Interesting article are all US calls being recorded?

Non-Allegiance related. High probability of spam. Pruned regularly.
Kopperhead
Posts: 299
Joined: Thu Mar 17, 2005 8:00 am
Location: Windmill country, Spain
Contact:

Post by Kopperhead »

What madpeople said and also, there's talk about that "Echelon" thing since a long time ago...
NO PAD, NO HELMET, JUST BRAIN AND BALLS!
Image
fuzzylunkin1

Post by fuzzylunkin1 »

There are ways around it, though. Try encryption. It's cool.
takingarms1
Posts: 3052
Joined: Fri Feb 20, 2004 8:00 am

Post by takingarms1 »

I do question the reliability of the sources (an ex fbi agent? could just be some old guy trying to sensationalize) but the technology is there and it could be true.

Under the Patriot Act the US gov't is allowed to monitor calls that happen between people in the US and people overseas without a warrant. I disagree with it and think it's a violation of the US citizens rights. That being said, that alone could explain the need for a huge data center and could be what this guy in the original post was referring to.
Last edited by takingarms1 on Mon May 06, 2013 6:12 pm, edited 1 time in total.
"You give my regards to St. Peter. Or, whoever has his job, but in hell!"
- - - -
NightRychune
Posts: 3065
Joined: Tue Feb 17, 2004 8:00 am

Post by NightRychune »

given the number of telecommunication surveillance facilities that exist in the US now, it's extraordinarily likely that a very large number of domestic-only phone calls are recorded and saved every year

i mean, it's likely far too much data to be looked over and processed beyond cursory scannings for specific keywords, but it's probably saved somewhere
Broodwich
Posts: 5662
Joined: Fri Oct 19, 2007 3:48 am
Location: Raincity

Post by Broodwich »

NightRychune wrote:QUOTE (NightRychune @ May 6 2013, 11:31 AM) given the number of telecommunication surveillance facilities that exist in the US now, it's extraordinarily likely that a very large number of domestic-only phone calls are recorded and saved every year

i mean, it's likely far too much data to be looked over and processed beyond cursory scannings for specific keywords, but it's probably saved somewhere
This, really the only thing that protects anyone is anonymity. Squeaky wheel gets the grease. Remember that chick that duct taped her kids face? They went in and found her old google searches from like 5 years ago
QUOTE Drizzo: ha ha good old chap
Drizzo: i am a brit
Drizzo: tut tut
Drizzo: wankarrrrrr
Drizzo: i only have sex whilst in the missionary position[/quote] Fas est et ab hoste doceri - Ovid
fuzzylunkin1

Post by fuzzylunkin1 »

germloucks
Posts: 756
Joined: Sat Feb 19, 2005 8:00 am
Location: Seattle

Post by germloucks »

If i were to think how i would design a system to do this kind of thing, i would use several pieces of software. One would build a profile on a database for each piece of information known to belong to a suspect. This would include normal stuff like assets, addresses, phone numbers, SSNs, Aliases etc. Everything we know about them. SQL works fine, and is extensible to this level. The database front end would interface with an aggregator. The aggregator's job is to sort through raw data output from the collection points, ideally this would happen real time. The aggregator would be smart enough pore over data such as phone calls, emails, cell phone text messages, and even blog posts... with the goal of matching unique bio/telemetric data, such as voice pitch and geo-tagging stuff already in place on many popular devices, with the person's profile on the database.

The end result would be a profile that builds over a period of time that starts to describe the average person's free time very well. You could do all sorts of interesting things with this information, maybe even a national REAL ID.
SgtMajor
Posts: 1446
Joined: Sun Apr 13, 2008 12:51 am
Location: Albuquerque NM

Post by SgtMajor »

Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assassinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC,UFO.


TAKE ME AWAY BIG BROTHER
The Last ACS Student
Doc Izzo wrote:QUOTE (Doc Izzo @ Sep 21 2012, 06:34 AM) k10, when people fear you like they fear me, you can get at me.
http://alleg.tripod.com
takingarms1
Posts: 3052
Joined: Fri Feb 20, 2004 8:00 am

Post by takingarms1 »

NightRychune wrote:QUOTE (NightRychune @ May 6 2013, 02:31 PM) given the number of telecommunication surveillance facilities that exist in the US now, it's extraordinarily likely that a very large number of domestic-only phone calls are recorded and saved every year

i mean, it's likely far too much data to be looked over and processed beyond cursory scannings for specific keywords, but it's probably saved somewhere
It raises the possibility that all of this stuff is saved somewhere, and then they can get a warrant for it after the fact and look up dates/times/numbers when needed. As a practical matter, I think there's far too much data to record it all, especially every domestic call. The engineering required would be tremendous and I doubt you could hide a project of that magnitude. And frankly the government just isnt that good at anything. But I suppose if you're given to conspiracy theories, this one is at least plausible.
"You give my regards to St. Peter. Or, whoever has his job, but in hell!"
- - - -
germloucks
Posts: 756
Joined: Sat Feb 19, 2005 8:00 am
Location: Seattle

Post by germloucks »

TakingArms wrote:QUOTE (TakingArms @ May 6 2013, 06:09 PM) And frankly the government just isnt that good at anything.
citation needed :excl:
Last edited by germloucks on Tue May 07, 2013 5:15 am, edited 1 time in total.
Post Reply