I don't know how things work in Britain, but here in the US one of most important criteria for obtaining/keeping ANY clearance is that you not be "blackmail-able".
An interesting response to those questions would have been:
If there were a secretly gay member of GCHQ, wouldn't they pose an unacceptable blackmail risk, thus disqualifying them from having a clearance at all?/div>
This might explain the Telco's reluctance to refuse overbroad requests. There's already a precedent of losing government funding when you appear "adversarial"./div>
Maybe, just maybe they're operating under the idea that their "protected" systems shouldn't be involved in providing data/ services on a public network...
Many of you seem to be operating under the illusion that you can trust your computer. You can't. It won't always behave the way you expect, especially when it can communicate with a public network. Network communications is never "safe", at best it's "mostly safe."/div>
That whole process of "without having to ...innovate myself" is called learning. It's not like I have a replicator and can just "copy" his spear, I have to "learn" the techniques he used before I can produce one on my own./div>
Also, if they actually don't have the capability to process all of their data... they can't actually talk about that in a public forum because that'd be revealing their internal techniques (which are classified).
The CIA, FBI and ordinary Law Enforcement aren't terribly keen about discussing their techniques in public either.../div>
Okay, I remember reading (probably on Wired) that the NSA has an unusual definition of "intercept" when it came to domestic telephone calls... An "intercept" for them was going back and analyzing their recordings, not the actual "making" of the recording.
If, for instance, I merely record raw packet data on the network and do not interpret it... then I've "captured the firehose", but I don't know what I've got until I analyze it.
If I have the budget to "capture the firehose" for the entire US telephone network, but I only need to analyze 10-20K "intercepts" per year, then I probably wouldn't have the equipment or staff to evaluate the details of all the data I have.
If that's the situation, then I'd probably respond similarly to Wyden's request. In order to answer his questions I'd have to analyze ALL the data I have, which I don't have the resources or budget to do... and even if I did, it'd expose the details of all communications on the network... which would be an invasion of privacy./div>
Techdirt has not posted any stories submitted by Randy Zagar.
On the "outing" of GCHQ members...
An interesting response to those questions would have been:
If there were a secretly gay member of GCHQ, wouldn't they pose an unacceptable blackmail risk, thus disqualifying them from having a clearance at all?/div>
Anybody remember what happened to Qwest?
http://www.nytimes.com/2006/05/12/washington/12cnd-phone.html?pagewanted=all&_r=0
On ce they refused the NSA request, they started losing government contracts...
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/12/AR2007101202485.html
This might explain the Telco's reluctance to refuse overbroad requests. There's already a precedent of losing government funding when you appear "adversarial"./div>
Umm, I think you're missing the point...
Many of you seem to be operating under the illusion that you can trust your computer. You can't. It won't always behave the way you expect, especially when it can communicate with a public network. Network communications is never "safe", at best it's "mostly safe."/div>
Copying vs. Learning
Re: It makes sense if the NSA is recording *raw* data...
The CIA, FBI and ordinary Law Enforcement aren't terribly keen about discussing their techniques in public either.../div>
It makes sense if the NSA is recording *raw* data...
If, for instance, I merely record raw packet data on the network and do not interpret it... then I've "captured the firehose", but I don't know what I've got until I analyze it.
If I have the budget to "capture the firehose" for the entire US telephone network, but I only need to analyze 10-20K "intercepts" per year, then I probably wouldn't have the equipment or staff to evaluate the details of all the data I have.
If that's the situation, then I'd probably respond similarly to Wyden's request. In order to answer his questions I'd have to analyze ALL the data I have, which I don't have the resources or budget to do... and even if I did, it'd expose the details of all communications on the network... which would be an invasion of privacy./div>
Techdirt has not posted any stories submitted by Randy Zagar.
Submit a story now.
Tools & Services
TwitterFacebook
RSS
Podcast
Research & Reports
Company
About UsAdvertising Policies
Privacy
Contact
Help & FeedbackMedia Kit
Sponsor/Advertise
Submit a Story
More
Copia InstituteInsider Shop
Support Techdirt