I don't know how things work in Britain, but here in the US one of most important criteria for obtaining/keeping ANY clearance is that you not be "blackmail-able".
An interesting response to those questions would have been:
If there were a secretly gay member of GCHQ, wouldn't they pose an unacceptable blackmail risk, thus disqualifying them from having a clearance at all?
This might explain the Telco's reluctance to refuse overbroad requests. There's already a precedent of losing government funding when you appear "adversarial".
Maybe, just maybe they're operating under the idea that their "protected" systems shouldn't be involved in providing data/ services on a public network...
Many of you seem to be operating under the illusion that you can trust your computer. You can't. It won't always behave the way you expect, especially when it can communicate with a public network. Network communications is never "safe", at best it's "mostly safe."
That whole process of "without having to ...innovate myself" is called learning. It's not like I have a replicator and can just "copy" his spear, I have to "learn" the techniques he used before I can produce one on my own.
Also, if they actually don't have the capability to process all of their data... they can't actually talk about that in a public forum because that'd be revealing their internal techniques (which are classified).
The CIA, FBI and ordinary Law Enforcement aren't terribly keen about discussing their techniques in public either...
Okay, I remember reading (probably on Wired) that the NSA has an unusual definition of "intercept" when it came to domestic telephone calls... An "intercept" for them was going back and analyzing their recordings, not the actual "making" of the recording.
If, for instance, I merely record raw packet data on the network and do not interpret it... then I've "captured the firehose", but I don't know what I've got until I analyze it.
If I have the budget to "capture the firehose" for the entire US telephone network, but I only need to analyze 10-20K "intercepts" per year, then I probably wouldn't have the equipment or staff to evaluate the details of all the data I have.
If that's the situation, then I'd probably respond similarly to Wyden's request. In order to answer his questions I'd have to analyze ALL the data I have, which I don't have the resources or budget to do... and even if I did, it'd expose the details of all communications on the network... which would be an invasion of privacy.
Techdirt has not posted any stories submitted by Randy Zagar.
On the "outing" of GCHQ members...
I don't know how things work in Britain, but here in the US one of most important criteria for obtaining/keeping ANY clearance is that you not be "blackmail-able".
An interesting response to those questions would have been:
If there were a secretly gay member of GCHQ, wouldn't they pose an unacceptable blackmail risk, thus disqualifying them from having a clearance at all?
Anybody remember what happened to Qwest?
I do...
http://www.nytimes.com/2006/05/12/washington/12cnd-phone.html?pagewanted=all&_r=0
On ce they refused the NSA request, they started losing government contracts...
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/12/AR2007101202485.html
This might explain the Telco's reluctance to refuse overbroad requests. There's already a precedent of losing government funding when you appear "adversarial".
Umm, I think you're missing the point...
Maybe, just maybe they're operating under the idea that their "protected" systems shouldn't be involved in providing data/ services on a public network...
Many of you seem to be operating under the illusion that you can trust your computer. You can't. It won't always behave the way you expect, especially when it can communicate with a public network. Network communications is never "safe", at best it's "mostly safe."
Copying vs. Learning
That whole process of "without having to ...innovate myself" is called learning. It's not like I have a replicator and can just "copy" his spear, I have to "learn" the techniques he used before I can produce one on my own.
Re: It makes sense if the NSA is recording *raw* data...
Also, if they actually don't have the capability to process all of their data... they can't actually talk about that in a public forum because that'd be revealing their internal techniques (which are classified).
The CIA, FBI and ordinary Law Enforcement aren't terribly keen about discussing their techniques in public either...
It makes sense if the NSA is recording *raw* data...
Okay, I remember reading (probably on Wired) that the NSA has an unusual definition of "intercept" when it came to domestic telephone calls... An "intercept" for them was going back and analyzing their recordings, not the actual "making" of the recording.
If, for instance, I merely record raw packet data on the network and do not interpret it... then I've "captured the firehose", but I don't know what I've got until I analyze it.
If I have the budget to "capture the firehose" for the entire US telephone network, but I only need to analyze 10-20K "intercepts" per year, then I probably wouldn't have the equipment or staff to evaluate the details of all the data I have.
If that's the situation, then I'd probably respond similarly to Wyden's request. In order to answer his questions I'd have to analyze ALL the data I have, which I don't have the resources or budget to do... and even if I did, it'd expose the details of all communications on the network... which would be an invasion of privacy.