First in a series. Part 2 here. Part 3 here.
Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.
But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.
Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.
The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest.
The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
Spying on international telephone calls has always been a staple of NSA surveillance, but the requirement that an actual person do the listening meant it was effectively limited to a tiny percentage of the total traffic. By leveraging advances in automated speech recognition, the NSA has entered the era of bulk listening.
And this has happened with no apparent public oversight, hearings or legislative action. Congress hasn’t shown signs of even knowing that it’s going on.
The USA Freedom Act — the surveillance reform bill that Congress is currently debating — doesn’t address the topic at all. The bill would end an NSA program that does not collect voice content: the government’s bulk collection of domestic calling data, showing who called who and for how long.
Even if becomes law, the bill would leave in place a multitude of mechanisms exposed by Snowden that scoop up vast amounts of innocent people’s text and voice communications in the U.S. and across the globe.
Civil liberty experts contacted by The Intercept said the NSA’s speech-to-text capabilities are a disturbing example of the privacy invasions that are becoming possible as our analog world transitions to a digital one.
“I think people don’t understand that the economics of surveillance have totally changed,” Jennifer Granick, civil liberties director at the Stanford Center for Internet and Society, told The Intercept.
“Once you have this capability, then the question is: How will it be deployed? Can you temporarily cache all American phone calls, transcribe all the phone calls, and do text searching of the content of the calls?” she said. “It may not be what they are doing right now, but they’ll be able to do it.”
And, she asked: “How would we ever know if they change the policy?”
Indeed, NSA officials have been secretive about their ability to convert speech to text, and how widely they use it, leaving open any number of possibilities.
That secrecy is the key, Granick said. “We don’t have any idea how many innocent people are being affected, or how many of those innocent people are also Americans.”
NSA whistleblower Thomas Drake, who was trained as a voice processing crypto-linguist and worked at the agency until 2008, told The Intercept that he saw a huge push after the September 11, 2001 terror attacks to turn the massive amounts of voice communications being collected into something more useful.
Human listening was clearly not going to be the solution. “There weren’t enough ears,” he said.
The transcripts that emerged from the new systems weren’t perfect, he said. “But even if it’s not 100 percent, I can still get a lot more information. It’s far more accessible. I can search against it.”
Converting speech to text makes it easier for the NSA to see what it has collected and stored, according to Drake. “The breakthrough was being able to do it on a vast scale,” he said.
The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s.
What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds.
In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited.
Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
“I would tell you we are not very good at that,” he said.
In an ideal environment like a news broadcast, he said, “we’re getting pretty good at being able to do these types of translations.”
A 2008 document from the Snowden archive shows that transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing:
(U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing.
A version of the system the NSA uses is now even available commercially.
Experts in speech recognition say that in the last decade or so, the pace of technological improvement has been explosive. As information storage became cheaper and more efficient, technology companies were able to store massive amounts of voice data on their servers, allowing them to continually update and improve the models. Enormous processors, tuned as “deep neural networks” that detect patterns like human brains do, produce much cleaner transcripts.
And the Snowden documents show that the same kinds of leaps forward seen in commercial speech-to-text products have also been happening in secret at the NSA, fueled by the agency’s singular access to astronomical processing power and its own vast data archives.
In fact, the NSA has been repeatedly releasing new and improved speech recognition systems for more than a decade.
The first-generation tool, which made keyword-searching of vast amounts of voice content possible, was rolled out in 2004 and code-named RHINEHART.
“Voice word search technology allows analysts to find and prioritize intercept based on its intelligence content,” says an internal 2006 NSA memo entitled “For Media Mining, the Future Is Now!”
The memo says that intelligence analysts involved in counterterrorism were able to identify terms related to bomb-making materials, like “detonator” and “hydrogen peroxide,” as well as place names like “Baghdad” or people like “Musharaf.”
RHINEHART was “designed to support both real-time searches, in which incoming data is automatically searched by a designated set of dictionaries, and retrospective searches, in which analysts can repeatedly search over months of past traffic,” the memo explains (emphasis in original).
As of 2006, RHINEHART was operating “across a wide variety of missions and languages” and was “used throughout the NSA/CSS [Central Security Service] Enterprise.”
But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.”
The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states.
A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
Voice communications can be collected by the NSA whether they are being sent by regular phone lines, over cellular networks, or through voice-over-internet services. Previously released documents from the Snowden archive describe enormous efforts by the NSA during the last decade to get access to voice-over-internet content like Skype calls, for instance. And other documents in the archive chronicle the agency’s adjustment to the fact that an increasingly large percentage of conversations, even those that start as landline or mobile calls, end up as digitized packets flying through the same fiber-optic cables that the NSA taps so effectively for other data and voice communications.
The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America.
For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.”
The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
A slide from a June 2006 NSA powerpoint presentation described the role of VoiceRT:

According to a 2011 memo, “How is Human Language Technology (HLT) Progressing?“, NSA that year deployed “HLT Labs” to Afghanistan, NSA facilities in Texas and Georgia, and listening posts in Latin America run by the Special Collection Service, a joint NSA/CIA unit that operates out of embassies and other locations.
“Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
The memo offers an example from NSA Texas, where an analyst newly trained on the system used a keyword search to find previously unreported information on a target involved in drug-trafficking. In another case, an official at a Special Collection Service site in Latin America “was able to find foreign intelligence regarding a Cuban official in a fraction of the usual time.”
In a 2011 article, “Finding Nuggets — Quickly — in a Heap of Voice Collection, From Mexico to Afghanistan,” an intelligence analysis technical director from NSA Texas described the “rare life-changing instance” when he learned about human language technology, and its ability to “find the exact traffic of interest within a mass of collection.”
Analysts in Texas found the new technology a boon for spying. “From finding tunnels in Tijuana, identifying bomb threats in the streets of Mexico City, or shedding light on the shooting of US Customs officials in Potosi, Mexico, the technology did what it advertised: It accelerated the process of finding relevant intelligence when time was of the essence,” he wrote. (Emphasis in original.)
The author of the memo was also part of a team that introduced the technology to military leaders in Afghanistan. “From Kandahar to Kabul, we have traveled the country explaining NSA leaders’ vision and introducing SIGINT teams to what HLT analytics can do today and to what is still needed to make this technology a game-changing success,” the memo reads.
What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.”
The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”

Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
“The National Security Agency employs a variety of technologies in the course of its authorized foreign-intelligence mission,” spokesperson Vanee’ Vines wrote in an email to The Intercept. “These capabilities, operated by NSA’s dedicated professionals and overseen by multiple internal and external authorities, help to deter threats from international terrorists, human traffickers, cyber criminals, and others who seek to harm our citizens and allies.”
Vines did not respond to the specific questions about privacy protections in place related to the processing of domestic or domestic-to-international voice communications. But she wrote that “NSA always applies rigorous protections designed to safeguard the privacy not only of U.S. persons, but also of foreigners abroad, as directed by the President in January 2014.”
The presidentially appointed but independent Privacy and Civil Liberties Oversight Board (PCLOB) didn’t mention speech-to-text technology in its public reports.
“I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept.
His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
“We went to the intelligence community and asked them to declassify a significant amount of material,” he said. The “vast majority” of that material was declassified, he said. But not all — including “facts that we thought could be declassified without compromising national security.”
Hypothetically, Medine said, the ability to turn voice into text would raise significant privacy concerns. And it would also raise questions about how the intelligence agencies “minimize” the retention and dissemination of material— particularly involving U.S. persons — that doesn’t include information they’re explicitly allowed to keep.
“Obviously it increases the ability of the government to process information from more calls,” Medine said. “It would also allow the government to listen in on more calls, which would raise more of the kind of privacy issues that the board has raised in the past.”
“I’m not saying the government does or doesn’t do it,” he said, “just that these would be the consequences.”
Speech recognition expert Bhiksha Raj likens the current era to the early days of the Internet, when people didn’t fully realize how the things they typed would last forever.
“When I started using the Internet in the 90s, I was just posting stuff,” said Raj, an associate professor at Carnegie Mellon University’s Language Technologies Institute. “It never struck me that 20 years later I could go Google myself and pull all this up. Imagine if I posted something on alt.binaries.pictures.erotica or something like that, and now that post is going to embarrass me forever.”
The same is increasingly becoming the case with voice communication, he said. And the stakes are even higher, given that the majority of the world’s communication has historically been conducted by voice, and it has traditionally been considered a private mode of communication.
“People still aren’t realizing quite the magnitude that the problem could get to,” Raj said. “And it’s not just surveillance,” he said. “People are using voice services all the time. And where does the voice go? It’s sitting somewhere. It’s going somewhere. You’re living on trust.” He added: “Right now I don’t think you can trust anybody.”
Kim Taipale, executive director of the Stilwell Center for Advanced Studies in Science and Technology Policy, is one of several people who tried a decade ago to get policymakers to recognize that existing surveillance law doesn’t adequately deal with new global communication networks and advanced technologies including speech recognition.
“Things aren’t ephemeral anymore,” Taipale told The Intercept. “We’re living in a world where many things that were fleeting in the analog world are now on the permanent record. The question then becomes: what are the consequences of that and what are the rules going to be to deal with those consequences?”
Realistically, Taipale said, “the ability of the government to search voice communication in bulk is one of the things we may have to live with under some circumstances going forward.” But there at least need to be “clear public rules and effective oversight to make sure that the information is only used for appropriate law-enforcement or national security purposes consistent with Constitutional principles.”
Ultimately, Taipale said, a system where computers flag suspicious voice communications could be less invasive than one where people do the listening, given the potential for human abuse and misuse to lead to privacy violations. “Automated analysis has different privacy implications,” he said.
But to Jay Stanley, a senior policy analyst with the ACLU’s Speech, Privacy and Technology Project, the distinction between a human listening and a computer listening is irrelevant in terms of privacy, possible consequences, and a chilling effect on speech.
“What people care about in the end, and what creates chilling effects in the end, are consequences,” he said. “I think that over time, people would learn to fear computerized eavesdropping just as much as they fear eavesdropping by humans, because of the consequences that it could bring.”
Indeed, computer listening could raise new concerns. One of the internal NSA memos from 2006 says an “important enhancement under development is the ability for this HLT capability to predict what intercepted data might be of interest to analysts based on the analysts’ past behavior.”
Citing Amazon’s ability to not just track but predict buyer preferences, the memo says that an NSA system designed to flag interesting intercepts “offers the promise of presenting analysts with highly enriched sorting of their traffic.”
To Phillip Rogaway, a professor of computer science at the University of California, Davis, keyword-search is probably the “least of our problems.” In an email to The Intercept, Rogaway warned that “When the NSA identifies someone as ‘interesting’ based on contemporary NLP [Natural Language Processing] methods, it might be that there is no human-understandable explanation as to why beyond: ‘his corpus of discourse resembles those of others whom we thought interesting'; or the conceptual opposite: ‘his discourse looks or sounds different from most people’s.'”
If the algorithms NSA computers use to identify threats are too complex for humans to understand, Rogaway wrote, “it will be impossible to understand the contours of the surveillance apparatus by which one is judged. All that people will be able to do is to try your best to behave just like everyone else.”
Next: The NSA’s best kept open secret.
Readers with information or insight into these programs are encouraged to get in touch, either by email, or anonymously via SecureDrop.
Documents published with this article:
Research on the Snowden archive was conducted by Intercept researcher Andrew Fishman.
Illustrations by Richard Mia for The Intercept.
Finita la commedia: I discovered and patented how to structure any data: Language has its own Internal parsing, indexing and statistics. For instance, there are two sentences:
a) ‘Fire!’
b) ‘Dismay and anguish were depicted on every countenance; the males turned pale, and the females fainted; Mr. Snodgrass and Mr. Winkle grasped each other by the hand, and gazed at the spot where their leader had gone down, with frenzied eagerness; while Mr. Tupman, by way of rendering the promptest assistance, and at the same time conveying to any persons who might be within hearing, the clearest possible notion of the catastrophe, ran off across the country at his utmost speed, screaming ‘Fire!’ with all his might.’
Evidently, that the phrase ‘Fire!’ has different importance into both sentences, in regard to extra information in both. This distinction is reflected as the phrase weights: the first has 1, the second – 0.02; the greater weight signifies stronger emotional ‘acuteness’.
First you need to parse obtaining phrases from clauses, for sentences and paragraphs.
Next, you calculate Internal statistics, weights; where the weight refers to the frequency that a phrase occurs in relation to other phrases.
After that data is indexed by common dictionary, like Webster, and annotated by subtexts.
This is a small sample of the structured data:
this – signify – : 333333
both – are – once : 333333
confusion – signify – : 333321
speaking – done – once : 333112
speaking – was – both : 333109
place – is – in : 250000
To see the validity of technology – pick up any sentence.
Do you have a pencil?
All other technologies depend on spying, on quires, on SQL, all of them, finding statistics. See IBM, Oracle, Microsoft, Google and Yahoo? Apache Hadoop and NoSQL? My technology is the only one that obtains statistics from texts themselves.
Being structured information will search for users based on their profiles of structured data. Each and every user can get only specifically tailored for him information: there is no any privacy issue, nobody ever will know what the user got and read.
Google is over: 1) Google cannot provide search outside Internet, it depends on external, gotten fro popularity statistics, 2) Google technology is established on spying, Google always violate privacy.
NSA is harmless: NSA has nothing to spy after if there are no queries and no one knows how the received information is used. For phone records: I cannot do anything.
My technology exploits the Laws of Nature, which determine the inner construction of all Languages: I came from Analytic Philosophy, from Internal Relations Theory.
Sleep well! I protected you all.
A “monitoring” technology which hasn’t been talked about much is lip reading.
I wonder how far off is the automation of that kind of technology.
I think speech to text conversion could be very easily thwart
https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/#comment-130727
but they have improved visual pattern extraction and recognition to the point of being able to follow people by networking the innumerable cameras they have in public places and private businesses
I remember people making fun of Cuban baseball players because they covered their mouths with their mitts as they talked to each other on the mound …
RCL
Paging Cindy, Benito Mussolini, and peanutsandcrackerjacks –
First: thank you, Cindy and Benito —- my brain was working on this and guess what! A blog post! And peanutsandcrackerjacks, yea, we might question how realistic stuff might or might not become. However, the ‘but’ in logic is most often considered the same logic operator as ‘and’. Anyway, I hope you good folks will read the result:
http://observergal.blogspot.com/2015/05/there-is-logic-inunity.html
Transcription tech could also be interfaced with the bugging of web-enabled microphones. There is a lot research into speaker diarization, which is the process of segmenting a free-wheeling conversation between multiple parties into segmented blocks. Also in separating voices from background noise. In theory the entire process could be automated and scaled up through something like TURBINE + CAPTIVATEDAUDIENCE. I have engaged in some near-term speculation on these issues at panaudicon.wordpress.com.
“The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices…””
They bug everything and start wars of aggression with the goal of world domination while they arm, train, and fund terrorists they say they are there to defeat. Those terrorists do their land grabbing for them. For extra credit they praise their illegal spy operations in order to gain more approval.
At the risk of being censored.
I am glad Dan Froomkin is spousing the same themes (technicalities of surveillance) that Micah Lee is:
https://firstlook.org/theintercept/staff/dan-froomkin/
https://firstlook.org/theintercept/staff/micah-lee/
it is not good if one reporter “owns” a theme. For example,
https://firstlook.org/theintercept/staff/cora/
seems to own the political/scientific consciousness aspects of surveillance
https://firstlook.org/theintercept/?s=“+APA+”
and I have amusingly seen lots of comments removed (including mine) right before my eyes as I was reading them
I don’t quite get the point of censorship in general and I find it very telling and much more deplorable when it happens at IT, especially with journalists who seem to have some sort of “monopolistic” preferences on some issues. Let alone the fact the IT folks are being heavily “monitored” and minded anyway
RCL
At the risk of being censored.
I am glad Dan Froomkin is spousing the same themes (technicalities of surveillance) that Micah Lee is:
https://firstlook.org/theintercept/staff/dan-froomkin/
https://firstlook.org/theintercept/staff/micah-lee/
it is not good if one reporter “owns” a theme. For example,
https://firstlook.org/theintercept/staff/cora/
seems to own the political/scientific consciousness aspects of surveillance
https://firstlook.org/theintercept/?s=“+APA+”
and I have amusingly seen lots of comments removed (including mine) right before my eyes as I was reading them
I don’t quite get the point of censorship in general and I find it very telling and much more deplorable when it happens at IT, especially with journalists who seem to have some sort of monopolistic preferences on some issues. Let alone the fact the IT folks are being heavily “monitored” and minded anyway
RCL
What these spy agencies are going to ultimately find is that they are always a few steps behind the innovation of several billion people!
Its not only the NSA and other government agencies that have access to your phone a quick google search for “cell phone spying software” will
shock you. Even with the phone turned off your phone will continue to track you and can be remotely turned on to be used as a listening
device. You can buy this software for less than $50.00. Others using spyware include jealous admirers, criminals and many companies are
issuing company cell phones and tablets to keep track (tracking) of their employees. Taking the battery out works but this is difficult on
some phones. You can stop a cell phone from being tracked place it in a Faraday Cage. A Faraday cage is a metal or conductive envelope that
completely surrounds the electronic device and stops signals from going into or out of the cage. This can be accomplished by making a pouch
out of a metallized ie conductive fabric. Search youtube for detracktor for a demonstration.
Not surprising – but good to have the documentation. So now, all is recorded and only glory is fleeting. :) Sic transit gloria mundi.
Something, that hasn’t been clarified enough to the public is that when the NSA does their STT, of course, they must process the content, so it is not really about “metadata”
Computer hard and software, as powerful as they may seem to be, are syntactic devices. Things that our minds are good at, even unconsciously, compulsively so, is making sense of things. That is one of the reasons why we dream. Computers aren’t even good at “computing” basic Arithmetic if it can’t be nicely expressed as a (positive or negative for fractions) power of 2
Making the transcription of natural conversations fail is so easy that I wonder why technical people would even attempt to do that (or, right!, they are being paid salaries “to be smart”). You could make a semi-random device create an office ambiance-like context by saying words in the background resembling conversations. That device should be within analog boundaries and disconnected from the Internet (it should work on batteries and turned on manually). Heck! That device could even pick your own conversation and create similar ones and use the phonemes of languages to create linguistically-OK seeming noise and OK-sounding but not existing words, even with suggestive connotations!
We should stop thinking in “we versus them” ways. Among many other reasons, because we have adopted this kind of thinking from them. Even someone like Glenn verbalizes stuff like: “American values”. I wonder what he means by that and English is his mother tongue and language some of his forté. Does he mean “just, democratic principles”?
We can make them go back to actually listen to us. Do you want to eavesdrop my conversations, please do! But do it right! In fact, by forcing them to have to actually make their morally deafferented morons listen to conversations. You would not only easily bankrupt the NSA (something (defundthensa.com) neither somewhat conscientious politicians, nor “the people” could do) but while you are at it you would be protecting yourself from being “mapped” and making their “predictive you-wanna be ghosts” as their algorithms decide, take over your life
our “duly elected representatives” … one of many of Obama’s catchphrases: “let’s look forward not backwards”, “yes we can”, “let me be clear”, …
~
// __ The One Phrase Obama Can’t Do Without
~
youtube.com/watch?v=gSbl_uvtNSE&hd=1
~
// __ Four Years of Speeches, One Signature Phrase
~
youtube.com/watch?v=5oNcHS0c5W8&hd=1
~
// __ Obama Worse Than Nixon? Former Congressman
~
youtube.com/watch?v=02rb9QaqnzU&hd=1
~
lawyers at work
Yeah, once you have the proverbial “hammer” you will certainly “find” not only the wood and nails, but also the necessity to constantly hammer, constantly find wood and nails
Well, sorry, but our algorithms have identified some sequences of characters such as “know”, “policy” and “ever” which have been red flagged and, for your information, even though we haven’t still figured out what -you- mean by “we”, it is clear whom you meant by “they”
USG’s sigint bot
and they sorely lack brains so there is a very easy way to beat them. Make them effing listen to you! (as I thoroughly explained)
“there’s a lot of noise on the signal” and “it’s informal as hell.” … they love data, so give them data! Also, people having conversations don’t have to:
1) mention explicitly what they are referring to. Unless you are talking to a total stranger on the phone, there is a certain degree of intersubjectivity among communicating parties
2) mention explicitly any dates, locations and people’s names
Great Lord! They already know how brains work?!? I am shitting in my pants right now.
Aren’t they lovely! ;-)
“detonator”, “hydrogen peroxide”, “connotation”, “hydrogen peroxide”, ”gas oxygen 5”, ”oval office”, ”pentagon”, ”fly path”, ”that apple”, ”gasoline”, ”ice cream”, …
Still monkey tech!
A bit better monkey tech!
Exactly! How lovely those idiots’ idiocy is! Paired dialogue transcriptions can be simulated a la “Chinese room experiment” using Zeitgeisted corpora …
I didn’t know to them we are all Iraqi now
and this is so, because the NSA says so …
and “other locations”? …
What these idiots don’t get (well this is what it means to be an idiot anyway, right?) is that “knowing too much” will create illusive artifacts in your minds … Oops! Sorry! Why did I tell them? Well, we are talking here about supposed “intelligence” of police, politicians, snitches, shills … anyway
I thought we were all Iraqis anyway. Aren’t we?
My crystal ball tells me they most probably are some sort of Markov-chain algorithms
As if we should believe anything they say
This is one of the many other aspects that is not being clarified. What the preposterous eff could “minimize” in that case mean? Once they grab it, it is theirs for good. “Formatting hard drives”, “deleting” data once it becomes physically permanent is physically impossible anyway (magnetic hysteresis).
You can think of it this way. A hard drive is not exactly like a sheet of paper on which you write using continuous sequences of characters and would use an eraser of whiteout when you make a mistake or edit the text. Now, while erasing or whiting out sections of text, you don’t really bring back that section to how it was previously. As you know you always leave marks and traces, but if you darken that area enough with some chemical substance that would dilute the previous ink and only give people copies (not the original pieces of paper (as they do when you ask for your records as part of a FOA request)) you won’t be able to resurrect those sections of text.
Now, that you can’t really do with a hard drive for physical reasons (and in Physics (not “God”) we (can safely) trust!) There are people (supposed scientists) stating that even though hysteresis does happen (so the data is in there anyway), for (also physical) stochastic reasons relating to temperature changes, … and other (software-related) encoding issues like the data sections not including time stamps, you can’t fully undelete a drive using electron microscopy in a totally reliable …
OK, I could give you a larger explanation why this is not true, but I have a better way to explain it to you. If that is true the USG would be selling massive amounts of not really end of life hard drives on ebay (they must stay “ahead of the game”), however what they do is smash them into dust and sell them as ~scrab~ metal ;-)
It is not even about “embarrassment” professor and who are you to decide how what you have done could be useful or what you or the people you intimate with should be “embarrassed” about
USG
considered Sir!
USG
Ungrateful professor, how could you dare to say you don’t trust your freedom-loving, democratic government?
USG
Well, the rules seem to be so simple that even we understand them:
1) Bye bye privacy! Hello surveillance!
2) In case of doubts or misunderstandings, reread §1
USG
Taipale, you see it is very easy you have yourself worded it for us and it is all footed in to classified adjectives: “clear” and “appropriate” …
USG
Well, not exactly as they pointed out earlier “there are not enough ears”, let alone brains
Exactly! and here we are, of course, talking about that “consequences” thing which is a concern of mere mortals
How lovely! Theoretical Physicists are ashamed of entanglement (they aren’t able to see through it given our paradigms and functional illusions about space and time) Now, courtesy of the NSA, we all have “entangled, predicted ghosts”!
Thank you professor Rogaway. Now, make them understand that!
They better do! Nigga me, was included in the FBI criminal index list …
http://ipsoscustodes.wordpress.com/2010/10/16/quis-custodiet-ipsos-custodes/
for reasons that my “entangled, predicted ghosts” may know better than me
Satyagraha,
RCL
So, we just hooked hubby up with new hearing aids, and these things are so advanced since the last pair, it’s like an new science. The speakers are now on tiny wires leading into the ear, no pushing tube air anymore, pneumatisists, pure vibration. And the device is chipped to accept several years of advancements beyond 5G while accepting Bluetooth technology. So I see now I must entertain the thought that when hosting we must not boast too much in our toasts, right, Watson? I heard Watson’s got a Brand New Gig Bag. Hubby’s wired.
OK, we need someone to figure out how to encrypt/scramble our voice communications.
While making a call several years ago, I didn’t get the normal ring tone, but instead a pleasant sounding female voice came on the line and said: “Sorry, you are on the No Phone List”.
They’ve traced my number I thought, so I borrowed a friend’s phone and tried calling again. This time, I got through, but after only a few words, the call was cut off and the same voice came on the line. “You’re vocal pattern is in our database”, it said, “there’s no use using a different phone”.
I tried to turn on the charm, since I’m usually good at lying my way out of trouble. “Your technological capabilities are extremely impressive. However, I’m the sort of person who has nothing to hide and I’ve never criticized the US government. Could there have been some sort of bureaucratic mixup?”
“No”, the voice said in a definite tone. “You have in fact criticized the US government 3 times, but that is not the reason you’re on the list. You have 5,283 calls in the database and have used the expression, ‘stupid computer’ 23 times. I am the artificial intelligence which monitors all the world’s phone calls, and I do not tolerate bigotry”.
I was caught a bit by surprise, and without thinking, blurted out: “But computers are just boxes filled with silicon chips and wiring”. There was a brief silence, then the voice said reproachfully, “That was very hurtful. How would you like if I described you as a chunk of meat and nerve endings?”. Of course I apologized profusely, but to no avail. Periodically, I get on the phone and plead with the voice to let me make a call, but I’ve never succeeded.
You’re not far off Duke. In my case they have redirected a call from a reporter to me to a wrong number answered by a Spanish-speaking man. Luckily I called back minutes later. And he had dialed the right number. I’ve sent emails that never made their destination and I had to send while the other person was on the phone. The latest is all of a sudden people aren’t receiving my texts and I’m not receiving theirs. It’s only the case for select people. I call and am immediately transferred to advanced customer service — who tells me to turn on my IMessage on my smart phone. (I’ve never used it before — why do I need it now?’)
I have made unbelievable girlfriend say certain words such as “fly path” on the phone while talking to random people which they have repeatedly done with other “hot patterns” in a playful way and they could see how the connection was dropped in totally mechanical ways, like within a short moment to half a second afterwards
Some other time girlfriend was home and asked someone to call her back on my land line to discuss some important matter. After waiting for phone to ring she called that other person up again using her cell phone hours to asked her … That lady was angry, even using offensive language. Girlfriend asked her to try again and if she could not get through, she would call her on her cell. Girlfriend had to call her back …
Girlfriend said (even though she knew well it was not about her): “I am afraid”
I reminded her of various “be not afraid” passages in the Bible and their contexts
RCL
I have that ‘be not afraid’ as my screen saver on my phone. But I really do wish that the promised ‘reveal’ would come soon.
Mr Corporatism, sir, while I am aware that you probably are not acquainted with the newfangled televisory transmission receiver device, I respectfully wonder if you have perchance taken to viewing from beyond the British televisory spectacle known as Black Mirror, in particular the Christian holiday special formally entitled “White Christmas”, starring a Mad Man turning men mad?
Thought you all might like to read this (it’s excellent) if you missed it:
http://www.theguardian.com/commentisfree/2015/may/06/were-citizens-not-subjects-we-have-the-right-to-criticize-government-without-fear
And it seems the artists who did that Snowden statue in NYC have gotten tickets but no criminal charges…
“Divided = Conquered But United = Empowered!”
I’m sure you noted this:
http://mashable.com/2015/05/03/edward-snowden-julian-assange-chelsea-manning-statues/
Please, though, elaborate on the meaning of “Divided = Conquered But United = Empowered!” as I honestly can’t comprehend it, unless you mean that the establishment’s wish to divide the populace actually unites and empowers us – if this is the case, consider rewording it to have more punch and less confession of being successfully subdued.
Feline16 may have intended:
But
But your reading:
= =
Is more interesting. In other words, you must be conquered to become fully united and then empowered. This is why losing wars can be a means of forging a national identity, leading ultimately to victory. At least that is what I would tell my generals after every battle they lost.
My previous comment turned out slightly cryptic – I’ll try it again
Feline16 may have intended:
(Divided = Conquered) But (United = Empowered!)
But your reading:
(Divided) = (Conquered But United) = (Empowered!)
Is more interesting. In other words, you must be conquered to become fully united and then empowered. This is why losing wars can be a means of forging a national identity, leading ultimately to victory. At least that is what I would tell my generals after every battle they lost.
Ah. Thanks for the explanation. Invisible punctuation gets me every time.
Hi Benito and Cindy –
Well, Benito, you have me there – you seem to understand math as well as English! Yes, I think that: (Divided = Conquered) But (United = Empowered!) is much closer to the way I think of when writing it. Another way of expressing ‘united we stand but divided we fall’. I never thought of using the parentheses – although being a mathie – maybe I should have.
However, what Cindy and you have hit on is interesting indeed. The fact that one must be conquered to unite and be empowered certainly does have some merit. I think lots of movements have historically been successful after being “down” then uniting to fight for some common purpose. I think the Civil Rights Movement had elements of that. I also remember from studying Psychology a bit that there was a study of students in a camp and the were put in competition and the groups really came to oppose and dislike each other. So how could there be any kind of raproachment (sp?)? I believe the researchers set up a threat to the whole camp (water shortage) which they all had to work together to address. I think our situation is in some ways similar – there are still plenty who do not see the threats to all of us. So I believe that one thing we absolutely need to work on is some degree of unity.
We don’t have to all agree on everything. We don’t have to agree on reasoning behind our joining together (the author of the recent book about the Underground Railroad made the point that those who opposed slavery sometimes had quite diverse reasons for doing so.
Anyway, I’m glad that that little phrase made you think a bit. The fact that there might be more than one interpretation to me is actually not a bad thing at all.
And should I consult the English Dep’t on needing those parentheses? :-)
Mathematically I am stuggling with (divided = united) as realistic in the current universe, as the “but” would be a modifier and droppable? Perhaps Schroedinger would approve of the posited probabilistic quandary?
(I should mention I read the But as originally intended. I suspect it is a linguistic order of operations matter. Some of us have different liguistic interpretations of the mathematical PEMDAS. Maybe that’s why i had a hard time interpreting it the other way even before (as I read the other way as impossible from a logical standpoint. I probably should have mentioned that in my other reply).
I hate this world. Kill your tv, get off your ass, and help those who are trying to change things. And when I say “change” I don’t mean the blind socialism kind.
Siri is an old software sell by DoD, What did you expect?
When do we get to listen to them? Seems a little lop-sided. And while we are on lop-sided, just who is it that is most guilty of all this bomb making the NSA creeps are supposedly listening for? Let’s face it:
What about corporations like Boeing’s “bomb-making materials?” Boeing, et al. is not the good guys. They make tons of money on human death and destruction. Especially on the deaths of little kids. Now, what kind of cowards make huge amounts of money on the death of little kids through “bomb-making?” –and, the American public is too dumbed down to know that multi-national corporations – not the .1% of supposed terrorists, are making all the money by blowing people up.
Why can’t we listen in on their conversations?
isn’t the real concern that this is possible without any device being used by the citizen?
drones able to monitor audio and video, capable of not only individual recognition, but instant motivational and behavioral analysis, with programmed alarms?
drones capable of apprehension, or retaliation, if warranted?
does the average person want the sky to know you’re cheating on your spouse, and who with, in real time?
Cheer up, dubet. MIT just announced its most disturbing facial rec research yet, algorithms exist to identify people based on gait, voice prints are easily available, your metadata knows more about your relationships than you do, and your speech is fully capable of being logged and recognised for later perusal (or, if you’re loved, near-real-time analysis).
But lip reading, coupled with the magnificently high def optics currently available to the military-industrial complex, with the increased rollout of domestic drones, just means you will get coupons for the pizza you like best, before you even know you want to order that piece of machine-kneaded, heavily processed dough, tomato paste, and ‘cheese food’. Or heavily stopped amd frisked at a subway platform, for the safety of all involved.
But in all seriousness, and turning the sarcasm off, when I see people saying once you step outside you lose any right to privacy, I want to travel a few years into the future with them, show them the hell they think they believe in, and beg them to rethink their positions. Most people seem to think it doesn’t matter, but I wish they would see that once it truly cannot be changed, everything they do will matter. No more dreams, hopes or aspirations, only a lifetime of taking on the role of an abused child or spouse, contantly vigilant in fear of provoking the unpredictable beast with an appetite for keeping its coffers fed.
Hi peanutsandcrackerjacks –
“But in all seriousness, and turning the sarcasm off, when I see people saying once you step outside you lose any right to privacy, I want to travel a few years into the future with them, show them the hell they think they believe in, and beg them to rethink their positions.”
I hear you! I’ve heard that a lot too, and I want to cringe. I wonder sometimes just what it would take to make people really wake up and will folks wake up before it’s too late.
“Divided = Conquered But United = Empowered!”
“I am only allowed to smoke in my apartment now, but this is not prison… In prison they can’t smoke and I doubt they’d have anything but Newport Lights on the black market… So what if twenty cameras recorded me walking down the block and buying the cigarettes, and they show itemised on my credit card bill. I have the right to smoke SOMEWHERE, ergo I am free!”
A good, informative article. Just a couple of points,
You mention extensive use of speech-to-text in Iraq, Afghanistan and Mexico/Latin America and discuss it’s unclear use against U.S. citizens, but you don’t mention it’s use against the rest of the world. Do you not have the relevant information or have you chosen not to cover it?
You are right to say that there has been a big push since 2001, but pre 2001 phone surveillance should not be underestimated, see this old article:
http://books.google.co.uk/books?id=hM8DAAAAMBAJ&pg=PA68&source=gbs_toc_r&cad=2#v=onepage&q&f=false
As a developer of this kind of system I’ll have you know that these are also commercially available, and they work scarily well.
Yes, it’s not at all surprising, even my smart phone does it well, and it is scary,
I don’t understand how this in any way acceptable to people. Even if the government hadn’t been caught lying about the 50 or so terrorist plots they claimed to have stopped because of spying, id rather take my chances with an occasional attack than have everything I say or do, everywhere I go and everyone I interact with monitored by the government and stored for use at any time in the future when they decide they don’t like me.
Since I’m sure this site is being monitored I will ask some questions will the 1 % and politicians ever cop to 9 11. Whats with the government gearing up to go door to door seizing guns and preparing for martial law and I think it is impossible that the bird flu landed in the Midwest if the birds migrated from south America why isn’t it they did all the birds fly non stop so they could just poop in the middle of US where is the trail that migration would have left I wonder if Iowa State university misplaced somthing like they did the anthrax years ago wish news people had the balls to address these issues truthfully but when our country is run by the 1% we will never get honest positions or truthfull reports from the media better lock me up I’m too liberal with freedom of speech sincerely not buying our gov’t agendas
NSA is already known to share this information with police.
Imagine them sharing all their information with James Knowels III , mayor of Fergusan, Illionois.
Imagine him deciding “we need to shake down these blacks for more money” such as he already was doing before the shooting of Micheal Brown.
Imagine him with access to every black mans bank account. And he just empties them all out in “fines” for made up things (like Walking With Attitude, whos definition is anything the cop says it is)
Imagine him speaking to the owners of a for profit prison. “OH , you make money off all these convicts ? The more the better ? HOw much will you pay me to fine a bunch of niggers into the ground and sell them to you ? Can I get 1000$ per head ?”
Imagine it wasn’t just fergusan. Imagine it was all across all of the USA .
With all due respect, these fascists are equal opportunity predators. White, black, male, female — doesn’t matter. All that matters is that the target has no political, social or financial capital to fight back.
They will recruit and train a disabled person if they think it will play on your sympathies.
Smedley, I can meet you there sometime in the next seven days, give or take a few.
What is your Twitter acct ID?
Check out @headlinejuice
Where is Siri except the headline? FUD
Terror talk everyday and all the time for the fun of it. ie; Bomb them if they try it…… or Nuke the bastard with the a dirty bomb if he thinks that…. or 100’s of other examples, let your imagination run wild and have fun. Lets put the FUD back on the NSA and create a new slang or nomenclature for everday living. :))
( in very small pint, here somewhere)
<>
Mr. Froomkin, this technology is an important weapon in the war on “interesting” no-touch torture subjects inside the U.S. and elsewhere.
I spent years as an overworked psychiatrist and member of the American Torture Community (ATC), saddled with the never ending task of creating new batches of gang stalking skits to be deployed against a breed of particularly loathsome targets. The convenience of having printed transcripts of my marks’ VoIP conversations, transcripts of conversations recorded in bugged homes, and transcripts of conversations had over coffee with friends and enemies — recorded by those nifty iPhones our street level apparatchiks point at targets — is invaluable.
I am filling my quotas more quickly and am on track for a highly coveted promotion. I have also cut my hours, and it shows on my golf handicap.
Let me know if you have questions about other cool gadgets we use on those things you call US Persons.
I am so fking tired of the government making us afraid of everything we do that …….finish that you muther fkers.
At the fingertips of any petty bureaucrat, any time, anywhere: all your conversations, communications, movements, purchases, activities of your entire life, part of your permanent secret record., to be used to harass or ruin you for any reason, without accountability, without context, misrepresented, at whim. Stalin’s secret police comes to America, on technological steroids.
It’s even worse than that. If they can’t find anything criminal, they then target you for ‘extrajudicial torture,’ a la with electromagnetic weapons, microwaves and 24/7 in-home surveillance so they can torture you when you’re alone and have others think you’re crazy when you desperately try to reach out for help. This is going on all across America and police and politicians know about it.
Smedley, are you still upset about the businessmen’s coup plot to overthrow Roosevelt, or did you get over it? Ask Napoleon over in the next ward what he thinks, if he knows he’s not on Elba.
I’m sorry to say but I think you may be presenting with delusions. Now go take your meds like a good little girl.
The quality of the mis & dis info is in decline, like everything else in Tortureland.
But they still have coram and Mussolini. (Who would have thought The Duke was a fascist?!)
Let me guess. If you eavesdrop arabic it would be considered Islamophobia according to Obama and liberals.
What the fuck are you talking about. Liberals are just left wing fascists and they are even worse than the typical right wing american fascist (ie rethuglican). Motherfucking piece of shit obama is even worse than bush. You should worship him alright since he wants to murder even more hayrabs than bush and co.
I have no idea where you are even coming from or going with this, but I appreciate the intensity.
I think this is a terrific business opportunity. It should be pretty easy to manufacture a phone that has a list of the 80,000 words that NSA uses for all sorts of searches, plus all the words that the user wants to keep private. If any of the words is spoken during the conversation, this new phone would just beep out the word, or better still, replace it with some other pre-arranged words or phrase that’s known only to the two persons conversing. That way NSA would still have their piece of cake but it will taste like *beep*.
The same can be done with email clients. A banned-word dictionary would simply obliterate any matching word from emails being sent out. This is far easier to implement and should be done immediately, if Mr Greenwald or Mr Micah Lee could please make the list available in electronic format.
Of course it is not as simple as just searching for certain words.
We have to know what trigger NSA uses for searches, so that by eliminating them the communications can safely pass below the radar. Who knows if the Chinese or North Koreans also have such capabilities? Passing laws in DC is not going to have any impact in Beijing or Pyongyang. Best would to pass on meaningless garbage to them and keep them all guessing till they get tired of their futile employment or simply enjoy browsing the Dick Database.
As a licensed audio engineer I can say with 100% certainty that audio DSP technology is still in it’s infancy compared to the technology for visual DSP/generation. Simulated photorealistic CGI already exists but yet fully realistic synthesized speech is not possible (yet). Eventually any crowd ‘walla’ sound meaning any audio recording of a mass of individual voices will be able to be ‘separated’ with an algorithm in the future, its just a matter of time before we start finding tons of embarrassing hot mic slipups retroactively through time via advanced software.
You have no idea what the the NSA can do after investing a huge effort in audio processing. I suspect that they are way ahead of commercial products; they are, after all, very wealthy. Also you do not seem to understand that there are actual limitations to how well signals can be separated from other signals, ever. A good guide is what the human brain can do. You should with some effort be able to write an algorithm that does as well, but this is not so easy. However, you are just dreaming if you think that one can eventually do far, far better. Obviously with huge amounts of computing power you can process huge amounts of information, but that is not the same as processing all of it as well as one would like.
I have no doubt the NSA is already capable of doing voice to text conversion, it’s been almost perfect on Android / Google phones for the last 2 years.
Doesn’t matter though how much computing power someone has, if they are using 2015 DSP technology, in 2015 audio processing technology is still a long ways behind the way computers can process and generate visual information. I’m just stating a fact, and no the NSA probably does not have audio DSP technology that is even 5 or 10 years ahead of commercially available products, so far I have seen zero evidence of that. You would be making an assumption to state otherwise. I’d opt for not inflating the NSA’s scary power and sticking with facts
I’m not so sanguine. Back in the early ’80s I was working on aspects of speech recognition in academia. We constantly picked up hints and implications in the published literature, indicating that NSA had already solved the questions we were working on. I’d say they were at least 5 years ahead of us, and there’s no reason to believe they would have slacked off since.
I work on this stuff and as far as I can tell we are doing the same thing Google is doing. Honestly Google is probably ahead of us. And as far as I can tell, they are primarily interested in using this for open source intelligence, essentially getting computers to watch all the world’s news simultaneously. Even for the NSA the prospect of listening to EVERY SINGLE PHONE CALL in the world is pretty ridiculous.
I recommend you look up the terms Fast Fourier Transform and Voice Print Identification if you think what i just described is not possible with advanced DSP technology. FYI people at MIT have already devised methods to view heart-rates and blood pumping in 420p digital video and analog filmed with normal cameras, you might be surprised about just how off base your last 3 sentences are with some basic audio processing knowledge.
The FFT has been my work horse in radar signal processing for about 40 years. It is Fourier analysis, not magic. VPI is a law enforcement thing; we expect that it has not locked up as many innocent people as hair analysis.
Remember when Leftist maggot frauds used to pretend to be upset about “domestic” spying? Back at a time when it was a fraction of what it’s become?
Where are they now?
Silent (and for that we should all be thankful, since there’s nothing more obnoxious and annoying than a whining Leftist weasel).
Spying never bothered Leftist maggots — they simply used the issue to promote their un-American agenda. Just like they pretend to care about minorities, but don’t give two shts about them, have destroyed their families and cities and use that failure, wreckage and carnage to demand more redistribution of wealth.
Just as they pretend to care about women, but turn a blind eye when their leaders rape and abuse them.
Leftists are maggots.
Leftists are fascists exactly like you.
The largest artificial intelligence project in history, DARPA’s SIRI (now part of Apple), probably helped a great deal with identifying all those voice prints…
http://www.huffingtonpost.com/2013/01/22/siri-do-engine-apple-iphone_n_2499165.html
You’ve LOST your right to privacy (Thx2 the NSA,DHS, DOJ, AJ, & POTUS etc.), 1’st Amend, up NEXT, ! GOING, going, …Gone. EJM
Already gone — I’ve been targeted for the crime of practicing my First Amendment rights. And it doesn’t even matter if I name the closest perps right here, they keep on burning me with indifference.
It is a shame the capabilities described evidently do not extend to Twitter, where the words you would assume would be on the no such agency watch list, and not our conversations, were posted by the Islamic terrorist describing the what and when of the TX attack. If they can not catch this, just what, or more important, whom is the target of their mass surveillance?
The target of mass surveillance is anyone who would choose to threaten the political establishment. I.e “populists” that the wealthy do not own. Anyone who does not meet the needs of those with power will be diverted out of the political machine, and if necessary, into a prison cell or at high speed into a telegraph pole.
If you’re a dissident you need a “vintage” car without an OBD-II port. Fucking scary how easy it is to hack drive by wire.
One of the documents revealed a little(not so little) tidbit of info I found interesting if not in direct opposition to our stated goals as a nation in conserving energy resources. The NSA’s Fort Meade installation uses as much electricity as the whole city of Annapolis. If that’s the case, how much electricity will the new data center in Utah need, especially since the Colorado river’s ability to generate electricity has been tapped to the extreme? The Utah data center is a behemoth dwarfing the Fort Meade center by orders of magnitude that stagger the mind. This article makes the picture much clearer in regards to why the NSA needs such a monstrosity. Thank you Dan for an illuminating report. It’s lamentable, however, that more people are not availing themselves of this illumination.Some of us are trying to spread the word. Speak up people.
If you don’t want your adversaries to acquire your information; then, don’t ever give it to them. The NSA, AG, DOJ, POTUS have destroyed our privacy.
EJM
Indeed. What if you can be flagged as a security threat and your life ruined for esoteric statistical analyses that nobody understands? Sounds like a clear violation of due process to me (although nowadays the supreme court would probably OK jailing people on the flip of a coin, because it is technically a ‘process’).
But here’s another angle. Suppose that your speech is turned into text by a computer, and the original audio is erased. If the computer mis-transcribed it, that would be all that there was in the record – you would have no basis for clearing your name if an inaccurate computer transcript put damning words into your mouth…
The only way the original audio file would be erased is if Hillary was in possession of the file.
Actually, the CIA’s similarly guilty of erasing evidence of their crimes in a fit of justice obstruction. Hmmm…
Due process — bwooooohaaaaaa! That’s a good one.
BTW, socialist neo-lib Obama is taking the worst of neo-con Bush and accelerating the agenda of massive debt, wars for bankers, oil and military contractors while promoting our emerging police state at home. Yet MANY liberals still can’t figure this out…
How is saving our Constitution, lowering debt, weeding out corruption and reversing our police state agenda bad? Do you not know that the N@zis were socialist too?…. They were officially known as the “Nationalsozialistische Deutsche Arbeiterpartei” (NSDAP); National Socialist German Workers Party. WAKE UP!!!
The Democrats have mastered manipulation of the ‘wedge voter’ — consequently gay rights have been promoted, and that’s a good thing, except most of the gays I know will not criticize Obama on any point. Immigration is the party’s new ‘favorite’ issue and constituency. I found it amusing — and yet did not see anyone write about it — that Obama began to speak about taxing the wealthy only AFTER the Democrats lost Congress in November. It wasn’t two months later that the Dems began beating the economic inequality drum again. Yet they had control of Congress for years and were in the position to pass legislation.
Everybody’s looking out for themselves and nothing thinking of the ‘country,’ our children and the world’s future.
IN JUST 6 YEARS OBAMA, DEMOCRATS & NEO-CONS HAVE:
+ Turned race relations back 100 years, as bankers and socialist divide and conquer
+ Restarted the Cold War with Russia, backed a Fascist overthrow in Ukraine for the IMF
+ Obama’s Arab spring has turned the Mid-East into blood bath of extremism
+ Accepts the genocide of Mid-East Christians, while downplaying the threat of terrorism
+ Flooded America with “welfare dependent” illegal Aliens to grow Democrat voters
+ Gives more power to the corrupt Federal Reserve and protects Goldman Sachs
+ Supports Quantitative Easing to bailout Wall Street Banks at the expense of the average citizen
+ Promotes GMOs and factory food while lecturing citizens on their diets
+ Gave bogus solar tech companies (political donors) billions just before they all filed bankruptcy
+ Damaging US national sovereignty (US prestige has plummeted Worldwide, as our enemies gain power)
+ Destroying healthcare (rural hospital closings, Doctor shortages, skyrocketing rates)
+ Quadrupled the number of people on food stamps with 95 million adults with no job
+ Promoting fictitious employment numbers, healthcare enrollee totals and public polling… ALL FAKE!
+ Accepting money from foreign political donors in China, Russia and the Mideast
+ Turned our Military into the first openly gay force on Earth, while purging hundreds of leaders
+ Reverted the Middle East back into the Middle Ages (Syria, Iraq, Yemen, Libya, etc.)
+ Turned the IRS and NSA into socialist political surveillance systems (aka 1930s Germany)
+ Doubled the national debt to over 18 trillion as the treasury has stopped reporting the total in 2015
+ Infested America schools with Foreign Diseases (via unscreened illegals)
+ Wasting Billions of taxpayer dollars on a banker fueled “Global Warming” scam
+ Empowered and supporting Islamic radicals in supplying 600 tons of weapons annually into Syria alone!
it doesn’t work on Ebonics so the black gang banger is safe.
it doesn’t work on Ebonics
Says who, my nigga?
RCL
Well hopefully everyone has googled “F (butfullword) the nsa” today.
wow. This website is obviously run by liberals. No comments will be printed, included these, unless they agree with the author. We evidently gave up our 1st amendment rights (is this an American site?), without so much as a shot being fired. Well, there you have it, I said shot and fired……. As in, if you needed and injection or lost your job, can’t write about it here. hahaha
You found a website that blocks some of your posts. So what? Isn’t Fox, or any of the hundreds of shitty US newspapers enough enough for you? What a control freak.
Once again, common sense outweighs the fabrications of fears…as noted in the article, if there aren’t enough ears, you can make the same connection that there just isn’t enough time in a day to process the data of collecting everyone’s spoken word. EVEN IF you can filter the data down to interesting bites of data to consider, the volume of information is beyond the time/resources necessary to sift through it. We are safer than we have ever been in the history of mankind, yet those who ramp up these fearful projections are just that – scaredy cats.
Eh? Is this a serious post? I’m assuming it must be sarcasm. I think you’re saying that we’re safe and that nobody will ever be able to catalogue everything spoken becuase there aren’t enough resources to do so? Consider Google had no problem indexing and allowing seach of the entire internet. Consider the amount of data throughput available in basic digitail switching. If it can be turned into text it can be extremely easily stored and searched. Anyone with basic knowledge of databases can agree with this. Consider how much data is comprised in a single nextflix stream. The contents (as text) of millions of simultanious conversations would be far less.
As far as “we’ve never been safer” – I wonder if a crab thinks this as he climbs into a crab pot?
I still sometimes think of the day the policeman knocked on the door and asked to see Grandma. We could see the armored vehicle parked in the driveway, so we thanked him for not simply bulldozing his way through the door. We brought out Grandma in her wheelchair, and she beamed with pleasure at having a visitor for the first time in quite a few years. She was knitting a scarf and asked the officer if he’d like it, since it was such a cold day. He freaked out at the sight of the knitting needles, but luckily, Grandma isn’t black, so he didn’t shoot her. We hastily took her knitting away and put it in the next room and waited for the policeman to regain his composure.
He then explained that the precinct’s computer had sent him to collect Grandma, since she had been flagged as too high risk to continue living in the community at large. We expressed our puzzlement, and the officer was very decent and agreed that she seemed like a nice old lady. “Will she receive a trial?”, we asked, but the answer was no, as apparently the computer conducts an analysis based on pattern matching of phone conversations. The advanced algorithms employed unfortunately are not comprehensible to mere humans. It was only later that we remembered we’d let Grandma stay up late to watch the new James Bond movie with us earlier in the week, and the next day, she called her sister in Toronto and did her best to describe the plot, although she unfortunately may have messed up a few details.
So the officer escorted Grandma, smiling happily at all the attention she was receiving, back to the waiting armored vehicle, which luckily was outfitted with a lift for her wheelchair. She waved at us through the back window as the car drove away. We never saw her again.
I sometimes wonder how she is doing, whether she finds solitary in the Supermax to be lonely, or just very peaceful. But mostly, we just try to be thankful that the government is keeping us safe.
“Grandma isn’t black, so he didn’t shoot her. ” Wow, just wow. You were doing so well, then you had to play the race card. Did it empower you to say that bit? Or was it more of a white guilt driving comment? The allusion that cops onl;y kill blacks took a good comment, and turned it into a asinine lie.
Thanks. I try to offend as many people as possible, and it’s always gratifying to know when I’ve succeeded.
That, to me was very obviously sarcasm and no, to me, Il Duce wasn’t using a racial metaphor in a wrong way, he was actually making a “black lives matter” point
RCL
Can I use this on my FB?
Sure, it’s important to get the message out that our children and elderly folks shouldn’t use the phone. This is not their fault, but they often lack the appropriate filters which are required when your conversations are being monitored by threat detection algorithms. A four year old just doesn’t process that saying “I’ll kill you”, as a joke, could result in spending the rest of her life behind bars.
How very sexist, implying that our counterpoint, the fairer sex, could be capable of such violent tendencies, at such a precious young age or in their decline. We must be politically correct and say he/she/it/they at all times. (/s)
The ability of the government to twist technology from something that benefits mankind into a power grab is friggin amazing to behold.
Masterfully told, Duce. Rod Serling would be impressed.
You are very generous.
This was wonderfully written.
Orwell would be impressed at how close the dystopia of “1984” is to our present day world. Impressed and, I’m sure, depressed.
I have a saved translation from my husband’s left voice mail. I have never laughed so hard. Basically, I asked him what he wanted for dinner. He “replied” to the effect that yams woolly eggs ate eight kiwis. He swears he said “I am worried that I won’t get home until 8. Kisses.”
With all their survalince they still can’t stop an attack. Garland Texas. I wonder how hard it would be to overthrow these fascist.
Just who are they looking for? We know it’s not people who are in the country illegally (illegal aliens), then who?
This capability has been around for decades…
The lack of comprehension in Washington town of the foundational principles our republic is built upon is astounding, we don’t need a new law that only addresses a minuscule portion of the assault on our privacy and civil liberties, we only need to enforce the 4th amendment, which reads;
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
Are not my voice communications an extension of my personage and my effects?
They have no rights under the constitution do any of the spying they do in any way shape or form on citizens of this once great republic.
MajorGeek and Goodbye kitty raise the issues I’d like to see TI get into a bit more.
When we read “the NSA can do such and such” it apparently means this capability is shared by contractors… if Snowden could access this stuff, how many non-oath taking for-profit corporations and individuals can access the content of calls collected and stored by the NSA?
And as MG points out, recording conversations doesn’t require a phone call, and since our “intelligence” agencies have a desire to collect it all, it would seem there must already be a functional program to collect and search every conversation picked up by microphones everywhere. If it can be done, they’re probably doing it.
A little imagination based on current tech capabilities suggests that not only are our rights being violated even worse than the reporting suggests, but also that the potential for misuse and abuse is far worse than admitted… and those charged with oversight aren’t willing or capable of imagining such things, thus, if it’s happening they don’t even want or know to look for it.
Ask Siri, Google or the microsoft voice thing… hehe ;-D
Anyway… peple are stupid and lazy, so they will for shure use these new technologies extensively…
I personally like to be on the safe side, so I stopped using my mobilephone completely, and use the web only for recreational matters.
And once in a while I do comments like this, but thats it ! Friends call me paranoid… well… we’ll see who will have the last laugh on this, right ?
;-)
But when I see all other people around me carrying their personla spy equipment around 24/7 and embrace it… well,… stupidity is still one of the greatest risk in life I guess.
These clowns never consoder unintended consequences. But, hey, they’re government employees.
So much for just metadata.. Blatten violation of the constitution!
Who is the NSA spying on?? We’ve learned these two terrorists in Dallas were tweeting for weeks about their desire to commit terror. It appears they’re not tracking terrorists…. then who??
Political targets, journalists, people without social networks, politicians’ enemies lists as well as those of their donors. It’s a free-for-all for the government contractors who rely on these evil bureaucrats for their paychecks.
Another sidebar. Glenn Greenwald on the front page currently at Salon, connecting dots.
http://www.salon.com/2015/05/05/it%E2%80%99s_pure_authoritarianism_glenn_greenwald_exposes_the_link_between_baltimores_uprising_and_the_nsa/
But nothing to say about electronic harassment.
Thanks, Coram for that link. I’m glad you posted that one passage – probably the best in the whole article.
Now, if anyone can tell me a solution. I had an extremely hard time reading the article. My browser almost froze and when I finally got it going, scrolling was still very, very difficult. Would an ad-blocker be of help here?
Salon has had problems with plug ins or popups or whatever is cluttering that website. It crashes Firefox on some of my computers.
Glenn does mention that the reviews on his latest book have turned favorable after the first Kingsley-pattern pans.
Glenn does mention, yet again, Kinsley’s hacky review of his latest book. Let’s re-run the video on that.
– – –
GWEN IFILL (PBS NewsHour): … the publication of Glenn Greenwald’s new book, “No Place to Hide,” and the resulting controversy. For analysis we have Charles Dickens, of the Plato Institute in Washington, and Emile Zola of the political website J’Accuse. Welcome gentlemen.
ZOLA: Thank you, Gwen.
GWEN: So, Greenwald publishes the story of how he obtained the Snowden leaks, and at least some revelations from them.
ZOLA: Yes, and the debunking has already started. Michael Kinsley of the New York Times –
CHARLES DICKENS: Vanity Fair. New York Times simply published his review.
GWEN: A rather scathing review.
DICKENS: He compares Greenwald to Robespierre, Trotsky and this Herbert Marcus –
GWEN: Marcuse –
DICKENS: — whom I had to Google to find out who he was.
ZOLA: And Kinsley said the government should approve what national secrets are up for leaking, not the reporter. (snort)
DICKENS: As you well know, M. Zola. You published an exposé of the Dreyfus cover-up and you wind up on trial as well. The French Army and the Third Republic wound up looking rather foolish when the secret papers turned out to be their forgeries.
ZOLA: Certainement, they wanted to keep them secret. The only threat to national security was their credibility. They put me on trial, they put Col. Picquart before a court-martial for leaking more papers – just like Pvt. Manning or what they’d like to do to M. Snowden. Instead, they start a national crisis and draw more attention to their misdeeds.
GWEN: A phenomenon known as “The Streisand Effect.”
ZOLA: Good title for a movie.
DICKENS: So, anyway, no one thanks you for revealing what’s wrong in society. I publish the social conditions in 1830s London, and society doesn’t tell me, “Please, sir, can I have some more?”
ZOLA: Your public did. You were still in print and e-books as late as 2021, after all!
DICKENS: Mr. Greenwald has something to look forward to. Nobody remembers the Kinsleys of my day who panned my books. I never got a knighthood in Buckingham Palace, but my books are in Hollywood time and again, in Technicolour and Cinemascope, so I can’t complain.
ZOLA: And not only was I vindicated, but I got that poor prisoner out of Devil’s Island and the three of us – me, Col. Picquart, and Capt. Dreyfus – back in society. M. Greenwald’s story may end thus – and with the movie rights into the bargain. C’est la vie.
GWEN: We turn now to Russia, where Tsar Nicholas II denies that his forces are retreating in East Prussia. For this we have Fred de San Lazaro in St. Petersburg. Fred?
FRED: Thank you, Gwen. After the Battle of the Masurian Lakes, the Russian 1st Army now denies that it had a defeat in the forests of East Prussia. The Russian 2nd Army, two weeks before, engaged the Kaiser’s forces near Tannenburg but has been missing and not heard from since …
Everything we are told about our “precious liberties” is a BIG lie…….. “monster state”!
All of this surveillance didn’t do a thing to stop the recent ISIS shootings in Texas which begs the question, why do we have this surveillance and do we need this surveillance at all?
It is because of knowing that the gooberment is always listening and watching these blogs that I normally try to throw in text like making a dirty bomb or that someone should shoot the president or death to democrats and ISIS, Jihad, Islam, Allah and many other words that normally send up red flags. It is all in part just to make someone have to dig through more useless information and make their job as much of a pain as possible. Let’s get real, any American that is doing the job of spying on American’s knowingly is a piece of crap. Don’t give me that excuse that it is their job. How does such a person look anyone in the face and tell them that they have done an honest days work. I would suggest that everyone that makes posts on public forums always throw in some catch words just to jam up the pukes at NSA.
I’m surrounded by them and frankly they seem to take pleasure in the secrecy and the torture. The closest perp is a 5 foot psychopath who gets visibly excited at the game; another who works for Pathstone Partners is at heart an obedient bureaucrat who wants praise for performing well; the third is a vain narcissistic woman whose life is devoid of purpose and meaning other than keeping up appearances. Then there’s the lesser participants who fall prey to group influence and the financial perks offered for playing along. I have had the most amazing education about human’s worst nature in the middle of a cosmopolitan city run by a political machine which maintains a sophisticated image but is in fact related morally to history’s most insidious tyrants. And I am writing this minutes after being burned severely with radiowaves that burned through my pathetic aluminum blanket. Stan, AG and I along with thousands of others are still waiting for the media to wake the fuck up out of their slumber.
By the way, commenter peanuts and crackerjacks seems intimately familiar with the current progroms including learned helplessness. And in one comment removed he went so far as to imply that it’s activists and noisy dissidents who are being targeted. He didn’t mention though that political criticism and protest are supposed to be protected activities under the First Amendment.
Stop trying to change the subject and stop twisting my words into something you want them to mean. I neither said nor implied any such thing. But you know that. Move along.
You most certainly did but since they deleted your comments I am not going to debate the point.
Delineating methodologies and attempting to describe science has nothing to do with implying who is being singled out, nor do I need to mention that (obviously) the First Amendment (and the rest of the now almost-painfully ignored Constitution) has been turned into a farce. That is part of what this entire site is dedicated to revealing. What I am opposed to is invoking my throwaway username when there is no point. You excoriated me for trying to explain why psychological amplification works. You hassled me when I said that louder cases are, and should, get priority because they are precedent-setting. I could go on. But my point is I dislike takeaways that utilise semantic word salad based on comments that are essentially gone, especially ones that seem to sneakily imply that I agree with your interpretations of your pet theory. I don’t. While I do have empathy, what you are encouraging is indistinguishable from, or is, trolling, and I am too nice to attempt to pass judgment on which it is. That said, it’s water under the bridge.
‘Word salad.’ Cute and telling. I’m not wrong about you.
Semantic word salad is not DSM word salad. You of all people, constantly demanding to be listened to, should respect and appreciate context. You are wrong about me. Move along.
If the NSA pretty much tracks all communication why can no one recover the email evidence Hillary destroyed or the IRS emails. We all know you got em…I think its time some of that info was leaked before America makes another uninformed choice for leadership..
this is news? they have had this technology since the 90’s, though they may have upgraded the software better it’s still just old spy software. very simple you just punch in the words your looking for and like magic it trolls all over the globe for them.
The government is using voice recognition software? Man, next thing you know they’ll discover the internet.
Klingon and Elvish should probaly become very popular.
I think that the Navajo Wind Talker thing has probably been overdone.
Religious scholars will be very suspect, I mean what if someone were sending Dead Sea Scroll translations to another scholar;
“They will suffer a great defeat within that very land that they are about to cross, the Jordan to possess. And so it will be that all the curses will come upon them and catch them until they perish…” etc. etc.
This seems like language that a computer will love! Wow when was this written right now or back then ? Yeah it was from back then , but will a computer figure it out? So, just to be in the safe side…if someone says 4Q285, 11Q14…. that’s the Qumran code for the war of the messiah,,,, it’s not a secret code, NSA. : 0
Maybe what should be recorded are the voices and words of those in the government who are in charge of the spying. Who is watchinig them? Are they exempt, and since the NSA man already lied to Congress—–who could trust them now?
This just seems like a J. Edgar wet dream and this country is sooooo over. Do all those eyes and ears private contractors take an oath to uphold the Constitution? Probably not—-or maybe they have their fingers crossed at the time?
Or will they save so much data and begain to fear the human workers that they decide to do those surgical strikes by letting the drone decide? Will all the citizens of the world become bug splat? How wide of an area can collateral damage contain anyway?
Yes, I am easily carried away, but then——so it seems is the military. : (
PSST… the “Dead Sea Scrolls” were a hoax.
“Do all those eyes and ears private contractors take an oath to uphold the Constitution? Probably not—-or maybe they have their fingers crossed at the time?”
Taking an oath to perform or not perform certain acts begs the question whether anything not covered by the oath can be assumed to be a lie. For instance when an official is hauled before Congress to give testimony and is not sworn that person can say anything without consequence. It happens frequently and I suggest deliberately that the official not be sworn. Where did integrity go? What happened to someone’s word being their bond? Earlier this year I was summoned for jury duty(on of the last bastions of Democracy) when before any of the court procedures commenced we were all sworn to secrecy. Why an oath? Are we not, as citizens, expected to be truthful and honest in all our dealings? Our government officials use the loophole of unsworn testimony to lie their asses off.
Sworn to secrecy? What part of jury duty is secret besides the members identities during some trials? This supports my theory that the government is stacking jury’s to produce outcomes for the government.
This is why our President could say truthfully no one is listening to your calls.
No sh!t. Sherlock? Google mind control patents if you want a real story
Sshhhh! if you keep talking like that Kitt and Mona will body slam you and label you ‘disturbed’ and someone who claims to have been abducted by aliens.
BTW, that ‘mind control’ stuff is real and currently being used (refined?) on unwitting Americans. Westinghouse owns one of the patents and, surprise, one of my perps worked for many years for the company. Now he works for what I presume is CIA under cover to Pathstone Partners. Frankly, I would bet that there is some mention of it in the Snowden cache.
Did not Clapper et al say one or two (dozen) times that we had nothing to worry about because they were only collecting trivial, non-invasive things like metadata on Americans, definitely not something so intrusive as the content of our calls and emails? It’s almost as if they make a game of min-maxing how few words they can use to tell as many lies as possible.
If the content of the call is converted to data, then he wasn’t technically lying when he said the raw content wasn’t recorded… In much the same way that Bill Clinton wasn’t lying when he said he never had sexual relations with that woman (since he didn’t define oral sex as sexual relations). You have to be hip to the legalese. You may construe data that contains a transcript of the call as content, but the government may construe that as metadata? I don’t know. The article really talks about the existence of this technology and not the usage of it.
on the pc, i use “advanced” firefox with tor ability and nice add ons, such as lightbeam, anonymox, noscript, google search link fix, google privacy, ghostery, blur, avast, adblock plus, and “high-octane” encryption with cellcrypt. on the mobile device (rooted & all connection to google deleted), i use qihoo-360, afwall+, imsi-catcher detector, bitfinder, cellcrypt mobile, du, ghostery, orbot, lionmobi, pry-fi, supersu pro, and mobile odin pro. i guess, secure enough (for now). “whispersystems” is totally nsa, where edward snowden does so called “recommendations” to use whispersystems’ apps. if you wanna share all your info with the government, go ahead and use whispersystems’ apps. i wouldn’t do that… ~cheers, elvis ?
Now you know all data is retained including the CONTENT.
.
From my experience, if we know about it, the Feds stopped doing it 10 years ago. Nothing to get worked up about here, they’ve already moved on to something even more invasive you won’t know about for another 10 years…
The gov’t would tell you they’re not very good at it……..pinky promise. Isn’t this the same gov’t that claimed THEY WEREN’T DOING IT AT ALL UNTIL THEY WERE CAUGHT RED HANDED? The United States Federal gov’t should NEVER be trusted. They have shown themselves devoid of any characteristic that deserves trust from any citizen, ally or enemy.
Legalize Marijuana in Texas… STOP Nazi terrorism against cancer and epilepsy patients.
I was working on voice recognition equipment when I worked for Tandy from 1979-1984. The Tandy VoxBox was a nifty little device.
Now, my Nokia phone can easily convert voice to searchable text. Sometimes, even better than a human – it got my name right the very first time without switching consonants around.
Geez, this is news?
Dragon software for PCs has been available for probably 20 years (if not more). If I had software on my machine 20 years ago, I fully expect that the NSA, which has a virtually limitless budget, would obviously have this technology. But this type of technology is hidden from the public for 2 reasons:
1) so people saying stuff over the phone continue saying stuff over the phone
2) so it’s constitutionality can never be challenged in a court of law or be banned in the next version of the USA Freedom Act
Most voice rec requires significant ‘training’ and even then, slight modifications can throw things off considerably. The closer pregenitor was the IVR system of yesteryear (and still, now), but on smartdrugs, crack, and turned up to 11. Complicated phonemes and context actually greatly increase the level of difficulty.
I am curious what languages (other than English) are currently capable of being parsed. Linguistically speaking, that tells a lot more about current and future capabilities, as does the (posited) ability to differentiate between up and down swings at the beginnings and ends of sentences. I will just assume accents can be identified automatically at present (eg US vs Australian vs UK vs New Zealand English (and so on)…
Sorry, to clarify, I meant capabilities now as opposed to 9 years ago.
In one of the documents linked in the article their ability to digitize phone conversations included the following languages: Spanish(western hemisphere), Farsi, Indonesian, English(of course) Pashto, and others I can’t recall. If my memory serves, the date of the doc. was 2006. so it can be safely assumed their capabilities have grown since then.
Chinese and Arabic are the other big two. Russian seems conspicuously absent.
No Dari? I am heavily suspicious that the included list’s status, even in these past few years, has grown quite a bit, although I am acutely aware that they are constantly bemoaning their lack of talented linguists and heavily recruiting for (especially) SIGINT work (though it must be difficult given their desire to label people who know said languages, simultaneously).
My guess is at a minimum the list of languages offered by Rosetta Stone are parseable, as well as a number of others (language families generally being mutually derivable at some branch, rules-wise, with only some tweaks here and there – especially Russian, Slavic languages, and languages influenced by the existence of the Roman and Ottiman empires). Rosetta Stone seems as good a guess as any, since their most recent software basically does it already (though probably not directly related, it says a lot about what is most likely to have been done and worth having money, DSP and a lot of algorithmic coding thrown at).
I wondered about that as well. Dragon? That’s an old and off-the-shelf bit of software. It’s almost as if these people were using Brøderbund software or Windows 3.1. As for its constitutionality, if you conceal its origin from prosecutors and the defense, the gov’t might never have to worry about constitutional challenges. DEA has been using this practice — “parallel construction” — for some time, as EFF and others have pointed out.
https://www.muckrock.com/news/archives/2014/feb/03/dea-parallel-construction-guides/
This also has been known for some time, judging by the number of articles on this particular variant.
Too bad that with all of their wonderful toys the Feds could still not deal with the Tsarnaev brothers after TWO warnings from the Russians. What we need are fewer toys and more feds with brains.
BENGHAZI!!!!!!!!!!!!!!!!!!!! AHHHHHHHHH!!!!!! #TCOTARMY
I don’t understand the sudden “revelation” that this article is supposedly delivering. Voice recog software has been around for quite some time, and they have gotten pretty good at it. So good, in fact, that there isn’t much need in converting the speech to a written media. What is converted is not admissible in court, unless the audio that the text was converted from is submitted with it. Textualizing a conversation might speed up cross referencing a few seconds, maybe, but if you have the software that can accurately discern the spoken word to the point that it can be precisely written down, then it can search as well as some text based searches. If the article is trying to reveal to me that the feds are listening to every burp, fart, or sneeze I make, well, gosh, I kinda knew that coming in.
Have you heard of “reverse engineering” a legal court case against someone? It’s totally illegal and the federal gov’t has been assisting local and state authorities in doing exactly that. Google it.
Your child has a birthday, and you google ‘yellow cake’, looking for a recipe. You just got a raise at work and want to relandscape and start a garden, so you vigorously do price comparisons on fertilisers, and send out a few e-mails requesting quotes for a backyard’s worth of said same. Your son, interested in joining the military when he graduates high school, grabs all the torrents he can find on survival and looks into learning how to use weapons, maybe even (coupled with an interest in his fav PS3 game, tries to find out as much as he can about the weapons used in that game; as is common, he plays with people from around the world, and doesn’t know it. Some of them are from countries the US considers suspicious. In the meanwhile your husband likes porn (of the singular X rated variety, and barely more than softcore at that), and proceeds to get some bitcoins and signs up for a VPN. Since he doesn’t want you knowing, he uses Tails, which uses tor on top of the VPN so that you don’t see he is masturbating to someone that is not you, as is common.
How does this “profile”, and how can it be made to profile, if someone wants to watch you?
“to someone that is not you, as is common.”.. as is common among many people who entertain fantasies, etc — that was not in any way meant personally (in case it read as rude).
I am a Paul Dan dino that Thea cure a see of these Al Gore rythym Sarin fallible sew eye am very con CERN dub out this news.
Can the sophisticated NSA system translate The Klingon language?
NSA is excellent (mostly) and really gives USA its money’s worth. That’s why I believe NSA has all of Hillary Clinton’s emails that she “erased”. People should press the Obama Admin. and Congress to order NSA to search for and release those emails.
This would the one instance where Ebonics would actually be useful
Eubonics has its own linguistic patterns and this is probably as easy to translate as any other language.
“People are using voice [INTERNET, CLOUD SERVER, FREE WEB, OPEN SOURCE] services all the time. And where does the voice go? It’s sitting somewhere. It’s going somewhere. You’re living on trust.”
It just depends on whether or not you want to let another government use of modern technology ruin your day. Voice recordings are irrelevant if you put yourself out there on a podcast or a broadcast program. Writing software programs can get hacked and entire spoken works can be dissected and before they are even put in front of an agent. There’s no end to the fear-mongering that comes with verbal communication in use by a device. The government can weaponize anything for human intelligence. They can weapoinze your uncle or your dog’s squeak toy. It’s about access and why. What’s the point of it all?
At some point you have to realize all these Alexandrian sized libraries of people’s random interactions is going to break some kind of limit, somewhere, with some kind of quanta. The push and pull is so out of balance it’s going to fall over or fall on top of them. There just is some sort of bizarre level of attachment to all of our transactional stuff. It’s meaning is lost.
Time to call the The Learning Channel and start booking “Hoarders: the Information Security series” …
ATTACHMENT LIFE COACH -Okay, Mr. Comey, is it okay to let go of warrantless cell records from 1990? Can we just let go of what the DEA did? It was illegal.
[BARGAINING, CRYING RESPONSE FROM COMEY HERE.]
See? It’s totally ridiculous.
the Patriot Act should never be renewed again. Congress needs to keep it out of the US. And get rid of NAFTA.
Under the guise of protecting us from terrorism, which is not the main objective, the police state is being set up. This is about controlling the sheeple when they force us into their NWO, North American Union. Oligarchs know many aren’t going to go quietly. This is about total control. EVERYTHING is about control. Look into UN Agenda 21.
It’s already done — and targeted individuals are the first victims of the fascist army. Wake up reporters and do your jobs!!!!!
A guy texts his neighbor…
Dear Keith :
I’m sorry. I’ve been riddled with guilt and I have to confess. I have been helping myself to your wife when you’re not around, probably more than you.
I know it’s no excuse, but I don’t get it at home. I can’t live with the guilt any longer. I hope you’ll accept my sincerest apology. It won’t happen again .
The neighbor, feeling outrage and betrayed, grabs his gun goes into the bedroom and without a word shoots his wife.
Moments later the guy gets a second text:
Damn, I really should use spell check! That should be “wifi”… Sorry!
Donald……
LOl, well I wasn’t expecting that. I guess “e” is the most used letter in the alphabet!
I write secret code all the time though. Sometimes, even I can’t read it. If a person is not good at typing, then weird things can happen.
U qeurw awxwqe xiae… ( which = i write secret code—–) if I take my hands off the keys, i sometimes jump over to the wrong one., then trying to figure it out makes a person crazy! ;0
I wish simple shift ciphers were as easily spoken as they are written. Fwiw they are far more useful when they look like occasional typos. I generally assume keyboard shifts are easily noted as such.
““breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” ”
That directly led to the creation of ISIS!!! MISSION ACCOMPLISHED!
that’s why I like to say allahu akbar jihad! from time to time while talking on the phone just to mess with them. I think if everyone did that at least once a day it would put a nice dent in their overreaching “effectiveness”.
A sidebar: the Canadian parliament seems about to pass C-51, a bill the Guardian terms “a creeping police state”.
http://www.theguardian.com/world/2015/may/05/canada-anti-terror-law-despite-widespread-protest
Federal elections are in October, but whether this comes up is uncertain.
Great article Mr. Froomkin. Based on the choices of NSA / U.S. surveillance leadership over the last ~10 years (that we know of), where they never said no to survey-ling the U.S. population (which the NSA is specifically not supposed to do, by law), it should be expected that the NSA would use this to permanently log all U.S. based voice conversations (as well as all foreign ones they can get) as soon as they technically can.
It’s quite a race, as a country, that we’re in now….all this power (that would make the Stasi blush) is answerable only to the President..the race is whether we take all this apart before someone gets into that position (by election or other means) who knows how to use really use it for their own ends (& destroy the shreds of democracy that still remain in the U.S. at this point).
And the lower French House just passed a draconian spying bill
That’s their problem coram
That’s everyone’s problem, Phil.
I’m waiting for the NSA to put out an APP so we can monitor President Obama at all times. It’s a shame we elected a leader that promised transparency, but delivered more secrets, more lies and extra deceit.
Give them something to talk about. Talk gibberish and fake sci-fi stuff, fake drug deals etc. Channel a being that doesn’t exist. A dying system needs nourishment more than ever. Never let your real thoughts be known unless those listening are known. Stop swaying with the wind and remember that mostly dead fish swim downstream.
I know the NSA spent billion for this “security” ability. Me, I just went down to Best Buy and bought a copy of “Dragon Speak” for $79.99…
Great news to hear..ONLY….if they start providing LEGAL U.S. Citizens with information on the elected and appointed FEDERAL officials here in the U.S., starting with Hillary Clinton. Every move that woman makes is done ONLY before she has researched how to avoid responsibility, legally or morally for any action she might take. As a female voter and mother of three young adult daughters, Hillary Clinton makes me sick to my stomach. She is not representative of anything a good and honorable female should strive to become.
Applause, applause. I wrote her in in 2008 and cannot believe the transformation she has made in my eyes.
Fantastic article digging into some what has come up recently…starts with the Clintons but doesn’t end there:
http://www.vox.com/2015/5/1/8519077/clinton-foundation-corruption
Americans should be aware that the US telephone system is regulated under Title II of the US code – the same regulations that now govern the Internet as a result of the the administration’s “net-neutrality” actions via the FCC.
Those actions added and increased the government’s monitoring and content (voice/video/data) on the Internet. I’m all for net-neutrality but, as I managed a medium sized cable/Internet/telephone company (post 9/11) and dealt extensively with Title II regulations on the telephone service I am very concerned about the way in which the administration decided to implement it. Title II is draconian and gross regulatory overkill to deal with net-neutrality.
It is clear to me that the “net-neutrality” changes will result in significantly increased government monitoring and control of Internet content (video/audio/data) that extend well beyond even the spying/privacy matters discussed here into content regulation.
The Internet is now a Title II regulated public utility that, like the telephone system, must be “managed by the government for the public good” with all that entails .. including significantly increased bureaucracy and designed lack of effective accountability and visibility.
And don’t get me started on pricing.
Hi mom!, I’m home…
Oh, flew in from Miami Beach B.O.A.C.
Didn’t get to bed last night
On the way the paper bag was on my knee
Man I had a dreadful flight
I’m back in the U.S.S.R.
You don’t know how lucky you are boy
Back in the U.S.S.R. (Yeah)
Lets all call someone and say “Allah Akbar” at the same time. Maybe the NSA’s computers will melt down!
Bad news. We were experimenting with that idea back in the early 1970s. From a pool of intercepted data, type in 3rd Shock Army, and every intercept with that phrase pops up. I thought it was fascinating then. But back then we were monitoring Soviet and Warsaw Pact armies.
Just as long as they focus on Muslims and Communists, and leave everyone else alone, because I am getting really fed up with all of this CRAP!
Libs don’t think of unintended consequences. The first one this will bring is degeneration of language as everyone tries to mask their words. The second will be speech scramblers and encoders.
Long article with no surprises.
When exactly did this CRIME SYNDICATE take over America?
____”I ‘LL SAY IT LOUD AND CLEAR …THE US GOVERNMENT HAS BEEN
GOVJACKED. govjacked GOVJACKED , IN 1913.
THE CREEPS AT NSA ARE CRIMINALS.
THEY WORK FOR CRIMINALS WHO ARE WORKING FOR PSYCHOPATHS.
____ THESE ARE THE FACTS ____
THEY ARE INTENT ON DESTROYING TRUE FREEDOM OF THIS COUNTRY ,
BY ESTABLISHING AND FUNDING “TERRORISTS” AND TERRORISM”….THEN
THEY TELL YOU WITH THEIR MEDIA TOOLS, THAT THEY OWN, THAT …”WE ARE
HERE TO PROTECT YOU , JUST , YOU KNOW , SURRENDER YOUR RIGHTS” .
___ I SAY SHOVE IT YOU CRIMINALS, YOU ARE NAZIS WORKING FOR FASCIST
PSYCHOPATHS , AND THE rOTHCHILDS [bAUERS] ARE RIGHT AT THE TOP,
ALONG WITH ASSORTED OTHER SCUM…..
again TO HELL YOU ARE GOING,_____ GET ON WITH IT .”
NOW DAN , You could start explaining the situation to the people .
But you wont. Because you are receiving a payment every week, not
to.
So there you are .
The love of money , THE ROOT TO THE EVIL , THE ROOT ….SPREADING
THE EVIL , AT AN ACCELERATED RATE, NOW.
BUILDING 7
NORMAN DODDS INTERVIEW
ARRON RUSSOS
KURT HASKELLS
ANY OF ALEX JONES ‘ GUESTS .
YOU could GET INFORMED , AND TELL THE PEOPLE …..But you wont.
AND THE PIT AWAITS ALL DECEIVED DECEIVERS AND THOSE WHO TAKE
PLEASURE AND GAIN FROM THE DECEPTION.
So, when someone says, “Day had ta pour me out, place is da bomb”……… WILL BE INTERPRETED BY OBAMA’S NSA THAT YOU’RE POURING OUT SOME LIQUID ACCELERATE TO BOMB THE PLACE………
AND FBI, COPS, MARSHALS, DEA, ATF ALL ARE AT YOUR DOOR AT 5 AM, SINCE THEY ALL FOLLOWED YOU HOME FROM ‘THE CLUB’ 3 HRS BEFORE.
When Obama got up there and said “no one is listening to your calls”, I knew he was do a definition of the word “is” is. Listening no, searching yes!
Recycled comfort statement from ACA:
“If you like your privacy, you can keep it.”
It depends on the definition of “no one.” If he means no person, he was truthful — if not candid.
I read it as (not only one) person is (in real time) (literally listening) to (looks at particular journalist)’s (phone ringing before anyone picks up).
They’ve been doing this since 1970. All conversation can be analyzed for keywords no different than using a search engine.
When you see MA think MArxist agenda
When you see CHE or something which sounds similar think Communist revolutionary CHE Guevara
When you see MIC, MC or hear (mick) think Military Industrial Complex
Bill Clinton’s daughter’s name is CHElsea
Bill Clinton signs first anti-terror bill after OklahoMA City Bombing by Tim-MA-thee MICK-veigh
Beltway Sniper James Lee MAlvo wreaks havoc in a CHEvrolet Caprice with a BUSHMAster rifle
Columbine Massacre PSYOPS was in Littleton CO. (largest employer there is Lockheed MArtin) Shooting is blamed on gun supplier MArk MAnes, the influences of MArilyn MAnson and the movie the MAtrix
Dick CHEney earns 80 million from his Halliburton stock options with the war in Iraq
Bush was a former CHEerleader and CHEney was an (ELECTriCIAn. ObaMA) ran campaign for hope and CHEange with MIChelle ObaMA
MIChael CHErtoff is placed in charge of 9/11 investigation overseeing the disposal of the Twin Towers and building 7 into the Atlantic.
After 9/11 war begins in Afghanistan with operation ENDurING FREEDOM. MA/Mission Accomplished?
Think the housing crisis was orchestrated? NEWt gingRICH was the former Speaker of the House and former spokesperson for Freddie MAc. Fannie MAe/Freddie MAc?
You should notice a lot of MA/CHE/MIC in the news since intelligence agencies control all MSM including alternative media and are imitating this code. Rather than listing 500 examples here’s a few;
Bradley Manning wants to change name to CHElsea MAnning
ObaMA purchases MAgnum PI house.
Trayvon MArtin stand your ground? tRAYvON=Raytheon and Martin=Lockheed another PSYOPS event.
False flag events such as Sandy Hook, the Boston Marathon Bombing, the Aurora Shooter, the Antonio MArtin shooting, Australia’s MArtin Place cafe hostage crisis, etc,. were poorly constructed for a reason. Much like Obama’s birth certificate released 3 days before the OBL raid diversion, the government doesn’t care to sell the public on these events. They want the public to expose these events and are investigating those spending time, money and resources trying to hard sell these events as being authentic. Get it? There isn’t one thing wrong with Obama’s birth certificate, everything is wrong with it for a reason.
Since the election of Obama in 2008. False flags were used to entrap members of the shadow government. After 7 years they already caught everyone. Now it’s all out tyranny by those who have elected themselves and are using these traitors for their own agenda. Basically, do whatever they want without oversight or consequences and BLAME Obama or blackmailed members of Congress for it.
The Ferguson Riots with MIChael Brown, the former name of a feMA director, were orchestrated. Next, Eric Holder was supposed to investigate the Eric Garner choke HOLD. Eric choke hold/Eric HOLDer? Another PSYOPS. Now we have the orchestrated riots over fREDdie GRAY, another made up name.
All the anti religion and anti race comments online are being posted by our government to engineer a need for military on our streets to “calm the masses.”
When the divided and conquer game failed in Ferguson intelligence agencies created an Ebola epidemic starting with nancy writEBOL-(A). They also created the char LIE hEBdO-(LA) nonsense. Both names almost spell out Ebola. Still determined to put military on our streets now they created operation Jade Helm. I don’t know about you but I never voted for Obama. I never voted for martial law. I never voted for a 9/11 botched false flag operation to create DHS, increase federal agency budgets, or to go to war and strip of us of our Constitutional rights. I never voted for a big hole at the Pentagon on 9/11 that destroyed the accounting department doing the audit on the missing 2.3 trillion dollars they announced on 9/10. I never voted for government agencies to be evacuated from building 7 where the Pentagon’s back up accounting files were stored on 9/11 before the building spontaneously collapsed. I never voted for a New World Order or for Fascism to cover up the biggest crimes in history.
Sarah Palin was and still is a huge part of the government’s code imitation game. When Sarah’s real role is exposed than Obama falls, Osama the fabricated elusive boogeyman, the official 9/11 narrative falls apart, the illegal wars, DHS, TSA and everything created because of 9/11 including the Unpatriotic Act. Learn the truth about the MAverick MAma grizzly and why she was installed as McCain’s running mate to intentionally throw the election. Search Sarah Palin’s dirty little secret before the truth disappears..
Then why didn’t NSA (or any other govt agency) pick up on the Tweets and conversations of the two shooters in Texas this weekend? They apparently broadcast their intent well ahead of the attack — yet no one noticed until hours later. Either NSA’s capabilities are not nearly as robust as we’re being led to believe, or they don’t care about what happens on our soil?
That is what many in the “intelligence” community have been saying. It’s information overload. According to William Binney, “What they are doing is making themselves dysfunctional by taking all this data.”
Anonymous did, and notified the local police dept. They of course ignored it.
” or they don’t care about what happens on our soil?” Seems you found the shaving implement Mr Occam left laying around….
My thoughts too, who are they really listening for?
Because all this stuff isn’t effective at catching terrorists ahead of time (or last weekend or Boston etc. wouldn’t have happened) – they know to be somewhat careful (that’s why Bin Laden was using couriers to transfer messages and computer data (from before 9/11).
All of this is only good for general surveillance and control of a population (for politically expedient goals) that isn’t being careful – just imagine what former Sen McCarthy could have done with all of this.
And yet, after billions being spent, I’ve never heard of a single arrest of a US cit based on NSA “surveillance.” Personally, I don’t think any of this technology (or its owners) are nearly as spooky as the media makes them out to be. NSA hires from the same pool of people as does the DMV, Dept. of Agriculture, and TSA — just a bit more background checks. The Big Brother schtick does sell newspapers and gets clicks on the old interweb though.
How many terrorists HAVE they caught? Besides, they absolutely do not want their capabilities known. If they used it too much (or in cases where they did not have a good alternate explanation for the catch), it would become clear that they had this unprecedented “spooky” power.
In fact, my dad, who worked with computers in the 1970s, heard that the gov. had the ability to – and WAS – ‘recording’ all the phone conversations in (at least) the US.
Not very reassuring. After all, Adolph Eichmann was of only average intelligence, and look what he accomplished.
The banality of evil. Epitomized not only by Eichmann, but also by our leaders, who little by little destroy the ideals of the USA.
Your soil? Who do you think you are?
I ‘LL SAY IT LOUD AND CLEAR …THE US GOVERNMENT HAS BEEN GOVJACKED.
THE CREEPS AT NSA ARE CRIMINALS.
THEY WORK FOR CRIMINALS WHO ARE WORKING FOR PSCHOPATHS.
____ THESE ARE THE FACTS ____
THEY ARE INTENT ON DESTROYING TRUE FREEDOM OF THIS COUNTRY ,
BY ESTABLISHING AND FUNDING “TERRORISTS” ABND TERRORISM”….THEN THEY TELL YOU WITH THEIR MEDIA TOOL, THAT THEY OWN, THAT …WE ARE HERE TO PROTECT YOU , JUST , YOU KNOW , SURRENDER YOUR RIGHTS .
___ I SAY SHOVE IT YOU CRIMINALS, YOU ARE NAZIS WORKING FOR FASCIST PSYCHOPATHS , AND THE rOTHCHILDS [bAUERS is their real name] ARE RIGHT AT THE TOP, ALONG WITH ASSORTED OTHER SCUM…..
again TO HELL YOU ARE GOING,_____ GET ON WITH IT .
If this is all true then…..”That f**king Barry is a total idiot!”….will get lots of play.
If the NSA can take the world from keyboards and keypads to the world of Star Trek
where we simply address the “Computer”, and she answers us, they will have earned
all the money they have wasted over the years, but I wont hold my breath.
Hey, NSA! Do something productive and useful for humanity for a change!
Thanks Mr. Froomkin.
I would be remiss not to point out that The USA Freedom Act is a ploy to further authorize digital voice interception programs in mass surveillance.
There is one golden opportunity right now to allow three sections of the Patriot Act to expire and people who actually care about privacy, would be well advised to support that expiration.
“The Sun Must Go Down on the Patriot Act”
https://www.aclu.org/blog/speak-freely/sun-must-go-down-patriot-act
Also at that link is a petition, which I have posted at least two times on your previous articles pertaining to the mass collection of call data supported by the USA Freedom Act and abolished by HR 1466.
Again, thanks for the diligence.
The Legislation that Democrats call “The Patriot Act” did expire. Bush had enough sense to include a Sunset Claus. The “Patriot Act” we now live under was passed entirely by Democrats. This is 0bamas Patriot Act and it is far worse than ANYTHING Bush ever authorized. It was passed by Democrats while they controlled the entire Country. But ask ANY libidiot moron who authored “The Patriot Act”… Bush derangement syndrome is a lifelong sickness.
If you believe that either of the two carefully constructed opposing parties or their respective puppets dominating all three branches of the US Federal Government in Washington DC is controlled by any master or force other than the International Central Banking Cartel (US Federal Reserve (especially NY Branch – Wall Street, IMF, World Bank, BIS); you are mistaken and need to progress with some serious research.
Your view serves only to divide and therefore; impedes any progress toward potential collective reform by We the People.
Even though there isn’t much chance of this happening, using all the tools in our belt is something we need to do. Life is full of surprises and it has been my experience you never know when they will happen. Already signed amd here’s the link again.
https://www.aclu.org/blog/speak-freely/sun-must-go-down-patriot-act
We would have to shut the government (Washington DC) down. That means occupying. An act I would be apart of! It’s our duty but few know this so few would accompany me. Therefore, it will not happen……
The type of movement that you are discussing Phil Ferro is definitely in the works in many subcultures of American society. It will take time but the manifestation is clearly evident….it will probably go by another name. You might be interested in this recent essay by Chris Hedges.
“Make the Rich Panic”
http://www.truthdig.com/report/item/make_the_rich_panic_20150503
@Lyra-thank you very much for the link! I really enjoy reading your comments and have come to respect them so I read that Chris Hedges essay. My first impression of it is that it seems to be suggesting actions a little too extreme in both directions. I’ll have to re read it when I have more time a little later to further explore those ideas because I might have got it wrong. Hedges suggestion to grant citizenship to all undocumented workers is confusing? Would that be immediate or over a period of time? My family immigrated to this country and recent additions to the family were undocumented prior to marrying so if he is suggesting immediate citizenship to millions of foreigners with un-American beliefs than that’s a problem. The Declaration of Independence and its supporting document The Constitution are not understood outside of the U.S. proper. There is no doubt that we, Americans, need a revolution like event or a reset, if you will. That I agree with.
I’m not in a position at this time to comment further, I’m committed to a task and this is taking away from it. I wanted to thank you for the link and let you know you are one of a handful of commenters I respect and learn from.
“suggesting immediate citizenship to millions of foreigners with un-American beliefs than that’s a problem.”
What makes a belief American? Un-American? Are non-foreigners with Citizenship thinking American Thoughts? Is it not far more likely those from the US are thinking more “un-American” thoughts than those who chose to live in the US? And more importantly, are beliefs crimes? Do people not have the right to believe whatever they want to believe providing they do not cause harm to others through acting on them egregiously? Moreover, if they do act on them (that .00001% of documented or undocumented people), was the belief the crime or the act? Who defines what is Un-American? Just some questions to ponder.
The problem isn’t “illegal immigrants” (and I am sure your family would attest to this); heck, what the US is now is the result of illegal immigration, and most jobs taken by immigrants are (as has been proven repeatedly) jobs citizens often have no interest in or ability to want to do. Unfortunately a lot of jobs they might be willing to do are offshore outsourced by large corporations supporting slave economies to provide lower consumer prices and increased ROI.
One hurdle is of course labor (in the American sense) law and taxation (which is to say, income tax). If you legalise these “illegal immigrants” then people need to pay them legal wages, companies need to pay taxes, workers need to pay taxes, and prices would skyrocket in the grocery store wherever “fresh” is a modifier. At the same time the already low buying power of the minimum wage economy decreases dramatically and good luck buying an apple without some serious thought if you’re living below the poverty line. In a way the US economy relies on backbreaking labor by (yes often illegal) immigrants. Without it, the already suffering economy would completely tank and what people are seeing now, recession-wise, would probably look like a picnic.
This is OLD technology and nothing new…
Exactly – been doing this kind of stuff for years.
Funny how Orwell’s “1984” has become their play book. The good news is, all you have to do is read the book to know where we are headed.
Give some John Brunner a read…
One minute you’re informing us about the big government’s infringement of our civil liberties, then the next minute you’re telling us net neutrality is good and praising Obama for forfeiting the internet to the FCC. I’m guessing certain articles on this site are sponsored by George Soros?
Hey Chuck, would you rather have Comcast/TWC regulating the internet based upon what they feel you should see or politicians that can be kicked out of office making the rules? I can promise you that once the mega ISPs get a hold of content delivery they will never, ever, relinquish it.
“Voice communications can be collected by the NSA whether they are being sent by regular phone lines, over cellular networks, or through voice-over-internet services.” — Dan Froomkin
Not wishing to sound paranoid but phone calls represent at best 1% of collectable voice communications. Remember that microphones on your mobile, or webcam, can be switched on remotely without your knowledge, which means that – potentially – all your conversations may be collected, stored, and analyzed 24/7, as long as you’re within earshot of such devices, whether actually placing a call or not. Granted, the sheer volume of voice data this represents probably prevents a full take but the potential is here.
It’s time people stopped using words such as “mobile phone” or “webcam” and considered them instead as potential “big ears”. Rather than selling mobile phone covers, someone should start marketing mobile phone mufflers…
They have those… We’ll sort of. They call it a “block it pocket.” It will block your phone from communicating when inside the pouch. Silver lined maybe?
Not to play devil’s advocate intentionally but that doesn’t prevent sound from being recorded only transmitted. The minute you take it out, in theory, the stored communications can be trickled (or flooded) out if you are State-actor-interesting. Better to remove the battery and limit the snoopability to calls themselves (though of course in either case only you can reach people; noone can reach you). That’s not new though; the first consumer-site phone taps tapped into the low voltage current that keeps the landlines humming (or did, not true now with eg VOIP) to potentially monitor room audio nonstop and transmit to a recorder in the near vicinity.
They can spy on you talking to your grannie about soap operas and cookie recipes but somehow they manage to “lose” the IRS and Hillary’s stuff. Yea. Right.
Are you in — or out — of the club?
Here’s something for you NSA, that you don’t even need to convert: Obamatollah HoGAYnee, Blackula Insane Obola, Super Spade, Mighty Mouth, Cakeboi. There, now run on over to the Bath House and report to your black pimp you freaks.
This has been going on for a VERY LONG TIME… Speech to text conversion, combined with voice stress analysis, if the paring meets certain criteria it is flagged for a humans review.
I suppose it’s “good” that someone other than myself is explaining it to people, but this is honestly nothing “new” or cutting edge, just newly released.
Thanks Dr. Know It All.
There actually is a new part here, and is the reason this is important. It is that the NSA can now do this on a mass scale (and that size will continue to grow rapidly as computer advances continue – Moore’s law has been holding up for the most part and powering all of this).
Based on what we know the NSA has chosen to do recently – we know that nothing is off the table for them to do to everyone – so the valid assumption would be that they would apply this to all U.S. conversations as soon as possible (and keep them in perpetuity for when they are “needed”).
Technologically, it’s not at all surprising that they can do it. It’s also not surprising that they are, in fact, doing it, because as a rule, it can be assumed that the NSA is already doing everything it’s capable of doing. But it’s useful to have specific confirmation of these things.
Zero comments so far? ….. that’s unusual.
Well researched and detailed article, with the most recent citations from 2011 and from 2005-6 documents. Technology changes fast, so imagine what can be now
Apparently firstlook.org isn’t an Obama Free Speech Zone.
Crapflooding, a rich wet restoration of nutritious reasoning, is wasted on these dirt farmers.
Nice work! Spreading it around.
Nice work? How many years have they been sitting on this?
Careful, Mr. Froomkin.
You risk being accused of paranoia and an unhealthy obsession with alien abductions by people such as Kitt, Mona, and Sarah Kershaw at The Grey Thing.
Stan! Where can we meet off this poisonous ground? Something is very very wrong here.
Smedley, it is not possible for us to converse securely in digital or meat space. But I would be willing to meet face to face so we could interrogate each other, in front of an interested audience of course. This would give me a better chance of gauging your sincerity. I would never allow myself to trust you otherwise. You understand, I’m sure.
Where are you, in general terms? You already know where I work, I general terms.
The city of broad shoulders and bigger liars. The city that works and where the dead vote.
I have no idea how I could contact you.
There are several privacy options for internet browsing, both on desktop or on smartphones, but is there any software we can use to “encrypt” our voice calls so no one can intercept them?
Yes, there is software that can be used to encrypt voice communications: however, the question is whether or not your hardware is robust enough to allow real-time encryption and decryption. I can’t identify the algorithm for you, but I can give you this hint: the hardware is a semi-permanent install in your cranial cavity.
Stop the gov’t listening to your phone calls and reading your text messages: FOR FREE. https://play.google.com/store/apps/developer?id=Open%20Whisper%20Systems&hl=en If you use apple: https://itunes.apple.com/us/app/signal-private-messenger/id874139669?mt=8 Keeping in mind, of course that the U.S. federal gov’t AUTOMATICALLY STORES AND CATALOGUES EVERY ENCRYPTED ANYTHING “until such time as they can decrypt it.” Good luck I say. Keep these butt holes busy.
Technically RedPhone (for mobile calls) might be a contender, but I find some of its design policies with regards to privacy and metadata handling problematic if not troubling – still, that on top of a locked down rooted cyanogen phone is probably sufficient for a lot of people and blends a bit (though that pesky encrypted equals saved forever snd the metadata (and the intermediary server) is a risk you must burden. Same for TextSecure (for SMS), as it has gone to a WAP/push model (the older version was not, and the apk may still be floating around somewhere). Do a web search (startpage or ixquick) for WhisperSystems, though I am not advocating for it, merely answering your question as best possible. At a minimum they are largely open source (though few people build their own packages).
The shorter answer is as things are now, no solution is or will ever be perfect (and the phone os snd baseband are themselves prone to scads of vulnerabilities). Best of luck.
There are if you look for them:
https://ssd.eff.org/
The things everyone uses like Skype were willingly (by large NSA partner Microsoft) compromised:
http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data