revelarts
08-04-2013, 06:09 PM
NSA Spokesman Accidentally Admits that the Government Is Spying On Virtually All Americans
July 21, 2013
Source: Washington’s Blog (http://www.washingtonsblog.com/2013/07/nsa-spokesman-accidentally-admits-that-the-government-is-spying-on-all-americans.html)
We have long noted that the government is spying on just about everything we do (http://www.washingtonsblog.com/2013/07/anyone-who-says-the-government-only-spies-on-limited-targets-is-wrong.html).
The NSA has pretended that it only spies on a small number of potential terrorists. But NSA Deputy Director John C. Inglis inadvertently admitted that the NSA could spy on just about all Americans.
Inglis told Congress last week that the agency conducts “three-hop” analysis (http://www.bostonglobe.com/news/nation/2013/07/17/nsa-spying-under-fire-you-got-problem/Ev73I1XwPYtvD2WFZ6idGK/story.html).
Three-hop (also known as “three degree”) analysis means (http://www.bostonglobe.com/news/nation/2013/07/17/nsa-spying-under-fire-you-got-problem/Ev73I1XwPYtvD2WFZ6idGK/story.html):
The government can look at the phone data of a suspected terrorist, plus the data of all of the contacts, then all of those people’s contacts, and all of those people’s contacts.
This means that a lot of people (http://www.bostonglobe.com/news/nation/2013/07/17/nsa-spying-under-fire-you-got-problem/Ev73I1XwPYtvD2WFZ6idGK/story.html) could be caught up in the dragnet:
If the average person calls 40 unique people, three-hop analysis could allow the government to mine the records of 2.5 million Americans when investigating onesuspected terrorist.
Given that there are now approximately 875,000 (http://www.reuters.com/article/2013/05/03/us-usa-security-database-idUSBRE94200720130503) people in the government’s database of suspected terrorists – including many thousands of Americans – every single American living on U.S. soil could easily be caught up in the dragnet.
For example, 350 million Americans divided by 2.5 million Americans caught up in dragnet for each suspected terrorist, means that a mere 140 (https://www.google.com/search?q=350+divided+by+2.5&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a#client=firefox-a&hs=SL4&rls=org.mozilla:en-US%3Aofficial&sclient=psy-ab&q=350+million+divided+by+2.5+million+&oq=350+million+divided+by+2.5+million+&gs_l=serp.3...68253.73421.0.73863.17.17.0.0.0.3.27 4.2413.6j8j3.17.0....0...1c.1.21.psy-ab.ZX5KplpsI9s&pbx=1&bav=on.2,or.r_qf.&bvm=bv.49478099,d.cGE&fp=b08dbb3e193b471d&biw=853&bih=350) potential terrorists could lead to spying on all Americans. There are tens of thousands of Americans listed as suspected terrorists … including just about anyone who protests anything that the government or big banks do (http://www.washingtonsblog.com/2012/12/peaceful-protest-treated-as-terrorism-by-the-fbi.html).
As the Electronic Frontier Foundation notes (https://www.eff.org/deeplinks/2012/12/government-attorneys-agree-eff-new-counterterrorism-database-rules-threaten):
According to an unusually blunt Senate investigation of so-called “fusion centers”released last month (https://www.eff.org/deeplinks/2012/10/new-senate-report-confirms-government-counterterrorism-centers-dont-stop), the TIDE database is also full of information of innocent people that have nothing to do with terrorism. The report gave examples of: a TIDE profile of a person whom the FBI had already cleared of any connection to terrorism, a TIDE profile of a two-year old-boy, and even a TIDE profile of Ford Motor Company.
ARS Technica reports (http://arstechnica.com/information-technology/2013/07/you-may-already-be-a-winner-in-nsas-three-degrees-surveillance-sweepstakes/):
When the first revelations about the National Security Agency’s (NSA) widespread collection of phone call metadata and Internet traffic began to surface, South Carolina Senator Lindsey Graham noted that for those not talking to terrorists on the phone, “We don’t have anything to worry about. (http://www.mediaite.com/tv/lindsey-graham-glad-nsa-gathering-phone-records-i-know-im-not-talking-to-terrorists/) I’m glad that activity is going on, but it is limited totracking people who are suspected to be terrorists and who they may be talking to.”
Turns out the data collection is not so limited. In testimony yesterday before the House Judiciary Committee, National Security Agency Deputy Director Chris Inglis said that the NSA’s probing of data in search of terrorist activity extended “two to three hops (http://www.theatlanticwire.com/politics/2013/07/nsa-admits-it-analyzes-more-peoples-data-previously-revealed/67287/)” away from suspected terrorists. Previously, NSA leaders had said surveillance was limited to only two “hops” from a suspect.
If you’ve ever played “Six Degrees of Kevin Bacon (http://www.sixdegrees.org/about)” or used LinkedIn to try to reach someone professionally, you know how small the world of interconnected contacts can be. When you use big data tools to mine for relationships, the world gets even smaller. That third hop in connections greatly expands the probability of innocent people worldwide being scooped up into the NSA’s surveillance machine to include a good-sized share of American citizens—citizens who Senator Graham said “don’t have anything to worry about.”
***
By reading this article, you’re one hop from me—and three hops from [Afghan President] Hamid Karzai.
***
The NSA’s systems sort through the data using algorithms to find connections. These can be detected in near real time from Internet data or discovered in the periodic dumps of phone metadata from carriers, building upon the system’s knowledge of previous connections. The system narrows the field of potential surveillance targets through a process that’s similar to playing the game “Six Degrees of Kevin Bacon”—only, in this case, it’s more like “Three Degrees of Osama Bin Laden.”***
To determine how many hops you are from Osama, for example, the NSA’s data analysis engine software constantly plows through information and builds a model of all the relationships between every phone number on record and every IP address. Other software robots query the graph to discover which “nodes”—phone numbers, IP addresses and email accounts—fall within three degrees of separation from an established suspect.
If you have a direct relationship with a suspected terrorist or target (you’ve called them, you’ve emailed them, you’ve visited their website) that’s a “one hop” relationship; there’s a solid line connecting you to that person in the NSA’s relationship graph. If you talk with, e-mail, or visit the Facebook page or website of someone who’s got a one-hop relationship, you’re two hops away. Add one more person in between in the graph, and you’re three hops away.
If you’re within three hops, you may get flagged for analysis, and then you could get extra special attention, such as a secret FISA warrant request to use PRISM for access to your data on cloud providers’ servers.[I]....
July 21, 2013
Source: Washington’s Blog (http://www.washingtonsblog.com/2013/07/nsa-spokesman-accidentally-admits-that-the-government-is-spying-on-all-americans.html)
We have long noted that the government is spying on just about everything we do (http://www.washingtonsblog.com/2013/07/anyone-who-says-the-government-only-spies-on-limited-targets-is-wrong.html).
The NSA has pretended that it only spies on a small number of potential terrorists. But NSA Deputy Director John C. Inglis inadvertently admitted that the NSA could spy on just about all Americans.
Inglis told Congress last week that the agency conducts “three-hop” analysis (http://www.bostonglobe.com/news/nation/2013/07/17/nsa-spying-under-fire-you-got-problem/Ev73I1XwPYtvD2WFZ6idGK/story.html).
Three-hop (also known as “three degree”) analysis means (http://www.bostonglobe.com/news/nation/2013/07/17/nsa-spying-under-fire-you-got-problem/Ev73I1XwPYtvD2WFZ6idGK/story.html):
The government can look at the phone data of a suspected terrorist, plus the data of all of the contacts, then all of those people’s contacts, and all of those people’s contacts.
This means that a lot of people (http://www.bostonglobe.com/news/nation/2013/07/17/nsa-spying-under-fire-you-got-problem/Ev73I1XwPYtvD2WFZ6idGK/story.html) could be caught up in the dragnet:
If the average person calls 40 unique people, three-hop analysis could allow the government to mine the records of 2.5 million Americans when investigating onesuspected terrorist.
Given that there are now approximately 875,000 (http://www.reuters.com/article/2013/05/03/us-usa-security-database-idUSBRE94200720130503) people in the government’s database of suspected terrorists – including many thousands of Americans – every single American living on U.S. soil could easily be caught up in the dragnet.
For example, 350 million Americans divided by 2.5 million Americans caught up in dragnet for each suspected terrorist, means that a mere 140 (https://www.google.com/search?q=350+divided+by+2.5&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a#client=firefox-a&hs=SL4&rls=org.mozilla:en-US%3Aofficial&sclient=psy-ab&q=350+million+divided+by+2.5+million+&oq=350+million+divided+by+2.5+million+&gs_l=serp.3...68253.73421.0.73863.17.17.0.0.0.3.27 4.2413.6j8j3.17.0....0...1c.1.21.psy-ab.ZX5KplpsI9s&pbx=1&bav=on.2,or.r_qf.&bvm=bv.49478099,d.cGE&fp=b08dbb3e193b471d&biw=853&bih=350) potential terrorists could lead to spying on all Americans. There are tens of thousands of Americans listed as suspected terrorists … including just about anyone who protests anything that the government or big banks do (http://www.washingtonsblog.com/2012/12/peaceful-protest-treated-as-terrorism-by-the-fbi.html).
As the Electronic Frontier Foundation notes (https://www.eff.org/deeplinks/2012/12/government-attorneys-agree-eff-new-counterterrorism-database-rules-threaten):
According to an unusually blunt Senate investigation of so-called “fusion centers”released last month (https://www.eff.org/deeplinks/2012/10/new-senate-report-confirms-government-counterterrorism-centers-dont-stop), the TIDE database is also full of information of innocent people that have nothing to do with terrorism. The report gave examples of: a TIDE profile of a person whom the FBI had already cleared of any connection to terrorism, a TIDE profile of a two-year old-boy, and even a TIDE profile of Ford Motor Company.
ARS Technica reports (http://arstechnica.com/information-technology/2013/07/you-may-already-be-a-winner-in-nsas-three-degrees-surveillance-sweepstakes/):
When the first revelations about the National Security Agency’s (NSA) widespread collection of phone call metadata and Internet traffic began to surface, South Carolina Senator Lindsey Graham noted that for those not talking to terrorists on the phone, “We don’t have anything to worry about. (http://www.mediaite.com/tv/lindsey-graham-glad-nsa-gathering-phone-records-i-know-im-not-talking-to-terrorists/) I’m glad that activity is going on, but it is limited totracking people who are suspected to be terrorists and who they may be talking to.”
Turns out the data collection is not so limited. In testimony yesterday before the House Judiciary Committee, National Security Agency Deputy Director Chris Inglis said that the NSA’s probing of data in search of terrorist activity extended “two to three hops (http://www.theatlanticwire.com/politics/2013/07/nsa-admits-it-analyzes-more-peoples-data-previously-revealed/67287/)” away from suspected terrorists. Previously, NSA leaders had said surveillance was limited to only two “hops” from a suspect.
If you’ve ever played “Six Degrees of Kevin Bacon (http://www.sixdegrees.org/about)” or used LinkedIn to try to reach someone professionally, you know how small the world of interconnected contacts can be. When you use big data tools to mine for relationships, the world gets even smaller. That third hop in connections greatly expands the probability of innocent people worldwide being scooped up into the NSA’s surveillance machine to include a good-sized share of American citizens—citizens who Senator Graham said “don’t have anything to worry about.”
***
By reading this article, you’re one hop from me—and three hops from [Afghan President] Hamid Karzai.
***
The NSA’s systems sort through the data using algorithms to find connections. These can be detected in near real time from Internet data or discovered in the periodic dumps of phone metadata from carriers, building upon the system’s knowledge of previous connections. The system narrows the field of potential surveillance targets through a process that’s similar to playing the game “Six Degrees of Kevin Bacon”—only, in this case, it’s more like “Three Degrees of Osama Bin Laden.”***
To determine how many hops you are from Osama, for example, the NSA’s data analysis engine software constantly plows through information and builds a model of all the relationships between every phone number on record and every IP address. Other software robots query the graph to discover which “nodes”—phone numbers, IP addresses and email accounts—fall within three degrees of separation from an established suspect.
If you have a direct relationship with a suspected terrorist or target (you’ve called them, you’ve emailed them, you’ve visited their website) that’s a “one hop” relationship; there’s a solid line connecting you to that person in the NSA’s relationship graph. If you talk with, e-mail, or visit the Facebook page or website of someone who’s got a one-hop relationship, you’re two hops away. Add one more person in between in the graph, and you’re three hops away.
If you’re within three hops, you may get flagged for analysis, and then you could get extra special attention, such as a secret FISA warrant request to use PRISM for access to your data on cloud providers’ servers.[I]....