Moon of Alabama Brecht quote
May 11, 2006
A Useless Program

USA Today reports that three big telecommonication companies, AT&T, Verizon and BellSouth, have delivered and are delivering all call detail records (CDRs) of domestic and international phonecalls to the NSA. Quest as the fourth biggest provider did not deliver such records, for doubts on the legality and fear of fines, even as it was pressured to do so.

CDRs include the callers telephone number, the number called, the start time and the end time of a call. They do not include the call content, i.e. the talk. The companies deny to have delivered additional information, like addresses or customer names. USA Today only reported on fixed phone lines. But we can reasonably assume that cell phone and voice over Internet call data is also used.

The NSA, as someone tells USA Today is, "to create a database of every call ever made". That can be done. But how useful might this attempt be?

I believe that that indentifying terrorist networks through this can not succeed and that the program thereby does not add to the security of the people.
But history has shown that such datacollections can be and will be abused. The NSA program thereby decreses the security of the people and should be abolished.

The NSA is said to use the data to do "social network analysis" to identify terrorist networks. 

I have worked intensively with CDRs for billing purposes and to project usage behaviour  for international internet service and telco providers. Pure CDRs will give you interesting data on "social network analysis". But only in a statistical sense.

On a Sunday afternoon I did get an emergency call by an U.S. based online service. Their network folks thought their European access network had gone down when they saw a sudden and massive drop of online traffic. I, like many million others in Europe, was watching a Formula 1 race, so the reason was immediate clear to me, but I missed some race laps while explaining the importance of Formula 1 in Europe.

So the NSA may be able to group NASCAR loving households as their call volume will be low through a race and spike immediately when its over. It may be able to group the households with teenage girls as, except for vacation time, their line will light up shortly after school.

But pure CDR analysis will only get you down to social groups with ten-thousands of members, not to small terrorist groups. The NSA must add to that information which is easy as there are many address databases that include the phonenumbers. They will have those plus mortgage data, credit card information, tax-data and maybe medical and/or insurance records.

The NSA did, as Technology Review reported, take over Pointdexters Total Information Awareness Project which was planed for such dataprocessing.

Still, with all this information available, how far down can "social network analysis" go? What defines a "terrorist" social network? What identifies it? What is the minimum group size that is identifyable by this datamining?

The official report on the London bombing on July 7 2005 shows that there was only very, very little that could have enabled the identification of this small group of domestic suicide bombers before their deeds.

Four domestic folks, with no foreign connection, who had a few things in common and a lot of things not in common. They did not use the same hairdresser, did not buy their food at the same market and went to different doctors. The were a social network overlayed with other social networks they did not have in common. No datamining I can think of would have identified them as what they turned out to be.

Datamining is useless for finding small groups that behave normal except in one social issue. Datamining will deliver a lot of "suspect" behavior of small groups and individual people. But the sheer size of the possibilities will find ten-thousands or hundred-thousands of "suspects" without identifying any real terrorist other than by chance.

Indeed the FBI has complained about the trash of thousands of false tips that resulted from the program and that the NSA delivered to them.

The NSA datamining attempt is useless to find terrorist "social networks". Therefor the program should be buried.

Unless of course there are other "social networks" one wants to keep an ear on.

Comments

Exactly. The NSA and FBI are already drowning in information. It is exceedingly doubtful that a database this size would allow any sort of meaningful analysis. On the other hand, the potential for political misuse is obvious. Let’s say you’re, oh, a powerful Republican Congressman facing a tough reelection fight. Wouldn’t it be awfully helpful to know exactly what calls were made from your opponent’s home phone?
The prescience of the drafters of the US Constitution, in requiring a warrant to search a person’s home, is startling. They might never have envisioned a program like this — but they knew precisely what unscrupulous government could do. Yet further evidence that Bush has systematically violated the Constitution and all sorts of laws. Of course, that’s nowhere near as serious as, say, having consensual sex with an intern.

Posted by: Aigin | May 11 2006 18:18 utc | 1

The first thing I did this morning was look into switching from Verizon to Qwest. It wasn’t available in my area. It will be interesting to see what stocks in Qwest do.

Posted by: beq | May 11 2006 18:40 utc | 2

@beq – stocks – maybe not what you expected. As of now Q down 2.2%, T down 0.04%.
All those fat government contracts will go to AT&T. Quest will not get any because they refused cooperation. Looks like wallstreet doesn´t believe AT&T will be fined for their corruption.

Posted by: b | May 11 2006 18:47 utc | 3

Bush:

“We are not mining or trolling through the personal lives of millions of innocent Americans,” Bush said. “Our efforts are focused on links to al-Qaeda and their known affiliates.”

All phone records of 200 million U.S. phone lines are needed to focus on links to al-Quaeda.

Posted by: b | May 11 2006 18:49 utc | 4

This sort of phone tapping is the cyberspace equivalent of having Halliburton build domestic detention camps: they are just boning up for the Big One.
Once the Big Brother Database is installed, it will be an easy step to install the telescreens.

Posted by: ralphieboy | May 11 2006 19:18 utc | 5

But they don’t have any bodies to actually translate any of the intercepts.

Posted by: Anonymous | May 11 2006 19:50 utc | 6

DefenseTech: NSA Sweep “Waste of Time,” Analyst Says

Here’s what Krebs had to say about the newly-revealed NSA program that aims to track “every call ever made”: “If you’re looking for a needle, making the haystack bigger is counterintuitive. It just doesn’t make sense.”
“Certain people are more suspicious than others,” he adds. They make frequent trips back-and-forth to Afghanistan, for instance. “So you start with them. And you work two steps out. If none of those people are connected, you don’t have a cell. Because if one was there, you’d find some clustering. You don’t have to collect all the data in the world to do that.”

Posted by: b | May 11 2006 20:04 utc | 7

With the data they have, there is a kind of software that can draw links on which numbers call which other numbers, so I don’t think it’s really a “needle in a larger haystack”. This software prints out data that looks like a “family tree” sorta – with lots of curvilinear branches connecting different phone calls. It’s used in law enforcement by the Feds (with a warrant) – and if it’s used to break up a drug distribution chain or other organized crime, it’s a *very* powerful tool. Start with one known number, and things branch out very far, to several degrees of separation.
But – if the fed’s wanted to go after dissident groups, political activists, it could very easily “sweep up” huge numbers of political activists as well. It’s very scary to me that the Feds have completely abandoned the 4th amendment here.

Posted by: foilhatgrrl | May 11 2006 20:07 utc | 8

assuming they were actually using it for monitoring ME terrorists, yes, it is a useless operation. assuming it is part of the new national security state, it’s probably a required step for anticipated applications, and not useless at all.

Posted by: b real | May 11 2006 20:10 utc | 9

Why is the USAToday story getting all the news when this article in last month’s Atlantic got nary a peep?

The Atlantic Monthly | April 2006
Big Brother Is Listening
(page 1 of 4)
The NSA has the ability to eavesdrop on your communications—landlines, cell phones, e-mails, BlackBerry messages, Internet searches, and more—with ease. What happens when the technology of espionage outstrips the law’s ability to protect ordinary citizens from it?
by James Bamford

Posted by: Hamburger | May 11 2006 20:19 utc | 10

Look, the big war for these people is the war at home, which is mainly being fought in our federal bureaucracy. Whistleblowers and reporters can be easily linked with this information, and effectively neutralized.

Posted by: Dick Durata | May 11 2006 20:24 utc | 11

Anyone who thinks Bu$hCo is telling the truth about this matter should not be allowed to handle heavy machinery, sharp knives, or firearms.
As an intellectual exercise, how long will it be until it is revealed that, in fact, NSA has been trapping the entire content of phone calls and other forms of electronic communication, including emails and internet messages?
Because think of them – just how many times now have we learned something shocking, and they have immediately protested that they aren’t doing worse than that, only to find out they were, in fact, doing worse?

Posted by: Lurch | May 11 2006 20:53 utc | 12

@b
Regarding the DefenseTech: (NSA Sweep “Waste of Time,” Analyst Says) link, that is complete bullshit because, they can , have, and will back engineer data on whom ever they want to target. Saying it is a waste of time is less than genuous. I can’t find it now but posted a link here (I believe) not long back with information on the up and coming trends in software data analysis such as SPSS. And other software companies that are specific in mining the complicated data within massive data.
Why is the USAToday story getting all the news when this article in last month’s Atlantic got nary a peep?
Good Question hamburger…

Posted by: Uncle $cam | May 11 2006 21:27 utc | 13

Scam, here it is. How 1984 works in 2006 – Wiretapping Unveiled a daily kos diary by dhomyak.
I didn’t verify that the texts were correct, but dhomyak quotes a high-tech communications equipment vendor which he references:

Capable of monitoring 10 billion bits of data per second in real-time. This means the NarusInsight can monitor an OC-192 in realtime. For reference 10 billion bits is 10 million Kbts, divide that by the average DSL user witch is 256 Kbts (10000000/256) you get monitoring of 39062.5 DSL lines in realtime for every piece of hardware. After data capture Narus softeware can replay data. What does this mean well acrodding too Narus website “Capabilities include playback of streaming media (for example, VoIP), rendering of Web pages, examination of e-mails and the ability to analyze the payload/attachments of e-mail or file transfer protocols.” Think of it as Tivo for the internet able to replay 39000 US DSL users activity in realtime for every piece of hardware.

I guess that not only will the revolution be televised, it will be recorded and stored for future playback. Gives a whole new meaning to the phrase “time-shifting.” [Apologies to Gill Scott Heron.]

Posted by: jonku | May 11 2006 21:52 utc | 14

what makes this all really sick is that Narus has sold that same machine to the chinese. So not only do we have our government spying on us, we have sold the technology to others so that they may too spy on us.
my my, what a tangled web we do weave

Posted by: dan of steele | May 11 2006 22:12 utc | 15

Thanks jonku, but that was not what I was refering to although along the same lines. No what I was looking for was a specific link I posted w/regards certain software companies such as clickstream for example. But with irrevocable use to military and the NSA. I’m still looking and will post if I find em.
Anyhow, whether or not the data is used for nefarious/inimical or benign use it still has intended direct and indirect effects and purposes hence…
Consequences of the Panopticon
as Foucault puts it:

the major effect of the Panopticon: to induce in the inmate [in this case you] a state of conscious and permanent visibility that assures the automatic functioning of power. So to arrange things that the surveillance is permanent in its effects, even if it is discontinuous in its action; that the perfection of power should tend to render its actual exercise unnecessary; that this architectural apparatus should be a machine for creating and sustaining a power relation independent of the person who exercises it

As the saying goes, the military is always thirty years ahead in technology than the public knows…
If you haven’t seen what technofascism is about do look over this: The Panopticon Singularity.

Posted by: Uncle $cam | May 11 2006 22:33 utc | 16

Bush will soon force us to take his mark on our forehands or right hands. It’s only a matter of time. Apocalpse? We’re soaking in it!

Posted by: Diogenes | May 11 2006 23:01 utc | 17

Singularity, schmingularity.
Die Gedanken sind frei,
wer kann sie erraten;
sie fliehen vorbei
wie naechtliche Schatten.
Kein Mensch kann sie wissen,
kein Jaeger erschiessen;
es bleibet dabei:
Die Gedanken sind frei.
Ich denk was ich will,
und was mich begluecket,
Doch alles in der Still,
und wie es sich schicket.
Mein Wunsch und Begehren
kann niemand verwehren,
es bleibet dabei:
Die Gedanken sind frei.
Und sperrt man mich ein
in finsteren Kerker,
das alles sind rein
vergebliche Werke;
denn meine Gedanken
zerreissen die Schranken
und Mauern entzwei:
Die Gedanken sind frei.
Drum will ich auf immer
den Sorgen entsagen
und will mich auf nimmer
mit Grillen mehr plagen.
Man kann ja im Herzen
stets lachen und scherzen
und denken dabei:
Die Gedanken sind frei.

Posted by: catlady | May 11 2006 23:09 utc | 18

You’d have to think that this is the inevitable effect of having all of the Law Enforcement Agencies welded together and called “Homeland Security”.
‘Strapping’ as it used to be called back in the day was popular in the ‘8os Reaganite “War On Drugs”. Anti -Narcotics goons all over the world used to have far less trouble getting warrants to put a device on someone’s ‘switchgear’ that noted down incoming and outgoing phone numbers, than they would getting a warrant to listen to a “suspect’s” phone calls.
Although handy for building ‘social maps’ of drug dealers for a while, eventually the inevitable happened.
Workers in phone exchanges who didn’t neccessarily share the zealous anti-drug beliefs of the DEA, ‘n all the other enforcement tribes lining up to slap these things on anyone with eyes like pissholes in the snow, began letting people know when they were targets of strapping. That metamorphosed into a ‘nice little earn’ for Joe Wirestrippers.
Of course even before the program got going the real smarties weren’t using their phones to call colleagues; no matter how innocuous the call was be likely to be. Phones have one basic flaw which can never be remedied no matter how secure the caller is. A person can have absolute control over what they say on a phone but they have absolutely no control over what the other person says back.
Anyway once exchanges became digitized and recording who called who became an easy task that needn’t involve anyone physically in a phone exchange, the practice resurged, chiefly because it was still much easier to get warrants for strapping, as any afficianado of “The Wire” already knows. Once again their value against ‘prefessionals’ was limited because they were unlikely to have insecure telephone habits, but it could sometimes help chase the unfortunates at the bottom of the heap.
So “HomeLand Security” gets up and like every other Law Enforcement or Military program it has it’s share of advocates. People who had made their careers outta building up empires of phone data mining technicians and analysts, along with the manufacturers of the equipment that supplied to the law enforcement contracts.
They wouldn’t have skipped a beat in getting their lobbyists out there ensuring they ‘got their fair share’ of snout access to the post 911 war on Terra trough.
The data value is limited especially as a predictor of any event dope trade or terrorist but it does have some use after the event to get an idea of who was up who, and who was paying the rent, especially if dealing with idealistic amateurs or first timers.
It is that relative uselessness of this data in the war on terra that makes this whole practice so dangerous.
We all know what happens next. The fact that this empire of “the largest database in the world” isn’t delivering certainly won’t cause this self styled “wonder of the technological world” to be abandoned and closed down.
The gang wil be out there touting alternative uses for this irreplaceable gold-mine of useless information.
If they have been good little troopers greasing the hand that feeds them they will inspire legislators to legislate. Make bailiffs and bounty hunters subscribe to their ‘program’. From their it will be a short step to the mob of loan sharks and pick-pockets most treasuries have willingly abrograted responsibility for ensuring currency can be transacted securely to, AKA banks and credit card corps.
Remember that the expensive and time intensive part of the data extraction and analysis, assigning ‘perps’ to the phones need only be done when an actual ‘target’ has been identified.
It all gets too much for some poor fucker, just the minimum charge on his/her cards exceeds the most he/she can wheedle out of the faceless entity fronted by an obvious psychopath laughingly called a boss each month. Going bankrupt doesn’t ‘work’ anymore so Joe Wellupshitcreek-Sanspaddle skips. Of course the phone number on his card application is correct. When this poor fuck filled it out he/she had no idea at all that life as before was gonna change irrevocably.
Corporate gumshoe pulls up phone data sees that miscreant would call a particular person/place long distance and notifies opposite number bloodsucker at that location an our hero is once more dragged back into the fold for a spot of ‘re-education’.
So although this important step in the oppression of amerikans had to be taken under false pretences against the GWOT, amerikans will learn to love it once they are persuaded that it will only be used against those unspeakable un-Xtian parasites who don’t pay their bills.
Especially once the polished, powdered, and coiffured spokesperson for the Charge Reduction Alleviation Protocol explains that this powerful new weapon in the war against bank charges is likely to ameliorate the need for an interest rate hike.
That just one potential use. Anyone putting their mind to it could come up with lots more.

Posted by: Anonymous | May 11 2006 23:35 utc | 19

Here is one of the links I was looking for,
Israel Is Spying In And On The U.S.?
It was a four part Fox news special done after 911 that detailed the monitoring of all phone calls by an Israeli company.
Amdocs has contracts with the 25 biggest phone companies in America, and more worldwide. The White House and other secure government phone lines are
protected, but it is virtually impossible to make a call on normal phones without generating an Amdocs record of it.
I’ll keep looking for the others…

Posted by: Uncle $cam | May 12 2006 0:06 utc | 20

Here’s another: Verint (ex Comverse Systems)
I know there were two more very relevant links w/ important info however I’ll have to find em & post em later…

Posted by: Uncle $cam | May 12 2006 0:12 utc | 21

Short anonymous above:
Never use the phone for serious communication.
On this particular issue:
It’s probably just the ###### feds building empires all over. Just gets some groups collective noses in the trough. Nobody even cares at that level whether it accomplishes any thing. Many mouths to feed.

Posted by: Whitey Bulger | May 12 2006 0:16 utc | 22

“I Can’t Hear You!” NSA Laughs
Sunday 23 July 2006
API – Centennial
Jim Gillespie swivels casually around in the expensive
executive chair at his NSA listening station deep in the
underground DARPA bunker here in central Colorado.
“Katrina bought this chair,” Jim laughs softly, rubbing
his Cole Hahn hush puppies together, “And my job
reassignment here to NSA got me out of Iraq and into
your living room. The life of a lonely phone warrior.”
He turns back to the blinking laptop at his desk, like
the 100’s of other NSA domestic espionage agents
huddling over their communications stations.
“Aren’t you guys supposed to be shredding documents
and grinding up your hard discs about now, ” I asked a
young lady in a tailored gray uniform. She smiles at me
but makes no reply, tapping her Bluetooth ear bud, and
shaking her head, hands turned out.
“I can’t hear you.”
She turns back to her work, logging in, then databasing
literally hundreds of thousands of domestic phonecalls
originating every hour from the Denver telephone hub,
alll being picked up by this NSA listening post.
“I thought Congress had hearings on all this?” I ask a
close-cropped black guy who’s twiddling his pen in that
nervously annoying imitation of a rock star drummer,
a habit enjoyed by computer geeks.
He nods. “They did. So what? It was all just CYA.”
And that’s about all you’ll get from these NSA folks,
polite, helpful, noncommital answers like you’d get
on a tour of your local zoo. But pushing my welcome,
I finally got an NSA supervisor to speak, on deep cover.
“Sir, are you shutting this operation down, are you
building it up, or are you waiting for directions from
Langley on what to do with domestic spy operations?”
He thought for a moment, playing church-steeple-
open-the-doors-see-all-the-people with his hands.
“We’ve been doing domestic intelligence since long
before 9/11, and have been gathering this mountain
of data every day since then,” glancing up at the wall
calendar. “That’s been 1776 days now.”
He stops, making the Philadelphia connection, then
laughs, and waves his hand in dismissal.
“We are at war, and we have to collect evidence on
the enemy. You can’t simply tell them how you’re doing
it, and the White House cannot acknowledge everything
that we do to counter terrorism. The American people
have no expection of privacy when they use the phone
or the internet. Everything is digital broadband today,
everything can be listened in on by anyone, anywhere.”
I start to respond, but he cuts me off again.
“Your children are playing with pedophiles online,
your grandparents are watching porn on satellite
TV, your corporate CEO’s are trading insider stock
information over the cell phone, there are millions
of terrorists and industrial spies watching it all.
I’ll bet the Martians are even picking up the feed.”
I’m getting nervous, looking around.
“I’ll bet the damn Commies Martians are picking
up this conversation we’re having right now!” he
gestured wildly, removing his black NSA baseball
cap to reveal a tinfoil liner.
“But by God and George Bush, they ain’t gonna spy
on my thoughts! No, gol-dang it, they can all go to hell!”
He’s tearing at the edge of his phone pad now,
nervously flipping the pen in circles like a baton
twirler, faster and faster, rising from his seat.
He stabs the pen directly at my chest.
“You! You’re one of them Commies, ain’t you, punk!?
Guards! Guards! We got us here another Commie!”
They threw me on the floor and tossed away my
reporter’s notepad, then stripped the clothes from
my body. When I refused to take off my drawers,
a guard produced a belt knife and cut them off,
then flex-cuffed my hands behind my back. I felt
a hard rod shove up my anus, then I blacked out.
I’m writing this message to you out there from my
cell in Guantanamo. I’m here, like the others who
asked too many questions, who didn’t keep their
head down. I write a message every day on toilet
paper, kept rolled up in a ball under my armpit,
then thrown through the barbed wire late at night.
Can anyone hear me out there!?
Does the United States even exist anymore!?

Posted by: Bayt Mann | May 12 2006 2:46 utc | 23

today’s headline: Bush Defends Spying on Millions of Americans
tomorrow’s headline: Bush Defends Kidnapping Millions of Americans

Posted by: b real | May 12 2006 4:18 utc | 24

Security expert Schneider thinks along my line:

Judicial oversight is a security system, and unchecked military and police power is a security threat.

Posted by: b | May 12 2006 4:34 utc | 25

From my 5 mins. of Air America yesterday – Randi, I believe. A Professional called – had attended Bird Flu Conference to get latest updates from govt. (back in a moment) She has relative who owns farm outside of Fargo, N.D. (On Minn. border.) He was considering selling it. FEMA made an offer. Apparently they’re buying up farms all over the country.
Back to birdflu. For absolutely reliable info. I recommend listening to mkaku.org. Michio is a theoretical physicist who does a Totally reliable science prog. weekly – avail. online. (You can take what you hear there to the bank.)
He’s had two specialists on birdflu. Most recent (w/in last few wks.) reported on research just then being publ. – in Nature, I think…anyway prestigious science jrnl. (I assume it’s transparently obvious to people that there is no epidemic until it can be spread bet. humans.) They discovered that BirdFlu Is Not Transmissable Bet. Humans ‘cuz it attacks the lower portion of the lungs. To be contagious it has to attack the upper portion of the lungs, hence dislodged readily by sneezing etc.
Second, BirdFlu program – w/in last 2 mos. He had guest, who’s name I missed, who said govt. is Doing Research to figure out how to make BirdFlu Transmissable…”so they can figure out how to make a vaccine”…

Posted by: jj | May 12 2006 4:38 utc | 26

Fitting the picture (via Schneider): New security glitch found in Diebold system

Elections officials in several states are scrambling to understand and limit the risk from a “dangerous” security hole found in Diebold Election Systems Inc.’s ATM-like touch-screen voting machines.
The hole is considered more worrisome than most security problems discovered on modern voting machines, such as weak encryption, easily pickable locks and use of the same, weak password nationwide.
Armed with a little basic knowledge of Diebold voting systems and a standard component available at any computer store, someone with a minute or two of access to a Diebold touch screen could load virtually any software into the machine and disable it, redistribute votes or alter its performance in myriad ways.
“This one is worse than any of the others I’ve seen. It’s more fundamental,” said Douglas Jones, a University of Iowa computer scientist and veteran voting-system examiner for the state of Iowa.
“In the other ones, we’ve been arguing about the security of the locks on the front door,” Jones said. “Now we find that there’s no back door. This is the kind of thing where if the states don’t get out in front of the hackers, there’s a real threat.”
This newspaper is withholding some details of the vulnerability at the request of several elections officials and scientists, partly because exploiting it is so simple and the tools for doing so are widely available.

Posted by: b | May 12 2006 4:40 utc | 27

Here’s another Useless Program.
xAm. Taliban are declaring war on us, using our children:
If you’ve been waiting until the Christian fascist movement started filling stadiums with young people and hyping them up to do battle in “God’s army” to get alarmed, wait no longer.
In recent weeks, Battle Cry, a Christian fundamentalist youth movement, has attracted more than 25,000 to mega-rally rock concerts in San Francisco and Detroit and this weekend they plan to fill Wachovia Stadium in Philadelphia.
They claim their religion and values are under attack but, amidst spectacular lightshows, hummers, Navy Seals, and military imagery on stage, it is Battle Cry that has declared war on everyone else! Their leader, Ron Luce, insists: “This is war. And Jesus invites us to get into the action, telling us that the violent–the ‘forceful’ ones–will lay hold of the kingdom.”
A glimpse at Battle Cry’s Honor Academy, which trains 500 youth each year and preaches that homosexuality and masturbation are sins, reveals a lot about what kind of society they are fighting for. Interns are forbidden to listen to secular music, watch R-rated movies or date. Men can’t use the internet unsupervised and the length of women’s skirts is regulated. The logic behind this, that men must be protected from the sin of sexual temptation, is what drives Islamic fundamentalists to shroud women in burkhas!
Behind their multi-million dollar operation that sends more than 5,000 missionaries to more than thirty-four countries each year, are some of the most powerful and extreme religious lunatics in the country. Their partners include Pat Robertson (who got a call from Karl Rove to discuss Alito before the nomination was made public), Ted Haggard (who brags that his concerns will be responded to by the White House within 24 hours), Jerry Falwell (who blamed September 11th on homosexuals, feminists, pagans, and abortionists), and others. Their events have been addressed by Barbara Bush (via video) as well as former President Gerry Ford. This weekend’s event will include Franklyn Graham who has ministered to George Bush and publicly proclaimed that Islam is an “evil religion.”
Meet the Shock Troops of the Christian Youth
Somebody better start finding alternatives for the young before it’s too late. One can see how this is attractive to lost, angry, frightened youngsters – it offers instant community, promises of being in the vanguard in creating the future, perhaps redemption, adolescent males get to fight, and females are assured of “protection”…
The rest of us know the predators, et al have destroyed the country, wiped out the future, so what are the young to do…prob. the most sensitive will commit suicide or leave…as for the rest…

Posted by: jj | May 12 2006 5:16 utc | 28

Fortune favors Diebold

Posted by: ralphieboy | May 12 2006 5:25 utc | 29

If NSA and other agencies waste time trying to figure out who’s a terrorist with *this*, they’ll never find the real ones, won’t have enough time.
Thougb of course social network analysis is a good way of finding out who belongs to annoying “useless” “inferior” social clusters. It’ll be easier to get rid of them when the time will come. The kind of tools the Nazis would’ve liked to get their hands on.
because, in all seriousness, there can be only 2 uses of such a complex and apparently useless system. Blackmail of politicians, journalists and others / broad identification of entire classes of opponents and deviants for later use during an elimination process.

Posted by: CluelessJoe | May 12 2006 8:04 utc | 30

Working Assets can’t fix the problem with the dead fourth amendment..all the switching stations are overseen by AT&T–but they offer wireless, phone and credit cards that also benefit progressive causes.
I read somewhere that everyone could go file a lawsuit for $1000 (the fine for unauthorized info sharing for telecoms per sharing..so that’s a minimum) so that AT&T’s lawyers either have to show up to defend or, if they default, the co. has to pay $1000 per person.
How many ppl would need to file for Wall Street to give a goddam fuck about this issue, I wonder? I’ll do it. I’ll tell locals I know who would do it too. How many ppl in your area do you know who would be willing to do this? This may be the only way we can fight back as everyday citizens. I’ll go find the info again if ppl here are willing to file such a suit.
Jack Cafferty on dictatorship at Crooks and Liars– a secret govt agency is telling our Justice Dept. that it does not have the authority to investigate it…and Bush announces today that it’s all fine…
Cafferty can reach an audience that Amy Goodman or most blogs cannot.
It would also seem that a march on washington will be required soon…a march that includes a cross section of Americans…i.e. blue-haired anti-globalists and blue-haired old ladies from the Quaker meeting house. With a 29% approval rating, Bush needs to feel the love…not for him, but for Constitutional guarantees.
Are any state legislatures following IL’s lead and taking an impeachment request to their federal reps? If nothing else, this would be a good election issue…does your rep support the constitution or the Bush administration?
I don’t think it’s possible to do both.
jj- these “shock troops” are coming from families who support this jihad, as much as anywhere else, I would bet big money.
where I am, kids are doing things like making their own movies or playing sports or volunteering at the local science museum
…there are plenty of things for kids to do. This has NOTHING to do with kids needing activities, beyond the issue of funds for poor kids. This has to do with the homeschooled Hitler youth and other fundie cult activities. This is an approved activity for these kids’ parents.
You cannot tell another parent that they are raising their kid to be a fascist by their religious indoctrination. well, you can, but it wouldn’t matter — and for good reason — I certainly wouldn’t want fundies to tell me I had no right to raise my children as agnostics or secular skeptics or deists or whatever — even tho they do. I wouldn’t want their words to have legal weight, however.
it’s the isolation from the real world that is the problem for these kids..their regimine reads like the Moonies or Jim Jones meetings. If any of them get a chance to actually live in the real world, I’m sure quite a few of them will defect.
Making their kids into fascist shock troops is part of the social life of fundies.

Posted by: fauxreal | May 12 2006 8:25 utc | 31

LA Times:

The record-gathering program described by USA Today does not involve the NSA listening to or recording conversations.
Instead, the aim is to analyze calling patterns for possible clues about the ways that terrorist networks communicate.
Some critics asked Thursday whether the two programs were linked, suggesting the NSA was combing phone logs to identify people to wiretap. NSA spokesman Don Weber declined to address the matter, saying, “It would be irresponsible to comment on actual or alleged operational issues.”
Critics also questioned the usefulness of examining the phone records of millions of Americans for clues to Al Qaeda communications.
“Terrorist activity is so limited, and we have so little to go on, that you’re not going to be able to put together a pattern you can search for,” said Jim Harper, director of information policy studies at the libertarian Cato Institute and a member of a committee that advises the Department of Homeland Security on privacy matters. “You can’t put together an algorithm that finds it.”

yep

Posted by: b | May 12 2006 10:02 utc | 32

…Meanwhile most of the country yawns and changes the channel:
Poll: Most Americans Support NSA’s Efforts

The new survey found that 63 percent of Americans said they found the NSA program to be an acceptable way to investigate terrorism, including 44 percent who strongly endorsed the effort.

Posted by: mats | May 12 2006 11:56 utc | 33

And more of the same:
Most put security ahead of privacy

”I have nothing to hide, so I don’t have a problem with it. If it’s for the security of the country, it’s OK with me.”

Excuse me for having thought for a minute or two that this might be the one that tipped the whole thing over.

Posted by: mats | May 12 2006 12:27 utc | 34

mats- what a conveeenient poll.
they don’t say what question was asked or how it was worded, do they?
Post the question another way: Would you support a telephone intercept program that allowed one political party to spy on another? –in complete secrecy?
or how about this: would you support a secret agency that said no one had the power to investigate it?
whatever. the poll, once again, uses the fear of terrorism as a way to again allow the bush junta to wield powers far beyond the mandate of the constitution.

Posted by: fauxreal | May 12 2006 12:30 utc | 35

That poll is interesting.
The American people are still scared shitless 4 3/4 years into this.

Posted by: Groucho | May 12 2006 14:06 utc | 36

Todays Democracy Now on the latest developments of NSA scandal, is joined by three guests:
* Rep. Maurice Hinchey, a Democrat from New York.
* Ryan Singel, a contributing writer at Wired News.
* Tim Shorrock, independent journalist who has covered the issue for The Nation magazine.
Very much worth hearing/seeing
Three Major Telecom Companies Help US Government Spy on Millions of Americans

Posted by: Uncle $cam | May 12 2006 15:26 utc | 37

the surveillance scandal is a winner for bush.

Posted by: slothrop | May 12 2006 15:38 utc | 38

@Uncle in comment 13 – SPSS
I have worked extensively with SPSS on large data amounts. It is statistic analysis, quite refined, but nothing more.
Terrorism is so small that there is now way to “hear” it within the “white noise”. The behaviour of the actors is statistically irrelevant until they blow themself up. One will never find such through datamining other than by (a very small) chance.
Feed on the street is what you need. Police and informants within the relevant communities. Other than that – no chance. It’s useless.

Posted by: b | May 12 2006 18:17 utc | 39

Qwest Explains Why It Refused N.S.A. Query

The telecommunications company Qwest turned down requests by the National Security Agency for private telephone records because it concluded that doing so would violate federal privacy laws, a lawyer for the telephone company’s former chief executive said today.
In a statement released this morning, the lawyer said that the former chief executive, Joseph N. Nacchio, made the decision after asking whether “a warrant or other legal process had been secured in support of that request.”
Mr. Nacchio learned that no warrant had been granted and that there was a “disinclination on the part of the authorities to use any legal process,” said the lawyer, Herbert J. Stern. As a result, the statement said, Mr. Nacchio concluded that “the requests violated the privacy requirements of the Telecommunications Act.”

Posted by: b | May 12 2006 18:28 utc | 40

Maybe enough exposure will wake the public…
I doubt it.
http://thinkprogress.org/2006/05/12/more-unlawful-activity/

Posted by: Rick Happ | May 12 2006 23:20 utc | 41

@faux- good pts. But I didn’t mean nothing to do – I meant Nothing to Believe in to give them hope. I worry about this hitting critical mass & becoming a self-perpetuating youth movement.
I heard that a lot of class action lawyers are spending sleepless nights now preparing suits. Debates on whether to file under state laws (at least in Ca.) vs. Fed. laws.
I just heard my 5 mins. of Randi Rhodes today. She had Larry Johnson on. Asked him about that poll of people supporting NSA wiretapping. He was right on the nose. It’s all in how the question is asked. He said “they were asked do you support wire-tapping to prevent another attack. So, of course, they’d say yes, thinking that it’s nec. to prevent said attack.” So, don’t worry about it…it’s just mass manipulation bullshit.

Posted by: jj | May 13 2006 2:12 utc | 42

What does the government learn by discovering that one throwaway cell phone called another throaway cell phone?

Posted by: Brian Boru | May 13 2006 4:55 utc | 43