The Original Gay Porn Community - Free Gay Movies and Photos, Gay Porn Site Reviews and Adult Gay Forums

  • Welcome To Just Us Boys - The World's Largest Gay Message Board Community

    In order to comply with recent US Supreme Court rulings regarding adult content, we will be making changes in the future to require that you log into your account to view adult content on the site.
    If you do not have an account, please register.
    REGISTER HERE - 100% FREE / We Will Never Sell Your Info

    To register, turn off your VPN; you can re-enable the VPN after registration. You must maintain an active email address on your account: disposable email addresses cannot be used to register.

NSA data mining

Re: NSA data mining shared with the DEA

Palbert I can't imagine a paycheque big enough to put up with the likes of you, and kallipolis, and kulindahr, and t-rexx, and even your humble servant, bankside. Day after tedious day of futile efforts to put Oz back behind the green curtain. I thought only in China did people have so little to do that they would accept a career of filing reports with their minders, meeting post reply quotas, and frantically e-mailing for approved lines to feed into people's everyday conversation.

It is futile to get certain people to see reality, absolutely.

But I like to think that our posts here have an audience beyond just those posting in the thread. I like to believe that there are people out there who wonder what gay people think and come here, at least occasionally, to see. And I want those people to know.
 
Re: NSA data mining shared with the DEA

The NSA has trashed the Fourth Amendment. Again and again and again.

Whether they were deliberately trying to defy the law or accidentally destroying democracy matters not.

Failure to obey the law is abuse of the law. Failure to carry out their mandate in a legal manner is abuse of their mission.


Abuse

Abuse A*buse", v. t. [imp. & p. p. Abused; p. pr. & vb. n.
Abusing.] [F. abuser; L. abusus, p. p. of abuti to abuse,
misuse; ab + uti to use. See Use.]
1. To put to a wrong use; to misapply; to misuse; to put to a
bad use; to use for a wrong purpose or end; to pervert;
as, to abuse inherited gold; to make an excessive use of;
as, to abuse one's authority.
[1913 Webster]

2. To use ill; to maltreat; to act injuriously to; to punish
or to tax excessively; to hurt; as, to abuse prisoners, to
abuse one's powers, one's patience.
[1913 Webster]
You keep saying they've trashed the Fourth Amendment over and over again yet it's simply not true. Even the single court opinion in which Constitutionality is addressed says that the acquisition of the data wasn't Constitutionally questionable, but the storage and minimization procedures for it were. This came from the NSA's self-reporting of violations and was remedied within a month to ensure their storage and minimization procedures comported with the Fourth Amendment. This tells me that you a) didn't read the actual court opinion and b) you either have a fundamental misunderstanding of the way the programs work or you have a fundamental hatred of the government and what it does. A good summary of how this process occurs can be found here within this article. To quote:

To conduct the surveillance, the N.S.A. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border. The senior intelligence official, who, like other former and current government officials, spoke on condition of anonymity because of the sensitivity of the topic, said the N.S.A. makes a “clone of selected communication links” to gather the communications, but declined to specify details, like the volume of the data that passes through them.

Computer scientists said that it would be difficult to systematically search the contents of the communications without first gathering nearly all cross-border text-based data; fiber-optic networks work by breaking messages into tiny packets that flow at the speed of light over different pathways to their shared destination, so they would need to be captured and reassembled.

The official said that a computer searches the data for the identifying keywords or other “selectors” and stores those that match so that human analysts could later examine them. The remaining communications, the official said, are deleted; the entire process takes “a small number of seconds,” and the system has no ability to perform “retrospective searching.”

The official said the keyword and other terms were “very precise” to minimize the number of innocent American communications that were flagged by the program. At the same time, the official acknowledged that there had been times when changes by telecommunications providers or in the technology had led to inadvertent overcollection. The N.S.A. monitors for these problems, fixes them and reports such incidents to its overseers in the government, the official said.

So, by your very definition of abuse, this is not a misuse of the system and it doesn't fit into your description of abuse. Abuse indicates intent. As you can see from above, the technical complexities are enormous and the NSA not only takes steps to try and eliminate data they don't need (ex. destroying reassembled data that is purely domestic), but only targets certain data within that set. Abuse would come when they are targeting (via selectors described above) American's communications. They are not doing that. The small amount of American communications they do get into their system via the MTUs described in the court opinion, are stored separately, analyzed to remove any data pertaining to Americans save the exceptions provided for by law, and only then are they moved to the production databases with a permanent indication that it was data that was initially segregated and domestic communications were removed. By actually reading how the process works, it paints a completely different picture from the one you seem to be portraying of the NSA going out and targeting American's communications.

Do mistakes occur? Absolutely (and it has been noted by several anti-NSA posters in this thread) and that is why Congress wrote the laws to account for mistakes via minimization and reporting requirements. The courts also recognize this and it is discussed extensively in the FISC opinion. Again, I would invite you to actually read it.

Except, of course, when they were covering up their activities, as they did with their internal audit (which documented their abuse the law and their own directives thousands of times per year).
Except they didn't cover up their activities. Both the House and Senate Intelligence Committees have said they were aware of the information contained in that audit, which didn't document abuse of the law, but compliance issues that were the result of human and machine based mistakes.

In other words, the FISA court does not and cannot monitor or supervise the NSA.
No. In other words, the FISA court can and does monitor and supervise the NSA, just not to the micro level you seem to expect.

Yes, of course it is true of all courts.

So, why did you just complain above that "the FISA court announcement did not say that they didn't monitor or supervise the NSA" when you agree that it does not and cannot monitor or supervise the NSA?

The problem here is that the NSA operates unsupervised. The FISA court is a rubber stamp. And, in those rare instances where it complains, it is ignored.
No. What I said above was that it doesn't supervise and monitor the NSA down to a micro level. No court personally supervises the day-to-day operations and compliance with its orders. The court's job is to interpret the law, issue an order, and then turn it over to the appropriate authorities charged with the day-to-day monitoring and supervision of the operation. They then require reports on compliance with their order in a specified time period. That's how courts work.

So it's funny that only two of those quotes are from people on the Intelligence Committees, the committees that receive these reports from NSA. And the one quote from Wyden and Udall shows very clearly that they knew this and other information, which one can assume they wouldn't know had the NSA not shared it with them. And still, not one of those quotes made the claim that the NSA didn't provide this, or any other compliance information, to Congress. All of it is just politically convenient outrage.

Here is a compliance report that was issued for June 1-November 30, 2012. Notice on page 28 where it states:

The Section 707 report previously provided to Congress and the Court discussed in detail every incident of non-compliance that occurred during the reporting period.

Here's another compliance report that was issued for December 1, 2008-May 31, 2009. In it:

The compliance incidents for the reporting period are described in detail in the Section 707 Report,26 and, as with the prior joint assessment, are analyzed here to determine whether there are patterns or trends that might indicate underlying causes that could be addressed through additional measures, and to assess whether the agency involved has implemented measures to
prevent recurrences.

It seems to me like the Congressional Intelligence Committees regularly gets reports of the details of each of the incidents every reporting period. Now whether they read them or not is an issue to take up with the members who serve on those committees.

You don't seem to get this. The FISC itself is claiming the NSA violated the Constitution!

The Congress itself is complaining that the NSA seems to be breaking the law.

The only person who seems to believe that everything here is just fine is you.
You don't seem to get this. The FISC did claim that a PORTION of the NSA program was unconstitutional, the NSA fixed their storage and minimization guidelines for that part of their collection, and then the court signed off on it as being constitutional. Congress itself is not complaining or accusing the NSA of breaking the law. And I make my judgments based on the information I can research and put together, not on what some news reporter tells me.

I wonder how many copies of the information (which presumably they already have) they need to "recover?"

If we email them another 500 copies of the data, will they have "recovered" what they need? How about 5 billion copies? How about 5 trillion?

Why don't they recover what they "lost" from their own hard drives?

Does British intelligence routinely depend on people leaking their data to external sources for them to keep a copy of what they have? Why don't they just get better hard drives?
They only needed to recover one copy at the time - the copy that Mr. Miranda was traveling through their country with. It's been deemed stolen property by the United States and the UK government, based on their laws, obviously had the ability to recover it. Would I have a right, if I obtained a copy of your social security number, date of birth, mother's maiden name, etc. to keep that information as long as you had a copy with you?

The UK sent government inspectors to supervise the destruction of hard drives containing data which the Guardian maintained at other locations, outside the UK. Data which they can access in Britain by simply sitting down at a computer terminal.

The government accomplished absolutely no destruction of information by this exercise. It never intended to. The motivation was to intimidate the Guardian into not printing information that the USA found embarrassing.
The motivation was to address stolen and classified information (per Greenwald's claim, some of it pertaining to the UK government) wherever it had the ability to do so. If the Guardian gets the information back, I'm sure they'll have another story they can write when they show up to offer them the choice to go to court or destroy it. By the Guardian's own admission, had they been taken to court, they could have been stopped publishing the information (available here) so they opted to destroy it themselves as a symbolic gesture because the court actions may have seriously stopped their publishing. The UK government didn't make the decision to destroy the computer

The motivation was to make Britain a less democratic and more easily controlled society by suppressing a free press - so that the USA could go on abusing its Constitution.
Exactly. You figured it out. Britain's sole purpose in existing is to allow the US to violate its Constitution. What a smart guy you are.
 
Re: NSA data mining shared with the DEA

Meet a member of Obama's NSA review panel: Cass Sunstein.



http://www.salon.com/2010/01/15/sunstein_2/

So far as I'm concerned the administration's dissembling on the NSA will continue, especially with the introduction of this "establishment intelligence terrorist."
Really palbert? I expected so much more out of you. Salon takes those quotes so far out of context they may as well have made them up themselves. Please read the entire paper here. It's a theoretical discussion on conspiracy theories and how governments can deal with them if they become too dangerous or approach the level of violence.

I will admit though the guy is a bit of an enigma when it comes to his political standings. Some positions he has are extremely liberal, some seem extremely conservative, and some seem very Libertarian.
 
Re: NSA data mining shared with the DEA

Ahh here we go. Propaganda in social media.

Palbert I can't imagine a paycheque big enough to put up with the likes of you, and kallipolis, and kulindahr, and t-rexx, and even your humble servant, bankside. Day after tedious day of futile efforts to put Oz back behind the green curtain. I thought only in China did people have so little to do that they would accept a career of filing reports with their minders, meeting post reply quotas, and frantically e-mailing for approved lines to feed into people's everyday conversation.
Well obviously Canada has at least one of those people. Maybe you can move out to China, be around people who share your daily practices, and be closer to your boy Snowden. You obviously don't appreciate all of the report filers there in Canada that keep your stream of government benefits going.
 
Re: NSA data mining shared with the DEA

In response to the actions of the UK:

Guardian partners with New York Times over Snowden GCHQ files

"In a climate of intense pressure from the UK government, the Guardian decided to bring in a US partner to work on the GCHQ documents provided by Edward Snowden. We are working in partnership with the NYT and others to continue reporting these stories," the Guardian said in a statement.

This is an interesting development. In my opinion The Times has lagged in coverage of national security issues.

I assume the International Herald Tribune, a Times company, will participate.
 
Re: NSA data mining shared with the DEA

In response to the actions of the UK:



This is an interesting development. In my opinion The Times has lagged in coverage of national security issues.

I assume the International Herald Tribune, a Times company, will participate.

I'm also surprised that the NYT has been so noticeably low key in this matter.
 
Re: NSA data mining shared with the DEA

In case someone missed this:

http://www.theguardian.com/commentisfree/2013/aug/19/david-miranda-schedule7-danger-reporters

A little over two months ago I was contacted by a very senior government official claiming to represent the views of the prime minister. There followed two meetings in which he demanded the return or destruction of all the material we were working on. The tone was steely, if cordial, but there was an implicit threat that others within government and Whitehall favoured a far more draconian approach.

The mood toughened just over a month ago, when I received a phone call from the centre of government telling me: "You've had your fun. Now we want the stuff back." There followed further meetings with shadowy Whitehall figures. The demand was the same: hand the Snowden material back or destroy it. I explained that we could not research and report on this subject if we complied with this request. The man from Whitehall looked mystified. "You've had your debate. There's no need to write any more."

Alan Rusbridger, editor of The Guardian.

If true, this would be some serious shit. I wonder what's in Cameron's mind. I mean, there's nothing lower, stupider and more pathetic than being Obama's bitch. And about the latter, I guess posting youtube videos about your new fucking pet is way more important than being an honest, truly democratic head of state...
 
Re: NSA data mining shared with the DEA

I'm actually just as interested in the news that so-called civilized west is engaging in "50-cent-party" tactics. I'm interested in the extent to which our governments eavesdrop, but just as much the extent to which they insert themselves into the conversation with paid hacks.
 
Re: NSA data mining shared with the DEA

Some ready-witted and funny comments:

http://original.antiwar.com/justin/2013/08/20/rue-britannia/

Snowden’s arrival in Russia set off a firestorm of hatred directed at the American whistleblower in the British media – but now that they are seeing their own government act like they imagine Putin would, what do these "human rights" campaigners have to say? (Not that it will mitigate their avid interest in the state of human rights in Russia).

Britain is one of the least free countries in the "Free World" – a place where a tweet that offends some politically correct full-of-themselves bureaucrat can land you in jail.[...]Where Christians and others who hold to traditional and now unpopular beliefs about sexuality and the family can be and have been prosecuted for expressing their religious convictions.

Here is the spokesman for a country [U.S. Department Of State] that ceaselessly criticizes other governments’ “human rights violations” around the world, even going so far as to issue annual report cards for every damn two-bit backwater on earth. If the inhabitants of East Shittystan aren’t allowed to see "Sex and the City" on their 1950s television sets, Uncle Sam has something to say about it. Yet when a bunch of British cops barge into a newspaper office to oversee the pointless destruction of computers containing the Snowden files, suddenly this usually oh-so-righteous arbiter of international morality is struck dumb.

Justin Raimondo.

The Obama fanboys and fangirls won't be outraged at any of these things either, after all, his speeches are oh so pretty...
 
Re: NSA data mining shared with the DEA

Obama's antics never cease. Now he's employing one of his and Bush II mutual buddies to cover his lying, pathetic ass:

http://original.antiwar.com/justin/2013/08/22/yes-black-is-the-new-transparency/

[...] Obama announced a "review board" to be appointed that would supposedly reassure his critics there really is no domestic spying program[...]later he made some appointments to this panel: former Counter-Terrorism Czar Richard Clarke, former special assistant for economic policy Peter Swire, former CIA Deputy Director Mike Morrell – and Cass Sunstein, a very close friend and confidant of the President.[...]he has made something of a name for himself as an outspoken advocate of government spying. Being one of those really highbrow types, he calls it "cognitive infiltration." Sunstein wants paid government agents to penetrate ostensibly subversive “conspiracy minded” social networks[...]

[...]Here is part of the summary of an academic paper Sunstein published in 2008: [*]

"Many millions of people hold conspiracy theories; they believe that powerful people have worked together in order to withhold the truth about some important practice or some terrible event."

[...]Sunstein proposes sending government spies into "chat rooms, online social networks, or even real-space groups" to provide a bit of Attitude Correction.

These agents would be paid to infiltrate and counteract any "conspiracy theories" the Harvard Professor and his co-thinkers deem "dangerous."

The Bush administration tried something like this, although not quite as extreme: you’ll recall the secret government payoffs to "independent" pundits like Armstrong Williams and Maggie Gallagher before and during the Iraq war[...]

[...]"What can government do about conspiracy theories?" he asks:

"Among the things it can do, what should it do? We can readily imagine a series of possible responses. (1) Government might ban conspiracy theorizing.[...]

Here, after all, is someone who defended [**] George W. Bush’s "military commissions" as perfectly legal and legitimate, dismissing opponents’ arguments as "ludicrous." And it isn’t just the Fourth Amendment the new authoritarians are after: Sunstein opposes the First Amendment as presently constituted. Instead, he says, we need a [***] "New Deal for speech,"[...]

Justin Raimondo.

*http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585

**http://prospect.org/article/military-tribunal-debate

***http://www.scottlondon.com/reviews/sunstein.html
 
Re: NSA data mining shared with the DEA

It must suck being this spiteful of the man in charge of your country... Personally, I'm newbored with this attitude...

More open-eyed attention to current events - and less to the Botticelli Triptych - seems in order. (Even though the Triptych may induce a false state of well-being.)
 
Re: NSA data mining shared with the DEA

Must be a slow Guardian news day since people are having to resort to reposting material to try and keep the "Brotherhood of the Oppressed and Surveilled" stirred up.

I posted the link the the full paper earlier. Please make an attempt to read it before trying to act like an expert in the matter by quoting some biased news reporter's interpretation and HIGHLY selective quotations of it (some only contain 2 or 3 words). I especially like the quote, taken completely out of context, about the government's options in dealing with groups that perpetuate conspiracy theories (not even mentioning the fact that one of the previous options discussed was just ignoring the theories.) So let's look at the whole paragraph it's quoted from:

What can government do about conspiracy theories? Among the things it can do, what should it do? We can readily imagine a series of possible responses. (1) Government might ban conspiracy theorizing. (2) Government might impose some kind of tax, financial or otherwise, on those who disseminate such theories. (3) Government might itself engage in counterspeech, marshaling arguments to discredit conspiracy theories. (4) Government might formally hire credible private parties to engage in counterspeech. (5) Government might engage in informal communication with such parties, encouraging them to help. Each instrument has a distinctive set of potential effects, or costs and benefits, and each will have a place under imaginable conditions. However, our main policy idea is that government should engage in cognitive infiltration of the groups that produce conspiracy theories, which involves a mix of (3), (4) and (5).

You can find that, and much more information, in the ACTUAL paper (an academic discussion of dealing with this particular issue, not a policy push for any administration) found at the link both you and I previously posted.

I also love your HIGHLY trimmed summary of his positions on free speech, when much of what he says has been championed on these very message boards in the past. Let's quote slightly more than 4 words from your linked book review:

In this book, he addresses himself to the thorny issue of free speech, suggesting that the First Amendment protects many forms of speech that should never be protected — commercial speech, libelous speech, speech that invades privacy, and certain forms of pornography and hate speech — while it ignores genuine victims of defamation and in some cases gives the government too much power over speech.

According to Sunstein, contemporary interpreters of First Amendment law have lost sight of the primary rationale behind freedom of expression, namely the principle of "government by discussion." The framers realized that the only way the people can be sovereign while at the same time subject to the law was to organize government around a system of deliberative discussion.

Sunstein proposes what he calls a "New Deal" for speech, a reformulation which abandons the prevailing "marketplace of ideas" model of free expression, in favor of a Madisonian conception based on deliberative democracy. In practice, this would mean, among other things, free media time for political candidates, federal guidelines for the coverage of public issues, and curtailment of the ability of the wealthy to buy access in the media.

All quotes taken from http://www.scottlondon.com/reviews/sunstein.html

I think what we've learned today is that while antiwar.com is obviously a stellar fire stoker, it falls far short of being any kind of actual news site.
 
Re: NSA data mining shared with the DEA

^

Oops. OK, evidently, I didn't notice you posted a link to the paper earlier. This being such a long thread (274 posts and counting); I have no time to read it all in detail, since, you know, believe it or not, a have that thing people call "a life". It's all OK, though, don't worry. Your previous posting of the link doesn't alter the validity of my posts at all. And, after all, obviously you know that whether I'm biased/taking things out of context or not is utterly irrelevant in this context, since, you know, I'm posting the link, so, you know, people can read the shit and form an opinion of their own. So, again, no worries, no harm done. Nobody died.
 
Re: NSA data mining shared with the DEA

We learn more each day of the rigorous security and tracking at NSA.

As a system administrator, according to intelligence officials, Snowden had the ability to create and modify user profiles for employees and contractors. He also had the ability to access NSAnet using those user profiles, meaning he could impersonate other users in order to access files. He borrowed the identities of users with higher level security clearances to grab sensitive documents.

http://investigations.nbcnews.com/_...n-impersonated-nsa-officials-sources-say?lite

From the same: it appears new-hires have to be less capable.

“Every day, they are learning how brilliant [Snowden] was,” said a former U.S. official with knowledge of the case. “This is why you don’t hire brilliant people for jobs like this. You hire smart people. Brilliant people get you in trouble.”
 
Re: NSA data mining shared with the DEA

Today we get a glimpse of the "black budget" for the National Intelligence Program.

U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary

The $52.6 billion “black budget” for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny. Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses those funds or how it performs against the goals set by the president and Congress.

The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees.

The summary describes cutting-edge technologies, agent recruiting and ongoing operations. The Washington Post is withholding some information after consultation with U.S. officials who expressed concerns about the risk to intelligence sources and methods. Sensitive details are so pervasive in the documents that The Post is publishing only summary tables and charts online.

http://www.washingtonpost.com/world...57bb78-10ab-11e3-8cdd-bcdc09410972_print.html

A visual budget breakdown as presented by The Washington Post.

http://www.washingtonpost.com/wp-sr.../?Post+generic=?tid=sm_twitter_washingtonpost
 
Re: NSA data mining shared with the DEA

Inside the 2013 U.S. intelligence 'black budget'

The pages in this document appear in the summary of the Office of the Director of National Intelligence's multivolume FY 2013 Congressional Budget Justification — the U.S. intelligence community's top-secret "black budget." It covers many of the high-profile agencies, such as the Central Intelligence Agency and the National Security Agency, as well as lesser-known programs, including those within the Treasury, State and Energy Departments. This budget does not include funding for intelligence-gathering by the military.

Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses those funds. See detailed breakdowns of how the U.S. government allocates resources across the intelligence community and within individual agencies in the annotated pages below (i.e., in the sidebar).

With copy of 2013 Congressional Budget Justification
 
Back
Top