{"id":20315,"date":"2015-03-18T12:35:48","date_gmt":"2015-03-18T19:35:48","guid":{"rendered":"http:\/\/www.backwoodshome.com\/blogs\/ClaireWolfe\/?p=20315"},"modified":"2015-03-18T12:35:48","modified_gmt":"2015-03-18T19:35:48","slug":"bulk-collection-of-signals-intelligence","status":"publish","type":"post","link":"https:\/\/www.clairewolfe.com\/blog\/2015\/03\/18\/bulk-collection-of-signals-intelligence\/","title":{"rendered":"Bulk Collection of Signals Intelligence"},"content":{"rendered":"<p><a href=\"http:\/\/www.backwoodshome.com\/blogs\/ClaireWolfe\/2010\/06\/07\/so-what-exactly-is-a-freedom-outlaw\/\" target=\"_blank\">An Agitator<\/a> who might not want to be named sent me a .pdf pre-publication copy of an upcoming report, <a href=\"http:\/\/www.nap.edu\/catalog\/19414\/bulk-collection-of-signals-intelligence-technical-options\" target=\"_blank\">&#8220;Bulk Collection of Signals Intelligence.&#8221;<\/a><\/p>\n<p>It&#8217;s from the wittily named &#8220;Committee on Responding to Section 5(d) of Presidential Policy Directive 28: The Feasibility of Software to Provide Alternatives to Bulk Signals Intelligence Collection; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council &#8221; and its aim is apparently (not their words) to find better ways of targeting everybody rather than just randomly spying on everybody. (It&#8217;s a fine distinction, I know. But when you&#8217;re well-connected enough for the fedgov to let you serve on the august CORTS5(d)OPD28TFOSTPATBSICCSATBDOEAPSNRC such distinctions matter to you.)<\/p>\n<p>The report is officially to be released on Friday. (And you know what a Friday release means; the fedgov wants it ignored.)<\/p>\n<p>Behind the typically unreadable bureaucratic prose, there are some revealing bits. I warn you, it&#8217;s as boring as dirt, but if you want a copy of this report, just drop a comment using a functional email address in your login. I&#8217;ll email it to you.<\/p>\n<p>But of course, receiving an email from me will mean that you fall under section 3.1 (&#8220;Contact chaining&#8221;): &#8220;Communications metadata, domestic and foreign, is used to develop contact chains by starting with a target and using metadata records to determine who has communicated directly with the target (1 hop), who has in turn communicated with those people (2 hop), and so on. [And hey, pretty soon, you&#8217;ve <a href=\"https:\/\/en.wikipedia.org\/wiki\/Six_Degrees_of_Kevin_Bacon\" target=\"_blank\">got Kevin Bacon in your terrorist network<\/a>!]&#8221;<\/p>\n<p>So maybe you&#8217;re better off just clicking the &#8220;Contents&#8221; link on the NAP site, &#8216;kay? It&#8217;s all there, anyhow.<\/p>\n<p>&#8212;&#8211;<\/p>\n<p>The Agitator who sent the .pdf is &#8212; he knows for sure &#8212; one of the Target People. He&#8217;s had those red circles painted on him for many years and is quite used to it. He sent along some familiar, but always worthy, advice (I&#8217;ve massaged the words a bit to disguise his identity): <\/p>\n<blockquote><p>Think of it from this perspective:  If your adversary has documented that they always chase down red balloons, well, give them a sea of red balloons to chase down.<\/p>\n<p>I once established that the govt was beyond obviously reading emails between me and an attorney. These communications were considered privileged and off limits under all laws (didn&#8217;t stop the government).<\/p>\n<p>&#8220;So they like reading do they?&#8221; I told the attorney.  <\/p>\n<p>Then I emailed multiple 10,000 page documents to the attorney in rapid succession. I gave them all the red balloons their little bureaucratic hearts could ever desire.<\/p><\/blockquote>\n<p>I&#8217;m not sure how well the attorney might have appreciated that. But you get the picture. \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An Agitator who might not want to be named sent me a .pdf pre-publication copy of an upcoming report, &#8220;Bulk Collection of Signals Intelligence.&#8221; It&#8217;s from the wittily named &#8220;Committee on Responding to Section 5(d) of Presidential Policy Directive 28: The Feasibility of Software to Provide Alternatives to Bulk Signals Intelligence Collection; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council &#8221; and its aim is apparently (not their words) to find better ways of targeting everybody rather than just randomly spying on everybody. (It&#8217;s a fine distinction, I know. But when you&#8217;re well-connected enough&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/www.clairewolfe.com\/blog\/2015\/03\/18\/bulk-collection-of-signals-intelligence\/\">Continue reading<span class=\"screen-reader-text\">Bulk Collection of Signals Intelligence<\/span><\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,28],"tags":[],"class_list":["post-20315","post","type-post","status-publish","format-standard","hentry","category-government","category-privacy-and-self-ownership","ratio-natural","entry"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/posts\/20315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/comments?post=20315"}],"version-history":[{"count":0,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/posts\/20315\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/media?parent=20315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/categories?post=20315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/tags?post=20315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}