[AGL] Fwd: DRANT#181: TELE-RECTAL DATA MINING
Frances Morey
frances_morey at yahoo.com
Thu May 11 13:35:04 EDT 2006
I have long feared that the govt will figger out a way to tax this form of communication. The govt rake off from cell phones is about 12%. The habit (addiction?) of govt is taxation. Parking meter fines are 85% of the take, with only 15% coming from coins. The money will be collected by hook or crook, one way or the other. When I read bills for the TLC it was typical for the wording on the bill to be the same as before, with the only chances being increases in the monetary amounts.
I am puzzled by the fact that it took four special sessions of our legislature to work out school funding and here on this one it slides quickly through as though warm butter, thick with self congratulatory smiling faces all over the media. How come it got so easy, all of a sudden? Any ideas.
Hope email "postage" doesn't happen.
Frances
David Rubinson <rubinson at kab.com> wrote:
From: David Rubinson <rubinson at kab.com>
Subject: DRANT#181: TELE-RECTAL DATA MINING
Date: Thu, 11 May 2006 09:58:02 -0700
DRANT DAILY
Number 181
May 11, 2006
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Today's DRANT
---Ill-tempered, Iconoclastic, Impatient and Ideologically-
unpredictable views, comments, and sources about the World, how we
humans are messing it up, and how we can all DO SOMETHING about it.
For the complete, entire Megillah, please access : http://
drrant.blogspot.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
HERE IS A short REPRISE OF DRANT #178- PORNO PREDATORS
2) The Government and Big Telecom have co-conspired for years-- but
under Bush et al, the incest has become epidemic and much much more
pervasive and dangerous.
In 1998, our friend Bill and his sidekick Al handed the airwaves to
Major Media.
In 1999, the CIA inaugurated the insidious and largely unremarked
program called In Q Tel- to provide seed money and initial
capitalization for fledgling high tech startups, acting as a
Governmental Venture Capital firm, thus to own and control what has
now become a huge network of developing cutting edge tech "security-
oriented" enterprises, all run and operated by The Federal
Government. (much more about this in a later DRANT).
See:
"In-Q-Tel: A New Partnership Between the CIA and the Private Sector"
Rick Yannuzzi
Defense Intelligence Journal
Winter 2000
And more recently-- You remember 2-3 years back ? When GWBush's
nephew Mike Powell, and the FCC obliterated the historic limits on
cross-ownership of media in major markets, finalizing the
Murdochization of our very lives ? And GiantPimpMedia did a giant
Jerry Mahoney for The War in Terror ?
Well, this is the next quid pro puke quo Giant Step in the exploding
Fascist Symbiosis between Government and Business.
It's such a simple deal--
The FCC rules that the Internet is not a public resource, that the
pipes belong to the pipelayers not the peeps, and re-defines and
privatizes the Internet, handing over public net access and granting
control of the net AND the international backbones, to Giant Telcom.
Simultaneously, the aforementioned Congress, those busy little bees,
are enacting legislation that will destroy net neutrality-- Thus,
AOL, Yahoo and the rest can CHARGE for each email, and establish
tiers of service- so the big corporations go 1st class, with much
faster access and bypass of the spam blockers, and we peasants ride
in the back of the bus, if we get to ride at all.
And, need we even mention the Supreme Court ? Oooooh baby.
In their gratitude, the Telecoms give it all up to the NSA. Giant
Telcom gives up all of our email, our web searches, downloads, p2p
file shares to The CIA, NSA, and whoever else the Government
decides. All of it- turned over to the Data Mining loonies in the
big grey concrete buildings.
Everybody wins, right ?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Well, if you had any doubts- if you had even a glimmer of
nowaynothereintheUSA, well -- fuggedabouddit.
This is real, its true, they are looking up every orifice with a
flashlight they justify with the AlKayeeda Myth, and THIS MEANS YOU.
Today, USA TODAY, America's official journal of record, finally broke
the story for De Average Joe.
And Av J is pissed.
This is the same week that GENERAL Hayden is being put in charge of
the CIA. While his ole Buddy Rumsfeld runs OPERATION ROADMAP.
This is the same week that Congress is voting on COPE- the
Communications Opportunity, Promotion, and Enhancement Act, that
rapes us in so many lovely little ways:
"...The COPE bill would permit phone and cable companies to operate
Internet and other digital communications service as private
networks, free of policy safeguards or governmental oversight. The
bill would effectively end what is known as "net neutrality" which is
the concept that that everyone, everywhere, should have free,
universal and non-discriminatory access to all the Internet has to
offer. The COPE bill would permit Internet service providers like AOL
to charge fees for almost every online transaction and to prioritize
emails based on the senders' willingness to pay.
Another provision of the bill would cut back the obligation of cable
TV companies to devote channels to public access and fund the
facilities to run them. And the COPE bill would replace local cable
franchises with national franchises. The companies contend that this
will create competition and lower fees but consumer groups and
activists are concerned that it will take control and oversight away
from local government as well as cut channel capacity for public,
educational and governmental access channels or PEGs. The COPE Act
would also permit providers to not provide service to low-income
communities that they believe would be less profitable to serve..."
* Robert McChesney, professor at the University of Illinois at
Urbana-Champaign and co-founder of Free Press
http://www.democracynow.org/article.pl?sid=06/05/08/1352255
COPE
Ends regulation and hands the Internet to ATT, Verizon, Clear
Comcast, BellSouth. Do these names sound umm familiar ?
Destroys local community access to TV ? Hmmm now that's Democracy.
Turns the net into a tiered access structure, whereby dose dat pays
da most, gets da most. Just like CONGRESS.
RED-LINEs net access, so the 37% of Americans below the poverty line,
not to mention those damn immigrants, would not have internet.
Don't this sound cozy ?
McChesney says, and most Save The Internet folks say, that Congress
is doing this because they are being PAID-- by the enormous telcom
lobbyists - hundreds of millions of dollars.
Well, maybe - we know a pimp when we see one. Or 400.
But the Government is doing this because they get to perform TELE-
rectal data mining with no lube on all of US, all the time.
They are pushing this to create the biggest goddam spying operation
in history, and they have already started.
So if the words Net Neutrality don't get your little ticker booming,
how about the fact that George Bush, and that incredible mealy-
mouthed Putz Hayden, and Negroponte del Salvador, are listening to
every goddam phone call you make, or get ?
Does that pluck your magic twanger ?
Wake up, I'm talking to YOU !
When exactly will you have had enough ?
When will you finally take to the streets from pure self-interest if
nothing else ?
Anyway, if all this don't get you raging, then just do nothing.
They're counting on it.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
USA Today: NSA building massive database of phone records
Thursday, May 11, 2006 Posted: 1609 GMT (0009 HKT)
http://edition.cnn.com/2006/POLITICS/05/11/nsa.phonerecords.ap/
WASHINGTON (AP) -- President Bush said Thursday that the government
does not troll the personal lives of Americans, but did not directly
refer to newspaper reports the National Security Agency has gathered
millions of Americans' phone records.
Congressional Democrats had demanded answers from the Bush
administration about a report that the government secretly collected
records of ordinary Americans' phone calls to build a database of
every call made within the country.
"It is our government, it's not one party's government. It's
America's government. Those entrusted with great power have a duty to
answer to Americans what they are doing," said Sen. Patrick Leahy of
Vermont, the ranking Democrat on the Senate Judiciary Committee.
AT&T, Verizon and BellSouth telephone companies began turning over
records of tens of millions of their customers' phone calls to the
NSA program shortly after the September 11, 2001, terrorist attacks,
USA Today reported, citing anonymous sources it said had direct
knowledge of the arrangement.
The telephone companies on Thursday declined to comment on national
security matters, and would say only that they are assisting
government agencies in accordance with the law.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
NSA has massive database of Americans' phone calls
Updated 5/11/2006 10:38 AM ET
http://www.usatoday.com/news/washington/2006-05-10-nsa_x.htm
By Leslie Cauley, USA TODAY
The National Security Agency has been secretly collecting the phone
call records of tens of millions of Americans, using data provided by
AT&T, Verizon and BellSouth, people with direct knowledge of the
arrangement told USA TODAY.
The NSA program reaches into homes and businesses across the nation
by amassing information about the calls of ordinary Americans â most
of whom aren't suspected of any crime. This program does not involve
the NSA listening to or recording conversations. But the spy agency
is using the data to analyze calling patterns in an effort to detect
terrorist activity, sources said in separate interviews.
QUESTIONS AND ANSWERS: The NSA record collection program
"It's the largest database ever assembled in the world," said one
person, who, like the others who agreed to talk about the NSA's
activities, declined to be identified by name or affiliation. The
agency's goal is "to create a database of every call ever made"
within the nation's borders, this person added.
For the customers of these companies, it means that the government
has detailed records of calls they made â across town or across the
country â to family members, co-workers, business contacts and others.
The three telecommunications companies are working under contract
with the NSA, which launched the program in 2001 shortly after the
Sept. 11 terrorist attacks, the sources said. The program is aimed at
identifying and tracking suspected terrorists, they said.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taking Snooping Further; Government Looks at Ways To Mine Databases
By JOHN MARKOFF; SCOTT SHANE CONTRIBUTED REPORTING FROM WASHINGTON
FOR THIS ARTICLE. (NYT) 2023 words
Published: February 25, 2006
http://select.nytimes.com/search/restricted/article?
res=F70C16F8345A0C768EDDAB0894DE404482
PALO ALTO, Calif., Feb. 23 - A small group of National Security
Agency officials slipped into Silicon Valley on one of the agency's
periodic technology shopping expeditions this month. On the wish
list, according to several venture capitalists who met with the
officials, were an array of technologies that underlie the fierce
debate over the Bush administration's anti-terrorist eavesdropping
program: computerized systems that reveal connections between
seemingly innocuous and unrelated pieces of information.
The tools they were looking for are new, but their application would
fall under the well-established practice of data mining: using
mathematical and statistical techniques to scan for hidden
relationships in streams of digital data or large databases.
Supercomputer companies looking for commercial markets have used the
practice for decades. Now intelligence agencies, hardly newcomers to
data mining, are using new technologies to take the practice to
another level.
But by fundamentally changing the nature of surveillance, high-tech
data mining raises privacy concerns that are only beginning to be
debated widely. That is because to find illicit activities it is
necessary to turn loose software sentinels to examine all digital
behavior whether it is innocent or not.
''The theory is that the automated tool that is conducting the search
is not violating the law,'' said Mark D. Rasch, the former head of
computer-crime investigations for the Justice Department and now the
senior vice president of Solutionary, a computer security company.
But ''anytime a tool or a human is looking at the content of your
communication, it invades your privacy.''
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Information Operations Roadmap
http://www.sourcewatch.org/index.php?
title=Special:Categories&limit=500&offset=0)
John Rendon, President of the Rendon Group, "insists that information
is terrain and someone will occupy it, either the adversary, a third
party, or US." [1] (http://www.iwar.org.uk/iwar/resources/usaf/
maxwell/students/2002/urrutia.pdf)
"Information is an instrument of national power, just as military,
economic and political. Like any weapon or tool, the United States
Government needs to use it or cede the 'battlefield' to someone
else." [2] (http://www.iwar.org.uk/iwar/resources/usaf/maxwell/
students/2002/urrutia.pdf)
Table of contents
1 The "Roadmap"
2 Perception Management
3 Related Documents & Reports
4 SourceWatch Resources
5 External Links
The "Roadmap"
On October 30, 2003, Secretary of Defense Donald Rumsfeld signed a
secret order for the classified 74-page directive the Information
Operations Roadmap. [3] (http://www.capitolhillblue.com/cgi-bin/
artman/exec/view.cgi?archive=38&num=5847&printer=1)
The Roadmap is a "detailed plan being implemented by the Pentagon,"
Christopher J. Lamb, a senior fellow in the Institute for National
Security Studies at the National Defense University and former Deputy
Assistant Secretary of Defense, Resources and Plans, wrote (http://
www.ndu.edu/inss/press/jfq_pages/1536.pdf) First Quarter 2005 in the
Joint Force Quarterly. "The roadmap charts a course for developing IO
into a mature warfighting capability and a core joint competency. It
is designed to enable capabilities to keep pace with threats and
exploit opportunities afforded by innovation and information
technologies. Lessons learned from Iraqi Freedom underscore the
validity of its recommendations."
"The key assumption underlying the IO roadmap is that exploiting
information for decisionmaking has become critical for military
success. Accordingly, it must be treated on a par with ground,
maritime, air, and special operations," Lamb wrote.
The Roadmap "represents 18 months of effort to determine IO issues
and makes 57 recommendations for implementation. Execution of these
57 recommendations has begun," Allen W. Batschelet wrote (http://
www.findarticles.com/p/articles/mi_m0IAU/is_3_9/ai_n6181373/pg_2) in
the July/August 2004 FA Journal. "Setting the course for IO's future
as a DoD core competency, the roadmap provides a common framework and
definition for understanding IO, empowers combatant commanders with
the authority to plan and integrate IO, and improves education and
training opportunities designed to strengthen IO efforts."
"Noting the complexities and risks, Mr. Rumsfeld ordered studies to
clarify the appropriate relationship between Pentagon and military
public affairs - whose job is to educate and inform the public with
accurate and timely information - and the practitioners of secret
psychological operations and information campaigns to influence,
deter or confuse adversaries," Thom Shanker and Eric Schmitt reported
(http://www.nytimes.com/2004/12/13/politics/13info.html?
pagewanted=1&ei=5089&en=89b177f07cc24678&ex=1260680400&partner=rssyahoo)
in the December 13, 2004, New York Times.
Perception Management
"'In the battle of perception management, where the enemy is clearly
using the media to help manage perceptions of the general public, our
job is not perception management but to counter the enemy's
perception management,' said the chief Pentagon spokesman, Lawrence
Di Rita" in December 2004. [
Related Documents & Reports
>From "Information Operations Roadmap," (http://www.iwar.org.uk/
iwar/) Information Warfare Site:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The End of the Internet?
http://www.thenation.com/doc/20060213/chester
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Coming Tug of War Over the Internet
By Christopher Stern
Sunday, January 22, 2006; B01
http://www.washingtonpost.com/wp-dyn/content/article/2006/01/21/AR
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Hands Off Our Internet!
http://www.commoncause.org/site/pp.asp?c=dkLNK1MQIwG&b=1386967
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Sunday Herald -
http://www.sundayherald.com/print54975
02 April 2006
America's war on the web
While the US remains committed to hunting down al-Qaeda operatives,
it is now taking the battle to new fronts. Deep within the Pentagon,
technologies are being deployed to wage the war on terror on the
internet, in newspapers and even through mobile phones.
Investigations editor Neil Mackay reports.
IMAGINE a world where wars are fought over the internet; where TV
broadcasts and newspaper reports are designed by the military to
confuse the population; and where a foreign armed power can shut down
your computer, phone, radio or TV at will.
In 2006, we are just about to enter such a world. This is the age of
information warfare, and details of how this new military doctrine
will affect everyone on the planet are contained in a report,
entitled The Information Operations Roadmap, commissioned and
approved by US secretary of defence Donald Rumsfeld and seen by the
Sunday Herald.
The Pentagon has already signed off $383 million to force through the
documentâs recommendations by 2009. Military and intelligence
sources in the US talk of âa revolution in the concept of
warfareâ. The report orders three new developments in Americaâs
approach to warfare:
lFirstly, the Pentagon says it will wage war against the internet in
order to dominate the realm of communications, prevent digital
attacks on the US and its allies, and to have the upper hand when
launching cyber-attacks against enemies.
lSecondly, psychological military operations, known as psyops, will
be at the heart of future military action. Psyops involve using any
media â from newspapers, books and posters to the internet, music,
Blackberrys and personal digital assistants (PDAs) â to put out
black propaganda to assist government and military strategy. Psyops
involve the dissemination of lies and fake stories and releasing
information to wrong-foot the enemy.
lThirdly, the US wants to take control of the Earthâs
electromagnetic spectrum, allowing US war planners to dominate mobile
phones, PDAs, the web, radio, TV and other forms of modern
communication. That could see entire countries denied access to
telecommunications at the flick of a switch by America.
Freedom of speech advocates are horrified at this new doctrine, but
military planners and members of the intelligence community embrace
the idea as a necessary development in modern combat...
...In September 2000, the now notorious document Rebuilding
Americaâs Defences â written by the Project for the New American
Century (PNAC), a think-tank staffed by some of the Bush
presidencyâs leading lights â said that America needed a
âblueprint for maintaining US global pre-eminence, precluding the
rise of a great power-rival, and shaping the international security
order in line with American principles and interestsâ.
The PNAC was founded by Dick Cheney, the vice-president; Donald
Rumsfeld, the defence secretary; Bushâs younger brother, Jeb; Paul
Wolfowitz, once Rumsfeldâs deputy and now head of the World Bank;
and Lewis Libby, Cheneyâs former chief of staff, now indicted for
perjury in America.
Rebuilding Americaâs Defences also spoke of taking control of the
internet. A heavily censored version of the document was released
under Freedom of Information legislation to the National Security
Archive at George Washington University in the US.
The report admits the US is vulnerable to electronic warfare.
âNetworks are growing faster than we can defend them,â the report
notes. âThe sophistication and capability of ⦠nation states to
degrade system and network operations are rapidly increasing.â
T he report says the US militaryâs first priority is that the
âdepartment [of defence] must be prepared to âfight the netââ.
The internet is seen in much the same way as an enemy state by the
Pentagon because of the way it can be used to propagandise, organise
and mount electronic attacks on crucial US targets. Under the
heading âoffensive cyber operationsâ, two pages outlining possible
operations are blacked out.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BIFURCATE IN THE ROAD
http://kmilyun.com/?P=143
We are sacrificing our privacy and freedoms for the cause of National
Security while our President demands extraordinary powers (see post
here) The legal protections that are essential to our democratic
society; due process, presumption of innocence and rights against
unreasonable search and seizure, arbitrary detention and punishment,
interception of personal communications without warrant are being
ignored. (example link to for each) Infrastructures for strategic
mass surveillance and dissemination of propaganda are in place to
support governmental agendas. (See Govt. pdf docs: Information
Operations Roadmap, Information Operations: Doctrine, Tactics,
Techniques, and Procedures)
InfraGuard is Federal Bureau of Investigation program âthat began in
the Cleveland Field Office in 1996. It was a local effort to gain
support from the information technology industry and academia for the
FBIâs investigative efforts in the cyber arena. The program expanded
to other FBI Field Offices, and in 1998 the FBI assigned national
program responsibility for InfraGuard to the former National
Infrastructure Protection Center (NIPC) and to the Cyber Division in
2003. InfraGard and the FBI have developed a relationship of trust
and credibility in the exchange of information concerning various
terrorism, intelligence, criminal, and security matters.â Info
Businesses are surrendering their databases to government agencies.
Among them are commercial airlines, Universities, driving schools,
Double Click, and Choice Point. Major Internet companies have started
to deal with this problem also.
CALEA gives law enforcement officials a back door that can be used to
wiretap systems. Read my previous post on this subject here.
In its May 2004 report on federal data mining efforts, Federal
Efforts Cover a Wide Range of Uses, GAO-04-548,May 2004. . The U.S.
General Accounting Office(now called the Government Accountability
Office) revealed projects that use personal information from the
private sector. The Defense Intelligence Agency, mines data âto
identify foreign terrorists or U.S. citizens connected to foreign
terrorism activitiesâ. The National Security Agency program called
Novel Intelligence from Massive Data, extracts information from
databases including text, audio, video, graphs, images, maps,
equations, and chemical formulas. The C.I.A. reportedly has a data-
mining program called âQuantum Leapâ which âenables an analyst
to get quick access to all the information available â classified
and unclassified â about virtually anyoneâ.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Citizens for Legitimate Government
http://news.com.com/ISP+snooping+gaining+support/
2100-1028_3-6061187.html
"The 'department [of defence] must be prepared to 'fight the net'".
America's war on the web 02 Apr 2006 By Neil Mackay "...[Details] are
contained in a report, entitled The Information Operations Roadmap,
commissioned and approved by US secretary of defence Donald Rumsfeld
and seen by the Sunday Herald. The Pentagon has already signed off
$383 million to force through the documentâs recommendations by
2009. Military and intelligence sources in the US talk of 'a
revolution in the concept of warfare'... Firstly, the Pentagon says
it will wage war against the internet in order to dominate the realm
of communications, prevent digital attacks on the US and its allies,
and to have the upper hand when launching cyber-attacks against
enemies. Secondly, psychological military operations, known as
psyops, will be at the heart of future military action... Thirdly,
the US wants to take control of the Earth's electromagnetic spectrum,
allowing US war planners to dominate mobile phones, PDAs, the web,
radio, TV and other forms of modern communication. That could see
entire countries denied access to telecommunications at the flick of
a switch by America... The report says the US militaryâs first
priority is that the 'department [of defence] must be prepared to
'fight the net'. The internet is seen in much the same way as an
enemy state by the Pentagon because of the way it can be used to
propagandise, organise and mount electronic attacks on crucial US
targets. Under the heading 'offensive cyber operations', two pages
outlining possible operations are blacked out."
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Part I: The End of the Internet? Net Neutrality Threatened by
Cable, Telecom Interests
http://www.democracynow.org/print.pl?sid=06/04/13/146201
Part II: The End of the Internet? Net Neutrality Threatened by Cable,
Telecom Interests
http://www.democracynow.org/print.pl?sid=06/04/14/147241
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Now, as for the other Them of The Month campaigns, we will continue
in the next DRANT:
The Big Sell #2
GLOBAL YADA YADA:
This is a little more tricky.
But it seems clear to me that this is really about
1) OIL
2) COAL
Which is to say, more money for Bush and, of course, his daddy and
Cheney's pals.
It has to be seen in context with the otherwise inexplicable
Bushifying of our Oil Dependence in the State of The Union address.
Now what the hell ? Why did he stick that in ? As the cartoon
character always says: "what the ?"
And finally:
The Big Sell #3
The PARADE OF THE GENERALS:
And now, I'm really scared.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DRANT http://drrant.blogspot.com · POB 411197 · San Francisco ·
CA · 94141 1197
If you wish to UNSUBSCRIBE, please just reply to this email, and put
UNSUBSCRIBE in the Subject line of your email.
Thanks.
David Rubinson
,,,, ,,,,
\\\ ///
~~~~~~~~~~{ô¿ô}~~~~~~~~~~~~~~~~~
~~~~~~~~~~( . ) ~~~~~~~~~~~~~~~~~
::::::::::::::ooo:::ooo :::::::::::::::::::::::::::::::::::::::::::::
::::::::::::::( ) :::
( )::::::::::::::::::::::::::::::::::::::::::::
( ) ( )
in J A M A I C A
YAH !! MON !!
Quote of the day:
"To live as if our choices make any real difference in the long
run may be the act of a fool, but to live as if they do not,
that is the act of a coward."
--Albert Camus
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.pairlist.net/pipermail/austin-ghetto-list/attachments/20060511/51ea6fd8/attachment-0001.html
More information about the Austin-ghetto-list
mailing list