder Shuffle" to see what you're reading.
It might be the receptionist at the office who looks up your personnel file to see what your wife's name is because they met at a party and she can't remember what it was.
It might be the anti-social geek that you picked on in High School who vowed that he would one day get even, so he stalks you and sharpens his knife collection.
Everything you do is being watched. If the government is doing it, that's another thing. Unless you sell all your worldly possessions and hike to the northern wilderness to live in isolation in a log cabin built by yourself out of hand-felled timber, you are in the public eye.
The problem is, technology has progressed to the point that it is relatively easy to spy on anyone else.
Do I feel that I should just sit back and live the life of a naive person while the government violates my privacy? No. I just think that most people are not the targets of intelligence operations.
A major part of risk management is identifying control measures to reduce the bigger risks. If you feel that you might be held accountable for what you say later, get involved in cryptology. Come up with a crypto system for telephone conversations. Rely on your own private system of messenger pigeons.
Computer network security is very similar to electonic eavesdropping in that you do what you can to minimize the holes for exploitation, but you can't get them all. If you want to communicate and exist as a member of society, you have to take risks, and there is a point where safety precautions get ridiculous.
I would just love to live in a world without weapons of mass destruction, armies, and politicians. However, we are stuck in a world with these and more. The National Intelligence community is entrusted with the protection of our national interests. They do a very good job of that. The catch is, where is the dividing line between ethical and unethical? If I am listening to personal phone conversations between US Citizens, that's a pretty wrong (and illegal) thing. However, if one of them starts talking about stockpiling arms and explosives to overthrow the government (not just a hypothesis, look at some of the militia groups out there), then most people would say that I have a duty to report that. It's a very gray issue.
Yes, there is a big potential for abuse of such great power. "Power Corrupts, Absolute Power Corrupts Absolutely." I'm not really sure who watches the Intelligence Community to check for abuses. That's a little scary for me. Hoover was unchecked. However, at the time, he was almost in-line with the popular thought that only criminals would be investigated by the FBI. It was a different time. As a result of these and other abuses, it is now illegal for US Citizens to be monitored. There are loopholes, but not too many.
From small snoops spring large killer systems (Score:3)
Snooping by three-letter agencies does indeed seem fairly innocuous (as long as you lay undistinguished and hence unseen among the teeming masses), but what if you have larger ambitions than to live and die unwitnessed? Whatever you do, even if it's totally legal, you're bound to annoy somebody sometime, and it's not beyond the bounds of possibility that the snooped info will pop up to haunt you, because *all* information is for sale to someone at some price. You'll feel different about it then than you do now.
And longer term, what about the Terminator, Matrix, or even Borg scenarios? A system that knows everything about what's going on is a system that can kill you in the end, no matter how benign it is at the start. Don't dismiss it as "just SF". It'll be too late to say "Oops, I was wrong" when it happens.
Re:You know (Score:1)
Re:Echelon (Score:1)
Re:You know (Score:1)
--
More references? (Score:1)
The reason for the patent (Score:2)
The reason (a partial one, at least) for many other patents is to keep others from patenting the same thing. This is exactly why NSA is doing it too. The catch here is that NSA has a special position with the patent office: the patent doesn't come public until someone else tries to patent the same thing.
As it was stated, this kind of technology is not new, certainly not for NSA. For all we know, the patent may have lain dormant for years - or a decade. Given what we know about Echelon (or rather, the rumors we've heard about it) suggest that it has been around for a long time. And you can rest assured that no matter how sophisticated the technology in the patent may sound, it does not compare to what NSA has now. Because the patent is now public, it means that regarding this particular technology, the rest of the world (well, ok, the US), collectively, is where NSA was years ago.
Re:Far More Sophisticated than "Key Phrases" (Score:1)
"I'm going to kill the president with help from my new friends in the terrorist group."
instead of adding a huge list of key-words at the end.. would that throw them off? And if everyone did that? Wouldn't that create quite the ruckus?
'But master, I'm not afraid of the NSA.'
'Oh? You will be. You will be.'
--
Re:You know (Score:1)
Re:Far More Sophisticated than "Key Phrases" (Score:2)
If you're a known member of the Abu Nidal Fan Club, Black September, Islamic Jihaad, Hizbollah... they're going to have a vested interest in monitoring you even if you're ostensibly discussing your favorite laundry detergent.
What we all should do (Score:1)
Re:You know (Score:1)
The first sentence is just an empty tautology that ignores whether or not the UN can ever "work" by either its own or any other definition of the word. Your second assertion assumes the US would not be isolated politically if we went along with the "majority". Even then, who cares if the US is politically isolated in the UN? It is simply a fact that UN conventions are whispy nothings. Little pieces of paper. For example, do you think the Cold-War era Soviet Union ever honored the UN Declaration on Human Rights? Did China? More importantly, name a UN resolution or convention that has had some real impact in the policies of a majority, or even a minority, of member nations.
Old News (Score:1)
Re:NSA patents something - huh? (Score:2)
---
pb Reply or e-mail rather than vaguely moderate [152.7.41.11].
There is no doubt that Echelon exists. (Score:1)
Folks:
Two years ago reasonable and informed people could (and did) doubt Echelon's existence. But today if you doubt Echelon's existence, then clearly you haven't been paying attention. Duncan Campbell [apc.org] is the man who blew the lid off Echelon, and his report in all of its detailed and independently substantiated glory is available for free on his web page.
The EchelonWatch [echelonwatch.org] page by the ACLU [aclu.org] is another good source with current news.
Regards,
Zooko
I know someone who worked on this project (Score:1)
He seemed credible. He described the mundaneness of most of the calls, and how little information content most of them contained. For example:
Re: Gov't agencies patenting anything - huh? (Score:1)
Ignoring for a minute the exact patent....
I'm a little confused about the consequences of a government agency, which uses the citizens' money, patenting anything. Do the citizens and that country's companies get free licenses then since it was publicly funded? eh? What about the case of a, again, public school holding a patent?
Any ideas?
Intelligence (Ques) (Score:1)
Re:Barrier to the rise of encrypted email (Score:1)
I agree with you that encryption must be really easy to use before it becomes standard. As mentioned, the way public keys work is that you encrypt something with someone's public key, and then only that person can decrypt it. So even if email software automatically grabbed keys, if clueless users did not have public keys there is no way they could receive encrypted email.
I think the real solution is to add encryption to the underlying mail protocols. This probably won't happen for a while. The idea would be that to have an email address, you must have a public key.
When clueless Joe User signs onto the Internet via his local ISP, he wants an email account. To get his email account, he must enter a passphrase into his computer. This becomes his private key (which he can remember and use anywhere). His computer then computes the corresponding public key, and sends it to his ISP. The ISP then creates his mail account, and sends his address plus public key to the nearest trusted keyserver.
Whenever email is sent, the appropriate keyserver is queried and the email is automatically encrypted. This way encryption is the default, not plain text. Of course this way there are problems with people forgetting their passphrase, etc. This would also rely on the keyserver's accuracy. So someone could put up an insincere keyserver that always responds, "Yes, I know the public key for that address, it is 0xdeadbeef" where 0xdeadbeef is the public key of the owner of the keyserver.
Widespread encryption is inevitable given the way people (and governments) abuse the situation now. I predict that within 3-5 years most computer-savvy people with use PGP or something equivalent for their normal correspondence. Within 8 years encryption will be the default, and it will be harder to send an email without encryption than with encryption.
-Nathan Whitehead
Re:too much NSA conspiracy stuff (Score:1)
No big surprise really (Score:2)
Re:I know ... (Score:1)
I don't know if the poster(s) think that their comments are funny or intelligent, but either way, please stop, because I doubt anyone else does.
Uh oh! (Score:3)
-
THIS IS PRE-ALPHA PRIVATE RELEASE CODE!!!
DO NOT USE IT UNLESS YOU ARE A DEVELOPER.
ALL IT DOES IS CRASH!
Re:NSA line eater (Score:2)
I hate to date myself (but I will) but way back when, we got to add lines to feed the line-eater on our posts, and filled them with all sorts of vague (and not so vague) references to selling drugs, bombing buildings, etc. in the belief that there was some computer somewhere snarfing down all our messages.
Now I find out it's true. I am not sure if I should be happy or sad. From The Jargon Dictionary
NSA line eater n. The National Security Agency trawling program sometimes assumed to be reading the net for the U.S. Government's spooks. Most hackers describe it as a mythical beast, but some believe it actually exists, more aren't sure, and many believe in acting as though it exists just in case. Some netters put loaded phrases like `KGB', `Uzi', `nuclear materials', `Palestine', `cocaine', and `assassination' in their sig block [slashdot.org]s in a (probably futile) attempt to confuse and overload the creature. The GNU [slashdot.org] version of EMACS [slashdot.org] actually has a command that randomly inserts a bunch of insidious anarcho-verbiage into your edited text.
There is a mainstream variant of this myth involving a `Trunk Line Monitor', which supposedly used speech recognition to extract words from telephone trunks. This one was making the rounds in the late 1970s, spread by people who had no idea of then-current technology or the storage, signal-processing, or speech recognition needs of such a project. On the basis of mass-storage costs alone it would have been cheaper to hire 50 high-school students and just let them listen in. Speech-recognition technology can't do this job even now (1993), and almost certainly won't in this millennium, either. The peak of silliness came with a letter to an alternative paper in New Haven, Connecticut, laying out the factoids of this Big Brotherly affair. The letter writer then revealed his actual agenda by offering --- at an amazing low price, just this once, we take VISA and MasterCard --- a scrambler guaranteed to daunt the Trunk Trawler and presumably allowing the would-be Baader-Meinhof gangs of the world to get on with their business.
NSA_LINE.HTML [bilkent.edu.tr]
NSA TREC paper (Score:3)
The NSA is not alone (Score:2)
For example, The Informedia Project at Carnegie Mellon (can't find a working link, but try http://informedia.cs.cmu.edu/) tries to find information about "interesting topics" from a feed of worldwide TV news broadcasts. They have even put a nice voice-command interface on their system, so you can query it by saying things like, "Tell me about last night's Bull's game."
Another example, the WebKB project [cmu.edu], also out of Carnegie Mellon, has shown some success in deriving meaningful information by web-crawling -- where the signal:noise ratio is probably even lower than in phone calls.
The NSA could build a pretty good system for this kind of stuff without doing much original research. Developing the technology isn't that questionable. The application is a little spooky, though.
US Invasion of Privacy (Score:2)
The thing that gets me the most about the whole Echelon thing is the sheer hubris of the NSA and the US Government to take upon themselves the right to invade the whole world's privacy by intercepting telephone calls, faxes, and emails - and still insist that the Right to Free Speech is enshrined in the US Constitution. I suppose what this really means is "You can say whatever you want, but if we don't like it you may disappear".
Luckily for the US they are the biggest and nastiest dog in the junkyard, so other countries in the world cannot afford to complain. Sadly, Might does make right it seems.
Re:The Independant? (Score:1)
Bothered to check the website to see what the article actually says?
As far as other papers over in Blighty are concerned, give it a couple of days.
The Independent is located in London and is considered one of the weaker (circulation-wise) centrist/centre-left papers in the UK. Its main competition is the Guardian. Much of this has been covered in some considerable detail by the Guardian and its sister Sunday paper, the Observer. Other broadsheets, in ideological leanings increasing to the right-wing, are the Times, the Financial Times, and the Daily Telegraph (often called the Torygraph by wags). Tabloids include the Sun, the Mirror, and the Daily Star.
I'd embed the URLs in the above paragraph, but I reckon you can check that yourself.
Credibility? (Score:2)
How many Americans are pro communist?
What individuals or oganizations want to assassinate the President?
What's the answer to the ultimate quesions of life, the universe, and everything?
The answers could be reasonably estimated from logs of phone calls and plaintext internet communications. Obviously, this has advantages for national security, but could easily be abused.
Re:You know (Score:1)
I don't think that is the case. The days of MAD and stockpiling are over, and the future of warfare is economic, socio-political, electronic and small-scale mobile tactical units.
Get a life, other countries would be doing the same things if they had the same power
Well, isn't America so all-powerful and wise. It may be that the states is the richest nation on earth, but take a look at the violent crime statistica, or the level of income inequality, or educational inequality. America should be spending its money sorting out its social problems for all the new immigrants that you mention, before blanket spying on foreign nationals in their own countries.
Oh yeah, just because other nations are worse offenders (China), doesn't mean that privacy abuse is right. And I have lived in America, and it definitely wasn't as nice as Morocco, Germany, Thailand or the UK.
Spies in the Forest (Score:2)
On the privacy thing I have assumed for quite some time now that as technology advances there is no such thing as real privacy. I am afraid we need to get use to that idea and work to insure there will not be ensuing abuse of other rights when almost all details of our lives are semi-public.
Re:You know (Score:2)
Yes. When the feds spied on Dr. Martin Luther King, it was to protect people.
When the NSA broke into the Watergate hotel to bug the DNC, it was to protect people too.
When the FBI delivers their files on Republicans to Bill Clinton, that too is to protect people.
Most people won't really catch the eye of Big Brother. It's only important people, people who really are bad, and a few false positives who have to worry. Most people can go about their day to day lives without ever being touched by Big Brother, because most people are insignificant.
So go do your little business as usual. You'll be fine.
Don't worry that the government is corrupt. They're after some other guy, not you.
Don't worry that what you say might make them angry. You don't have anything to say that matters.
Move along people.
There's nothing to see here.
(The above has high sarcasm content, in case you haven't noticed.)
Re:How Intelligence Collection Works (Score:2)
Re:NSA patents something - huh? (Score:1)
Re:Barrier to the rise of encrypted email (Score:1)
Then the main stumbling block would be establishment of a central database of keys that would be publicly accessible. Of course one would have to deal with all those tricky authentification issues.
Definitely a worthy project, perhaps some folks in countries with enlightened crypto laws could work on it.
Why does that make any more sense? (Score:1)
Am I wrong?
If not, and the NSA doesn't need patents to protect its right to use the techgnology, then the question stands (slightly altered): Why does the NSA care about other people patenting their technology?
--
Re:Credibility? (Score:1)
Re:Echelon (Score:1)
Re:How Intelligence Collection Works (Score:2)
Even if people aren't in fact generally being surveilled, there is a definite effect when people feel that they could be being surveilled at any time. It has a chilling effect on democracy -- people become afraid to say things that may be controversial or unpopular when it's possible that Big Brother could use those statements against them in some way. When public discourse is stunted like this, democracy suffers.
And what about when the surveillance goes beyond public policy matters and becomes a tool to give force to the prejudices and petty hatreds of the men who control the cameras? J. Edgar Hoover made a career out of using intelligence collected under official auspices to destroy the lives of people he just happened not to like, for whatever reason. Does it have any bearing on the public good whether, for example, Martin Luther King, Jr. cheated on his wife? Hoover thought so. Hoover decided that any black man who talked about freedom for his long-suffering people was a Communist by definition, and spent untold taxpayer dollars spying on King's private life in order to find some silver bullet that he could use against him. And this wasn't an isolated case -- Hoover kept tabs on anyone and everyone who he could use some leverage over. And anyone who dared speak out against this could count on having Hoover's cameras pointed at them next. This gave Hoover great power -- and his power knew no bound, no accountability. Secret government by its nature is un-democratic government.
Your main point seems to be that people should shut up and sit down because they're not important enough for anyone to pay attention to, and even if they were nobody's being dragged away in Black Marias yet. But "security through obscurity" only works when you're willing to forfeit your right to participate in public life, a right which no free man or woman who wishes to make a difference in society should be asked to surrender. And the fact that we have what freedoms we enjoy today springs from the efforts and sacrifices of people who knew that if you wait until the secret police are at your door to protest the loss of your freedom, you've waited too long.
-- Jason A. Lefkowitz
Re:Barrier to the rise of encrypted email (Score:1)
Re:Far More Sophisticated than "Key Phrases" (Score:1)
Rupert.
Some thoughts (Score:2)
CND's website documents an amazing amount of information about Menworth Hill and the NSA base there, including their programs for monitoring satellite-based communications, and their plans for linking their interception capability with spy satellite systems.
Whilst I have no means of verifying the claims, I have talked with a person who claimed to be familiar with Echelon. He didn't go into details (no great surprise, either way), but his description of extremely massive arrays of very fast DSP systems certainly sound a technically feasable approach.
I agree with other posters - Echelon won't be using keywords. If conventional search engines abandoned that approach as useless, you can be sure that the Intelligence community would have reached the same conclusion, eventually. They almost certainly use some kind of basic "expert system", either as an inclusive or exclusive filter.
Menworth Hill alone, of the 5 countries known to be involved, intercepts hundreds, if not thousands, of hours of communications, every day. If the guys there had to sort through spam and false hits, from a basic keyword search, they'd need an army the size of England just to cope.
Re:Far More Sophisticated than "Key Phrases" (Score:2)
Re:You know (Score:1)
"Well.. my neighbour once raped a kid, so it's alright for me to do so too."
//rdj
Re:What's the problem with "Allah"? (Score:1)
Re:identifying all Muslims? (Score:1)
There are places where this tech is a godsend... (Score:1)
I realize most of you are freaking out over the idea that the government could be reading your personal email without your consent, but there ARE commercial applications of this sort of snooping that are a godsend. If you've ever waited on an auditor to clear the release of some boneheadedly trivial email you want to send, you'd probably rather have a computer quickly and anonymously clear your stuff than wait for some person who might be busy to clear it.
Just a thought.
Scrappy
Re:How Intelligence Collection Works (Score:1)
First, I happen to be one of the people who believes Echelon doesn't exist. This actually helps my case. For instance, most of the "information" I have read on Echelon indicates that the system has been in place for a number of years. The information in the article referenced indicates that the US had an accuracy if 25% in 1998. For conversations that were already transcribed. Filtering through even a large portion of phone conversations is unlikely.
And Email? Take a look at that web site that shows the internet connections. Tell me where they're going to hook into the net to keep track of messages? And keep in mind that there are more connections than those graphs show. Not likely either.
On the other hand, the fact is that we don't really KNOW what these people are doing. If the Gov/NSA decides they want to know all about you, they can do so. This I do not argue. I think that we should definitely know what these people are doing, and we should definitely be putting limits on their power.
>>>>>>>>>> Kvort
Re:identifying all Muslims? (Score:1)
Yes, there are a lot of Muslims in the world, but far less of them live in the United States. They could monitor those calls much easier.
Good point. I wouldn't put it past the NSA to do point.
Echelon@Home (Score:1)
Hard to tell from the brief precis [wired.com] in Wired, but it looks like Dragon Systems has come out with speech-grepping software on the open market (demoed at Comdex).
Of course, hooking your laptop up to a radio scanner modified to get the wireless-phone channels and using this software to look for keywords related to, say, Congressional graft, as you stroll through downtown Washington at lunchtime, would be totally illegal. I certainly don't advocate any such thing; it would be wrong.
Might goose the folks putting barriers in the path of widespread crypto adoption, though. And maybe cast the Justice Department's calls for expanded wiretapping powers-- "because technology is eroding away our ability to lawfully intercept communications" -- in a slightly more skeptical light.
Re:You know (Score:1)
Re:Uh oh! (Score:1)
NSA patents something - huh? (Score:2)
--
"Some people say that I proved if you get a C average, you can end up being successful in life."
competition? (Score:2)
Can we be sure that the DoD and NSA are really working together on these issues? Perhaps there is a bit of competition going on within the American government here.
After all, we were all wondering why the NSA would effectively comfirm that this is what they were doing by taking out that patent. But if they saw that the DoD were working on technology like it, they may have felt that that was reason enough to get a patent.
It also seems to make sense, in light of the cludged up nature of governments that makes it very hard to believe that they are keeping anything really secret. Thank god for profit motives huh
-
We cannot reason ourselves out of our basic irrationality. All we can do is learn the art of being irrational in a reasonable way.
What's the problem with "Allah"? (Score:1)
Get over this, guys. Smart people do not have racial stereotypes and prejudices. Slashdot is all about smart people and free exchange of opinions. The word "Allah" has no more relation to terrorism or anything illegal than, say, "Jesus", or "Jehovah".
--
BluetoothCentral.com [bluetoothcentral.com]
A site for everything Bluetooth. Coming in January 2000.
Re:US Invasion of Privacy (Score:1)
""You can say whatever you want, but if we don't like it you may disappear""
I'd rewrite this to.
You can say whatever you want, but we are listening.
Still allows for free speech, but kinda puts a damper on free expression. IMHO free expression is much more important than free speech as free speech is only a subset of free expression.
Far More Sophisticated than "Key Phrases" (Score:3)
I've already seen several posts implying that you can fool NSA technology by simply including key phrases in your documents. Thus the "spook" command in emacs, etc.
But NSA technology is far more sophisticated than this. In fact, if you've used a variety of search engines, you've seen such such technology in use. The better search engines do a good job of rejecting key-phrase laden documents and returning only good hits.
Of course, eveybody who's used a search engine and gotten some bogus site hit knows that the technology is far from perfect. But remember, the NSA has been throwing millions of dollars at the problem basically since computers existed. They're likely to be well ahead of current search engine technology.
In other words, you can continue to use spook-mode in emacs (I do, it's fun), but you should be aware that it's probably not fooling anybody. The private sector already has technology that can eliminate that sort of spoofing, and the military is probably years ahead of the game. Trust No One.
Credibility is excellent. (Score:2)
I think this article is a pretty impressive bit of cluefulness.
--
Re:You know (Score:1)
//rdj
P.S. Did you know that the United States is the only country in the world that has not ratified the U.N. Convention on the Rights of the Child? Including China and all the other big bad red commie states?
Re:Credibility? (Score:1)
No, it doesn't work that way (Score:2)
Only public keys are stored on keyservers, and they're used by a message sender to encrypt messages destinated for the corresponding recipients who are the only people that can decrypt them because they alone hold the corresponding private keys. The NSA can't get the private keys from the keyservers because they aren't there.
Recipients of incoming messages don't grab public keys from keyservers in order to decrypt the messages, but only to authenticate their signatures. For message signing, keys are used in reverse, ie. the sender signs his message with his private key and then recipients can check that it really came from him with the help of his public key.
Needless to say, even a non-clueful user has to generate his own keypair and place his public key on a default keyserver, but that operation can be completely hidden from him by being done at the time his email system is installed, configured, or just run for the first time. Sensible crypto users go to great lengths to select a good and long passphrase to protect their private key, but this is not necessary if the only goal is to defeat the snoops: the passphrase can be left completely empty by default, so the mailreader can decrypt incoming mail (which has been encrypted by the senders using the recipient's public key obtained from a keyserver) without bothering the user with a request for a passphrase. [Not ideal of course, but at least it would make the operation transparent.]
Solution? All encryption, all the time. (Score:2)
A few random ideas... Consider this my "wishlist":
If most of these points are actually implemented, we may be protected from Echelon, depending on the sophistication of the cracking techniques of the NSA. What you write in a forum like
On a side note: "The Independent" is a very well-known and accurate newspaper in the UK. You can have a fair amount of trust in this paper -- it's not called "The Independent" for nothing.
Of course this opinion is worth exactly what you paid for it... =)
Distributed keyservers, not central database (Score:2)
Re:Spies in the Forest (Score:1)
An interesting question, for certain.
I was given to understand that, in the US, Governments can't hold copyrights. Why can they hold patents but not copyrights? Are such patents defensive in nature?
Get Over It (Score:1)
The NSA, KGB, GCHQ and other intelligence agencies have been doing this for decades. They are not going to stop just because some people have the illusion that their email and conversations are private.
European countries have been intercepting and reading paper mail in "black chambers" for hundreds of years.
Call Centres (Score:2)
..one reason COULD be that there is a lot of interest in this field due to the increase in a desire to replace manned call centres with software, so key phrase recognition would be a neat trick. Software designed using this could help callers by recognising what they were talking about and acting accordingly
..end kite flying
Re:FreeDonations (OT) (Score:2)
Visit and save a life!
Re:NSA line eater (Score:1)
How Intelligence Collection Works (Score:4)
I will admit, though, it does sound like a blatant disregard for my personal privacy, so I'm going to attack the government back.
It never fails that there is a score of posts containing supposedly keywords that would set of the "Echelon" buzzers deep inside some bunker in the DC area. Then, thugs come and raid your house while you sleep and drag you away hancuffed, naked, and screaming to their torture chambers, where you are given a showtrial and then sentenced to 8 years in a work camp in the frozen north.
Wake up, people.
As anybody with a rational mind can tell you. most people (99.99999%) have nothing to worry about. Just because someone can collect information on just about anything they want to (try it sometime--even use whois and a couple of internet search engines to see what you can come up with about yourself) doesn't mean that they will.
Just about anybody who has experience in the intelligence field or law enforcement can tell you that true, valuable intelligence (or investigation, if you prefer) is the result of long-term collection and analysis. Just scanning traffic for keywords will not work. Pull up your favorite search engine and do a search for bomb. How many results do you get?
If you want to collect intelligence, you need to set a specific goal or target. Usually, this is influenced by political means. It's just like a police investigation. In one very well-documanted book ("Inside the Aquarium") about Soviet intelligence collection, Victor Suvorov (former Spetznaz and GRU Major who defected to the west) talked about picking an area such as the US 7th Fleet in the Mediterranean. They focused on the question, "When and where are the major deployments of the Carrier Battle Groups?" Then, you identify the means to collect on that target. In our case, the spies ran a hotel in a major port town that served as a homebase for several fleet ships. They didn't just walk around town asking people for information, which is fairly comparable to scanning IP packets.
In order for intelligence to be valuable, it has to be correct, timely, and actually useful to the guys who need it. It takes a concerted effort between many different organizations to accomplish this. Just because you "intercepted" an email containing a few keywords, that does not constitute an intelligence lead. Basically, it is as reliable as a rumor that you overheard in a seedy bar downtown. No police investigator would bet his reputation on such a piece of information.
All the so-called 'experts" on Echelon are just speculating. They are conducting a very weak intelligence collection operation on the NSA. Alot of information is easily available, such as purchase contracts with suppliers. So, they collect all this information and then make a good guess. That's all it is. Unless you've been in the bunkers and fences, you have no idea what goes on inside.
As far as invasion of privacy, yes, some intelligence agencies are more invasive in their techniques than other ones. Ever since they got their buttocks burned several decades ago (Vietnam and Mccarthy Eras), they have had to seriously rethink their policy concerning this. I think, just like the police, trying to conduct operations in as unintrusive means as possible is basically the policy. Honestly, I'm more worried about my boss tracking my keystrokes to find out if I'm jerking off at work, or my system administrator forking my mail through a buzzword filter to report me to my boss, and the adolescent who lives in the high-rise next to me who was given a 100x telescope for his birthday.
In short, just because the NSA, FBI, CIA, and others can spy on you doesn't mean that they will, or that they even want to.
Re:You know (Score:1)
Whenever they feel like it, they blow up some hospitals or embassies in other countries and then say they "had" to do it to protect the world from terrorists.
Guess what - the US of A is the biggest bully in the world, and you'd have to be an american not to see it.
Barrier to the rise of encrypted email (Score:2)
I think the reason for that is pretty clear, and consequently the solution is as well: the major mailreaders needs to automatically retrieve PGP keys from default keyservers and automatically decrypt incoming mail *by default* for electronic envelopes to catch on in any significant way. [This is even more important than encrypting outgoing mail.] If there is any manual configuration involved, or any hassle whatsoever, or (shock horror!) any knowledge required, then it just won't happen. Clued up computer users simply aren't around in sufficient numbers to form a critical mass in the email world. For encrypted email to take off, Joe Bloggs has to be part of the revolution, without even being aware of it. [Just like he sends WINMAIL.DAT attachments everywhere without being aware of it.]
I guess this means that until Netscape and Microsoft implement the above in their respective products, nothing of any statistical significance will happen in this area.
Re:Uh oh! (Score:2)
Try at least to place words in context! narcotics^iraq^nuclear war will not fool this system-- it is unlikely that they have much to do with each other.
It appears that context is very important. Try to use a *few* words *in context* in a short paragraph. Attach *that* to your regular email message and the system is more likely to be false positive.
The paper referenced by another poster was interesting.
http://trec.nist.gov/pubs/trec7/papers/nsa-rev.
( cute. "Iraq" was one of the example words.)
Personally, I would have placed the keywords in a Binary tree based on alpha order for speed purposes. Perhaps this paper would describe an effective system for a *second* check of any messages flagged by an alpha tree system. Or maybe they have hardware of the gods and don't need to? ; )
Bobzibub
(The Happy Slacker)